OptionTypeDefault ValueDescription
experimentalstructExperimental features for Gloo Platform. Disabled by default. Do not use in production.
experimental.ambientEnabledboolfalseAllow Gloo Mesh to create Istio Ambient Mesh resources.
experimental.asyncStatusWritesboolfalseEnable asynchronous writing of statuses to Kubernetes objects.
prometheusmapHelm values for configuring Prometheus. See the Prometheus Helm chart for the complete set of values.
legacyMetricsPipelinestructConfiguration for the legacy metrics pipeline, which uses Gloo agents to propagate metrics to the management server.
legacyMetricsPipeline.enabledbooltrueSet to false to disable the legacy telemetry pipeline.
glooNetworkstructGloo Network configuration options.
glooNetwork.enabledboolfalseEnable translation of network policies to enforce access policies and service isolation.
redisstructRedis configuration options.
redis.addressstringgloo-mesh-redis.gloo-mesh:6379Address to use when connecting to the Redis instance. To use the default Redis deployment, specify ‘redis.gloo-mesh.svc.cluster.local:6379’.
redis.authstructOptional authentication values to use when connecting to the Redis instance
redis.auth.enabledboolfalseConnect to the Redis instance with a password
redis.auth.secretNamestringredis-auth-secretsName of the k8s secret that contains the password
redis.auth.usernameKeystringusernameThe secret key containing the username to use for authentication
redis.auth.passwordKeystringpasswordThe secret key containing the password to use for authentication
redis.dbint0DB to connect to
redis.certsstructConfiguration for TLS verification when connecting to the Redis instance
redis.certs.enabledboolfalseEnable a secure network connection to the Redis instance via TLS
redis.certs.caCertKeystringThe secret key containing the ca cert
redis.certs.secretNamestringredis-certsName of the k8s secret that contains the certs
redis.connectionstructOptional connection parameters
redis.connection.maxRetriesint3Maximum number of retries before giving up. Default is 3. -1 disables retries.
redis.connection.minRetryBackoffstring8msMinimum backoff between each retry. Default is 8 milliseconds. -1 disables backoff.
redis.connection.maxRetryBackoffstring512msMaximum backoff between each retry. Default is 512 milliseconds. -1 disables backoff.
redis.connection.dialTimeoutstring5sDial timeout for establishing new connections. Default is 5 seconds.
redis.connection.readTimeoutstring3sTimeout for socket reads. if reached, commands will fail with a timeout instead of blocking. Default is 3 seconds. -1 disables timeout. 0 uses the default value.
redis.connection.writeTimeoutstringTimeout for socket writes. If reached, commands will fail with a timeout instead of blocking. Default is ReadTimeout.
redis.connection.poolFifoboolfalseType of connection pool. true for FIFO pool. false for LIFO pool. Note that FIFO has higher overhead compared to LIFO.
redis.connection.poolSizeint0Maximum number of socket connections. Default is 10 connections per every available CPU as reported by runtime.GOMAXPROCS.
redis.connection.minIdleConnsint0Minimum number of idle connections which is useful when establishing new connection is slow.
redis.connection.maxConnAgestringConnection age at which client retires (closes) the connection. Default is to not close aged connections.
redis.connection.poolTimeoutstringAmount of time client waits for connection if all connections are busy before returning an error. Default is ReadTimeout + 1 second.
redis.connection.idleTimeoutstring5m0sAmount of time after which client closes idle connections. Should be less than server’s timeout. Default is 5 minutes. -1 disables idle timeout check.
redis.connection.idleCheckFrequencystring1m0sFrequency of idle checks made by idle connections reaper. Default is 1 minute. -1 disables idle connections reaper, but idle connections are still discarded by the client if IdleTimeout is set.
licenseKeystringDeprecated: Legacy Gloo Mesh Enterprise license key. Use individual product license fields, the trial license field, or a license secret instead.
glooGatewayLicenseKeystringGloo Gateway license key.
glooMeshLicenseKeystringGloo Mesh Enterprise license key.
glooNetworkLicenseKeystringGloo Network license key.
glooTrialLicenseKeystringGloo trial license key, for a trial installation of all products.
