Big Bang is a declarative, continuous delivery tool for core DoD hardened and approved packages into a Kubernetes cluster.
Homepage: https://p1.dso.mil/#/products/big-bang
This is a mirror of a government repo hosted on Repo1 by DoD Platform One. Please direct all code changes, issues and comments to https://repo1.dso.mil/platform-one/big-bang/bigbang
Big Bang follows a GitOps approach to configuration management, using Flux v2 to reconcile Git with the cluster. Environments (e.g. dev, prod) and packages (e.g. istio) can be fully configured to suit the deployment needs.
Big Bang is intended to be used for deploying and maintaining a DoD hardened and approved set of packages into a Kubernetes cluster. Deployment and configuration of ingress/egress, load balancing, policy auditing, logging, monitoring, etc. are handled via Big Bang. Additional packages (e.g. ArgoCD, GitLab) can also be enabled and customized to extend Big Bang's baseline. Once deployed, the customer can use the Kubernetes cluster to add mission specific applications.
Additional information can be found in Big Bang Docs.
To start using Big Bang, you will need to create your own Big Bang environment tailored to your needs. The Big Bang customer template is provided for you to copy into your own Git repository and begin modifications.
Name | Url | |
---|---|---|
Ryan Garcia | garcia.ryan@solute.us | |
Michael McLeroy | michaelmcleroy@cloudfitsoftware.com | |
Micah Nagel | micah.nagel@parsons.com | |
Branden Cobb | cobb_branden@bah.com | |
Tom Runyon | tom@runyon.dev | |
Josh Wolf | josh@rancherfederal.com |
Key | Type | Default | Description |
---|---|---|---|
domain | string | "bigbang.dev" |
Domain used for BigBang created exposed services, can be overridden by individual packages. |
offline | bool | false |
(experimental) Toggle sourcing from external repos. All this does right now is toggle GitRepositories, it is not fully functional |
registryCredentials | object | {"email":"","password":"","registry":"registry1.dso.mil","username":""} |
Single set of registry credentials used to pull all images deployed by BigBang. |
openshift | bool | false |
Multiple sets of registry credentials used to pull all images deployed by BigBang. Credentials will only be created when a valid combination exists, registry, username, and password (email is optional) Or a list of registires: - registry: registry1.dso.mil username: "" password: "" email: "" - registry: registry.dso.mil username: "" password: "" email: "" Openshift Container Platform Feature Toggle |
git | object | {"credentials":{"caFile":"","knownHosts":"","password":"","privateKey":"","publicKey":"","username":""},"existingSecret":""} |
Git credential settings for accessing private repositories Order of precedence is: 1. existingSecret 2. http credentials (username/password/caFile) 3. ssh credentials (privateKey/publicKey/knownHosts) |
git.existingSecret | string | "" |
Existing secret to use for git credentials, must be in the appropriate format: https://toolkit.fluxcd.io/components/source/gitrepositories/#https-authentication |
git.credentials | object | {"caFile":"","knownHosts":"","password":"","privateKey":"","publicKey":"","username":""} |
Chart created secrets with user defined values |
git.credentials.username | string | "" |
HTTP git credentials, both username and password must be provided |
git.credentials.caFile | string | "" |
HTTPS certificate authority file. Required for any repo with a self signed certificate |
git.credentials.privateKey | string | "" |
SSH git credentials, privateKey, publicKey, and knownHosts must be provided |
sso | object | {"auth_url":"https://{{ .Values.sso.oidc.host }}/auth/realms/{{ .Values.sso.oidc.realm }}/protocol/openid-connect/auth","certificate_authority":"","client_id":"","client_secret":"","jwks":"","oidc":{"host":"login.dso.mil","realm":"baby-yoda"},"secretName":"tls-ca-sso","token_url":"https://{{ .Values.sso.oidc.host }}/auth/realms/{{ .Values.sso.oidc.realm }}/protocol/openid-connect/token"} |
Global SSO values used for BigBang deployments when sso is enabled, can be overridden by individual packages. |
sso.oidc.host | string | "login.dso.mil" |
Domain for keycloak used for configuring SSO |
sso.oidc.realm | string | "baby-yoda" |
Keycloak realm containing clients |
sso.certificate_authority | string | "" |
Keycloak's certificate authority (PEM Format). Entered using chomp modifier (see ./docs/example_configs/dev-sso-values.yaml for example). Used by authservice to support SSO for various packages |
sso.jwks | string | "" |
Keycloak realm's json web key output, obtained at https:///auth/realms//protocol/openid-connect/certs |
sso.client_id | string | "" |
OIDC client ID used for packages authenticated through authservice |
sso.client_secret | string | "" |
OIDC client secret used for packages authenticated through authservice |
sso.token_url | string | "https://{{ .Values.sso.oidc.host }}/auth/realms/{{ .Values.sso.oidc.realm }}/protocol/openid-connect/token" |
OIDC token URL template string (to be used as default) |
sso.auth_url | string | "https://{{ .Values.sso.oidc.host }}/auth/realms/{{ .Values.sso.oidc.realm }}/protocol/openid-connect/auth" |
OIDC auth URL template string (to be used as default) |
sso.secretName | string | "tls-ca-sso" |
Kubernetes Secret containing the sso.certificate_authority value for SSO enabled application namespaces |
