1# This file has been modified by Chainguard, Inc.
3# Copyright Chainguard, Inc. All Rights Reserved.
4# Chainguard, Inc. modifications are subject to the license
5# available at: https://www.chainguard.dev/legal/software-license-agreement
7# Copyright Broadcom, Inc. All Rights Reserved.
8# SPDX-License-Identifier: APACHE-2.0
10## @section Global parameters
11## Global Docker image parameters
12## Please, note that this will override the image parameters, including dependencies, configured to use the global value
13## Current available global Docker image parameters: imageRegistry, imagePullSecrets and storageClass
15## @param global.imageRegistry Global Docker image registry
16## @param global.imagePullSecrets Global Docker registry secret names as an array
17## @param global.defaultStorageClass Global default StorageClass for Persistent Volume(s)
23 ## - myRegistryKeySecretName
26 defaultStorageClass: ""
27 ## Security parameters
30 ## @param global.security.allowInsecureImages Allows skipping image verification
31 allowInsecureImages: false
32 ## Compatibility adaptations for Kubernetes platforms
35 ## Compatibility adaptations for Openshift
38 ## @param global.compatibility.openshift.adaptSecurityContext Adapt the securityContext sections of the deployment to make them compatible with Openshift restricted-v2 SCC: remove runAsUser, runAsGroup and fsGroup and let the platform use their allowed default IDs. Possible values: auto (apply if the detected running cluster is Openshift), force (perform the adaptation always), disabled (do not perform adaptation)
40 adaptSecurityContext: auto
42## @section Common parameters
44## @param kubeVersion Override Kubernetes version
47## @param apiVersions Override Kubernetes API versions reported by .Capabilities
50## @param nameOverride String to partially override common.names.fullname
53## @param fullnameOverride String to fully override common.names.fullname
56## @param namespaceOverride String to fully override common.names.namespace
59## @param clusterDomain Default Kubernetes cluster domain
61clusterDomain: cluster.local
62## @param commonLabels Labels to add to all deployed objects
65## @param commonAnnotations Annotations to add to all deployed objects
68## @param extraDeploy Array of extra objects to deploy with the release
71## @param usePasswordFiles Mount credentials as files instead of using environment variables
75## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden)
76## @param diagnosticMode.command Command to override all containers in the chart release
77## @param diagnosticMode.args Args to override all containers in the chart release
85## @param serviceBindings.enabled Create secret for service binding (Experimental)
86## Ref: https://servicebinding.io/service-provider/
90## @section Kafka common parameters
92## Iamguarded Kafka image version
93## @param image.registry [default: REGISTRY_NAME] Kafka image registry
94## @param image.repository [default: REPOSITORY_NAME/kafka] Kafka image repository
95## @skip image.tag Kafka image tag (immutable tags are recommended)
96## @param image.digest Kafka image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag
97## @param image.pullPolicy Kafka image pull policy
98## @param image.pullSecrets Specify docker-registry secret names as an array
99## @param image.debug Specify if debug values should be set
103 repository: chainguard-private/kafka-iamguarded
106 ## Specify a imagePullPolicy
107 ## ref: https://kubernetes.io/docs/concepts/containers/images/#pre-pulled-images
109 pullPolicy: IfNotPresent
110 ## Optionally specify an array of imagePullSecrets.
111 ## Secrets must be manually created in the namespace.
112 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
115 ## - myRegistryKeySecretName
118 ## Set to true if you would like to see extra information on logs
121## @param clusterId Kafka Kraft cluster ID (ignored if existingKraftSecret is set). A random cluster ID will be generated the 1st time Kraft is initialized if not set.
122## NOTE: Already initialized Kafka nodes will use cluster ID stored in their persisted storage.
123## If reusing existing PVCs, make sure the cluster ID is set matching the stored cluster ID, otherwise new nodes will fail to join the cluster.
124## In case the cluster ID stored in the secret does not match the value stored in /iamguarded/kafka/data/meta.properties, remove the secret and upgrade the chart setting the correct value.
127## @param existingKraftSecret Name of the secret containing the Kafka KRaft Cluster ID and one directory ID per controller replica
129existingKraftSecret: ""
130## @param kraftVersion Kraft version to be used. It determines whether static quorum (kraftVersion=0) or dynamic quorum (kraftVersion=1) will be used.
131## NOTE: Kafka 4.0 does not yet support switching kraft version. This setting was added for backward-compatibility with 3.x clusters.
132## Ref: https://kafka.apache.org/documentation/#static_versus_dynamic_kraft_quorums
135## @param config Specify content for Kafka configuration (auto-generated based on other parameters otherwise)
136## NOTE: This will override the configuration based on values, please act carefully
137## Use simple key-value YAML format, then it's transformed to properties format by the chart. e.g:
138## process.roles: broker
139## ... will be transformed to:
140## process.roles=broker
143## @param overrideConfiguration Kafka common configuration override. Values defined here takes precedence over the ones defined at `config`
145overrideConfiguration: {}
146## @param existingConfigmap Name of an existing ConfigMap with the Kafka configuration
149## @param secretConfig Additional configuration to be appended at the end of the generated Kafka configuration (store in a secret)
152## @param existingSecretConfig Secret with additional configuration that will be appended to the end of the generated Kafka configuration
153## The key for the configuration should be: server-secret.properties
154## NOTE: This will override secretConfig value
156existingSecretConfig: ""
157## @param log4j2 Specify content for Kafka log4j2 configuration (default one is used otherwise)
158## ref: https://github.com/apache/kafka/blob/trunk/config/log4j2.yaml
161## @param existingLog4j2ConfigMap The name of an existing ConfigMap containing the log4j2.yaml file
163existingLog4j2ConfigMap: ""
164## @param heapOpts Kafka Java Heap configuration
166heapOpts: -XX:InitialRAMPercentage=75 -XX:MaxRAMPercentage=75
167## @param brokerRackAwareness.enabled Enable Kafka Rack Awareness
168## @param brokerRackAwareness.cloudProvider Cloud provider to use to set Broker Rack Awareness. Allowed values: `aws-az`, `azure`
169## @param brokerRackAwareness.azureApiVersion Metadata API version to use when brokerRackAwareness.cloudProvider is set to `azure`
170## ref: https://cwiki.apache.org/confluence/display/KAFKA/KIP-392%3A+Allow+consumers+to+fetch+from+closest+replica
175 azureApiVersion: "2023-11-15"
176## @param interBrokerProtocolVersion Override the setting 'inter.broker.protocol.version' during the ZK migration.
177## Ref. https://docs.confluent.io/platform/current/installation/migrate-zk-kraft.html
179interBrokerProtocolVersion: ""
180## Kafka listeners configuration
183 ## @param listeners.client.name Name for the Kafka client listener
184 ## @param listeners.client.containerPort Port for the Kafka client listener
185 ## @param listeners.client.protocol Security protocol for the Kafka client listener. Allowed values are 'PLAINTEXT', 'SASL_PLAINTEXT', 'SASL_SSL' and 'SSL'
186 ## @param listeners.client.sslClientAuth Optional. If SASL_SSL is enabled, configure mTLS TLS authentication type. If SSL protocol is enabled, overrides tls.authType for this listener. Allowed values are 'none', 'requested' and 'required'
189 protocol: SASL_PLAINTEXT
192 ## @param listeners.controller.name Name for the Kafka controller listener
193 ## @param listeners.controller.containerPort Port for the Kafka controller listener
194 ## @param listeners.controller.protocol Security protocol for the Kafka controller listener. Allowed values are 'PLAINTEXT', 'SASL_PLAINTEXT', 'SASL_SSL' and 'SSL'
195 ## @param listeners.controller.sslClientAuth Optional. If SASL_SSL is enabled, configure mTLS TLS authentication type. If SSL protocol is enabled, overrides tls.authType for this listener. Allowed values are 'none', 'requested' and 'required'
196 ## Ref: https://cwiki.apache.org/confluence/display/KAFKA/KIP-684+-+Support+mutual+TLS+authentication+on+SASL_SSL+listeners
200 protocol: SASL_PLAINTEXT
202 ## @param listeners.interbroker.name Name for the Kafka inter-broker listener
203 ## @param listeners.interbroker.containerPort Port for the Kafka inter-broker listener
204 ## @param listeners.interbroker.protocol Security protocol for the Kafka inter-broker listener. Allowed values are 'PLAINTEXT', 'SASL_PLAINTEXT', 'SASL_SSL' and 'SSL'
205 ## @param listeners.interbroker.sslClientAuth Optional. If SASL_SSL is enabled, configure mTLS TLS authentication type. If SSL protocol is enabled, overrides tls.authType for this listener. Allowed values are 'none', 'requested' and 'required'
208 protocol: SASL_PLAINTEXT
211 ## @param listeners.external.containerPort Port for the Kafka external listener
212 ## @param listeners.external.protocol Security protocol for the Kafka external listener. . Allowed values are 'PLAINTEXT', 'SASL_PLAINTEXT', 'SASL_SSL' and 'SSL'
213 ## @param listeners.external.name Name for the Kafka external listener
214 ## @param listeners.external.sslClientAuth Optional. If SASL_SSL is enabled, configure mTLS TLS authentication type. If SSL protocol is enabled, overrides tls.sslClientAuth for this listener. Allowed values are 'none', 'requested' and 'required'
217 protocol: SASL_PLAINTEXT
220 ## @param listeners.extraListeners Array of listener objects to be appended to already existing listeners
224 ## containerPort: 9097
225 ## protocol: SASL_PLAINTEXT
229 ## NOTE: If set, below values will override configuration set using the above values (extraListeners.*, controller.*, interbroker.*, client.* and external.*)
230 ## @param listeners.overrideListeners Overrides the Kafka 'listeners' configuration setting.
231 ## @param listeners.advertisedListeners Overrides the Kafka 'advertised.listener' configuration setting.
232 ## @param listeners.securityProtocolMap Overrides the Kafka 'security.protocol.map' configuration setting.
233 overrideListeners: ""
234 advertisedListeners: ""
235 securityProtocolMap: ""
236## @section Kafka SASL parameters
237## Kafka SASL settings for authentication, required if SASL_PLAINTEXT or SASL_SSL listeners are configured
240 ## @param sasl.enabledMechanisms Comma-separated list of allowed SASL mechanisms when SASL listeners are configured. Allowed types: `PLAIN`, `SCRAM-SHA-256`, `SCRAM-SHA-512`, `OAUTHBEARER`
241 ## NOTE: At the moment, Kafka Raft mode does not support SCRAM, that is why only PLAIN is configured.
243 enabledMechanisms: PLAIN,SCRAM-SHA-256,SCRAM-SHA-512
244 ## @param sasl.interBrokerMechanism SASL mechanism for inter broker communication.
246 interBrokerMechanism: PLAIN
247 ## @param sasl.controllerMechanism SASL mechanism for controller communications.
249 controllerMechanism: PLAIN
250 ## Settings for OAuthBearer mechanism
251 ## @param sasl.oauthbearer.tokenEndpointUrl The URL for the OAuth/OIDC identity provider
252 ## @param sasl.oauthbearer.jwksEndpointUrl The OAuth/OIDC provider URL from which the provider's JWKS (JSON Web Key Set) can be retrieved
253 ## @param sasl.oauthbearer.expectedAudience The comma-delimited setting for the broker to use to verify that the JWT was issued for one of the expected audiences
254 ## @param sasl.oauthbearer.subClaimName The OAuth claim name for the subject.
261 ## Credentials for inter-broker communications.
262 ## @param sasl.interbroker.user Username for inter-broker communications when SASL is enabled
263 ## @param sasl.interbroker.password Password for inter-broker communications when SASL is enabled. If not set and SASL is enabled for the controller listener, a random password will be generated.