licenseSecretNamestringlicense-keysProvide license keys in a secret in the adminNamespace of the management cluster, instead of in the license key fields.
leaderElectionbooltrueEnable leader election for the high-availability deployment.
verboseboolfalseEnable verbose/debug logging.
devModeboolfalseSet to true to enable development mode for the logger, which can cause panics. Do not use in production.
insecureboolfalsePermit unencrypted and unauthenticated communication between Gloo control and data planes. Do not use in production.
prometheusUrlstringhttp://prometheus-serverPrometheus server address.
adminNamespacestringNamespace to install control plane components into. The admin namespace also contains global configuration, such as Workspace, global overrides WorkspaceSettings, and KubernetesCluster resources.
readOnlyGeneratedResourcesboolfalseIf true, the deployment only reads Istio resource outputs that are created by Gloo Platform, and filters out Istio resource fields that Gloo Mesh cannot properly unmarshal. These other resource outputs are not visible in the Gloo UI.
mgmtClusterNamestringDEPRECATED: Use global.cluster.
globalstructGlobal values shared by the Gloo Mesh Enterprise chart and its subcharts.
global.clusterstringmgmt-clusterName of the management cluster. Be sure to modify this value to match your cluster’s name.
registerMgmtPlanestructSet up the management cluster with the Gloo management server, register a Gloo agent, and create a simple workspace that selects all registered clusters and namespaces by default. This way, you can get started quickly for single cluster or testing setups. For multicluster or production setups, use your own fine-grained workspaces instead.
registerMgmtPlane.enabledboolfalseenable installation of the agent when installing the management server
registerMgmtPlane.GlooAgentValuesstructSee the gloo-mesh-agent helm chart docs for more
telemetryGatewaystructConfiguration for the Gloo Platform Telemetry Gateway. See the OpenTelemetry Helm chart for the complete set of values.
telemetryGateway.nameOverridestring
telemetryGateway.fullnameOverridestringgloo-telemetry-gateway
telemetryGateway.enabledboolfalse
telemetryGateway.modestringdeployment
telemetryGateway.replicaCountint1
telemetryGateway.commandmap[string, interface]{“extraArgs”:["–config=/conf/relay.yaml"],“name”:“gloo-otel-collector”}
telemetryGateway.command.<MAP_KEY>interface
telemetryGateway.command.extraArgsinterface
telemetryGateway.command.nameinterface
telemetryGateway.imagestruct
telemetryGateway.image.pullPolicystringIfNotPresent
telemetryGateway.image.repositorystringgcr.io/gloo-mesh/gloo-otel-collector
telemetryGateway.image.tagstring
telemetryGateway.extraVolumes[][]map[{“name”:“tls-keys”,“secret”:{“defaultMode”:420,“secretName”:“gloo-telemetry-gateway-tls-secret”}},{“configMap”:{“items”:[{“key”:“relay”,“path”:“relay.yaml”}],“name”:“gloo-telemetry-gateway-config”},“name”:“telemetry-configmap”}]
telemetryGateway.extraVolumes[]map[string, interface]
telemetryGateway.extraVolumes[].<MAP_KEY>interface
telemetryGateway.extraVolumeMounts[][]map[{“mountPath”:"/etc/otel-certs",“name”:“tls-keys”,“readOnly”:true},{“mountPath”:"/conf",“name”:“telemetry-configmap”}]
telemetryGateway.extraVolumeMounts[]map[string, interface]
telemetryGateway.extraVolumeMounts[].<MAP_KEY>interface
telemetryGateway.resourcesmap[string, interface]{“requests”:{“cpu”:“200m”,“memory”:“300Mi”}}
telemetryGateway.resources.<MAP_KEY>interface
telemetryGateway.resources.requestsinterface
telemetryGateway.extraEnvs[][]mapnull
telemetryGateway.extraEnvs[]map[string, interface]