flux | object | {"install":{"remediation":{"retries":-1}},"interval":"2m","rollback":{"cleanupOnFail":true,"timeout":"10m"},"test":{"enable":false},"timeout":"10m","upgrade":{"cleanupOnFail":true,"remediation":{"remediateLastFailure":true,"retries":3}}} |
(Advanced) Flux reconciliation parameters. The default values provided will be sufficient for the majority of workloads. |
networkPolicies | object | {"controlPlaneCidr":"0.0.0.0/0","enabled":true,"nodeCidr":"","vpcCidr":"0.0.0.0/0"} |
Global NetworkPolicies settings |
networkPolicies.enabled | bool | true |
Toggle all package NetworkPolicies, can disable specific packages with package.values.networkPolicies.enabled |
networkPolicies.controlPlaneCidr | string | "0.0.0.0/0" |
Control Plane CIDR, defaults to 0.0.0.0/0, use kubectl get endpoints -n default kubernetes to get the CIDR range needed for your cluster Must be an IP CIDR range (x.x.x.x/x - ideally with /32 for the specific IP of a single endpoint, broader range for multiple masters/endpoints) Used by package NetworkPolicies to allow Kube API access |
networkPolicies.nodeCidr | string | "" |
Node CIDR, defaults to allowing "10.0.0.0/8" "172.16.0.0/12" "192.168.0.0/16" "100.64.0.0/10" networks. use kubectl get nodes -owide and review the INTERNAL-IP column to derive CIDR range. Must be an IP CIDR range (x.x.x.x/x - ideally a /16 or /24 to include multiple IPs) |
networkPolicies.vpcCidr | string | "0.0.0.0/0" |
VPC CIDR, defaults to 0.0.0.0/0 In a production environment, it is recommended to setup a Private Endpoint for your AWS services like KMS or S3. Please review https://docs.aws.amazon.com/kms/latest/developerguide/kms-vpc-endpoint.html to setup routing to AWS services that never leave the AWS network. Once created update networkPolicies.vpcCidr to match the CIDR of your VPC so Vault will be able to reach your VPCs DNS and new KMS endpoint. |
imagePullPolicy | string | "IfNotPresent" |
Global ImagePullPolicy value for all packages Permitted values are: None, Always, IfNotPresent |
istio.enabled | bool | true |
Toggle deployment of Istio. |
istio.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/istio-controlplane.git" |
|
istio.git.path | string | "./chart" |
|
istio.git.tag | string | "1.11.3-bb.2" |
|
istio.ingressGateways.public-ingressgateway.type | string | "LoadBalancer" |
|
istio.ingressGateways.public-ingressgateway.kubernetesResourceSpec | object | {} |
|
istio.gateways.public.ingressGateway | string | "public-ingressgateway" |
|
istio.gateways.public.hosts[0] | string | "*.{{ .Values.domain }}" |
|
istio.gateways.public.autoHttpRedirect | object | {"enabled":true} |
Controls default HTTP/8080 server entry with HTTP to HTTPS Redirect. |
istio.gateways.public.tls.key | string | "" |
|
istio.gateways.public.tls.cert | string | "" |
|
istio.flux | object | {} |
Flux reconciliation overrides specifically for the Istio Package |
istio.values | object | {} |
Values to passthrough to the istio-controlplane chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/istio-controlplane.git |
istio.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
istiooperator.enabled | bool | true |
Toggle deployment of Istio Operator. |
istiooperator.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/istio-operator.git" |
|
istiooperator.git.path | string | "./chart" |
|
istiooperator.git.tag | string | "1.11.3-bb.3" |
|
istiooperator.flux | object | {} |
Flux reconciliation overrides specifically for the Istio Operator Package |
istiooperator.values | object | {} |
Values to passthrough to the istio-operator chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/istio-operator.git |
istiooperator.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
jaeger.enabled | bool | true |
Toggle deployment of Jaeger. |
jaeger.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/jaeger.git" |
|
jaeger.git.path | string | "./chart" |
|
jaeger.git.tag | string | "2.27.1-bb.0" |
|
jaeger.flux | object | {"install":{"crds":"CreateReplace"},"upgrade":{"crds":"CreateReplace"}} |
Flux reconciliation overrides specifically for the Jaeger Package |
jaeger.ingress.gateway | string | "" |
|
jaeger.sso.enabled | bool | false |
Toggle SSO for Jaeger on and off |
jaeger.sso.client_id | string | "" |
OIDC Client ID to use for Jaeger |
jaeger.sso.client_secret | string | "" |
OIDC Client Secret to use for Jaeger |
jaeger.values | object | {} |
Values to pass through to Jaeger chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/jaeger.git |
jaeger.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
kiali.enabled | bool | true |
Toggle deployment of Kiali. |
kiali.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/kiali.git" |
|
kiali.git.path | string | "./chart" |
|
kiali.git.tag | string | "1.44.0-bb.3" |
|
kiali.flux | object | {} |
Flux reconciliation overrides specifically for the Kiali Package |
kiali.ingress.gateway | string | "" |
|
kiali.sso.enabled | bool | false |
Toggle SSO for Kiali on and off |
kiali.sso.client_id | string | "" |
OIDC Client ID to use for Kiali |
kiali.sso.client_secret | string | "" |
OIDC Client Secret to use for Kiali |
kiali.values | object | {} |
Values to pass through to Kiali chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/kiali |
kiali.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
clusterAuditor.enabled | bool | true |
Toggle deployment of Cluster Auditor. |