264 ## @param sasl.interbroker.clientId Client ID for inter-broker communications when SASL is enabled with mechanism OAUTHBEARER
265 ## @param sasl.interbroker.clientSecret Client Secret for inter-broker communications when SASL is enabled with mechanism OAUTHBEARER. If not set and SASL is enabled for the controller listener, a random secret will be generated.
268 user: inter_broker_user
270 clientId: inter_broker_client
272 ## Credentials for controller communications.
273 ## @param sasl.controller.user Username for controller communications when SASL is enabled
274 ## @param sasl.controller.password Password for controller communications when SASL is enabled. If not set and SASL is enabled for the inter-broker listener, a random password will be generated.
275 ## @param sasl.controller.clientId Client ID for controller communications when SASL is enabled with mechanism OAUTHBEARER
276 ## @param sasl.controller.clientSecret Client Secret for controller communications when SASL is enabled with mechanism OAUTHBEARER. If not set and SASL is enabled for the inter-broker listener, a random secret will be generated.
279 user: controller_user
281 clientId: controller_broker_client
283 ## Credentials for client communications.
284 ## @param sasl.client.users Comma-separated list of usernames for client communications when SASL is enabled
285 ## @param sasl.client.passwords Comma-separated list of passwords for client communications when SASL is enabled, must match the number of client.users
291 ## @param sasl.existingSecret Name of the existing secret containing credentials for client.users, interbroker.user and controller.user
292 ## Create this secret running the command below where SECRET_NAME is the name of the secret you want to create:
293 ## kubectl create secret generic SECRET_NAME --from-literal=client-passwords=CLIENT_PASSWORD1,CLIENT_PASSWORD2 --from-literal=inter-broker-password=INTER_BROKER_PASSWORD --from-literal=inter-broker-client-secret=INTER_BROKER_CLIENT_SECRET --from-literal=controller-password=CONTROLLER_PASSWORD --from-literal=controller-client-secret=CONTROLLER_CLIENT_SECRET
294 ## The client secrets are only required when using OAuthBearer as SASL mechanism.
295 ## Client, inter-broker and controller passwords are only required if the SASL mechanism includes something other than OAuthBearer.
298## @section Kafka TLS parameters
299## Kafka TLS settings, required if SSL or SASL_SSL listeners are configured
302 ## @param tls.type Format to use for TLS certificates. Allowed types: `JKS` and `PEM`
305 ## @param tls.pemChainIncluded Flag to denote that the Certificate Authority (CA) certificates are bundled with the endpoint cert.
306 ## Certificates must be in proper order, where the top certificate is the leaf and the bottom certificate is the top-most intermediate CA.
308 pemChainIncluded: false
309 ## @param tls.autoGenerated.enabled Enable automatic generation of TLS certificates (only supported if `tls.type` is `PEM`)
310 ## @param tls.autoGenerated.engine Mechanism to generate the certificates (allowed values: helm, cert-manager)
311 ## @param tls.autoGenerated.customAltNames List of additional subject alternative names (SANs) for the automatically generated TLS certificates.
312 ## @param tls.autoGenerated.certManager.existingIssuer The name of an existing Issuer to use for generating the certificates (only for `cert-manager` engine)
313 ## @param tls.autoGenerated.certManager.existingIssuerKind Existing Issuer kind, defaults to Issuer (only for `cert-manager` engine)
314 ## @param tls.autoGenerated.certManager.keyAlgorithm Key algorithm for the certificates (only for `cert-manager` engine)
315 ## @param tls.autoGenerated.certManager.keySize Key size for the certificates (only for `cert-manager` engine)
316 ## @param tls.autoGenerated.certManager.duration Duration for the certificates (only for `cert-manager` engine)
317 ## @param tls.autoGenerated.certManager.renewBefore Renewal period for the certificates (only for `cert-manager` engine)
325 existingIssuerKind: ""
330 ## @param tls.existingSecret Name of the existing secret containing the TLS certificates for the Kafka nodes.
331 ## When using 'jks' format for certificates, each secret should contain a truststore and a keystore.
332 ## Create these secrets following the steps below:
333 ## 1) Generate your truststore and keystore files. Helpful script: https://raw.githubusercontent.com/confluentinc/confluent-platform-security-tools/master/kafka-generate-ssl.sh
334 ## 2) Rename your truststore to `kafka.truststore.jks`.
335 ## 3) Rename your keystores to `kafka-<role>-X.keystore.jks` where X is the replica number of the .
336 ## 4) Run the command below one time per broker to create its associated secret (SECRET_NAME_X is the name of the secret you want to create):
337 ## kubectl create secret generic SECRET_NAME_0 --from-file=kafka.truststore.jks=./kafka.truststore.jks \
338 ## --from-file=kafka-controller-0.keystore.jks=./kafka-controller-0.keystore.jks --from-file=kafka-broker-0.keystore.jks=./kafka-broker-0.keystore.jks ...
340 ## NOTE: Alternatively, a single keystore can be provided for all nodes under the key 'kafka.keystore.jks', this keystore will be used by all nodes unless overridden by the 'kafka-<role>-X.keystore.jks' file
342 ## When using 'pem' format for certificates, each secret should contain a public CA certificate, a public certificate and one private key.
343 ## Create these secrets following the steps below:
344 ## 1) Create a certificate key and signing request per Kafka broker, and sign the signing request with your CA
345 ## 2) Rename your CA file to `ca.crt`.
346 ## 3) Rename your certificates to `kafka-X.tls.crt` where X is the ID of each Kafka broker.
347 ## 3) Rename your keys to `kafka-X.tls.key` where X is the ID of each Kafka broker.
348 ## 4) Run the command below one time per broker to create its associated secret (SECRET_NAME_X is the name of the secret you want to create):
349 ## kubectl create secret generic SECRET_NAME_0 --from-file=ca.crt=./ca.crt --from-file=kafka-controller-0.crt=./kafka-controller-0.crt --from-file=kafka-controller-0.key=./kafka-controller-0.key \
350 ## --from-file=kafka-broker-0.crt=./kafka-broker-0.crt --from-file=kafka-broker-0.key=./kafka-broker-0.key ...
352 ## NOTE: Alternatively, a single key and certificate can be provided for all nodes under the keys 'tls.crt' and 'tls.key'. These certificates will be used by all nodes unless overridden by the 'kafka-<role>-X.key' and 'kafka-<role>-X.crt' files
355 ## @param tls.passwordsSecret Name of the secret containing the password to access the JKS files or PEM key when they are password-protected. (`key`: `password`)
358 ## @param tls.passwordsSecretKeystoreKey The secret key from the tls.passwordsSecret containing the password for the Keystore.
360 passwordsSecretKeystoreKey: keystore-password
361 ## @param tls.passwordsSecretTruststoreKey The secret key from the tls.passwordsSecret containing the password for the Truststore.
363 passwordsSecretTruststoreKey: truststore-password
364 ## @param tls.passwordsSecretPemPasswordKey The secret key from the tls.passwordsSecret containing the password for the PEM key inside 'tls.passwordsSecret'.
366 passwordsSecretPemPasswordKey: ""
367 ## @param tls.keystorePassword Password to access the JKS keystore when it is password-protected. Ignored when 'tls.passwordsSecret' is provided.
368 ## When using tls.type=PEM, the generated keystore will use this password or randomly generate one.
371 ## @param tls.truststorePassword Password to access the JKS truststore when it is password-protected. Ignored when 'tls.passwordsSecret' is provided.
372 ## When using tls.type=PEM, the generated keystore will use this password or randomly generate one.
374 truststorePassword: ""
375 ## @param tls.keyPassword Password to access the PEM key when it is password-protected.
376 ## Note: ignored when using 'tls.passwordsSecret'
379 ## @param tls.jksKeystoreKey The secret key from the `tls.existingSecret` containing the keystore
380 ## Note: ignored when using 'pem' format for certificates.
383 ## @param tls.jksTruststoreSecret Name of the existing secret containing your truststore if truststore not existing or different from the one in the `tls.existingSecret`
384 ## Note: ignored when using 'pem' format for certificates.
386 jksTruststoreSecret: ""
387 ## @param tls.jksTruststoreKey The secret key from the `tls.existingSecret` or `tls.jksTruststoreSecret` containing the truststore
388 ## Note: ignored when using 'pem' format for certificates.
391 ## @param tls.endpointIdentificationAlgorithm The endpoint identification algorithm to validate server hostname using server certificate
392 ## Disable server host name verification by setting it to an empty string.
393 ## ref: https://docs.confluent.io/current/kafka/authentication_ssl.html#optional-settings
395 endpointIdentificationAlgorithm: https
396 ## @param tls.sslClientAuth Sets the default value for the ssl.client.auth Kafka setting.
397 ## ref: https://docs.confluent.io/current/kafka/authentication_ssl.html#optional-settings
399 sslClientAuth: "required"
400## @param extraEnvVars Extra environment variables to add to Kafka pods
403## - name: KAFKA_CFG_BACKGROUND_THREADS
407## @param extraEnvVarsCM ConfigMap with extra environment variables
410## @param extraEnvVarsSecret Secret with extra environment variables
412extraEnvVarsSecret: ""
413## @param extraVolumes Optionally specify extra list of additional volumes for the Kafka pod(s)
418## secretName: kafka-jaas
421## @param extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Kafka container(s)
424## mountPath: /iamguarded/kafka/config/kafka_jaas.conf
425## subPath: kafka_jaas.conf
428## @param sidecars Add additional sidecar containers to the Kafka pod(s)
431## - name: your-image-name
433## imagePullPolicy: Always
436## containerPort: 1234
439## @param initContainers Add additional Add init containers to the Kafka pod(s)
442## - name: your-image-name
444## imagePullPolicy: Always
447## containerPort: 1234
451## Ref: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/
452## @param dnsPolicy Specifies the DNS policy for the Kafka pods
453## DNS policies can be set on a per-Pod basis. Currently Kubernetes supports the following Pod-specific DNS policies.
454## Available options: Default, ClusterFirst, ClusterFirstWithHostNet, None
455## Ref: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-s-dns-policy
457## @param dnsConfig allows users more control on the DNS settings for a Pod. Required if `dnsPolicy` is set to `None`
458## The dnsConfig field is optional and it can work with any dnsPolicy settings.
459## Ref: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-dns-config
463## - 192.0.2.1 # this is an example
465## - ns1.svc.cluster-domain.example
466## - my.dns.search.suffix
472## Default init Containers
474defaultInitContainers:
475 ## 'volume-permissions' init container
476 ## Used to change the owner and group of the persistent volume(s) mountpoint(s) to 'runAsUser:fsGroup' on each node
479 ## @param defaultInitContainers.volumePermissions.enabled Enable init container that changes the owner and group of the persistent volume
482 ## @param defaultInitContainers.volumePermissions.image.registry [default: REGISTRY_NAME] "volume-permissions" init-containers' image registry
483 ## @param defaultInitContainers.volumePermissions.image.repository [default: REPOSITORY_NAME/os-shell] "volume-permissions" init-containers' image repository
484 ## @skip defaultInitContainers.volumePermissions.image.tag "volume-permissions" init-containers' image tag (immutable tags are recommended)
485 ## @param defaultInitContainers.volumePermissions.image.digest "volume-permissions" init-containers' image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag
486 ## @param defaultInitContainers.volumePermissions.image.pullPolicy "volume-permissions" init-containers' image pull policy
487 ## @param defaultInitContainers.volumePermissions.image.pullSecrets "volume-permissions" init-containers' image pull secrets
491 repository: chainguard-private/os-shell-iamguarded
494 pullPolicy: IfNotPresent
495 ## Optionally specify an array of imagePullSecrets.
496 ## Secrets must be manually created in the namespace.
