Security News
tea.xyz Spam Plagues npm and RubyGems Package Registries
Tea.xyz, a crypto project aimed at rewarding open source contributions, is once again facing backlash due to an influx of spam packages flooding public package registries.
@helm-charts/appscode-kubeci-engine
Advanced tools
KubeCI Engine by AppsCode - Kubernetes Native Workflow Engine
Readme
@helm-charts/appscode-kubeci-engine
KubeCI Engine by AppsCode - Kubernetes Native Workflow Engine
Field | Value |
---|---|
Repository Name | appscode |
Chart Name | kubeci-engine |
Chart Version | 0.1.0 |
NPM Package Version | 0.1.0 |
# Default values for Kubeci-engine.
# This is a YAML-formatted file.
# Declare variables to be passed into your templates.
replicaCount: 1
# Docker registry containing Kubeci-engine images
operator:
registry: kubeci
repository: kubeci-engine
tag: 0.1.0
cleaner:
registry: appscode
repository: kubectl
tag: v1.11
## Optionally specify an array of imagePullSecrets.
## Secrets must be manually created in the namespace.
## ref: https://kubernetes.io/docs/concepts/containers/images/#specifying-imagepullsecrets-on-a-pod
##
# imagePullSecrets:
# - name: myRegistryKeySecretName
## Specify a imagePullPolicy
## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images
##
imagePullPolicy: IfNotPresent
## Installs Kubeci-engine operator as critical addon
## https://kubernetes.io/docs/tasks/administer-cluster/guaranteed-scheduling-critical-addon-pods/
criticalAddon: false
## Log level for operator
logLevel: 3
## Annotations passed to operator pod(s).
##
annotations: {}
## Node labels for pod assignment
## Ref: https://kubernetes.io/docs/user-guide/node-selection/
##
nodeSelector: {}
## Tolerations for pod assignment
## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
##
tolerations: {}
## Affinity for pod assignment
## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
##
affinity: {}
## Install Default RBAC roles and bindings
rbac:
# Specifies whether RBAC resources should be created
create: true
serviceAccount:
# Specifies whether a ServiceAccount should be created
create: true
# The name of the ServiceAccount to use.
# If not set and create is true, a name is generated using the fullname template
name:
apiserver:
# groupPriorityMinimum is the minimum priority the group should have. Please see
# https://github.com/kubernetes/kube-aggregator/blob/release-1.9/pkg/apis/apiregistration/v1beta1/types.go#L58-L64
# for more information on proper values of this field.
groupPriorityMinimum: 10000
# versionPriority is the ordering of this API inside of the group. Please see
# https://github.com/kubernetes/kube-aggregator/blob/release-1.9/pkg/apis/apiregistration/v1beta1/types.go#L66-L70
# for more information on proper values of this field
versionPriority: 15
# enableMutatingWebhook is used to configure mutating webhook for Kubernetes workloads
enableMutatingWebhook: true
# enableValidatingWebhook is used to configure validating webhook for Kubeci-engine CRDss
enableValidatingWebhook: true
# CA certificate used by main Kubernetes api server
ca: not-ca-cert
# If true, disables status sub resource for crds.
# Otherwise, enables status sub resource for Kubernetes version >= 1.11 and disables for other versions.
disableStatusSubresource: false
# Send usage events to Google Analytics
enableAnalytics: true
KubeCI Engine by AppsCode - Kubernetes Native Workflow Engine
$ helm repo add appscode https://charts.appscode.com/stable/
$ helm repo update
$ helm install appscode/kubeci-engine --name kubeci-engine --namespace kube-system
This chart bootstraps a KubeCI engine controller deployment on a Kubernetes cluster using the Helm package manager.
To install the chart with the release name kubeci-engine
:
$ helm install appscode/kubeci-engine --name kubeci-engine
The command deploys KubeCI engine operator on the Kubernetes cluster in the default configuration. The configuration section lists the parameters that can be configured during installation.
Tip: List all releases using
helm list
To uninstall/delete the kubeci-engine
:
$ helm delete kubeci-engine
The command removes all the Kubernetes components associated with the chart and deletes the release.
The following table lists the configurable parameters of the KubeCI engine chart and their default values.
Parameter | Description | Default |
---|---|---|
replicaCount | Number of KubeCI engine replicas to create (only 1 is supported) | 1 |
operator.registry | Docker registry used to pull operator image | kubeci |
operator.repository | Operator container image | kubeci-engine |
operator.tag | Operator container image tag | 0.7.0 |
cleaner.registry | Docker registry used to pull Webhook cleaner image | appscode |
cleaner.repository | Webhook cleaner container image | kubectl |
cleaner.tag | Webhook cleaner container image tag | v1.11 |
imagePullPolicy | Container image pull policy | IfNotPresent |
criticalAddon | If true, installs KubeCI engine operator as critical addon | false |
logLevel | Log level for operator | 3 |
affinity | Affinity rules for pod assignment | {} |
annotations | Annotations applied to operator pod(s) | {} |
nodeSelector | Node labels for pod assignment | {} |
tolerations | Tolerations used pod assignment | {} |
rbac.create | If true , create and use RBAC resources | true |
serviceAccount.create | If true , create a new service account | true |
serviceAccount.name | Service account to be used. If not set and serviceAccount.create is true , a name is generated using the fullname template | `` |
apiserver.groupPriorityMinimum | The minimum priority the group should have. | 10000 |
apiserver.versionPriority | The ordering of this API inside of the group. | 15 |
apiserver.enableValidatingWebhook | Enable validating webhooks for KubeCI engine CRDs | true |
apiserver.enableMutatingWebhook | Enable mutating webhooks for Kubernetes workloads | true |
apiserver.ca | CA certificate used by main Kubernetes api server | not-ca-cert |
apiserver.disableStatusSubresource | If true, disables status sub resource for crds. Otherwise enables based on Kubernetes version | false |
enableAnalytics | Send usage events to Google Analytics | true |
Specify each parameter using the --set key=value[,key=value]
argument to helm install
. For example:
$ helm install --name kubeci-engine --set image.tag=v0.2.1 appscode/kubeci-engine
Alternatively, a YAML file that specifies the values for the parameters can be provided while installing the chart. For example:
$ helm install --name kubeci-engine --values values.yaml appscode/kubeci-engine
By default the chart will not install the recommended RBAC roles and rolebindings.
You need to have the flag --authorization-mode=RBAC
on the api server. See the following document for how to enable RBAC.
To determine if your cluster supports RBAC, run the following command:
$ kubectl api-versions | grep rbac
If the output contains "beta", you may install the chart with RBAC enabled (see below).
To enable the creation of RBAC resources (On clusters with RBAC). Do the following:
$ helm install --name kubeci-engine appscode/kubeci-engine --set rbac.create=true
FAQs
KubeCI Engine by AppsCode - Kubernetes Native Workflow Engine
We found that @helm-charts/appscode-kubeci-engine demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Tea.xyz, a crypto project aimed at rewarding open source contributions, is once again facing backlash due to an influx of spam packages flooding public package registries.
Security News
As cyber threats become more autonomous, AI-powered defenses are crucial for businesses to stay ahead of attackers who can exploit software vulnerabilities at scale.
Security News
UnitedHealth Group disclosed that the ransomware attack on Change Healthcare compromised protected health information for millions in the U.S., with estimated costs to the company expected to reach $1 billion.