2018-06-04 10:39:53 -04:00
images :
namespace : argoproj
controller : workflow-controller
2020-03-07 18:08:28 +01:00
server : argocli
2018-06-04 10:39:53 -04:00
executor : argoexec
2019-05-23 16:32:28 -07:00
pullPolicy : Always
2020-08-30 19:10:09 +02:00
# Secrets with credentials to pull images from a private registry
pullSecrets : [ ]
# - name: argo-pull-secret
2021-01-25 13:47:48 -05:00
tag : v2.12.5
2018-03-23 21:10:05 -07:00
2018-08-16 00:39:27 -07:00
crdVersion : v1alpha1
2019-10-22 10:10:13 -06:00
installCRD : true
2018-08-16 00:39:27 -07:00
init :
# By default the installation will not set an explicit one, which will mean it uses `default` for the namespace the chart is
# being deployed to. In RBAC clusters, that will almost certainly fail. See the NOTES: section of the readme for more info.
serviceAccount : ""
2019-05-13 16:16:44 -04:00
createAggregateRoles : true
2020-04-30 22:00:07 +01:00
# Restrict Argo to only deploy into a single namespace by apply Roles and RoleBindings instead of the Cluster equivalents,
# and start argo-cli with the --namespaced flag. Use it in clusters with strict access policy.
singleNamespace : false
2020-09-08 18:18:26 +02:00
workflow :
2020-10-16 18:03:48 +02:00
namespace : "" # Specify namespace if workflows run in another namespace than argo. This controls where the service account and RBAC resources will be created.
2020-09-08 18:18:26 +02:00
serviceAccount :
create : false # Specifies whether a service account should be created
annotations : {}
name : "argo-workflow" # Service account which is used to run workflows
rbac :
create : false # adds Role and RoleBinding for the above specified service account to be able to run workflows
2018-06-04 10:39:53 -04:00
controller :
2019-07-24 16:13:27 -04:00
image :
# Overrides .images.tag if defined.
tag : ""
2020-11-17 13:32:02 -05:00
# parallelism dictates how many workflows can be running at the same time
parallelism :
2018-08-16 00:39:27 -07:00
# podAnnotations is an optional map of annotations to be applied to the controller Pods
podAnnotations : {}
2019-09-23 16:49:13 +01:00
# Optional labels to add to the controller pods
podLabels : {}
2020-09-02 18:09:17 +02:00
# SecurityContext to set on the controller pods
podSecurityContext : {}
2019-09-23 16:49:13 +01:00
# podPortName: http
2019-04-16 18:27:40 -04:00
metricsConfig :
enabled : false
path : /metrics
port : 8080
2020-05-09 00:23:02 +03:00
persistence : {}
# connectionPool:
# maxIdleConns: 100
# maxOpenConns: 0
# # save the entire workflow into etcd and DB
# nodeStatusOffLoad: false
2020-05-27 16:01:15 +01:00
# # enable archiving of old workflows
# archive: false
2020-05-09 00:23:02 +03:00
# postgresql:
# host: localhost
# port: 5432
# database: postgres
# tableName: argo_workflows
# # the database secrets must be in the same namespace of the controller
# userNameSecret:
# name: argo-postgres-config
# key: username
# passwordSecret:
# name: argo-postgres-config
# key: password
2020-04-28 10:15:23 -07:00
workflowDefaults : {} # Only valid for 2.7+
# spec:
# ttlStrategy:
# secondsAfterCompletion: 84600
2020-06-08 22:09:40 +01:00
# workflowWorkers: 32
# podWorkers: 32
2020-09-16 12:46:13 -07:00
workflowRestrictions : {} # Only valid for 2.9+
# templateReferencing: Strict|Secure
2019-07-02 22:41:28 +02:00
telemetryConfig :
enabled : false
path : /telemetry
port : 8081
serviceMonitor :
enabled : false
additionalLabels : {}
2018-06-04 10:39:53 -04:00
serviceAccount : argo
2020-04-30 22:00:07 +01:00
# Service account annotations
serviceAccountAnnotations : {}
2018-06-04 10:39:53 -04:00
name : workflow-controller
2018-08-16 00:39:27 -07:00
workflowNamespaces :
2018-06-04 10:39:53 -04:00
- default
2019-06-18 01:33:17 +09:00
containerRuntimeExecutor : docker
2018-06-04 10:39:53 -04:00
instanceID :