497 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
500 ## - myRegistryKeySecretName
503 ## Configure "volume-permissions" init-container Security Context
504 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
505 ## @param defaultInitContainers.volumePermissions.containerSecurityContext.enabled Enabled "volume-permissions" init-containers' Security Context
506 ## @param defaultInitContainers.volumePermissions.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in "volume-permissions" init-containers
507 ## @param defaultInitContainers.volumePermissions.containerSecurityContext.runAsUser Set runAsUser in "volume-permissions" init-containers' Security Context
508 ## @param defaultInitContainers.volumePermissions.containerSecurityContext.privileged Set privileged in "volume-permissions" init-containers' Security Context
509 ## @param defaultInitContainers.volumePermissions.containerSecurityContext.allowPrivilegeEscalation Set allowPrivilegeEscalation in "volume-permissions" init-containers' Security Context
510 ## @param defaultInitContainers.volumePermissions.containerSecurityContext.capabilities.add List of capabilities to be added in "volume-permissions" init-containers
511 ## @param defaultInitContainers.volumePermissions.containerSecurityContext.capabilities.drop List of capabilities to be dropped in "volume-permissions" init-containers
512 ## @param defaultInitContainers.volumePermissions.containerSecurityContext.seccompProfile.type Set seccomp profile in "volume-permissions" init-containers
514 containerSecurityContext:
519 allowPrivilegeEscalation: false
524 type: "RuntimeDefault"
525 ## Kafka "volume-permissions" init container resource requests and limits
526 ## ref: http://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/
527 ## @param defaultInitContainers.volumePermissions.resourcesPreset Set Kafka "volume-permissions" init container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if defaultInitContainers.volumePermissions.resources is set (defaultInitContainers.volumePermissions.resources is recommended for production).
529 resourcesPreset: "nano"
530 ## @param defaultInitContainers.volumePermissions.resources Set Kafka "volume-permissions" init container requests and limits for different resources like CPU or memory (essential for production workloads)
541 ## Kafka "prepare-config" init container
542 ## Used to prepare the Kafka configuration files for main containers to use them
545 ## Configure "prepare-config" init-container Security Context
546 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
547 ## @param defaultInitContainers.prepareConfig.containerSecurityContext.enabled Enabled "prepare-config" init-containers' Security Context
548 ## @param defaultInitContainers.prepareConfig.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in "prepare-config" init-containers
549 ## @param defaultInitContainers.prepareConfig.containerSecurityContext.runAsUser Set runAsUser in "prepare-config" init-containers' Security Context
550 ## @param defaultInitContainers.prepareConfig.containerSecurityContext.runAsGroup Set runAsUser in "prepare-config" init-containers' Security Context
551 ## @param defaultInitContainers.prepareConfig.containerSecurityContext.runAsNonRoot Set runAsNonRoot in "prepare-config" init-containers' Security Context
552 ## @param defaultInitContainers.prepareConfig.containerSecurityContext.readOnlyRootFilesystem Set readOnlyRootFilesystem in "prepare-config" init-containers' Security Context
553 ## @param defaultInitContainers.prepareConfig.containerSecurityContext.privileged Set privileged in "prepare-config" init-containers' Security Context
554 ## @param defaultInitContainers.prepareConfig.containerSecurityContext.allowPrivilegeEscalation Set allowPrivilegeEscalation in "prepare-config" init-containers' Security Context
555 ## @param defaultInitContainers.prepareConfig.containerSecurityContext.capabilities.add List of capabilities to be added in "prepare-config" init-containers
556 ## @param defaultInitContainers.prepareConfig.containerSecurityContext.capabilities.drop List of capabilities to be dropped in "prepare-config" init-containers
557 ## @param defaultInitContainers.prepareConfig.containerSecurityContext.seccompProfile.type Set seccomp profile in "prepare-config" init-containers
559 containerSecurityContext:
565 readOnlyRootFilesystem: true
567 allowPrivilegeEscalation: false
572 type: "RuntimeDefault"
573 ## Kafka "prepare-config" init container resource requests and limits
574 ## ref: http://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/
575 ## @param defaultInitContainers.prepareConfig.resourcesPreset Set Kafka "prepare-config" init container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if defaultInitContainers.prepareConfig.resources is set (defaultInitContainers.prepareConfig.resources is recommended for production).
577 resourcesPreset: "nano"
578 ## @param defaultInitContainers.prepareConfig.resources Set Kafka "prepare-config" init container requests and limits for different resources like CPU or memory (essential for production workloads)
589 ## @param defaultInitContainers.prepareConfig.extraInit Additional content for the "prepare-config" init script, rendered as a template.
592 ## 'auto-discovery' init container
593 ## Used to auto-detect LB IPs or node ports by querying the K8s API
594 ## Note: RBAC might be required
597 ## @param defaultInitContainers.autoDiscovery.enabled Enable init container that auto-detects external IPs/ports by querying the K8s API
600 ## Iamguarded Kubectl image
601 ## @param defaultInitContainers.autoDiscovery.image.registry [default: REGISTRY_NAME] "auto-discovery" init-containers' image registry
602 ## @param defaultInitContainers.autoDiscovery.image.repository [default: REPOSITORY_NAME/os-shell] "auto-discovery" init-containers' image repository
603 ## @skip defaultInitContainers.autoDiscovery.image.tag "auto-discovery" init-containers' image tag (immutable tags are recommended)
604 ## @param defaultInitContainers.autoDiscovery.image.digest "auto-discovery" init-containers' image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag
605 ## @param defaultInitContainers.autoDiscovery.image.pullPolicy "auto-discovery" init-containers' image pull policy
606 ## @param defaultInitContainers.autoDiscovery.image.pullSecrets "auto-discovery" init-containers' image pull secrets
610 repository: chainguard-private/kubectl-iamguarded
613 ## Specify a imagePullPolicy
614 ## ref: https://kubernetes.io/docs/concepts/containers/images/#pre-pulled-images
616 pullPolicy: IfNotPresent
617 ## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace)
618 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
621 ## - myRegistryKeySecretName
624 ## Configure "auto-discovery" init-container Security Context
625 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
626 ## @param defaultInitContainers.autoDiscovery.containerSecurityContext.enabled Enabled "auto-discovery" init-containers' Security Context
627 ## @param defaultInitContainers.autoDiscovery.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in "auto-discovery" init-containers
628 ## @param defaultInitContainers.autoDiscovery.containerSecurityContext.runAsUser Set runAsUser in "auto-discovery" init-containers' Security Context
629 ## @param defaultInitContainers.autoDiscovery.containerSecurityContext.runAsGroup Set runAsUser in "auto-discovery" init-containers' Security Context
630 ## @param defaultInitContainers.autoDiscovery.containerSecurityContext.runAsNonRoot Set runAsNonRoot in "auto-discovery" init-containers' Security Context
631 ## @param defaultInitContainers.autoDiscovery.containerSecurityContext.readOnlyRootFilesystem Set readOnlyRootFilesystem in "auto-discovery" init-containers' Security Context
632 ## @param defaultInitContainers.autoDiscovery.containerSecurityContext.privileged Set privileged in "auto-discovery" init-containers' Security Context
633 ## @param defaultInitContainers.autoDiscovery.containerSecurityContext.allowPrivilegeEscalation Set allowPrivilegeEscalation in "auto-discovery" init-containers' Security Context
634 ## @param defaultInitContainers.autoDiscovery.containerSecurityContext.capabilities.add List of capabilities to be added in "auto-discovery" init-containers
635 ## @param defaultInitContainers.autoDiscovery.containerSecurityContext.capabilities.drop List of capabilities to be dropped in "auto-discovery" init-containers
636 ## @param defaultInitContainers.autoDiscovery.containerSecurityContext.seccompProfile.type Set seccomp profile in "auto-discovery" init-containers
638 containerSecurityContext:
644 readOnlyRootFilesystem: true
646 allowPrivilegeEscalation: false
651 type: "RuntimeDefault"
652 ## Kafka "auto-discovery" init container resource requests and limits
653 ## ref: http://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/
654 ## @param defaultInitContainers.autoDiscovery.resourcesPreset Set Kafka "auto-discovery" init container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if defaultInitContainers.autoDiscovery.resources is set (defaultInitContainers.autoDiscovery.resources is recommended for production).
656 resourcesPreset: "nano"
657 ## @param defaultInitContainers.autoDiscovery.resources Set Kafka "auto-discovery" init container requests and limits for different resources like CPU or memory (essential for production workloads)
668## @section Controller-eligible statefulset parameters
671 ## @param controller.replicaCount Number of Kafka controller-eligible nodes
674 ## @param controller.controllerOnly If set to true, controller nodes will be deployed as dedicated controllers, instead of controller+broker processes.
676 controllerOnly: false
677 ## @param controller.quorumBootstrapServers Override the Kafka controller quorum bootstrap servers of the Kafka Kraft cluster. If not set, it will be automatically configured to use all controller-eligible nodes.
679 quorumBootstrapServers: ""
680 ## @param controller.minId Minimal node.id values for controller-eligible nodes. Do not change after first initialization.
681 ## Broker-only id increment their ID starting at this minimal value.
682 ## We recommend setting this this value high enough, as IDs under this value will be used by controller-elegible nodes
685 ## @param controller.config Specify content for Kafka configuration for Kafka controller-eligible nodes (auto-generated based on other parameters otherwise)
686 ## NOTE: This will override the configuration based on values, please act carefully
687 ## Use simple key-value YAML format, then it's transformed to properties format by the chart. e.g:
688 ## process.roles: controller
689 ## ... will be transformed to:
690 ## process.roles=controller
693 ## @param controller.overrideConfiguration Kafka configuration override for Kafka controller-eligible nodes. Values defined here takes precedence over the ones defined at `controller.config`
695 overrideConfiguration: {}
696 ## @param controller.existingConfigmap Name of an existing ConfigMap with the Kafka configuration for Kafka controller-eligible nodes
698 existingConfigmap: ""
699 ## @param controller.secretConfig Additional configuration to be appended at the end of the generated Kafka configuration for Kafka controller-eligible nodes (store in a secret)
702 ## @param controller.existingSecretConfig Secret with additional configuration that will be appended to the end of the generated Kafka configuration for Kafka controller-eligible nodes
703 ## The key for the configuration should be: server-secret.properties
704 ## NOTE: This will override secretConfig value
706 existingSecretConfig: ""
707 ## @param controller.heapOpts Kafka Java Heap configuration for controller-eligible nodes
709 heapOpts: -XX:InitialRAMPercentage=75 -XX:MaxRAMPercentage=75
710 ## @param controller.command Override Kafka container command
713 ## @param controller.args Override Kafka container arguments
716 ## @param controller.extraEnvVars Extra environment variables to add to Kafka pods
719 ## - name: KAFKA_CFG_BACKGROUND_THREADS
723 ## @param controller.extraEnvVarsCM ConfigMap with extra environment variables
726 ## @param controller.extraEnvVarsSecret Secret with extra environment variables
728 extraEnvVarsSecret: ""
729 ## @param controller.extraContainerPorts Kafka controller-eligible extra containerPorts.