clusterAuditor.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/cluster-auditor.git" |
|
clusterAuditor.git.path | string | "./chart" |
|
clusterAuditor.git.tag | string | "1.1.1-bb.0" |
|
clusterAuditor.flux | object | {} |
Flux reconciliation overrides specifically for the Cluster Auditor Package |
clusterAuditor.values | object | {} |
Values to passthrough to the cluster auditor chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/cluster-auditor.git |
clusterAuditor.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
gatekeeper.enabled | bool | true |
Toggle deployment of OPA Gatekeeper. |
gatekeeper.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/policy.git" |
|
gatekeeper.git.path | string | "./chart" |
|
gatekeeper.git.tag | string | "3.7.0-bb.4" |
|
gatekeeper.flux | object | {"install":{"crds":"CreateReplace"},"upgrade":{"crds":"CreateReplace"}} |
Flux reconciliation overrides specifically for the OPA Gatekeeper Package |
gatekeeper.values | object | {} |
Values to passthrough to the gatekeeper chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/policy.git |
gatekeeper.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
kyverno.enabled | bool | false |
Toggle deployment of Kyverno. |
kyverno.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/kyverno" |
|
kyverno.git.path | string | "./chart" |
|
kyverno.git.tag | string | "2.1.3-bb.3" |
|
kyverno.flux | object | {} |
Flux reconciliation overrides specifically for the Kyverno Package |
kyverno.values | object | {} |
Values to passthrough to the kyverno chart: https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/kyverno.git |
kyverno.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
logging.enabled | bool | true |
Toggle deployment of Logging (EFK). |
logging.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/elasticsearch-kibana.git" |
|
logging.git.path | string | "./chart" |
|
logging.git.tag | string | "0.6.0-bb.1" |
|
logging.flux | object | {"timeout":"20m"} |
Flux reconciliation overrides specifically for the Logging (EFK) Package |
logging.ingress.gateway | string | "" |
|
logging.sso.enabled | bool | false |
Toggle OIDC SSO for Kibana/Elasticsearch on and off. Enabling this option will auto-create any required secrets. |
logging.sso.client_id | string | "" |
Elasticsearch/Kibana OIDC client ID |
logging.sso.client_secret | string | "" |
Elasticsearch/Kibana OIDC client secret |
logging.license.trial | bool | false |
Toggle trial license installation of elasticsearch. Note that enterprise (non trial) is required for SSO to work. |
logging.license.keyJSON | string | "" |
Elasticsearch license in json format seen here: https://repo1.dso.mil/platform-one/big-bang/apps/core/elasticsearch-kibana#enterprise-license |
logging.values | object | {} |
Values to passthrough to the elasticsearch-kibana chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/elasticsearch-kibana.git |
logging.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
eckoperator.enabled | bool | true |
Toggle deployment of ECK Operator. |
eckoperator.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/eck-operator.git" |
|
eckoperator.git.path | string | "./chart" |
|
eckoperator.git.tag | string | "1.9.1-bb.1" |
|
eckoperator.flux | object | {} |
Flux reconciliation overrides specifically for the ECK Operator Package |
eckoperator.values | object | {} |
Values to passthrough to the eck-operator chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/eck-operator.git |
fluentbit.enabled | bool | true |
Toggle deployment of Fluent-Bit. |
fluentbit.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/fluentbit.git" |
|
fluentbit.git.path | string | "./chart" |
|
fluentbit.git.tag | string | "0.19.16-bb.1" |
|
fluentbit.flux | object | {} |
Flux reconciliation overrides specifically for the Fluent-Bit Package |
fluentbit.values | object | {} |
Values to passthrough to the fluentbit chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/fluentbit.git |
fluentbit.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
promtail | object | {"enabled":false,"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/promtail.git","tag":"3.8.1-bb.2"},"postRenderers":[],"values":{}} |
BETA support of promtail/loki logging stack |
promtail.enabled | bool | false |
Toggle deployment of Promtail. |
promtail.flux | object | {} |
Flux reconciliation overrides specifically for the Promtail Package |
promtail.values | object | {} |
Values to passthrough to the promtail chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/fluentbit.git |
promtail.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
loki.enabled | bool | false |
Toggle deployment of Loki. |
loki.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/loki.git" |
|
loki.git.path | string | "./chart" |
|
loki.git.tag | string | "2.5.1-bb.2" |
|
loki.flux | object | {} |
Flux reconciliation overrides specifically for the Loki Package |
loki.values | object | {} |
Values to passthrough to the Loki chart: https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/loki.git |
loki.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
tempo.enabled | bool | false |
Toggle deployment of Tempo. |
tempo.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/tempo.git" |
|
tempo.git.path | string | "./chart" |
|
tempo.git.tag | string | "0.12.2-bb.0" |
|
tempo.flux | object | {} |
Flux reconciliation overrides specifically for the Tempo Package |
tempo.values | object | {} |