telemetryGateway.extraEnvs[].<MAP_KEY>interface
telemetryGateway.presetsmap[string, interface]{“clusterMetrics”:{“enabled”:false},“hostMetrics”:{“enabled”:false},“kubeletMetrics”:{“enabled”:false},“kubernetesAttributes”:{“enabled”:false},“logsCollection”:{“enabled”:false,“includeCollectorLogs”:false}}
telemetryGateway.presets.<MAP_KEY>interface
telemetryGateway.presets.clusterMetricsinterface
telemetryGateway.presets.hostMetricsinterface
telemetryGateway.presets.kubeletMetricsinterface
telemetryGateway.presets.kubernetesAttributesinterface
telemetryGateway.presets.logsCollectioninterface
telemetryGateway.configMapmap[string, interface]{“create”:false}
telemetryGateway.configMap.<MAP_KEY>interface
telemetryGateway.configMap.createinterface
telemetryGateway.clusterRolemap[string, interface]{“create”:true,“rules”:[{“apiGroups”:[""],“resources”:[“nodes”,“nodes/proxy”,“nodes/metrics”,“services”,“endpoints”,“pods”,“ingresses”,“configmaps”],“verbs”:[“get”,“list”,“watch”]},{“apiGroups”:[“extensions”,“networking.k8s.io”],“resources”:[“ingresses/status”,“ingresses”],“verbs”:[“get”,“list”,“watch”]},{“nonResourceURLs”:["/metrics"],“verbs”:[“get”]}]}
telemetryGateway.clusterRole.<MAP_KEY>interface
telemetryGateway.clusterRole.createinterface
telemetryGateway.clusterRole.rulesinterface
telemetryGateway.servicemap[string, interface]{“type”:“LoadBalancer”}
telemetryGateway.service.<MAP_KEY>interface
telemetryGateway.service.typeinterface
telemetryGateway.podAnnotationsmap[string, interface]{“prometheus.io/path”:"/metrics",“prometheus.io/port”:“9091”,“prometheus.io/scrape”:“true”}
telemetryGateway.podAnnotations.<MAP_KEY>interface
telemetryGateway.podAnnotations.prometheus.io/pathinterface
telemetryGateway.podAnnotations.prometheus.io/portinterface
telemetryGateway.podAnnotations.prometheus.io/scrapeinterface
telemetryGateway.portsmap[string, interface]{“jaeger-compact”:{“enabled”:false},“jaeger-grpc”:{“enabled”:false},“jaeger-thrift”:{“enabled”:false},“otlp”:{“containerPort”:4317,“enabled”:true,“hostPort”:0,“protocol”:“TCP”,“servicePort”:4317},“otlp-http”:{“enabled”:false},“zipkin”:{“enabled”:false}}
telemetryGateway.ports.<MAP_KEY>interface
telemetryGateway.ports.jaeger-compactinterface
telemetryGateway.ports.jaeger-grpcinterface
telemetryGateway.ports.jaeger-thriftinterface
telemetryGateway.ports.otlpinterface
telemetryGateway.ports.otlp-httpinterface
telemetryGateway.ports.zipkininterface
telemetryGateway.tolerations[][]interfacenull
telemetryGateway.tolerations[]interface
telemetryGatewayCustomizationstructCustomization for the Gloo Platform Telemetry Gateway.
telemetryGatewayCustomization.serverNamestringgloo-telemetry-gateway.gloo-meshSNI and certificate subject alternative name used in the telemetry gateway certificate.
telemetryGatewayCustomization.extraReceiversmap[string, interface]nullConfiguration for extra receivers, such as to scrape extra Prometheus targets. Receivers listen on a network port to receive telemetry data.
telemetryGatewayCustomization.extraReceivers.<MAP_KEY>interfaceConfiguration for extra receivers, such as to scrape extra Prometheus targets. Receivers listen on a network port to receive telemetry data.
telemetryGatewayCustomization.extraProcessorsmap[string, interface]{“batch”:{“send_batch_max_size”:3000,“send_batch_size”:2000,“timeout”:“600ms”},“memory_limiter”:{“check_interval”:“1s”,“limit_percentage”:85,“spike_limit_percentage”:10}}Configuration for extra processors to drop and generate new data. Processors can transform the data before it is forwarded to another processor and an exporter.