731 extraContainerPorts: []
732 ## Configure extra options for Kafka containers' liveness, readiness and startup probes
733 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes
734 ## @param controller.livenessProbe.enabled Enable livenessProbe on Kafka containers
735 ## @param controller.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe
736 ## @param controller.livenessProbe.periodSeconds Period seconds for livenessProbe
737 ## @param controller.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe
738 ## @param controller.livenessProbe.failureThreshold Failure threshold for livenessProbe
739 ## @param controller.livenessProbe.successThreshold Success threshold for livenessProbe
743 initialDelaySeconds: 10
748 ## @param controller.readinessProbe.enabled Enable readinessProbe on Kafka containers
749 ## @param controller.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe
750 ## @param controller.readinessProbe.periodSeconds Period seconds for readinessProbe
751 ## @param controller.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe
752 ## @param controller.readinessProbe.failureThreshold Failure threshold for readinessProbe
753 ## @param controller.readinessProbe.successThreshold Success threshold for readinessProbe
757 initialDelaySeconds: 5
762 ## @param controller.startupProbe.enabled Enable startupProbe on Kafka containers
763 ## @param controller.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe
764 ## @param controller.startupProbe.periodSeconds Period seconds for startupProbe
765 ## @param controller.startupProbe.timeoutSeconds Timeout seconds for startupProbe
766 ## @param controller.startupProbe.failureThreshold Failure threshold for startupProbe
767 ## @param controller.startupProbe.successThreshold Success threshold for startupProbe
771 initialDelaySeconds: 30
776 ## @param controller.customLivenessProbe Custom livenessProbe that overrides the default one
778 customLivenessProbe: {}
779 ## @param controller.customReadinessProbe Custom readinessProbe that overrides the default one
781 customReadinessProbe: {}
782 ## @param controller.customStartupProbe Custom startupProbe that overrides the default one
784 customStartupProbe: {}
785 ## @param controller.lifecycleHooks lifecycleHooks for the Kafka container to automate configuration before or after startup
788 ## Kafka resource requests and limits
789 ## ref: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/
790 ## @param controller.resourcesPreset Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if controller.resources is set (controller.resources is recommended for production).
792 resourcesPreset: "small"
793 ## @param controller.resources Set container requests and limits for different resources like CPU or memory (essential for production workloads)
804 ## Kafka pods' Security Context
805 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod
806 ## @param controller.podSecurityContext.enabled Enable security context for the pods
807 ## @param controller.podSecurityContext.fsGroupChangePolicy Set filesystem group change policy
808 ## @param controller.podSecurityContext.sysctls Set kernel settings using the sysctl interface
809 ## @param controller.podSecurityContext.supplementalGroups Set filesystem extra groups
810 ## @param controller.podSecurityContext.fsGroup Set Kafka pod's Security Context fsGroup
811 ## @param controller.podSecurityContext.seccompProfile.type Set Kafka pods's Security Context seccomp profile
815 fsGroupChangePolicy: Always
817 supplementalGroups: []
820 type: "RuntimeDefault"
821 ## Kafka containers' Security Context
822 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
823 ## @param controller.containerSecurityContext.enabled Enable Kafka containers' Security Context
824 ## @param controller.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
825 ## @param controller.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
826 ## @param controller.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
827 ## @param controller.containerSecurityContext.runAsGroup Set Kafka containers' Security Context runAsGroup
828 ## @param controller.containerSecurityContext.runAsNonRoot Set Kafka containers' Security Context runAsNonRoot
829 ## @param controller.containerSecurityContext.allowPrivilegeEscalation Force the child process to be run as non-privileged
830 ## @param controller.containerSecurityContext.readOnlyRootFilesystem Allows the pod to mount the RootFS as ReadOnly only
831 ## @param controller.containerSecurityContext.capabilities.drop Set Kafka containers' server Security Context capabilities to be dropped
833 ## containerSecurityContext:
837 ## readOnlyRootFilesystem: true
839 containerSecurityContext:
845 allowPrivilegeEscalation: false
846 readOnlyRootFilesystem: true
849 ## @param controller.automountServiceAccountToken Mount Service Account token in pod
851 automountServiceAccountToken: false
852 ## @param controller.hostAliases Kafka pods host aliases
853 ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/
856 ## @param controller.hostNetwork Specify if host network should be enabled for Kafka pods
859 ## @param controller.hostIPC Specify if host IPC should be enabled for Kafka pods
862 ## @param controller.podLabels Extra labels for Kafka pods
863 ## Ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/
866 ## @param controller.podAnnotations Extra annotations for Kafka pods
867 ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
870 ## @param controller.topologyKey Override common lib default topology key. If empty - "kubernetes.io/hostname" is used
871 ## i.e. topologyKey: topology.kubernetes.io/zone
874 ## @param controller.podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard`
875 ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity
877 podAffinityPreset: ""
878 ## @param controller.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard`
879 ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity
881 podAntiAffinityPreset: soft
882 ## Node affinity preset
883 ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity
886 ## @param controller.nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard`
889 ## @param controller.nodeAffinityPreset.key Node label key to match Ignored if `affinity` is set.
891 ## key: "kubernetes.io/e2e-az-name"
894 ## @param controller.nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set.
901 ## @param controller.affinity Affinity for pod assignment
902 ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
903 ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set
906 ## @param controller.nodeSelector Node labels for pod assignment
907 ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
910 ## @param controller.tolerations Tolerations for pod assignment
911 ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
914 ## @param controller.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template
915 ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods
917 topologySpreadConstraints: []
918 ## @param controller.terminationGracePeriodSeconds Seconds the pod needs to gracefully terminate
919 ## ref: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#hook-handler-execution
921 terminationGracePeriodSeconds: ""
922 ## @param controller.podManagementPolicy StatefulSet controller supports relax its ordering guarantees while preserving its uniqueness and identity guarantees. There are two valid pod management policies: OrderedReady and Parallel
923 ## ref: https://kubernetes.io/docs/tutorials/stateful-application/basic-stateful-set/#pod-management-policy
925 podManagementPolicy: Parallel
926 ## @param controller.minReadySeconds How many seconds a pod needs to be ready before killing the next, during update
929 ## @param controller.priorityClassName Name of the existing priority class to be used by kafka pods
930 ## Ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/
932 priorityClassName: ""
933 ## @param controller.runtimeClassName Name of the runtime class to be used by pod(s)
934 ## ref: https://kubernetes.io/docs/concepts/containers/runtime-class/
937 ## @param controller.enableServiceLinks Whether information about services should be injected into pod's environment variable
938 ## The environment variables injected by service links are not used, but can lead to slow kafka boot times or slow running of the scripts when there are many services in the current namespace.
939 ## If you experience slow pod startups or slow running of the scripts you probably want to set this to `false`.
941 enableServiceLinks: true
942 ## @param controller.schedulerName Name of the k8s scheduler (other than default)
943 ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
946 ## @param controller.updateStrategy.type Kafka statefulset strategy type
947 ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies
951 ## @param controller.extraVolumes Optionally specify extra list of additional volumes for the Kafka pod(s)
954 ## - name: kafka-jaas
956 ## secretName: kafka-jaas
959 ## @param controller.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Kafka container(s)
960 ## extraVolumeMounts:
961 ## - name: kafka-jaas
962 ## mountPath: /iamguarded/kafka/config/kafka_jaas.conf
963 ## subPath: kafka_jaas.conf
965 extraVolumeMounts: []
966 ## @param controller.sidecars Add additional sidecar containers to the Kafka pod(s)
969 ## - name: your-image-name
971 ## imagePullPolicy: Always
974 ## containerPort: 1234
977 ## @param controller.initContainers Add additional Add init containers to the Kafka pod(s)
980 ## - name: your-image-name
982 ## imagePullPolicy: Always
985 ## containerPort: 1234
988 ## @section Experimental: Kafka Controller Autoscaling configuration
989 ## ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/
993 ## @param controller.autoscaling.vpa.enabled Enable VPA
996 ## @param controller.autoscaling.vpa.annotations Annotations for VPA resource
999 ## @param controller.autoscaling.vpa.controlledResources VPA List of resources that the vertical pod autoscaler can control. Defaults to cpu and memory
1001 controlledResources: []
1002 ## @param controller.autoscaling.vpa.maxAllowed VPA Max allowed resources for the pod
1006 ## @param controller.autoscaling.vpa.minAllowed VPA Min allowed resources for the pod
1011 ## @param controller.autoscaling.vpa.updatePolicy.updateMode Autoscaling update policy Specifies whether recommended updates are applied when a Pod is started and whether recommended updates are applied during the life of a Pod
1012 ## Possible values are "Off", "Initial", "Recreate", and "Auto".
1016 ## @param controller.autoscaling.hpa.enabled Enable HPA for Kafka Controller
1019 ## @param controller.autoscaling.hpa.annotations Annotations for HPA resource
1022 ## @param controller.autoscaling.hpa.minReplicas Minimum number of Kafka Controller replicas
1025 ## @param controller.autoscaling.hpa.maxReplicas Maximum number of Kafka Controller replicas
1028 ## @param controller.autoscaling.hpa.targetCPU Target CPU utilization percentage
1031 ## @param controller.autoscaling.hpa.targetMemory Target Memory utilization percentage
1034 ## Kafka Pod Disruption Budget
1035 ## ref: https://kubernetes.io/docs/concepts/workloads/pods/disruptions/
1036 ## @param controller.pdb.create Deploy a pdb object for the Kafka pod
1037 ## @param controller.pdb.minAvailable Minimum number/percentage of available Kafka replicas
1038 ## @param controller.pdb.maxUnavailable Maximum number/percentage of unavailable Kafka replicas
1044 ## persistentVolumeClaimRetentionPolicy
1045 ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#persistentvolumeclaim-retention
1046 ## @param controller.persistentVolumeClaimRetentionPolicy.enabled Controls if and how PVCs are deleted during the lifecycle of a StatefulSet
1047 ## @param controller.persistentVolumeClaimRetentionPolicy.whenScaled Volume retention behavior when the replica count of the StatefulSet is reduced
1048 ## @param controller.persistentVolumeClaimRetentionPolicy.whenDeleted Volume retention behavior that applies when the StatefulSet is deleted
1050 persistentVolumeClaimRetentionPolicy:
1054 ## Enable persistence using Persistent Volume Claims
1055 ## ref: https://kubernetes.io/docs/concepts/storage/persistent-volumes/
1058 ## @param controller.persistence.enabled Enable Kafka data persistence using PVC
1061 ## @param controller.persistence.existingClaim A manually managed Persistent Volume and Claim
1062 ## If defined, PVC must be created manually before volume will be bound
1063 ## The value is evaluated as a template
1066 ## @param controller.persistence.storageClass PVC Storage Class for Kafka data volume
1067 ## If defined, storageClassName: <storageClass>
1068 ## If set to "-", storageClassName: "", which disables dynamic provisioning
1069 ## If undefined (the default) or set to null, no storageClassName spec is
1070 ## set, choosing the default provisioner.
1073 ## @param controller.persistence.accessModes Persistent Volume Access Modes
1077 ## @param controller.persistence.size PVC Storage Request for Kafka data volume
1080 ## @param controller.persistence.annotations Annotations for the PVC
1083 ## @param controller.persistence.labels Labels for the PVC
1086 ## @param controller.persistence.selector Selector to match an existing Persistent Volume for Kafka data PVC. If set, the PVC can't have a PV dynamically provisioned for it
1092 ## @param controller.persistence.mountPath Mount path of the Kafka data volume
1094 mountPath: /iamguarded/kafka
1095 ## Log Persistence parameters
1098 ## @param controller.logPersistence.enabled Enable Kafka logs persistence using PVC
1101 ## @param controller.logPersistence.existingClaim A manually managed Persistent Volume and Claim
1102 ## If defined, PVC must be created manually before volume will be bound
1103 ## The value is evaluated as a template
1106 ## @param controller.logPersistence.storageClass PVC Storage Class for Kafka logs volume
1107 ## If defined, storageClassName: <storageClass>
1108 ## If set to "-", storageClassName: "", which disables dynamic provisioning
1109 ## If undefined (the default) or set to null, no storageClassName spec is
1110 ## set, choosing the default provisioner.
1113 ## @param controller.logPersistence.accessModes Persistent Volume Access Modes
1117 ## @param controller.logPersistence.size PVC Storage Request for Kafka logs volume
1120 ## @param controller.logPersistence.annotations Annotations for the PVC
1123 ## @param controller.logPersistence.selector Selector to match an existing Persistent Volume for Kafka log data PVC. If set, the PVC can't have a PV dynamically provisioned for it
1129 ## @param controller.logPersistence.mountPath Mount path of the Kafka logs volume
1131 mountPath: /opt/iamguarded/kafka/logs
1132## @section Broker-only statefulset parameters
1135 ## @param broker.replicaCount Number of Kafka broker-only nodes
1138 ## @param broker.minId Minimal node.id values for broker-only nodes. Do not change after first initialization.