Values to passthrough to the Tempo chart: https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/tempo.git |
tempo.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
monitoring.enabled | bool | true |
Toggle deployment of Monitoring (Prometheus, Grafana, and Alertmanager). |
monitoring.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/monitoring.git" |
|
monitoring.git.path | string | "./chart" |
|
monitoring.git.tag | string | "30.0.1-bb.2" |
|
monitoring.flux | object | {"install":{"crds":"CreateReplace"},"upgrade":{"crds":"CreateReplace"}} |
Flux reconciliation overrides specifically for the Monitoring Package |
monitoring.ingress.gateway | string | "" |
|
monitoring.sso.enabled | bool | false |
Toggle SSO for monitoring components on and off |
monitoring.sso.prometheus.client_id | string | "" |
Prometheus OIDC client ID |
monitoring.sso.prometheus.client_secret | string | "" |
Prometheus OIDC client secret |
monitoring.sso.alertmanager.client_id | string | "" |
Alertmanager OIDC client ID |
monitoring.sso.alertmanager.client_secret | string | "" |
Alertmanager OIDC client secret |
monitoring.sso.grafana.client_id | string | "" |
Grafana OIDC client ID |
monitoring.sso.grafana.client_secret | string | "" |
Grafana OIDC client secret |
monitoring.sso.grafana.scopes | string | "" |
Grafana OIDC client scopes, comma separated, see https://grafana.com/docs/grafana/latest/auth/generic-oauth/ |
monitoring.sso.grafana.allow_sign_up | string | "true" |
|
monitoring.sso.grafana.role_attribute_path | string | "Viewer" |
|
monitoring.values | object | {} |
Values to passthrough to the monitoring chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/monitoring.git |
monitoring.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
twistlock.enabled | bool | true |
Toggle deployment of Twistlock. |
twistlock.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/security-tools/twistlock.git" |
|
twistlock.git.path | string | "./chart" |
|
twistlock.git.tag | string | "0.2.0-bb.0" |
|
twistlock.flux | object | {} |
Flux reconciliation overrides specifically for the Twistlock Package |
twistlock.ingress.gateway | string | "" |
|
twistlock.values | object | {} |
Values to passthrough to the twistlock chart: https://repo1.dso.mil/platform-one/big-bang/apps/security-tools/twistlock.git |
twistlock.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.argocd.enabled | bool | false |
Toggle deployment of ArgoCD. |
addons.argocd.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/argocd.git" |
|
addons.argocd.git.path | string | "./chart" |
|
addons.argocd.git.tag | string | "3.27.1-bb.4" |
|
addons.argocd.flux | object | {} |
Flux reconciliation overrides specifically for the ArgoCD Package |
addons.argocd.ingress.gateway | string | "" |
|
addons.argocd.sso.enabled | bool | false |
Toggle SSO for ArgoCD on and off |
addons.argocd.sso.client_id | string | "" |
ArgoCD OIDC client ID |
addons.argocd.sso.client_secret | string | "" |
ArgoCD OIDC client secret |
addons.argocd.sso.provider_name | string | "" |
ArgoCD SSO login text |
addons.argocd.sso.groups | string | "g, Impact Level 2 Authorized, role:admin\n" |
ArgoCD SSO group roles, see docs for more details: https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/ |
addons.argocd.values | object | {} |
Values to passthrough to the argocd chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/argocd.git |
addons.argocd.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.authservice.enabled | bool | false |
Toggle deployment of Authservice. if enabling authservice, a filter needs to be provided by either enabling sso for monitoring or istio, or manually adding a filter chain in the values here: values: chain: minimal: callback_uri: "https://somecallback" |
addons.authservice.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/core/authservice.git" |
|
addons.authservice.git.path | string | "./chart" |
|
addons.authservice.git.tag | string | "0.4.0-bb.21" |
|
addons.authservice.flux | object | {} |
Flux reconciliation overrides specifically for the Authservice Package |
addons.authservice.values | object | {} |
Values to passthrough to the authservice chart: https://repo1.dso.mil/platform-one/big-bang/apps/core/authservice.git |
addons.authservice.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.authservice.chains | object | {} |
Additional authservice chain configurations. |
addons.minioOperator.enabled | bool | false |
Toggle deployment of minio operator and instance. |
addons.minioOperator.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/application-utilities/minio-operator.git" |
|
addons.minioOperator.git.path | string | "./chart" |
|
addons.minioOperator.git.tag | string | "4.2.3-bb.4" |
|
addons.minioOperator.flux | object | {} |
Flux reconciliation overrides specifically for the Minio Operator Package |
addons.minioOperator.values | object | {} |
Values to passthrough to the minio operator chart: https://repo1.dso.mil/platform-one/big-bang/apps/application-utilities/minio-operator.git |
addons.minioOperator.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.minio.enabled | bool | false |
Toggle deployment of minio. |
addons.minio.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/application-utilities/minio.git" |
|
addons.minio.git.path | string | "./chart" |
|
addons.minio.git.tag | string | "4.2.3-bb.10" |
|
addons.minio.flux | object | {} |