telemetryGatewayCustomization.extraProcessors.<MAP_KEY>interfaceConfiguration for extra processors to drop and generate new data. Processors can transform the data before it is forwarded to another processor and an exporter.
telemetryGatewayCustomization.extraProcessors.batchinterfaceConfiguration for extra processors to drop and generate new data. Processors can transform the data before it is forwarded to another processor and an exporter.
telemetryGatewayCustomization.extraProcessors.memory_limiterinterfaceConfiguration for extra processors to drop and generate new data. Processors can transform the data before it is forwarded to another processor and an exporter.
telemetryGatewayCustomization.extraExportersmap[string, interface]nullConfiguration for extra exporters, such as to forward your data to a third-party provider. Exporters forward the data they get to a destination on the local or remote network.
telemetryGatewayCustomization.extraExporters.<MAP_KEY>interfaceConfiguration for extra exporters, such as to forward your data to a third-party provider. Exporters forward the data they get to a destination on the local or remote network.
telemetryGatewayCustomization.extraPipelinesmap[string, interface]nullSpecify any added receivers, processors, or exporters in an extra pipeline.
telemetryGatewayCustomization.extraPipelines.<MAP_KEY>interfaceSpecify any added receivers, processors, or exporters in an extra pipeline.
telemetryGatewayCustomization.telemetrymap[string, interface]{“metrics”:{“address”:“0.0.0.0:8888”}}Configure the service telemetry (logs and metrics) as described in the otel-collector docs.
telemetryGatewayCustomization.telemetry.<MAP_KEY>interfaceConfigure the service telemetry (logs and metrics) as described in the otel-collector docs.
telemetryGatewayCustomization.telemetry.metricsinterfaceConfigure the service telemetry (logs and metrics) as described in the otel-collector docs.
telemetryGatewayCustomization.reloadTlsCertificatestructInterval of time between reloading the TLS certificate of the telemetry gateway.
telemetryGatewayCustomization.reloadTlsCertificate.secondsint640
telemetryGatewayCustomization.reloadTlsCertificate.nanosint320
telemetryGatewayCustomization.disableCertGenerationboolfalseDisable cert generation for the Gloo Platform Telemetry Gateway.
telemetryGatewayCustomization.disableDefaultPipelineboolfalseDisables the default pipeline. Useful if you want to create a custom pipeline using ’extraPipelines’ and to disable the default pipeline.
glooMeshMgmtServerstructConfiguration for the glooMeshMgmtServer deployment.
glooMeshMgmtServerstruct
glooMeshMgmtServer.leaderElectionboolfalseEnable leader election for the high-availability deployment.
glooMeshMgmtServerstruct
glooMeshMgmtServer.verboseboolfalseEnable verbose/debug logging.
glooMeshMgmtServerstruct
glooMeshMgmtServer.devModeboolfalseSet to true to enable development mode for the logger, which can cause panics. Do not use in production.
glooMeshMgmtServerstruct
glooMeshMgmtServer.insecureboolfalsePermit unencrypted and unauthenticated communication between Gloo control and data planes. Do not use in production.
glooMeshMgmtServerstruct
glooMeshMgmtServer.readOnlyGeneratedResourcesboolfalseIf true, the deployment only reads Istio resource outputs that are created by Gloo Platform, and filters out Istio resource fields that Gloo Mesh cannot properly unmarshal. These other resource outputs are not visible in the Gloo UI.
glooMeshMgmtServer.relaystructConfiguration for certificates to secure server-agent relay communication. Required only for multicluster setups.
glooMeshMgmtServer.relay.tlsSecretstructSecret containing client TLS certs used to secure the management server.
glooMeshMgmtServer.relay.tlsSecret.namestringrelay-server-tls-secret
glooMeshMgmtServer.relay.tlsSecret.namespacestring
glooMeshMgmtServer.relay.signingTlsSecretstructSecret containing TLS certs used to sign CSRs created by workload agents.
glooMeshMgmtServer.relay.signingTlsSecret.namestringrelay-tls-signing-secret
glooMeshMgmtServer.relay.signingTlsSecret.namespacestring
glooMeshMgmtServer.relay.tokenSecretstructSecret containing a shared token for authenticating Gloo agents when they first communicate with the management server.