1139 ## Broker-only id increment their ID starting at this minimal value.
1140 ## We recommend setting this this value high enough, as IDs under this value will be used by controller-eligible nodes
1144 ## @param broker.config Specify content for Kafka configuration for Kafka broker-only nodes (auto-generated based on other parameters otherwise)
1145 ## NOTE: This will override the configuration based on values, please act carefully
1146 ## Use simple key-value YAML format, then it's transformed to properties format by the chart. e.g:
1147 ## process.roles: broker
1148 ## ... will be transformed to:
1149 ## process.roles=broker
1152 ## @param broker.overrideConfiguration Kafka configuration override for Kafka broker-only nodes. Values defined here takes precedence over the ones defined at `broker.config`
1154 overrideConfiguration: {}
1155 ## @param broker.existingConfigmap Name of an existing ConfigMap with the Kafka configuration for Kafka broker-only nodes
1157 existingConfigmap: ""
1158 ## @param broker.secretConfig Additional configuration to be appended at the end of the generated Kafka configuration for Kafka broker-only nodes (store in a secret)
1161 ## @param broker.existingSecretConfig Secret with additional configuration that will be appended to the end of the generated Kafka configuration for Kafka broker-only nodes
1162 ## The key for the configuration should be: server-secret.properties
1163 ## NOTE: This will override secretConfig value
1165 existingSecretConfig: ""
1166 ## @param broker.heapOpts Kafka Java Heap configuration for broker-only nodes
1168 heapOpts: -XX:InitialRAMPercentage=75 -XX:MaxRAMPercentage=75
1169 ## @param broker.command Override Kafka container command
1172 ## @param broker.args Override Kafka container arguments
1175 ## @param broker.extraEnvVars Extra environment variables to add to Kafka pods
1178 ## - name: KAFKA_CFG_BACKGROUND_THREADS
1182 ## @param broker.extraEnvVarsCM ConfigMap with extra environment variables
1185 ## @param broker.extraEnvVarsSecret Secret with extra environment variables
1187 extraEnvVarsSecret: ""
1188 ## @param broker.extraContainerPorts Kafka broker-only extra containerPorts.
1190 extraContainerPorts: []
1191 ## Configure extra options for Kafka containers' liveness, readiness and startup probes
1192 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes
1193 ## @param broker.livenessProbe.enabled Enable livenessProbe on Kafka containers
1194 ## @param broker.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe
1195 ## @param broker.livenessProbe.periodSeconds Period seconds for livenessProbe
1196 ## @param broker.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe
1197 ## @param broker.livenessProbe.failureThreshold Failure threshold for livenessProbe
1198 ## @param broker.livenessProbe.successThreshold Success threshold for livenessProbe
1202 initialDelaySeconds: 10
1207 ## @param broker.readinessProbe.enabled Enable readinessProbe on Kafka containers
1208 ## @param broker.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe
1209 ## @param broker.readinessProbe.periodSeconds Period seconds for readinessProbe
1210 ## @param broker.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe
1211 ## @param broker.readinessProbe.failureThreshold Failure threshold for readinessProbe
1212 ## @param broker.readinessProbe.successThreshold Success threshold for readinessProbe
1216 initialDelaySeconds: 5
1221 ## @param broker.startupProbe.enabled Enable startupProbe on Kafka containers
1222 ## @param broker.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe
1223 ## @param broker.startupProbe.periodSeconds Period seconds for startupProbe
1224 ## @param broker.startupProbe.timeoutSeconds Timeout seconds for startupProbe
1225 ## @param broker.startupProbe.failureThreshold Failure threshold for startupProbe
1226 ## @param broker.startupProbe.successThreshold Success threshold for startupProbe
1230 initialDelaySeconds: 30
1233 failureThreshold: 15
1235 ## @param broker.customLivenessProbe Custom livenessProbe that overrides the default one
1237 customLivenessProbe: {}
1238 ## @param broker.customReadinessProbe Custom readinessProbe that overrides the default one
1240 customReadinessProbe: {}
1241 ## @param broker.customStartupProbe Custom startupProbe that overrides the default one
1243 customStartupProbe: {}
1244 ## @param broker.lifecycleHooks lifecycleHooks for the Kafka container to automate configuration before or after startup
1247 ## Kafka resource requests and limits
1248 ## ref: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/
1249 ## @param broker.resourcesPreset Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if broker.resources is set (broker.resources is recommended for production).
1251 resourcesPreset: "small"
1252 ## @param broker.resources Set container requests and limits for different resources like CPU or memory (essential for production workloads)
1263 ## Kafka pods' Security Context
1264 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod
1265 ## @param broker.podSecurityContext.enabled Enable security context for the pods
1266 ## @param broker.podSecurityContext.fsGroupChangePolicy Set filesystem group change policy
1267 ## @param broker.podSecurityContext.sysctls Set kernel settings using the sysctl interface
1268 ## @param broker.podSecurityContext.supplementalGroups Set filesystem extra groups
1269 ## @param broker.podSecurityContext.fsGroup Set Kafka pod's Security Context fsGroup
1270 ## @param broker.podSecurityContext.seccompProfile.type Set Kafka pod's Security Context seccomp profile
1274 fsGroupChangePolicy: Always
1276 supplementalGroups: []
1279 type: "RuntimeDefault"
1280 ## Kafka containers' Security Context
1281 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
1282 ## @param broker.containerSecurityContext.enabled Enable Kafka containers' Security Context
1283 ## @param broker.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
1284 ## @param broker.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
1285 ## @param broker.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
1286 ## @param broker.containerSecurityContext.runAsNonRoot Set Kafka containers' Security Context runAsNonRoot
1287 ## @param broker.containerSecurityContext.allowPrivilegeEscalation Force the child process to be run as non-privileged
1288 ## @param broker.containerSecurityContext.readOnlyRootFilesystem Allows the pod to mount the RootFS as ReadOnly only
1289 ## @param broker.containerSecurityContext.capabilities.drop Set Kafka containers' server Security Context capabilities to be dropped
1291 ## containerSecurityContext:
1294 ## drop: ["NET_RAW"]
1295 ## readOnlyRootFilesystem: true
1297 containerSecurityContext:
1303 allowPrivilegeEscalation: false
1304 readOnlyRootFilesystem: true
1307 ## @param broker.automountServiceAccountToken Mount Service Account token in pod
1309 automountServiceAccountToken: false
1310 ## @param broker.hostAliases Kafka pods host aliases
1311 ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/
1314 ## @param broker.hostNetwork Specify if host network should be enabled for Kafka pods
1317 ## @param broker.hostIPC Specify if host IPC should be enabled for Kafka pods
1320 ## @param broker.podLabels Extra labels for Kafka pods
1321 ## Ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/
1324 ## @param broker.podAnnotations Extra annotations for Kafka pods
1325 ## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
1328 ## @param broker.topologyKey Override common lib default topology key. If empty - "kubernetes.io/hostname" is used
1329 ## i.e. topologyKey: topology.kubernetes.io/zone
1332 ## @param broker.podAffinityPreset Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard`
1333 ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity
1335 podAffinityPreset: ""
1336 ## @param broker.podAntiAffinityPreset Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard`
1337 ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity
1339 podAntiAffinityPreset: soft
1340 ## Node affinity preset
1341 ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity
1344 ## @param broker.nodeAffinityPreset.type Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard`
1347 ## @param broker.nodeAffinityPreset.key Node label key to match Ignored if `affinity` is set.
1349 ## key: "kubernetes.io/e2e-az-name"
1352 ## @param broker.nodeAffinityPreset.values Node label values to match. Ignored if `affinity` is set.
1359 ## @param broker.affinity Affinity for pod assignment
1360 ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
1361 ## Note: podAffinityPreset, podAntiAffinityPreset, and nodeAffinityPreset will be ignored when it's set
1364 ## @param broker.nodeSelector Node labels for pod assignment
1365 ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
1368 ## @param broker.tolerations Tolerations for pod assignment
1369 ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
1372 ## @param broker.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template
1373 ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods
1375 topologySpreadConstraints: []
1376 ## @param broker.terminationGracePeriodSeconds Seconds the pod needs to gracefully terminate
1377 ## ref: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#hook-handler-execution
1379 terminationGracePeriodSeconds: ""
1380 ## @param broker.podManagementPolicy StatefulSet controller supports relax its ordering guarantees while preserving its uniqueness and identity guarantees. There are two valid pod management policies: OrderedReady and Parallel
1381 ## ref: https://kubernetes.io/docs/tutorials/stateful-application/basic-stateful-set/#pod-management-policy
1383 podManagementPolicy: Parallel
1384 ## @param broker.minReadySeconds How many seconds a pod needs to be ready before killing the next, during update
1387 ## @param broker.priorityClassName Name of the existing priority class to be used by kafka pods
1388 ## Ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/
1390 priorityClassName: ""
1391 ## @param broker.runtimeClassName Name of the runtime class to be used by pod(s)
1392 ## ref: https://kubernetes.io/docs/concepts/containers/runtime-class/
1394 runtimeClassName: ""
1395 ## @param broker.enableServiceLinks Whether information about services should be injected into pod's environment variable
1396 ## The environment variables injected by service links are not used, but can lead to slow kafka boot times or slow running of the scripts when there are many services in the current namespace.
1397 ## If you experience slow pod startups or slow running of the scripts you probably want to set this to `false`.
1399 enableServiceLinks: true
1400 ## @param broker.schedulerName Name of the k8s scheduler (other than default)
1401 ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
1404 ## @param broker.updateStrategy.type Kafka statefulset strategy type
1405 ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies
1409 ## @param broker.extraVolumes Optionally specify extra list of additional volumes for the Kafka pod(s)
1412 ## - name: kafka-jaas
1414 ## secretName: kafka-jaas
1417 ## @param broker.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Kafka container(s)
1418 ## extraVolumeMounts:
1419 ## - name: kafka-jaas
1420 ## mountPath: /iamguarded/kafka/config/kafka_jaas.conf
1421 ## subPath: kafka_jaas.conf
1423 extraVolumeMounts: []
1424 ## @param broker.sidecars Add additional sidecar containers to the Kafka pod(s)
1427 ## - name: your-image-name
1428 ## image: your-image
1429 ## imagePullPolicy: Always
1432 ## containerPort: 1234
1435 ## @param broker.initContainers Add additional Add init containers to the Kafka pod(s)
1438 ## - name: your-image-name
1439 ## image: your-image
1440 ## imagePullPolicy: Always
1443 ## containerPort: 1234
1446 ## Kafka Pod Disruption Budget
1447 ## ref: https://kubernetes.io/docs/concepts/workloads/pods/disruptions/
1448 ## @param broker.pdb.create Deploy a pdb object for the Kafka pod
1449 ## @param broker.pdb.minAvailable Maximum number/percentage of unavailable Kafka replicas
1450 ## @param broker.pdb.maxUnavailable Maximum number/percentage of unavailable Kafka replicas
1456 ## @section Experimental: Kafka Broker Autoscaling configuration
1457 ## ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/
1461 ## @param broker.autoscaling.vpa.enabled Enable VPA
1464 ## @param broker.autoscaling.vpa.annotations Annotations for VPA resource
1467 ## @param broker.autoscaling.vpa.controlledResources VPA List of resources that the vertical pod autoscaler can control. Defaults to cpu and memory
1469 controlledResources: []
1470 ## @param broker.autoscaling.vpa.maxAllowed VPA Max allowed resources for the pod
1474 ## @param broker.autoscaling.vpa.minAllowed VPA Min allowed resources for the pod
1479 ## @param broker.autoscaling.vpa.updatePolicy.updateMode Autoscaling update policy Specifies whether recommended updates are applied when a Pod is started and whether recommended updates are applied during the life of a Pod
1480 ## Possible values are "Off", "Initial", "Recreate", and "Auto".