Flux reconciliation overrides specifically for the Minio Package |
addons.minio.ingress.gateway | string | "" |
|
addons.minio.accesskey | string | "" |
Default access key to use for minio. |
addons.minio.secretkey | string | "" |
Default secret key to intstantiate with minio, you should change/delete this after installation. |
addons.minio.values | object | {} |
Values to passthrough to the minio instance chart: https://repo1.dso.mil/platform-one/big-bang/apps/application-utilities/minio.git |
addons.minio.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.gitlab.enabled | bool | false |
Toggle deployment of Gitlab |
addons.gitlab.hostnames.gitlab | string | "gitlab" |
|
addons.gitlab.hostnames.registry | string | "registry" |
|
addons.gitlab.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/developer-tools/gitlab.git" |
|
addons.gitlab.git.path | string | "./chart" |
|
addons.gitlab.git.tag | string | "5.6.2-bb.2" |
|
addons.gitlab.flux | object | {} |
Flux reconciliation overrides specifically for the Gitlab Package |
addons.gitlab.ingress.gateway | string | "" |
|
addons.gitlab.sso.enabled | bool | false |
Toggle OIDC SSO for Gitlab on and off. Enabling this option will auto-create any required secrets. |
addons.gitlab.sso.client_id | string | "" |
Gitlab OIDC client ID |
addons.gitlab.sso.client_secret | string | "" |
Gitlab OIDC client secret |
addons.gitlab.sso.label | string | "" |
Gitlab SSO login button label |
addons.gitlab.database.host | string | "" |
Hostname of a pre-existing PostgreSQL database to use for Gitlab. Entering connection info will disable the deployment of an internal database and will auto-create any required secrets. |
addons.gitlab.database.port | int | 5432 |
Port of a pre-existing PostgreSQL database to use for Gitlab. |
addons.gitlab.database.database | string | "" |
Database name to connect to on host. |
addons.gitlab.database.username | string | "" |
Username to connect as to external database, the user must have all privileges on the database. |
addons.gitlab.database.password | string | "" |
Database password for the username used to connect to the existing database. |
addons.gitlab.objectStorage.type | string | "" |
Type of object storage to use for Gitlab, setting to s3 will assume an external, pre-existing object storage is to be used. Entering connection info will enable this option and will auto-create any required secrets |
addons.gitlab.objectStorage.endpoint | string | "" |
S3 compatible endpoint to use for connection information. examples: "https://s3.amazonaws.com" "https://s3.us-gov-west-1.amazonaws.com" "http://minio.minio.svc.cluster.local:9000" |
addons.gitlab.objectStorage.region | string | "" |
S3 compatible region to use for connection information. |
addons.gitlab.objectStorage.accessKey | string | "" |
Access key for connecting to object storage endpoint. -- If using accessKey and accessSecret, the iamProfile must be left as an empty string: "" |
addons.gitlab.objectStorage.accessSecret | string | "" |
Secret key for connecting to object storage endpoint. Unencoded string data. This should be placed in the secret values and then encrypted |
addons.gitlab.objectStorage.bucketPrefix | string | "" |
Bucket prefix to use for identifying buckets. Example: "prod" will produce "prod-gitlab-bucket" |
addons.gitlab.objectStorage.iamProfile | string | "" |
NOTE: Current bug with AWS IAM Profiles and Object Storage where only artifacts are stored. Fixed in Gitlab 14.5 -- Name of AWS IAM profile to use. -- If using an AWS IAM profile, the accessKey and accessSecret values must be left as empty strings eg: "" |
addons.gitlab.values | object | {} |
Values to passthrough to the gitlab chart: https://repo1.dso.mil/platform-one/big-bang/apps/developer-tools/gitlab.git |
addons.gitlab.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.gitlabRunner.enabled | bool | false |
Toggle deployment of Gitlab Runner |
addons.gitlabRunner.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/developer-tools/gitlab-runner.git" |
|
addons.gitlabRunner.git.path | string | "./chart" |
|
addons.gitlabRunner.git.tag | string | "0.34.0-bb.1" |
|
addons.gitlabRunner.flux | object | {} |
Flux reconciliation overrides specifically for the Gitlab Runner Package |
addons.gitlabRunner.values | object | {} |
Values to passthrough to the gitlab runner chart: https://repo1.dso.mil/platform-one/big-bang/apps/developer-tools/gitlab-runner.git |
addons.gitlabRunner.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.nexus.enabled | bool | false |
Toggle deployment of Nexus. |
addons.nexus.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/developer-tools/nexus.git" |
|
addons.nexus.git.path | string | "./chart" |
|
addons.nexus.git.tag | string | "36.0.0-bb.3" |
|
addons.nexus.license_key | string | "" |
Base64 encoded license file. |
addons.nexus.ingress.gateway | string | "" |
|
addons.nexus.sso.enabled | bool | false |
Toggle SAML SSO for NXRM. -- handles SAML SSO, a Client must be configured in Keycloak or IdP -- to complete setup. -- https://support.sonatype.com/hc/en-us/articles/1500000976522-SAML-integration-for-Nexus-Repository-Manager-Pro-3-and-Nexus-IQ-Server-with-Keycloak#h_01EV7CWCYH3YKAPMAHG8XMQ599 |
addons.nexus.sso.idp_data | object | {"email":"","entityId":"","firstName":"","groups":"","idpMetadata":"","lastName":"","username":""} |
NXRM SAML SSO Integration data |