glooMeshMgmtServer.relay.tokenSecret.namestringrelay-identity-token-secretName of the Kubernetes secret.
glooMeshMgmtServer.relay.tokenSecret.namespacestringNamespace of the Kubernetes secret.
glooMeshMgmtServer.relay.tokenSecret.keystringtokenKey value of the data within the Kubernetes secret.
glooMeshMgmtServer.relay.disableCaboolfalseTo disable relay CA functionality, set to true. Set to true only when you supply your custom client certs to the agents for relay mTLS. The gloo-mesh-mgmt-server pod will not require a token secret or the signing cert secret. The agent pod will not require the token secret, but will fail without a client cert.
glooMeshMgmtServer.relay.disableTokenGenerationboolfalseDo not create the relay token Kubernetes secret. Set to true only when you supply own.
glooMeshMgmtServer.relay.disableCaCertGenerationboolfalseDo not auto-generate self-signed CA certificates. Set to true only when you supply own.
glooMeshMgmtServer.relay.pushRbacbooltruePush RBAC resources to the management server. Required for multicluster RBAC in the Gloo UI.
glooMeshMgmtServer.enabledbooltrueDeploy the gloo-mesh-mgmt-server.
glooMeshMgmtServer.maxGrpcMessageSizestring4294967295Maximum message size for gRPC messages sent and received by the management server.
glooMeshMgmtServer.concurrencyuint1610Concurrency to use for translation operations.
glooMeshMgmtServer.enableClusterLoadBalancingboolfalseExperimental: Enable cluster load balancing. The management server replicas attempt to auto-balance the number of registered workload clusters, based on the number of replicas and the number of total clusters. For example, the server might disconnect a workload cluster if the number of connected clusters is greater than the allotted number.
glooMeshMgmtServer.statsPortuint329091Port on the management server deployment to pull stats from.
glooMeshMgmtServer.serviceAccountstructService account configuration to use for the management server deployment.
glooMeshMgmtServer.serviceAccount.extraAnnotationsmap[string, string]nullExtra annotations to add to the service account.
glooMeshMgmtServer.serviceAccount.extraAnnotations.<MAP_KEY>stringExtra annotations to add to the service account.
glooMeshMgmtServer.cloudResourcesDiscoverystructConfiguration for automatic discovery of CloudResources.
glooMeshMgmtServer.cloudResourcesDiscovery.enabledbooltrueEnable automated discovery of CloudResources, such as AWS Lambda functions, based on CloudProvider configuration.
glooMeshMgmtServer.cloudResourcesDiscovery.pollingIntervaluint1610Polling interval (in seconds) for calling AWS when attempting to discover CloudResources.
glooMeshMgmtServer.namespacedRbac[][]struct[{“resources”:[],“namespaces”:[]}]Scopes watches and RBAC policies for the given set of GVKs to the given set of namespaces. Currently, ‘secrets’ are the only supported resource.
glooMeshMgmtServer.namespacedRbac[]structScopes watches and RBAC policies for the given set of GVKs to the given set of namespaces. Currently, ‘secrets’ are the only supported resource.
glooMeshMgmtServer.namespacedRbac[].resources[][]string
glooMeshMgmtServer.namespacedRbac[].resources[]string
glooMeshMgmtServer.namespacedRbac[].namespaces[][]string
glooMeshMgmtServer.namespacedRbac[].namespaces[]string
glooMeshMgmtServerstructConfiguration for the glooMeshMgmtServer deployment.
glooMeshMgmtServerstruct
glooMeshMgmtServer.imagestructContainer image.
glooMeshMgmtServer.image.tagstringVersion tag for the container image.
glooMeshMgmtServer.image.repositorystringgloo-mesh-mgmt-serverImage name (repository).
glooMeshMgmtServer.image.registrystringgcr.io/gloo-meshImage registry.
glooMeshMgmtServer.image.pullPolicystringIfNotPresentImage pull policy.
glooMeshMgmtServer.image.pullSecretstringImage pull secret.