1484 ## @param broker.autoscaling.hpa.enabled Enable HPA for Kafka Broker
1487 ## @param broker.autoscaling.hpa.annotations Annotations for HPA resource
1490 ## @param broker.autoscaling.hpa.minReplicas Minimum number of Kafka Broker replicas
1493 ## @param broker.autoscaling.hpa.maxReplicas Maximum number of Kafka Broker replicas
1496 ## @param broker.autoscaling.hpa.targetCPU Target CPU utilization percentage
1499 ## @param broker.autoscaling.hpa.targetMemory Target Memory utilization percentage
1502 ## persistentVolumeClaimRetentionPolicy
1503 ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#persistentvolumeclaim-retention
1504 ## @param broker.persistentVolumeClaimRetentionPolicy.enabled Controls if and how PVCs are deleted during the lifecycle of a StatefulSet
1505 ## @param broker.persistentVolumeClaimRetentionPolicy.whenScaled Volume retention behavior when the replica count of the StatefulSet is reduced
1506 ## @param broker.persistentVolumeClaimRetentionPolicy.whenDeleted Volume retention behavior that applies when the StatefulSet is deleted
1508 persistentVolumeClaimRetentionPolicy:
1512 ## Enable persistence using Persistent Volume Claims
1513 ## ref: https://kubernetes.io/docs/concepts/storage/persistent-volumes/
1516 ## @param broker.persistence.enabled Enable Kafka data persistence using PVC
1519 ## @param broker.persistence.existingClaim A manually managed Persistent Volume and Claim
1520 ## If defined, PVC must be created manually before volume will be bound
1521 ## The value is evaluated as a template
1524 ## @param broker.persistence.storageClass PVC Storage Class for Kafka data volume
1525 ## If defined, storageClassName: <storageClass>
1526 ## If set to "-", storageClassName: "", which disables dynamic provisioning
1527 ## If undefined (the default) or set to null, no storageClassName spec is
1528 ## set, choosing the default provisioner.
1531 ## @param broker.persistence.accessModes Persistent Volume Access Modes
1535 ## @param broker.persistence.size PVC Storage Request for Kafka data volume
1538 ## @param broker.persistence.annotations Annotations for the PVC
1541 ## @param broker.persistence.labels Labels for the PVC
1544 ## @param broker.persistence.selector Selector to match an existing Persistent Volume for Kafka data PVC. If set, the PVC can't have a PV dynamically provisioned for it
1550 ## @param broker.persistence.mountPath Mount path of the Kafka data volume
1552 mountPath: /iamguarded/kafka
1553 ## Log Persistence parameters
1556 ## @param broker.logPersistence.enabled Enable Kafka logs persistence using PVC
1559 ## @param broker.logPersistence.existingClaim A manually managed Persistent Volume and Claim
1560 ## If defined, PVC must be created manually before volume will be bound
1561 ## The value is evaluated as a template
1564 ## @param broker.logPersistence.storageClass PVC Storage Class for Kafka logs volume
1565 ## If defined, storageClassName: <storageClass>
1566 ## If set to "-", storageClassName: "", which disables dynamic provisioning
1567 ## If undefined (the default) or set to null, no storageClassName spec is
1568 ## set, choosing the default provisioner.
1571 ## @param broker.logPersistence.accessModes Persistent Volume Access Modes
1575 ## @param broker.logPersistence.size PVC Storage Request for Kafka logs volume
1578 ## @param broker.logPersistence.annotations Annotations for the PVC
1581 ## @param broker.logPersistence.selector Selector to match an existing Persistent Volume for Kafka log data PVC. If set, the PVC can't have a PV dynamically provisioned for it
1587 ## @param broker.logPersistence.mountPath Mount path of the Kafka logs volume
1589 mountPath: /opt/iamguarded/kafka/logs
1590## @section Traffic Exposure parameters
1593## Service parameters
1596 ## @param service.type Kubernetes Service type
1599 ## @param service.ports.client Kafka svc port for client connections
1600 ## @param service.ports.controller Kafka svc port for controller connections
1601 ## @param service.ports.interbroker Kafka svc port for inter-broker connections
1602 ## @param service.ports.external Kafka svc port for external connections
1609 ## @param service.extraPorts Extra ports to expose in the Kafka service (normally used with the `sidecar` value)
1612 ## @param service.nodePorts.client Node port for the Kafka client connections
1613 ## @param service.nodePorts.external Node port for the Kafka external connections
1614 ## NOTE: choose port between <30000-32767>
1619 ## @param service.sessionAffinity Control where client requests go, to the same pod or round-robin
1620 ## Values: ClientIP or None
1621 ## ref: https://kubernetes.io/docs/concepts/services-networking/service/
1623 sessionAffinity: None
1624 ## @param service.sessionAffinityConfig Additional settings for the sessionAffinity
1625 ## sessionAffinityConfig:
1627 ## timeoutSeconds: 300
1629 sessionAffinityConfig: {}
1630 ## @param service.clusterIP Kafka service Cluster IP
1635 ## @param service.loadBalancerIP Kafka service Load Balancer IP
1636 ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#loadbalancer
1639 ## @param service.loadBalancerClass Kafka service Load Balancer Class
1640 ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#load-balancer-class
1642 loadBalancerClass: ""
1643 ## @param service.loadBalancerSourceRanges Kafka service Load Balancer sources
1644 ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service
1646 ## loadBalancerSourceRanges:
1649 loadBalancerSourceRanges: []
1650 ## @param service.allocateLoadBalancerNodePorts Whether to allocate node ports when service type is LoadBalancer
1651 ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#load-balancer-nodeport-allocation
1653 allocateLoadBalancerNodePorts: true
1654 ## @param service.externalTrafficPolicy Kafka service external traffic policy
1655 ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip
1657 externalTrafficPolicy: Cluster
1658 ## @param service.annotations Additional custom annotations for Kafka service
1661 ## Headless service properties
1665 ## @param service.headless.controller.annotations Annotations for the controller-eligible headless service.
1668 ## @param service.headless.controller.labels Labels for the controller-eligible headless service.
1672 ## @param service.headless.broker.annotations Annotations for the broker-only headless service.
1675 ## @param service.headless.broker.labels Labels for the broker-only headless service.
1678 ## @param service.headless.ipFamilies IP families for the headless service
1681 ## @param service.headless.ipFamilyPolicy IP family policy for the headless service
1684## External Access to Kafka brokers configuration
1687 ## @param externalAccess.enabled Enable Kubernetes external cluster access to Kafka brokers
1692 ## @param externalAccess.controller.forceExpose If set to true, force exposing controller-eligible nodes although they are configured as controller-only nodes
1695 ## Parameters to configure K8s service(s) used to externally access Kafka brokers
1696 ## Note: A new service per broker will be created
1699 ## @param externalAccess.controller.service.type Kubernetes Service type for external access. It can be NodePort, LoadBalancer or ClusterIP
1702 ## @param externalAccess.controller.service.ports.external Kafka port used for external access when service type is LoadBalancer
1706 ## @param externalAccess.controller.service.loadBalancerClass Kubernetes Service Load Balancer class for external access when service type is LoadBalancer
1707 ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#load-balancer-class
1709 loadBalancerClass: ""
1710 ## @param externalAccess.controller.service.loadBalancerIPs Array of load balancer IPs for each Kafka broker. Length must be the same as replicaCount
1717 ## @param externalAccess.controller.service.loadBalancerNames Array of load balancer Names for each Kafka broker. Length must be the same as replicaCount
1719 ## loadBalancerNames:
1720 ## - broker1.external.example.com
1721 ## - broker2.external.example.com
1723 loadBalancerNames: []
1724 ## @param externalAccess.controller.service.loadBalancerAnnotations Array of load balancer annotations for each Kafka broker. Length must be the same as replicaCount
1726 ## loadBalancerAnnotations:
1727 ## - external-dns.alpha.kubernetes.io/hostname: broker1.external.example.com.
1728 ## - external-dns.alpha.kubernetes.io/hostname: broker2.external.example.com.
1730 loadBalancerAnnotations: []
1731 ## @param externalAccess.controller.service.loadBalancerSourceRanges Address(es) that are allowed when service is LoadBalancer
1732 ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service
1734 ## loadBalancerSourceRanges:
1737 loadBalancerSourceRanges: []
1738 ## @param externalAccess.controller.service.allocateLoadBalancerNodePorts Whether to allocate node ports when service type is LoadBalancer
1739 ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#load-balancer-nodeport-allocation
1741 allocateLoadBalancerNodePorts: true
1742 ## @param externalAccess.controller.service.nodePorts Array of node ports used for each Kafka broker. Length must be the same as replicaCount
1749 ## @param externalAccess.controller.service.externalIPs Use distinct service host IPs to configure Kafka external listener when service type is NodePort. Length must be the same as replicaCount
1756 ## @param externalAccess.controller.service.useHostIPs Use service host IPs to configure Kafka external listener when service type is NodePort
1759 ## @param externalAccess.controller.service.usePodIPs using the MY_POD_IP address for external access.
1762 ## @param externalAccess.controller.service.domain Domain or external ip used to configure Kafka external listener when service type is NodePort or ClusterIP
1763 ## NodePort: If not specified, the container will try to get the kubernetes node external IP
1764 ## ClusterIP: Must be specified, ingress IP or domain where tcp for external ports is configured
1767 ## @param externalAccess.controller.service.publishNotReadyAddresses Indicates that any agent which deals with endpoints for this Service should disregard any indications of ready/not-ready
1768 ## ref: https://kubernetes.io/docs/reference/kubernetes-api/service-resources/service-v1/
1770 publishNotReadyAddresses: false
1771 ## @param externalAccess.controller.service.labels Service labels for external access
1774 ## @param externalAccess.controller.service.annotations Service annotations for external access
1777 ## @param externalAccess.controller.service.extraPorts Extra ports to expose in the Kafka external service
1780 ## @param externalAccess.controller.service.ipFamilies IP families for the external controller service
1783 ## @param externalAccess.controller.service.ipFamilyPolicy IP family policy for the external controller service
1787 ## Parameters to configure K8s service(s) used to externally access Kafka brokers
1788 ## Note: A new service per broker will be created
1791 ## @param externalAccess.broker.service.type Kubernetes Service type for external access. It can be NodePort, LoadBalancer or ClusterIP
1794 ## @param externalAccess.broker.service.ports.external Kafka port used for external access when service type is LoadBalancer
1798 ## @param externalAccess.broker.service.loadBalancerClass Kubernetes Service Load Balancer class for external access when service type is LoadBalancer
1799 ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#load-balancer-class
1801 loadBalancerClass: ""
1802 ## @param externalAccess.broker.service.loadBalancerIPs Array of load balancer IPs for each Kafka broker. Length must be the same as replicaCount
1809 ## @param externalAccess.broker.service.loadBalancerNames Array of load balancer Names for each Kafka broker. Length must be the same as replicaCount
1811 ## loadBalancerNames:
1812 ## - broker1.external.example.com
1813 ## - broker2.external.example.com
1815 loadBalancerNames: []
1816 ## @param externalAccess.broker.service.loadBalancerAnnotations Array of load balancer annotations for each Kafka broker. Length must be the same as replicaCount
1818 ## loadBalancerAnnotations:
1819 ## - external-dns.alpha.kubernetes.io/hostname: broker1.external.example.com.
1820 ## - external-dns.alpha.kubernetes.io/hostname: broker2.external.example.com.