addons.nexus.sso.idp_data.username | string | "" |
IdP Field Mappings -- NXRM username attribute |
addons.nexus.sso.idp_data.firstName | string | "" |
NXRM firstname attribute (optional) |
addons.nexus.sso.idp_data.lastName | string | "" |
NXRM lastname attribute (optional) |
addons.nexus.sso.idp_data.email | string | "" |
NXRM email attribute (optional) |
addons.nexus.sso.idp_data.groups | string | "" |
NXRM groups attribute (optional) |
addons.nexus.sso.idp_data.idpMetadata | string | "" |
IDP SAML Metadata XML as a single line string in single quotes -- this information is public and does not require a secret |
addons.nexus.sso.role | list | [{"description":"","id":"","name":"","privileges":[],"roles":[]}] |
NXRM Role |
addons.nexus.flux | object | {} |
Flux reconciliation overrides specifically for the Nexus Repository Manager Package |
addons.nexus.values | object | {} |
Values to passthrough to the nxrm chart: https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/nexus.git |
addons.nexus.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.sonarqube.enabled | bool | false |
Toggle deployment of SonarQube. |
addons.sonarqube.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/developer-tools/sonarqube.git" |
|
addons.sonarqube.git.path | string | "./chart" |
|
addons.sonarqube.git.tag | string | "9.6.3-bb.13" |
|
addons.sonarqube.flux | object | {} |
Flux reconciliation overrides specifically for the Sonarqube Package |
addons.sonarqube.ingress.gateway | string | "" |
|
addons.sonarqube.sso.enabled | bool | false |
Toggle SAML SSO for SonarQube. Enabling this option will auto-create any required secrets. |
addons.sonarqube.sso.client_id | string | "" |
SonarQube SAML client ID |
addons.sonarqube.sso.provider_name | string | "" |
SonarQube SSO login button label |
addons.sonarqube.sso.certificate | string | "" |
SonarQube plaintext SAML sso certificate. example: MITCAYCBFyIEUjNBkqhkiG9w0BA.... |
addons.sonarqube.sso.login | string | "login" |
SonarQube login sso attribute. |
addons.sonarqube.sso.name | string | "name" |
SonarQube name sso attribute. |
addons.sonarqube.sso.email | string | "email" |
SonarQube email sso attribute. |
addons.sonarqube.sso.group | string | "group" |
(optional) SonarQube group sso attribute. |
addons.sonarqube.database.host | string | "" |
Hostname of a pre-existing PostgreSQL database to use for SonarQube. |
addons.sonarqube.database.port | int | 5432 |
Port of a pre-existing PostgreSQL database to use for SonarQube. |
addons.sonarqube.database.database | string | "" |
Database name to connect to on host. |
addons.sonarqube.database.username | string | "" |
Username to connect as to external database, the user must have all privileges on the database. |
addons.sonarqube.database.password | string | "" |
Database password for the username used to connect to the existing database. |
addons.sonarqube.values | object | {} |
Values to passthrough to the sonarqube chart: https://repo1.dso.mil/platform-one/big-bang/apps/developer-tools/sonarqube.git |
addons.sonarqube.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.haproxy | object | {"flux":{},"git":{"path":"./chart","repo":"https://repo1.dso.mil/platform-one/big-bang/apps/developer-tools/haproxy","tag":"1.1.2-bb.2"},"ingress":{"gateway":""},"postRenderers":[],"values":{}} |
Deployment of HAProxy is automatically toggled depending on Monitoring SSO and Monitoring Istio Injection |
addons.haproxy.flux | object | {} |
Flux reconciliation overrides specifically for the HAProxy Package |
addons.haproxy.ingress | object | {"gateway":""} |
Redirect the package ingress to a specific Istio Gateway (listed in istio.gateways ). The default is "public". |
addons.haproxy.values | object | {} |
Values to passthrough to the haproxy chart: https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/haproxy.git |
addons.haproxy.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.anchore.enabled | bool | false |
Toggle deployment of Anchore. |
addons.anchore.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/security-tools/anchore-enterprise.git" |
|
addons.anchore.git.path | string | "./chart" |
|
addons.anchore.git.tag | string | "1.15.0-bb.5" |
|
addons.anchore.flux | object | {"upgrade":{"disableWait":true}} |
Flux reconciliation overrides specifically for the Anchore Package |
addons.anchore.adminPassword | string | "" |
Initial admin password used to authenticate to Anchore. |
addons.anchore.enterprise | object | {"enabled":false,"licenseYaml":"FULL LICENSE\n"} |
Anchore Enterprise functionality. |
addons.anchore.enterprise.enabled | bool | false |
Toggle the installation of Anchore Enterprise. This must be accompanied by a valid license. |
addons.anchore.enterprise.licenseYaml | string | "FULL LICENSE\n" |
License for Anchore Enterprise. For formatting examples see https://repo1.dso.mil/platform-one/big-bang/apps/security-tools/anchore-enterprise/-/blob/main/docs/CHART.md#enabling-enterprise-services |
addons.anchore.ingress.gateway | string | "" |
|
addons.anchore.sso.enabled | bool | false |
Toggle OIDC SSO for Anchore on and off. Enabling this option will auto-create any required secrets (Note: SSO requires an Enterprise license). |
addons.anchore.sso.client_id | string | "" |
Anchore OIDC client ID |
addons.anchore.sso.role_attribute | string | "" |
Anchore OIDC client role attribute |
addons.anchore.database.host | string | "" |
