5 # -- Add annotations to all CRD resources, e.g. "helm.sh/resource-policy": keep
7 # -- Enable Flux CRs migration using helm pre upgrade hook job
23 # -- Implement the patches for Multi-tenancy lockdown.
24 # See https://fluxcd.io/docs/installation/#multi-tenancy-lockdown
26 # -- All Kustomizations and HelmReleases which don’t have spec.serviceAccountName
27 # specified, will use the default account from the tenant’s namespace.
28 # Tenants have to specify a service account in their Flux resources to be able
29 # to deploy workloads in their namespaces as the default account has no permissions.
30 defaultServiceAccount: "default"
31 # -- Both kustomize-controller and helm-controller service accounts run privileged
32 # with cluster-admin ClusterRoleBinding. Disable if you want to run them with a
33 # minimum set of permissions.
35clusterDomain: cluster.local
37 image: cgr.dev/chainguard-private/flux
38 tag: latest@sha256:3bf245ec3c688b3b829b663d864bb88163ed69d7e805ab5ea62edd6ddf1b2fe6
48 image: cgr.dev/chainguard-private/flux-helm-controller
49 tag: latest@sha256:d4794545d38af609a98b4700ae4c99e4e2fe403c710ed8562c8a63844bc105fc
59 prometheus.io/port: "8080"
60 prometheus.io/scrape: "true"
71 # expects input structure as per specification https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.11/#affinity-v1-core
75 # requiredDuringSchedulingIgnoredDuringExecution:
78 # - key: foo.bar.com/role
84 # expects input structure as per specification https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.11/#toleration-v1-core
87 # - key: foo.bar.com/role
93imageAutomationController:
95 image: cgr.dev/chainguard-private/flux-image-automation-controller
96 tag: latest@sha256:f48bf47f51eeeae2dcb3d5b7eebc8467e984c1236f30c66e6d9e7f05d87238c6
104 priorityClassName: ""
106 prometheus.io/port: "8080"
107 prometheus.io/scrape: "true"
120imageReflectionController:
122 image: cgr.dev/chainguard-private/flux-image-reflector-controller
123 tag: latest@sha256:e974f34f09b823303641c7fb1ebf397f6fa66bf84766d104ea338175dde278a9
131 priorityClassName: ""
133 prometheus.io/port: "8080"
134 prometheus.io/scrape: "true"
149 image: cgr.dev/chainguard-private/flux-kustomize-controller
150 tag: latest@sha256:d73ed9aa36b6f023db85aec01216c58d10512b711ddcc8c28282d98afa16338c
158 priorityClassName: ""
160 prometheus.io/port: "8080"
161 prometheus.io/scrape: "true"
172 # -- Create a secret to use it with extraSecretMounts. Defaults to false.
176 # -- Defines envFrom using a configmap and/or secret.
182 # -- Defines additional mounts with secrets.
183 # Secrets must be manually created in the namespace or with kustomizeController.secret
184 extraSecretMounts: []
185 # - name: secret-files
186 # mountPath: /etc/secrets
188 # secretName: secret-files
194notificationController:
196 image: cgr.dev/chainguard-private/flux-notification-controller
197 tag: latest@sha256:835162a587f9594c6e742c6c64aa3e2ce79eb3ce7fe9d210c02955ddb6ed62f1
205 priorityClassName: ""
207 prometheus.io/port: "8080"
208 prometheus.io/scrape: "true"
227 # ingressClassName: nginx
229 # kubernetes.io/ingress.class: nginx
230 # kubernetes.io/tls-acme: "true"
233 - host: flux-webhook.example.com
236 pathType: ImplementationSpecific
238 # - secretName: flux-webhook-tls
240 # - flux-webhook.example.com
246 image: cgr.dev/chainguard-private/flux-source-controller
247 tag: latest@sha256:2e8cca6e00e70b321562505126da575a05c3f475e360cf94101dc4c404500b0c
255 priorityClassName: ""
257 prometheus.io/port: "8080"
258 prometheus.io/scrape: "true"
276 image: cgr.dev/chainguard-private/flux-source-watcher
277 tag: latest@sha256:a7ef4a2b17e9022796ea249867af001c194779ad59830c2968e2f28e1695a247
285 priorityClassName: ""
287 prometheus.io/port: "8080"
288 prometheus.io/scrape: "true"
308 # -- Grant the Kubernetes view, edit and admin roles access to Flux custom resources
309 createAggregation: true
310 # -- Add annotations to all RBAC resources, e.g. "helm.sh/resource-policy": keep
315watchAllNamespaces: true
316# -- contents of pod imagePullSecret in form 'name=[secretName]'; applied to all controllers
318# -- Array of extra K8s manifests to deploy
320# Example usage from https://fluxcd.io/docs/components/source/buckets/#static-authentication
321# - apiVersion: source.toolkit.fluxcd.io/v1beta2
330# endpoint: minio.minio.svc.cluster.local:9000
333# name: minio-credentials
337# name: minio-credentials
344# Enables podMonitor creation for the Prometheus Operator
347 # -- Enables podMonitor endpoint
352 # https://github.com/prometheus-operator/prometheus-operator/issues/4816
353 - sourceLabels: [__meta_kubernetes_pod_phase]