2018-08-16 00:39:27 -07:00
# `instanceID.enabled` configures the controller to filter workflow submissions
# to only those which have a matching instanceID attribute.
enabled : false
# NOTE: If `instanceID.enabled` is set to `true` then either `instanceID.userReleaseName`
# or `instanceID.explicitID` must be defined.
# useReleaseName: true
# explicitID: unique-argo-controller-identifier
logging :
level : info
globallevel : "0"
2019-07-02 22:41:28 +02:00
serviceType : ClusterIP
metricsServicePort : 8080
2019-09-23 16:49:13 +01:00
metricsServicePortName : metrics
2019-07-02 22:41:28 +02:00
telemetryServicePort : 8081
2019-09-23 16:49:13 +01:00
telemetryServicePortName : telemetry
2019-07-02 22:41:28 +02:00
# Annotations to be applied to the controller Service
serviceAnnotations : {}
2019-09-23 16:49:13 +01:00
# Optional labels to add to the controller Service
serviceLabels : {}
2019-07-02 22:41:28 +02:00
# Source ranges to allow access to service from. Only applies to
# service type `LoadBalancer`
loadBalancerSourceRanges : [ ]
2019-08-16 12:36:37 -04:00
resources : {}
2020-12-11 12:54:59 -08:00
# The list of environment variable definitions to be added to the controller
# manages container verbatim.
extraEnv : [ ]
2021-03-31 19:31:59 +02:00
# Extra arguments to be added to the controller
extraArgs : [ ]
2019-09-23 16:49:13 +01:00
replicas : 1
pdb :
enabled : false
# minAvailable: 1
# maxUnavailable: 1
2020-02-13 12:12:30 +08:00
## Node selectors and tolerations for server scheduling to nodes with taints
## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/
##
2020-09-02 18:04:05 +02:00
nodeSelector :
kubernetes.io/os : linux
2020-02-13 12:12:30 +08:00
tolerations : [ ]
affinity : {}
2020-10-14 00:48:07 +02:00
# Leverage a PriorityClass to ensure your pods survive resource shortages
# ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/
# PriorityClass: system-cluster-critical
priorityClassName : ""
2020-11-16 22:49:59 +01:00
# https://argoproj.github.io/argo/links/
links : [ ]
2018-06-04 10:39:53 -04:00
2020-04-30 22:00:07 +01:00
# executor controls how the init and wait container should be customized
2019-07-24 16:13:27 -04:00
executor :
image :
# Overrides .images.tag if defined.
tag : ""
2020-04-30 22:00:07 +01:00
resources : {}
2020-05-14 17:04:21 -07:00
# Adds environment variables for the executor.
env : {}
2020-09-02 18:09:17 +02:00
# sets security context for the executor container
securityContext : {}
2019-07-24 16:13:27 -04:00
2020-03-07 18:08:28 +01:00
server :
2019-04-16 18:00:06 -07:00
enabled : true
2020-03-13 11:04:31 -04:00
# only updates base url of resources on client side,
# it's expected that a proxy server rewrites the request URL and gets rid of this prefix
# https://github.com/argoproj/argo/issues/716#issuecomment-433213190
2020-03-10 16:41:23 +02:00
baseHref : /
2019-07-24 16:13:27 -04:00
image :
# Overrides .images.tag if defined.
tag : ""
2018-08-16 00:39:27 -07:00
# optional map of annotations to be applied to the ui Pods
podAnnotations : {}
2019-09-23 16:49:13 +01:00
# Optional labels to add to the UI pods
podLabels : {}
2020-09-02 18:09:17 +02:00
# SecurityContext to set on the server pods
podSecurityContext : {}
2020-03-07 18:08:28 +01:00
name : server
2018-08-28 01:29:10 +03:00
serviceType : ClusterIP
2020-03-07 18:08:28 +01:00
servicePort : 2746
2019-09-23 16:49:13 +01:00
# servicePortName: http
2020-03-07 18:08:28 +01:00
serviceAccount : argo-server
2020-10-05 09:45:49 -07:00
# Whether to create the service account with the name specified in
# server.serviceAccount and bind it to the server role.
createServiceAccount : true
2020-04-30 22:00:07 +01:00
# Service account annotations
serviceAccountAnnotations : {}
2018-08-16 00:39:27 -07:00
# Annotations to be applied to the UI Service
serviceAnnotations : {}
2019-09-23 16:49:13 +01:00
# Optional labels to add to the UI Service
serviceLabels : {}
2019-06-25 17:57:20 +02:00
# Static IP address to assign to loadBalancer
# service type `LoadBalancer`
loadBalancerIP : ""
2019-04-16 11:29:45 -07:00
# Source ranges to allow access to service from. Only applies to
# service type `LoadBalancer`
loadBalancerSourceRanges : [ ]
2019-08-16 12:36:37 -04:00
resources : {}
2019-09-23 16:49:13 +01:00
replicas : 1
pdb :
enabled : false
# minAvailable: 1
# maxUnavailable: 1
2020-02-13 12:12:30 +08:00
## Node selectors and tolerations for server scheduling to nodes with taints
## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/
##
2020-09-02 18:04:05 +02:00
nodeSelector :
kubernetes.io/os : linux
2020-02-13 12:12:30 +08:00
tolerations : [ ]
affinity : {}
2020-10-14 00:48:07 +02:00
# Leverage a PriorityClass to ensure your pods survive resource shortages
# ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/
# PriorityClass: system-cluster-critical
priorityClassName : ""
2019-04-16 11:29:45 -07:00
2020-12-02 10:26:21 -06:00
# Run the argo server in "secure" mode. Configure this value instead of
# "--secure" in extraArgs. See the following documentation for more details
# on secure mode:
# https://argoproj.github.io/argo/tls/#encrypted
secure : false
2020-04-06 09:13:40 -07:00
# Extra arguments to provide to the Argo server binary.
extraArgs : [ ]
2020-06-22 19:27:06 +02:00
## Additional volumes to the server main container.
volumeMounts : [ ]
volumes : [ ]