Hostname of a pre-existing PostgreSQL database to use for Anchore. Entering connection info will disable the deployment of an internal database and will auto-create any required secrets. |
addons.anchore.database.port | string | "" |
Port of a pre-existing PostgreSQL database to use for Anchore. |
addons.anchore.database.username | string | "" |
Username to connect as to external database, the user must have all privileges on the database. |
addons.anchore.database.password | string | "" |
Database password for the username used to connect to the existing database. |
addons.anchore.database.database | string | "" |
Database name to connect to on host (Note: database name CANNOT contain hyphens). |
addons.anchore.database.feeds_database | string | "" |
Feeds database name to connect to on host (Note: feeds database name CANNOT contain hyphens). Only required for enterprise edition of anchore. By default, feeds database will be configured with the same username and password as the main database. For formatting examples on how to use a separate username and password for the feeds database see https://repo1.dso.mil/platform-one/big-bang/apps/security-tools/anchore-enterprise/-/blob/main/docs/CHART.md#handling-dependencies |
addons.anchore.redis.host | string | "" |
Hostname of a pre-existing Redis to use for Anchore Enterprise. Entering connection info will enable external redis and will auto-create any required secrets. Anchore only requires redis for enterprise deployments and will not provision an instance if using external |
addons.anchore.redis.port | string | "" |
Port of a pre-existing Redis to use for Anchore Enterprise. |
addons.anchore.redis.username | string | "" |
OPTIONAL: Username to connect to a pre-existing Redis (for password-only auth leave empty) |
addons.anchore.redis.password | string | "" |
Password to connect to pre-existing Redis. |
addons.anchore.values | object | {} |
Values to passthrough to the anchore chart: https://repo1.dso.mil/platform-one/big-bang/apps/security-tools/anchore-enterprise.git |
addons.anchore.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.mattermostoperator.enabled | bool | false |
|
addons.mattermostoperator.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/collaboration-tools/mattermost-operator.git" |
|
addons.mattermostoperator.git.path | string | "./chart" |
|
addons.mattermostoperator.git.tag | string | "1.17.0-bb.1" |
|
addons.mattermostoperator.flux | object | {} |
Flux reconciliation overrides specifically for the Mattermost Operator Package |
addons.mattermostoperator.values | object | {} |
Values to passthrough to the mattermost operator chart: https://repo1.dso.mil/platform-one/big-bang/apps/collaboration-tools/mattermost-operator/-/blob/main/chart/values.yaml |
addons.mattermostoperator.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.mattermost.enabled | bool | false |
Toggle deployment of Mattermost. |
addons.mattermost.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/collaboration-tools/mattermost.git" |
|
addons.mattermost.git.path | string | "./chart" |
|
addons.mattermost.git.tag | string | "0.3.0-bb.0" |
|
addons.mattermost.flux | object | {} |
Flux reconciliation overrides specifically for the Mattermost Package |
addons.mattermost.enterprise | object | {"enabled":false,"license":""} |
Mattermost Enterprise functionality. |
addons.mattermost.enterprise.enabled | bool | false |
Toggle the Mattermost Enterprise. This must be accompanied by a valid license unless you plan to start a trial post-install. |
addons.mattermost.enterprise.license | string | "" |
License for Mattermost. This should be the entire contents of the license file from Mattermost (should be one line), example below license: "eyJpZCI6InIxM205bjR3eTdkYjludG95Z3RiOD---REST---IS---HIDDEN |
addons.mattermost.ingress.gateway | string | "" |
|
addons.mattermost.sso.enabled | bool | false |
Toggle OIDC SSO for Mattermost on and off. Enabling this option will auto-create any required secrets. |
addons.mattermost.sso.client_id | string | "" |
Mattermost OIDC client ID |
addons.mattermost.sso.client_secret | string | "" |
Mattermost OIDC client secret |
addons.mattermost.sso.auth_endpoint | string | "" |
Mattermost OIDC auth endpoint To get endpoint values, see here: https://repo1.dso.mil/platform-one/big-bang/apps/collaboration-tools/mattermost/-/blob/main/docs/keycloak.md#helm-values |
addons.mattermost.sso.token_endpoint | string | "" |
Mattermost OIDC token endpoint To get endpoint values, see here: https://repo1.dso.mil/platform-one/big-bang/apps/collaboration-tools/mattermost/-/blob/main/docs/keycloak.md#helm-values |
addons.mattermost.sso.user_api_endpoint | string | "" |
Mattermost OIDC user API endpoint To get endpoint values, see here: https://repo1.dso.mil/platform-one/big-bang/apps/collaboration-tools/mattermost/-/blob/main/docs/keycloak.md#helm-values |
addons.mattermost.database.host | string | "" |
Hostname of a pre-existing PostgreSQL database to use for Mattermost. Entering connection info will disable the deployment of an internal database and will auto-create any required secrets. |
addons.mattermost.database.port | string | "" |
Port of a pre-existing PostgreSQL database to use for Mattermost. |
addons.mattermost.database.username | string | "" |
Username to connect as to external database, the user must have all privileges on the database. |
addons.mattermost.database.password | string | "" |