1822 loadBalancerAnnotations: []
1823 ## @param externalAccess.broker.service.loadBalancerSourceRanges Address(es) that are allowed when service is LoadBalancer
1824 ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service
1826 ## loadBalancerSourceRanges:
1829 loadBalancerSourceRanges: []
1830 ## @param externalAccess.broker.service.allocateLoadBalancerNodePorts Whether to allocate node ports when service type is LoadBalancer
1831 ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#load-balancer-nodeport-allocation
1833 allocateLoadBalancerNodePorts: true
1834 ## @param externalAccess.broker.service.nodePorts Array of node ports used for each Kafka broker. Length must be the same as replicaCount
1841 ## @param externalAccess.broker.service.externalIPs Use distinct service host IPs to configure Kafka external listener when service type is NodePort. Length must be the same as replicaCount
1848 ## @param externalAccess.broker.service.useHostIPs Use service host IPs to configure Kafka external listener when service type is NodePort
1851 ## @param externalAccess.broker.service.usePodIPs using the MY_POD_IP address for external access.
1854 ## @param externalAccess.broker.service.domain Domain or external ip used to configure Kafka external listener when service type is NodePort or ClusterIP
1855 ## NodePort: If not specified, the container will try to get the kubernetes node external IP
1856 ## ClusterIP: Must be specified, ingress IP or domain where tcp for external ports is configured
1859 ## @param externalAccess.broker.service.publishNotReadyAddresses Indicates that any agent which deals with endpoints for this Service should disregard any indications of ready/not-ready
1860 ## ref: https://kubernetes.io/docs/reference/kubernetes-api/service-resources/service-v1/
1862 publishNotReadyAddresses: false
1863 ## @param externalAccess.broker.service.labels Service labels for external access
1866 ## @param externalAccess.broker.service.annotations Service annotations for external access
1869 ## @param externalAccess.broker.service.extraPorts Extra ports to expose in the Kafka external service
1872 ## @param externalAccess.broker.service.ipFamilies IP families for the external broker service
1875 ## @param externalAccess.broker.service.ipFamilyPolicy IP family policy for the external broker service
1879## Ref: https://kubernetes.io/docs/concepts/services-networking/network-policies/
1882 ## @param networkPolicy.enabled Specifies whether a NetworkPolicy should be created
1885 ## @param networkPolicy.allowExternal Don't require client label for connections
1886 ## When set to false, only pods with the correct client label will have network access to the port Kafka is
1887 ## listening on. When true, Kafka accept connections from any source (with the correct destination port).
1890 ## @param networkPolicy.allowExternalEgress Allow the pod to access any range of port and all destinations.
1892 allowExternalEgress: true
1893 ## @param networkPolicy.addExternalClientAccess Allow access from pods with client label set to "true". Ignored if `networkPolicy.allowExternal` is true.
1895 addExternalClientAccess: true
1896 ## @param networkPolicy.extraIngress [array] Add extra ingress rules to the NetworkPolicy
1906 ## - matchExpressions:
1912 ## @param networkPolicy.extraEgress [array] Add extra ingress rules to the NetworkPolicy
1922 ## - matchExpressions:
1929 ## @param networkPolicy.ingressPodMatchLabels [object] Labels to match to allow traffic from other pods. Ignored if `networkPolicy.allowExternal` is true.
1931 ## ingressPodMatchLabels:
1932 ## my-client: "true"
1934 ingressPodMatchLabels: {}
1935 ## @param networkPolicy.ingressNSMatchLabels [object] Labels to match to allow traffic from other namespaces. Ignored if `networkPolicy.allowExternal` is true.
1936 ## @param networkPolicy.ingressNSPodMatchLabels [object] Pod labels to match to allow traffic from other namespaces. Ignored if `networkPolicy.allowExternal` is true.
1938 ingressNSMatchLabels: {}
1939 ingressNSPodMatchLabels: {}
1940## @section Other Parameters
1942## ServiceAccount for Kafka
1943## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/
1946 ## @param serviceAccount.create Enable creation of ServiceAccount for Kafka pods
1949 ## @param serviceAccount.name The name of the service account to use. If not set and `create` is `true`, a name is generated
1950 ## If not set and create is true, a name is generated using the kafka.serviceAccountName template
1953 ## @param serviceAccount.automountServiceAccountToken Allows auto mount of ServiceAccountToken on the serviceAccount created
1954 ## Can be set to false if pods using this serviceAccount do not need to use K8s API
1956 automountServiceAccountToken: false
1957 ## @param serviceAccount.annotations Additional custom annotations for the ServiceAccount
1960## Role Based Access Control
1961## ref: https://kubernetes.io/docs/admin/authorization/rbac/
1964 ## @param rbac.create Whether to create & use RBAC resources or not
1965 ## binding Kafka ServiceAccount to a role
1966 ## that allows Kafka pods querying the K8s API
1969## @section Metrics parameters
1971## Prometheus Exporters / Metrics
1974 ## Prometheus JMX exporter: exposes the majority of Kafka metrics
1977 ## @param metrics.jmx.enabled Whether or not to expose JMX metrics to Prometheus
1980 ## @param metrics.jmx.kafkaJmxPort JMX port where the exporter will collect metrics, exposed in the Kafka container.
1983 ## Iamguarded JMX exporter image
1984 ## @param metrics.jmx.image.registry [default: REGISTRY_NAME] JMX exporter image registry
1985 ## @param metrics.jmx.image.repository [default: REPOSITORY_NAME/jmx-exporter] JMX exporter image repository
1986 ## @skip metrics.jmx.image.tag JMX exporter image tag (immutable tags are recommended)
1987 ## @param metrics.jmx.image.digest JMX exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag
1988 ## @param metrics.jmx.image.pullPolicy JMX exporter image pull policy
1989 ## @param metrics.jmx.image.pullSecrets Specify docker-registry secret names as an array
1993 repository: chainguard-private/jmx-exporter-iamguarded
1996 ## Specify a imagePullPolicy
1997 ## ref: https://kubernetes.io/docs/concepts/containers/images/#pre-pulled-images
1999 pullPolicy: IfNotPresent
2000 ## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace)
2001 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
2004 ## - myRegistryKeySecretName
2007 ## Prometheus JMX exporter containers' Security Context
2008 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
2009 ## @param metrics.jmx.containerSecurityContext.enabled Enable Prometheus JMX exporter containers' Security Context
2010 ## @param metrics.jmx.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
2011 ## @param metrics.jmx.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
2012 ## @param metrics.jmx.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
2013 ## @param metrics.jmx.containerSecurityContext.runAsNonRoot Set Prometheus JMX exporter containers' Security Context runAsNonRoot
2014 ## @param metrics.jmx.containerSecurityContext.allowPrivilegeEscalation Set Prometheus JMX exporter containers' Security Context allowPrivilegeEscalation
2015 ## @param metrics.jmx.containerSecurityContext.readOnlyRootFilesystem Set Prometheus JMX exporter containers' Security Context readOnlyRootFilesystem
2016 ## @param metrics.jmx.containerSecurityContext.capabilities.drop Set Prometheus JMX exporter containers' Security Context capabilities to be dropped
2018 ## containerSecurityContext:
2021 ## drop: ["NET_RAW"]
2022 ## readOnlyRootFilesystem: true
2024 containerSecurityContext:
2030 allowPrivilegeEscalation: false
2031 readOnlyRootFilesystem: true
2034 ## @param metrics.jmx.containerPorts.metrics Prometheus JMX exporter metrics container port
2038 ## Prometheus JMX exporter resource requests and limits
2039 ## ref: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/
2040 ## @param metrics.jmx.resourcesPreset Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if metrics.jmx.resources is set (metrics.jmx.resources is recommended for production).
2042 resourcesPreset: "micro"
2043 ## @param metrics.jmx.resources Set container requests and limits for different resources like CPU or memory (essential for production workloads)
2054 ## Configure extra options for liveness probe
2055 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes
2056 ## @param metrics.jmx.livenessProbe.enabled Enable livenessProbe
2057 ## @param metrics.jmx.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe
2058 ## @param metrics.jmx.livenessProbe.periodSeconds Period seconds for livenessProbe
2059 ## @param metrics.jmx.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe
2060 ## @param metrics.jmx.livenessProbe.failureThreshold Failure threshold for livenessProbe
2061 ## @param metrics.jmx.livenessProbe.successThreshold Success threshold for livenessProbe
2065 initialDelaySeconds: 60
2070 ## Configure extra options for readiness probe
2071 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/#configure-probes
2072 ## @param metrics.jmx.readinessProbe.enabled Enable readinessProbe
2073 ## @param metrics.jmx.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe
2074 ## @param metrics.jmx.readinessProbe.periodSeconds Period seconds for readinessProbe
2075 ## @param metrics.jmx.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe
2076 ## @param metrics.jmx.readinessProbe.failureThreshold Failure threshold for readinessProbe
2077 ## @param metrics.jmx.readinessProbe.successThreshold Success threshold for readinessProbe
2081 initialDelaySeconds: 30
2086 ## Prometheus JMX exporter service configuration
2089 ## @param metrics.jmx.service.ports.metrics Prometheus JMX exporter metrics service port
2093 ## @param metrics.jmx.service.clusterIP Static clusterIP or None for headless services
2094 ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#choosing-your-own-ip-address
2097 ## @param metrics.jmx.service.sessionAffinity Control where client requests go, to the same pod or round-robin
2098 ## Values: ClientIP or None
2099 ## ref: https://kubernetes.io/docs/concepts/services-networking/service/
2101 sessionAffinity: None
2102 ## @param metrics.jmx.service.annotations [object] Annotations for the Prometheus JMX exporter service
2105 prometheus.io/scrape: "true"
2106 prometheus.io/port: "{{ .Values.metrics.jmx.service.ports.metrics }}"
2107 prometheus.io/path: "/metrics"
2108 ## @param metrics.jmx.service.ipFamilies IP families for the jmx metrics service
2111 ## @param metrics.jmx.service.ipFamilyPolicy IP family policy for the jmx metrics service
2114 ## @param metrics.jmx.whitelistObjectNames Allows setting which JMX objects you want to expose to via JMX stats to JMX exporter
2115 ## Only whitelisted values will be exposed via JMX exporter. They must also be exposed via Rules. To expose all metrics
2116 ## (warning its crazy excessive and they aren't formatted in a prometheus style) (1) `whitelistObjectNames: []`
2117 ## (2) commented out above `overrideConfig`.
2119 whitelistObjectNames:
2120 - kafka.controller:*
2125 ## @param metrics.jmx.config [string] Configuration file for JMX exporter
2126 ## Specify content for jmx-kafka-prometheus.yml. Evaluated as a template
2128 ## Credits to the incubator/kafka chart for the JMX configuration.
2129 ## https://github.com/helm/charts/tree/master/incubator/kafka
2132 jmxUrl: service:jmx:rmi:///jndi/rmi://127.0.0.1:{{ .Values.metrics.jmx.kafkaJmxPort }}/jmxrmi
2133 lowercaseOutputName: true
2134 lowercaseOutputLabelNames: true
2136 {{- if .Values.metrics.jmx.whitelistObjectNames }}
2137 whitelistObjectNames: ["{{ join "\",\"" .Values.metrics.jmx.whitelistObjectNames }}"]
2139 ## @param metrics.jmx.existingConfigmap Name of existing ConfigMap with JMX exporter configuration
2140 ## NOTE: This will override metrics.jmx.config
2142 existingConfigmap: ""
2143 ## @param metrics.jmx.extraRules Add extra rules to JMX exporter configuration
2146 ## - pattern: kafka.server<type=socket-server-metrics, listener=(.+), networkProcessor=(.+)><>(connection-count)
2147 ## name: kafka_server_socket_server_metrics_$3
2152 ## Prometheus Operator ServiceMonitor configuration
2155 ## @param metrics.serviceMonitor.enabled if `true`, creates a Prometheus Operator ServiceMonitor (requires `metrics.jmx.enabled` to be `true`)
2158 ## @param metrics.serviceMonitor.namespace Namespace in which Prometheus is running
2161 ## @param metrics.serviceMonitor.path Path where JMX exporter serves metrics
2164 ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped
2165 ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint
2168 ## @param metrics.serviceMonitor.scrapeTimeout Timeout after which the scrape is ended
2169 ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint
2172 ## @param metrics.serviceMonitor.labels Additional labels that can be used so ServiceMonitor will be discovered by Prometheus
2175 ## @param metrics.serviceMonitor.selector Prometheus instance selector labels
2178 ## @param metrics.serviceMonitor.relabelings RelabelConfigs to apply to samples before scraping
2181 ## @param metrics.serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion
2183 metricRelabelings: []
2184 ## @param metrics.serviceMonitor.honorLabels Specify honorLabels parameter to add the scrape endpoint
2187 ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus.