glooMeshMgmtServer.env[]slice[{“name”:“POD_NAMESPACE”,“valueFrom”:{“fieldRef”:{“fieldPath”:“metadata.namespace”}}},{“name”:“POD_UID”,“valueFrom”:{“fieldRef”:{“fieldPath”:“metadata.uid”}}},{“name”:“K8S_MEM_LIMIT”,“valueFrom”:{“resourceFieldRef”:{“resource”:“limits.memory”,“divisor”:“1”}}},{“name”:“LICENSE_KEY”,“valueFrom”:{“secretKeyRef”:{“name”:“gloo-mesh-enterprise-license”,“key”:“key”,“optional”:true}}},{“name”:“REDIS_USERNAME”,“valueFrom”:{“secretKeyRef”:{“name”:“redis-auth-secrets”,“key”:“username”,“optional”:true}}},{“name”:“REDIS_PASSWORD”,“valueFrom”:{“secretKeyRef”:{“name”:“redis-auth-secrets”,“key”:“password”,“optional”:true}}}]Environment variables for the container. For more info, see the Kubernetes documentation.
glooMeshMgmtServer.extraEnvsstructExtra environment variables for the container
glooMeshMgmtServer.resourcesstruct{“requests”:{“cpu”:“125m”,“memory”:“1Gi”}}Container resource requirements. For more info, see the Kubernetes documentation.
glooMeshMgmtServer.securityContextstructContainer security context. Set to ‘false’ to omit the security context entirely. For more info, see the Kubernetes documentation.
glooMeshMgmtServer.sidecarsmap[string, struct]{}Optional configuration for the deployed containers.
glooMeshMgmtServer.sidecars.<MAP_KEY>structOptional configuration for the deployed containers.
glooMeshMgmtServer.sidecars.<MAP_KEY>.imagestructContainer image.
glooMeshMgmtServer.sidecars.<MAP_KEY>.image.tagstringVersion tag for the container image.
glooMeshMgmtServer.sidecars.<MAP_KEY>.image.repositorystringImage name (repository).
glooMeshMgmtServer.sidecars.<MAP_KEY>.image.registrystringImage registry.
glooMeshMgmtServer.sidecars.<MAP_KEY>.image.pullPolicystringImage pull policy.
glooMeshMgmtServer.sidecars.<MAP_KEY>.image.pullSecretstringImage pull secret.
glooMeshMgmtServer.sidecars.<MAP_KEY>.env[]sliceEnvironment variables for the container. For more info, see the Kubernetes documentation.
glooMeshMgmtServer.sidecars.<MAP_KEY>.extraEnvsstructExtra environment variables for the container
glooMeshMgmtServer.sidecars.<MAP_KEY>.resourcesstructContainer resource requirements. For more info, see the Kubernetes documentation.
glooMeshMgmtServer.sidecars.<MAP_KEY>.securityContextstructContainer security context. Set to ‘false’ to omit the security context entirely. For more info, see the Kubernetes documentation.
glooMeshMgmtServer.floatingUserIdboolfalseAllow the pod to be assigned a dynamic user ID. Required for OpenShift installations.
glooMeshMgmtServer.runAsUseruint3210101Static user ID to run the containers as. Unused if floatingUserId is ’true’.
glooMeshMgmtServer.serviceTypestringLoadBalancerKubernetes service type. Can be either “ClusterIP”, “NodePort”, “LoadBalancer”, or “ExternalName”.
glooMeshMgmtServer.portsmap[string, uint32]{“grpc”:9900,“healthcheck”:8090}Service ports as a map from port name to port number.
glooMeshMgmtServer.ports.<MAP_KEY>uint32Service ports as a map from port name to port number.
glooMeshMgmtServer.ports.grpcuint329900Service ports as a map from port name to port number.
glooMeshMgmtServer.ports.healthcheckuint328090Service ports as a map from port name to port number.
glooMeshMgmtServer.deploymentOverridesstructArbitrary overrides for the component’s deployment template
glooMeshMgmtServer.serviceOverridesstructArbitrary overrides for the component’s service template.
glooMeshMgmtServer.enabledbooltrueEnable creation of the deployment/service.
glooMeshUistructConfiguration for the glooMeshUi deployment.