Database password for the username used to connect to the existing database. |
addons.mattermost.database.database | string | "" |
Database name to connect to on host. |
addons.mattermost.database.ssl_mode | string | "" |
SSL Mode to use when connecting to the database. Allowable values for this are viewable in the postgres documentation: https://www.postgresql.org/docs/current/libpq-ssl.html#LIBPQ-SSL-SSLMODE-STATEMENTS |
addons.mattermost.objectStorage.endpoint | string | "" |
S3 compatible endpoint to use for connection information. Entering connection info will enable this option and will auto-create any required secrets. examples: "s3.amazonaws.com" "s3.us-gov-west-1.amazonaws.com" "minio.minio.svc.cluster.local:9000" |
addons.mattermost.objectStorage.accessKey | string | "" |
Access key for connecting to object storage endpoint. |
addons.mattermost.objectStorage.accessSecret | string | "" |
Secret key for connecting to object storage endpoint. Unencoded string data. This should be placed in the secret values and then encrypted |
addons.mattermost.objectStorage.bucket | string | "" |
Bucket name to use for Mattermost - will be auto-created. |
addons.mattermost.elasticsearch | object | {"enabled":false} |
Mattermost Elasticsearch integration - requires enterprise E20 license - https://docs.mattermost.com/deployment/elasticsearch.html Connection info defaults to the BB deployed Elastic, all values can be overridden via the "values" passthrough for other connections. See values spec in MM chart "elasticsearch" yaml block - https://repo1.dso.mil/platform-one/big-bang/apps/collaboration-tools/mattermost/-/blob/main/chart/values.yaml |
addons.mattermost.elasticsearch.enabled | bool | false |
Toggle interaction with Elastic for optimized search indexing |
addons.mattermost.values | object | {} |
Values to passthrough to the Mattermost chart: https://repo1.dso.mil/platform-one/big-bang/apps/collaboration-tools/mattermost/-/blob/main/chart/values.yaml |
addons.mattermost.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.velero.enabled | bool | false |
Toggle deployment of Velero. |
addons.velero.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/cluster-utilities/velero.git" |
|
addons.velero.git.path | string | "./chart" |
|
addons.velero.git.tag | string | "2.23.6-bb.4" |
|
addons.velero.flux | object | {} |
Flux reconciliation overrides specifically for the Velero Package |
addons.velero.plugins | list | [] |
Plugin provider for Velero - requires at least one plugin installed. Current supported values: aws, azure, csi |
addons.velero.values | object | {} |
Values to passthrough to the Velero chart: https://repo1.dso.mil/platform-one/big-bang/apps/cluster-utilities/velero/-/blob/main/chart/values.yaml |
addons.velero.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
addons.keycloak.enabled | bool | false |
Toggle deployment of Keycloak. if you enable Keycloak you should uncomment the istio passthrough configurations above istio.ingressGateways.passthrough-ingressgateway and istio.gateways.passthrough |
addons.keycloak.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/security-tools/keycloak.git" |
|
addons.keycloak.git.path | string | "./chart" |
|
addons.keycloak.git.tag | string | "11.0.1-bb.9" |
|
addons.keycloak.database.host | string | "" |
Hostname of a pre-existing database to use for Keycloak. Entering connection info will disable the deployment of an internal database and will auto-create any required secrets. |
addons.keycloak.database.type | string | "postgres" |
Pre-existing database type (e.g. postgres) to use for Keycloak. |
addons.keycloak.database.port | int | 5432 |
Port of a pre-existing database to use for Keycloak. |
addons.keycloak.database.database | string | "" |
Database name to connect to on host. |
addons.keycloak.database.username | string | "" |
Username to connect as to external database, the user must have all privileges on the database. |
addons.keycloak.database.password | string | "" |
Database password for the username used to connect to the existing database. |
addons.keycloak.flux | object | {} |
Flux reconciliation overrides specifically for the OPA Gatekeeper Package |
addons.keycloak.ingress.gateway | string | "passthrough" |
|
addons.keycloak.ingress.key | string | "" |
Certificate/Key pair to use as the certificate for exposing Keycloak Setting the ingress cert here will automatically create the volume and volumemounts in the Keycloak Package chart |
addons.keycloak.ingress.cert | string | "" |
|
addons.keycloak.values | object | {} |
Values to passthrough to the keycloak chart: https://repo1.dso.mil/platform-one/big-bang/apps/security-tools/keycloak.git |
addons.vault.enabled | bool | false |
Toggle deployment of Vault. |
addons.vault.git.repo | string | "https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/vault.git" |
|
addons.vault.git.path | string | "./chart" |
|
addons.vault.git.tag | string | "0.18.0-bb.4" |
|
addons.vault.flux | object | {} |
Flux reconciliation overrides specifically for the Vault Package |
addons.vault.ingress.gateway | string | "" |
|
addons.vault.values | object | {} |
Values to passthrough to the vault chart: https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/vault.git |
addons.vault.postRenderers | list | [] |
Post Renderers. See docs/postrenders.md |
Please see the contributing guide if you are interested in contributing to Big Bang.