2191 ## @param metrics.prometheusRule.enabled if `true`, creates a Prometheus Operator PrometheusRule (requires `metrics.jmx.enabled` to be `true`)
2194 ## @param metrics.prometheusRule.namespace Namespace in which Prometheus is running
2197 ## @param metrics.prometheusRule.labels Additional labels that can be used so PrometheusRule will be discovered by Prometheus
2200 ## @param metrics.prometheusRule.groups Prometheus Rule Groups for Kafka
2203## @section Kafka provisioning parameters
2206## Kafka provisioning
2209 ## @param provisioning.enabled Enable Kafka provisioning Job
2212 ## @param provisioning.waitForKafka Whether an init container should be created to wait until Kafka is ready before provisioning
2215 ## @param provisioning.useHelmHooks Flag to indicate usage of helm hooks
2218 ## @param provisioning.automountServiceAccountToken Mount Service Account token in pod
2220 automountServiceAccountToken: false
2221 ## @param provisioning.numPartitions Default number of partitions for topics when unspecified
2224 ## @param provisioning.replicationFactor Default replication factor for topics when unspecified
2226 replicationFactor: 1
2227 ## @param provisioning.topics Kafka topics to provision
2228 ## - name: topic-name
2230 ## replicationFactor: 1
2231 ## ## https://kafka.apache.org/documentation/#topicconfigs
2233 ## max.message.bytes: 64000
2234 ## flush.messages: 1
2237 ## @param provisioning.nodeSelector Node labels for pod assignment
2238 ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
2241 ## @param provisioning.tolerations Tolerations for pod assignment
2242 ## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
2245 ## @param provisioning.extraProvisioningCommands Extra commands to run to provision cluster resources
2246 ## - echo "Allow user to consume from any topic"
2248 ## /opt/iamguarded/kafka/bin/kafka-acls.sh
2249 ## --bootstrap-server $KAFKA_SERVICE
2250 ## --command-config /shared/client.properties
2252 ## --allow-principal User:user
2253 ## --consumer --topic *
2254 ## - "/opt/iamguarded/kafka/bin/kafka-acls.sh
2255 ## --bootstrap-server $KAFKA_SERVICE
2256 ## --command-config /shared/client.properties
2259 extraProvisioningCommands: []
2260 ## @param provisioning.parallel Number of provisioning commands to run at the same time
2263 ## @param provisioning.preScript Extra bash script to run before topic provisioning. /shared/client.properties is path to properties file with most needed configurations
2266 ## @param provisioning.postScript Extra bash script to run after topic provisioning. /shared/client.properties is path to properties file with most needed configurations
2269 ## Auth Configuration for kafka provisioning Job
2272 ## TLS configuration for kafka provisioning Job
2275 ## @param provisioning.auth.tls.type Format to use for TLS certificates. Allowed types: `JKS` and `PEM`.
2276 ## Note: ignored if auth.tls.client.protocol different from one of these values: "SSL" "SASL_SSL"
2279 ## @param provisioning.auth.tls.certificatesSecret Existing secret containing the TLS certificates for the Kafka provisioning Job.
2280 ## When using 'jks' format for certificates, the secret should contain a truststore and a keystore.
2281 ## When using 'pem' format for certificates, the secret should contain one of the following:
2282 ## 1. A public CA certificate, a public certificate and one private key.
2283 ## 2. A truststore and a keystore in PEM format
2284 ## If caCert is set, option 1 will be taken, otherwise option 2.
2286 certificatesSecret: ""
2287 ## @param provisioning.auth.tls.cert The secret key from the certificatesSecret if 'cert' key different from the default (tls.crt)
2290 ## @param provisioning.auth.tls.key The secret key from the certificatesSecret if 'key' key different from the default (tls.key)
2293 ## @param provisioning.auth.tls.caCert The secret key from the certificatesSecret if 'caCert' key different from the default (ca.crt)
2296 ## @param provisioning.auth.tls.keystore The secret key from the certificatesSecret if 'keystore' key different from the default (keystore.jks)
2298 keystore: keystore.jks
2299 ## @param provisioning.auth.tls.truststore The secret key from the certificatesSecret if 'truststore' key different from the default (truststore.jks)
2301 truststore: truststore.jks
2302 ## @param provisioning.auth.tls.passwordsSecret Name of the secret containing passwords to access the JKS files or PEM key when they are password-protected.
2303 ## It should contain two keys called "keystore-password" and "truststore-password", or "key-password" if using a password-protected PEM key.
2306 ## @param provisioning.auth.tls.keyPasswordSecretKey The secret key from the passwordsSecret if 'keyPasswordSecretKey' key different from the default (key-password)
2307 ## Note: must not be used if `passwordsSecret` is not defined.
2309 keyPasswordSecretKey: key-password
2310 ## @param provisioning.auth.tls.keystorePasswordSecretKey The secret key from the passwordsSecret if 'keystorePasswordSecretKey' key different from the default (keystore-password)
2311 ## Note: must not be used if `passwordsSecret` is not defined.
2313 keystorePasswordSecretKey: keystore-password
2314 ## @param provisioning.auth.tls.truststorePasswordSecretKey The secret key from the passwordsSecret if 'truststorePasswordSecretKey' key different from the default (truststore-password)
2315 ## Note: must not be used if `passwordsSecret` is not defined.
2317 truststorePasswordSecretKey: truststore-password
2318 ## @param provisioning.auth.tls.keyPassword Password to access the password-protected PEM key if necessary. Ignored if 'passwordsSecret' is provided.
2321 ## @param provisioning.auth.tls.keystorePassword Password to access the JKS keystore. Ignored if 'passwordsSecret' is provided.
2323 keystorePassword: ""
2324 ## @param provisioning.auth.tls.truststorePassword Password to access the JKS truststore. Ignored if 'passwordsSecret' is provided.
2326 truststorePassword: ""
2327 ## @param provisioning.command Override provisioning container command
2330 ## @param provisioning.args Override provisioning container arguments
2333 ## @param provisioning.extraEnvVars Extra environment variables to add to the provisioning pod
2336 ## - name: KAFKA_CFG_BACKGROUND_THREADS
2340 ## @param provisioning.extraEnvVarsCM ConfigMap with extra environment variables
2343 ## @param provisioning.extraEnvVarsSecret Secret with extra environment variables
2345 extraEnvVarsSecret: ""
2346 ## @param provisioning.podAnnotations Extra annotations for Kafka provisioning pods
2349 ## @param provisioning.podLabels Extra labels for Kafka provisioning pods
2350 ## Ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/
2353 ## Kafka provisioning pods ServiceAccount
2354 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/
2357 ## @param provisioning.serviceAccount.create Enable creation of ServiceAccount for Kafka provisioning pods
2360 ## @param provisioning.serviceAccount.name The name of the service account to use. If not set and `create` is `true`, a name is generated
2361 ## If not set and create is true, a name is generated using the provisioning.serviceAccount.name template
2364 ## @param provisioning.serviceAccount.automountServiceAccountToken Allows auto mount of ServiceAccountToken on the serviceAccount created
2365 ## Can be set to false if pods using this serviceAccount do not need to use K8s API
2367 automountServiceAccountToken: false
2368 ## Kafka provisioning resource requests and limits
2369 ## ref: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/
2370 ## @param provisioning.resourcesPreset Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if provisioning.resources is set (provisioning.resources is recommended for production).
2372 resourcesPreset: "micro"
2373 ## @param provisioning.resources Set container requests and limits for different resources like CPU or memory (essential for production workloads)
2384 ## Kafka provisioning pods' Security Context
2385 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod
2386 ## @param provisioning.podSecurityContext.enabled Enable security context for the pods
2387 ## @param provisioning.podSecurityContext.fsGroupChangePolicy Set filesystem group change policy
2388 ## @param provisioning.podSecurityContext.sysctls Set kernel settings using the sysctl interface
2389 ## @param provisioning.podSecurityContext.supplementalGroups Set filesystem extra groups
2390 ## @param provisioning.podSecurityContext.fsGroup Set Kafka provisioning pod's Security Context fsGroup
2391 ## @param provisioning.podSecurityContext.seccompProfile.type Set Kafka provisioning pod's Security Context seccomp profile
2395 fsGroupChangePolicy: Always
2397 supplementalGroups: []
2400 type: "RuntimeDefault"
2401 ## Kafka provisioning containers' Security Context
2402 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
2403 ## @param provisioning.containerSecurityContext.enabled Enable Kafka provisioning containers' Security Context
2404 ## @param provisioning.containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container
2405 ## @param provisioning.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
2406 ## @param provisioning.containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup
2407 ## @param provisioning.containerSecurityContext.runAsNonRoot Set Kafka provisioning containers' Security Context runAsNonRoot
2408 ## @param provisioning.containerSecurityContext.allowPrivilegeEscalation Set Kafka provisioning containers' Security Context allowPrivilegeEscalation
2409 ## @param provisioning.containerSecurityContext.readOnlyRootFilesystem Set Kafka provisioning containers' Security Context readOnlyRootFilesystem
2410 ## @param provisioning.containerSecurityContext.capabilities.drop Set Kafka provisioning containers' Security Context capabilities to be dropped
2412 ## containerSecurityContext:
2415 ## drop: ["NET_RAW"]
2416 ## readOnlyRootFilesystem: true
2418 containerSecurityContext:
2424 allowPrivilegeEscalation: false
2425 readOnlyRootFilesystem: true
2428 ## @param provisioning.schedulerName Name of the k8s scheduler (other than default) for kafka provisioning
2429 ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
2432 ## @param provisioning.enableServiceLinks Whether information about services should be injected into pod's environment variable
2433 ## The environment variables injected by service links are not used, but can lead to slow kafka boot times or slow running of the scripts when there are many services in the current namespace.
2434 ## If you experience slow pod startups or slow running of the scripts you probably want to set this to `false`.
2436 enableServiceLinks: true
2437 ## @param provisioning.extraVolumes Optionally specify extra list of additional volumes for the Kafka provisioning pod(s)
2440 ## - name: kafka-jaas
2442 ## secretName: kafka-jaas
2445 ## @param provisioning.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the Kafka provisioning container(s)
2446 ## extraVolumeMounts:
2447 ## - name: kafka-jaas
2448 ## mountPath: /iamguarded/kafka/config/kafka_jaas.conf
2449 ## subPath: kafka_jaas.conf
2451 extraVolumeMounts: []
2452 ## @param provisioning.sidecars Add additional sidecar containers to the Kafka provisioning pod(s)
2455 ## - name: your-image-name
2456 ## image: your-image
2457 ## imagePullPolicy: Always
2460 ## containerPort: 1234
2463 ## @param provisioning.initContainers Add additional Add init containers to the Kafka provisioning pod(s)
2466 ## - name: your-image-name
2467 ## image: your-image
2468 ## imagePullPolicy: Always
2471 ## containerPort: 1234