glooMeshUistruct
glooMeshUi.prometheusUrlstringPrometheus server address.
glooMeshUistruct
glooMeshUi.verboseboolfalseEnable verbose/debug logging.
glooMeshUistruct
glooMeshUi.readOnlyGeneratedResourcesboolfalseIf true, the deployment only reads Istio resource outputs that are created by Gloo Platform, and filters out Istio resource fields that Gloo Mesh cannot properly unmarshal. These other resource outputs are not visible in the Gloo UI.
glooMeshUi.enabledbooltrueDeploy the gloo-mesh-ui.
glooMeshUi.settingsNamestringsettingsName of the UI settings object to use.
glooMeshUi.authstructConfigure authentication for the UI.
glooMeshUi.auth.enabledboolfalseRequire authentication to access the UI.
glooMeshUi.auth.backendstringAuthentication backend to use. ‘oidc’ is supported.
glooMeshUi.auth.oidcstructSettings for the OpenID Connect (OIDC) backend.
glooMeshUi.auth.oidc.clientIdstringOIDC client ID
glooMeshUi.auth.oidc.clientSecretstringPlaintext OIDC client secret, which will be encoded in base64 and stored in a secret named the value of ‘clientSecretName’.
glooMeshUi.auth.oidc.clientSecretNamestringName for the secret that will contain the client secret.
glooMeshUi.auth.oidc.issuerUrlstringIssuer URL from the OIDC provider, such as ‘https://.<provider_url>/’.
glooMeshUi.auth.oidc.appUrlstringURL that the UI for OIDC app is available at, from the DNS and other ingress settings that expose OIDC app UI service.
glooMeshUi.auth.oidc.sessionstructSession storage configuration. If omitted, a cookie is used.
glooMeshUi.auth.oidc.session.backendstringBackend to use for auth session storage. ‘cookie’ and ‘redis’ are supported.
glooMeshUi.auth.oidc.session.redisstructRedis instance configuration.
glooMeshUi.auth.oidc.session.redis.hoststringHost at which the Redis instance is accessible. To use the default Redis deployment, specify ‘redis.gloo-mesh.svc.cluster.local:6379’.
glooMeshUi.licenseSecretNamestringProvide license keys in a secret in the adminNamespace of the management cluster, instead of in the license key fields.
glooMeshUi.ipVersionstringdualStackConfigure IP version to ipv4, ipv6 or dualStack. Defaults to dualStack.
glooMeshUi.namespacedRbac[][]struct[{“resources”:[],“namespaces”:[]}]Scopes watches and RBAC policies for the given set of GVKs to the given set of namespaces. Currently, ‘secrets’ are the only supported resource.
glooMeshUi.namespacedRbac[]structScopes watches and RBAC policies for the given set of GVKs to the given set of namespaces. Currently, ‘secrets’ are the only supported resource.
glooMeshUi.namespacedRbac[].resources[][]string
glooMeshUi.namespacedRbac[].resources[]string
glooMeshUi.namespacedRbac[].namespaces[][]string
glooMeshUi.namespacedRbac[].namespaces[]string
glooMeshUistructConfiguration for the glooMeshUi deployment.
glooMeshUistruct
glooMeshUi.imagestructContainer image.
glooMeshUi.image.tagstringVersion tag for the container image.
glooMeshUi.image.repositorystringgloo-mesh-apiserverImage name (repository).
glooMeshUi.image.registrystringgcr.io/gloo-meshImage registry.
glooMeshUi.image.pullPolicystringIfNotPresentImage pull policy.
glooMeshUi.image.pullSecretstringImage pull secret.
glooMeshUi.env[]slice[{“name”:“POD_NAMESPACE”,“valueFrom”:{“fieldRef”:{“fieldPath”:“metadata.namespace”}}},{“name”:“LICENSE_KEY”,“valueFrom”:{“secretKeyRef”:{“name”:“gloo-mesh-enterprise-license”,“key”:“key”,“optional”:true}}},{“name”:“REDIS_USERNAME”,“valueFrom”:{“secretKeyRef”:{“name”:“redis-auth-secrets”,“key”:“username”,“optional”:true}}},{“name”:“REDIS_PASSWORD”,“valueFrom”:{“secretKeyRef”:{“name”:“redis-auth-secrets”,“key”:“password”,“optional”:true}}},{“name”:“K8S_MEM_LIMIT”,“valueFrom”:{“resourceFieldRef”:{“resource”:“limits.memory”,“divisor”:“1”}}}]Environment variables for the container. For more info, see the Kubernetes documentation.