2018-08-28 01:29:10 +03:00
## Ingress configuration.
## ref: https://kubernetes.io/docs/user-guide/ingress/
##
ingress :
enabled : false
## Annotations to be added to the web ingress.
##
# annotations:
# kubernetes.io/ingress.class: nginx
# kubernetes.io/tls-acme: "true"
2021-02-11 13:40:56 +03:00
## Labels to be added to the web ingress.
##
# labels:
# use-cloudflare-solver: "true"
2018-08-28 01:29:10 +03:00
## Hostnames.
## Must be provided if Ingress is enabled.
##
# hosts:
# - argo.domain.com
2020-04-29 21:45:20 -04:00
## Additional Paths for each host
# paths:
# - serviceName: "ssl-redirect"
# servicePort: "use-annotation"
2018-08-28 01:29:10 +03:00
## TLS configuration.
## Secrets must be manually created in the namespace.
##
# tls:
# - secretName: argo-ui-tls
# hosts:
# - argo.domain.com
2020-05-15 14:32:23 -07:00
clusterWorkflowTemplates :
# Give the server permissions to edit ClusterWorkflowTemplates.
enableEditing : true
2020-06-22 10:44:50 -07:00
sso :
## SSO configuration when SSO is specified as a server auth mode.
2021-02-02 12:25:24 -05:00
## All the values are required. SSO is activated by adding --auth-mode=sso
2020-06-22 10:44:50 -07:00
## to the server command line.
#
## The root URL of the OIDC identity provider.
# issuer: https://accounts.google.com
## Name of a secret and a key in it to retrieve the app OIDC client ID from.
# clientId:
# name: argo-server-sso
# key: client-id
## Name of a secret and a key in it to retrieve the app OIDC client secret from.
# clientSecret:
# name: argo-server-sso
# key: client-secret
## The OIDC redirect URL. Should be in the form <argo-root-url>/oauth2/callback.
# redirectUrl: https://argo/oauth2/callback
2021-01-13 10:07:56 -08:00
# rbac:
# enabled: true
## When present, restricts secrets the server can read to a given list.
## You can use it to restrict the server to only be able to access the
## service account token secrets that are associated with service accounts
## used for authorization.
# secretWhitelist: []
## Scopes requested from the SSO ID provider. The 'groups' scope requests
## group membership information, which is usually used for authorization
## decisions.
# scopes:
# - groups
2018-03-23 21:10:05 -07:00
2018-08-16 00:39:27 -07:00
# Influences the creation of the ConfigMap for the workflow-controller itself.
2018-03-23 21:10:05 -07:00
useDefaultArtifactRepo : false
useStaticCredentials : true
2018-08-16 00:39:27 -07:00
artifactRepository :
2019-05-07 22:45:50 +08:00
# archiveLogs will archive the main container logs as an artifact
archiveLogs : false
2018-08-16 00:39:27 -07:00
s3 :
# Note the `key` attribute is not the actual secret, it's the PATH to
# the contents in the associated secret, as defined by the `name` attribute.
accessKeySecret :
# name: <releaseName>-minio (default)
key : accesskey
secretKeySecret :
# name: <releaseName>-minio
key : secretkey
insecure : true
# bucket:
# endpoint:
2020-04-23 12:25:08 -07:00
# region:
2020-04-29 22:04:07 -04:00
# roleARN:
# useSDKCreds: true
2020-09-04 23:23:16 +01:00
# gcs:
# bucket: <project>-argo
# keyFormat: "{{workflow.namespace}}/{{workflow.name}}/"
# serviceAccountKeySecret is a secret selector.
# It references the k8s secret named 'my-gcs-credentials'.
# This secret is expected to have have the key 'serviceAccountKey',
# containing the base64 encoded credentials
# to the bucket.
#
# If it's running on GKE and Workload Identity is used,
# serviceAccountKeySecret is not needed.
# serviceAccountKeySecret:
# name: my-gcs-credentials
# key: serviceAccountKey
2018-03-23 21:10:05 -07:00
2018-08-16 00:39:27 -07:00
# NOTE: These are setting attributes for the `minio` optional dependency
2018-06-04 10:39:53 -04:00
minio :
2018-08-16 00:39:27 -07:00
# If set to true then chart installs minio and generate according artifactRepository section in workflow controller config map
2018-08-14 17:30:45 -04:00
install : false
2018-06-04 10:39:53 -04:00
defaultBucket :
enabled : true
name : argo-artifacts