glooMeshUi.extraEnvsstructExtra environment variables for the container
glooMeshUi.resourcesstruct{“requests”:{“cpu”:“125m”,“memory”:“256Mi”}}Container resource requirements. For more info, see the Kubernetes documentation.
glooMeshUi.securityContextstructContainer security context. Set to ‘false’ to omit the security context entirely. For more info, see the Kubernetes documentation.
glooMeshUi.sidecarsmap[string, struct]{“console”:{“image”:{“repository”:“gloo-mesh-ui”,“registry”:“gcr.io/gloo-mesh”,“pullPolicy”:“IfNotPresent”},“env”:null,“extraEnvs”:{},“resources”:{“requests”:{“cpu”:“125m”,“memory”:“256Mi”}}},“envoy”:{“image”:{“repository”:“gloo-mesh-envoy”,“registry”:“gcr.io/gloo-mesh”,“pullPolicy”:“IfNotPresent”},“env”:[{“name”:“ENVOY_UID”,“value”:“0”}],“extraEnvs”:{},“resources”:{“requests”:{“cpu”:“500m”,“memory”:“256Mi”}}}}Optional configuration for the deployed containers.
glooMeshUi.sidecars.<MAP_KEY>structOptional configuration for the deployed containers.
glooMeshUi.sidecars.<MAP_KEY>.imagestructContainer image.
glooMeshUi.sidecars.<MAP_KEY>.image.tagstringVersion tag for the container image.
glooMeshUi.sidecars.<MAP_KEY>.image.repositorystringImage name (repository).
glooMeshUi.sidecars.<MAP_KEY>.image.registrystringImage registry.
glooMeshUi.sidecars.<MAP_KEY>.image.pullPolicystringImage pull policy.
glooMeshUi.sidecars.<MAP_KEY>.image.pullSecretstringImage pull secret.
glooMeshUi.sidecars.<MAP_KEY>.env[]sliceEnvironment variables for the container. For more info, see the Kubernetes documentation.
glooMeshUi.sidecars.<MAP_KEY>.extraEnvsstructExtra environment variables for the container
glooMeshUi.sidecars.<MAP_KEY>.resourcesstructContainer resource requirements. For more info, see the Kubernetes documentation.
glooMeshUi.sidecars.<MAP_KEY>.securityContextstructContainer security context. Set to ‘false’ to omit the security context entirely. For more info, see the Kubernetes documentation.
glooMeshUi.sidecars.consolestructOptional configuration for the deployed containers.
glooMeshUi.sidecars.console.imagestructContainer image.
glooMeshUi.sidecars.console.image.tagstringVersion tag for the container image.
glooMeshUi.sidecars.console.image.repositorystringgloo-mesh-uiImage name (repository).
glooMeshUi.sidecars.console.image.registrystringgcr.io/gloo-meshImage registry.
glooMeshUi.sidecars.console.image.pullPolicystringIfNotPresentImage pull policy.
glooMeshUi.sidecars.console.image.pullSecretstringImage pull secret.
glooMeshUi.sidecars.console.env[]slicenullEnvironment variables for the container. For more info, see the Kubernetes documentation.
glooMeshUi.sidecars.console.extraEnvsstructExtra environment variables for the container
glooMeshUi.sidecars.console.resourcesstruct{“requests”:{“cpu”:“125m”,“memory”:“256Mi”}}Container resource requirements. For more info, see the Kubernetes documentation.
glooMeshUi.sidecars.console.securityContextstructContainer security context. Set to ‘false’ to omit the security context entirely. For more info, see the Kubernetes documentation.
glooMeshUi.sidecars.envoystructOptional configuration for the deployed containers.
glooMeshUi.sidecars.envoy.imagestructContainer image.
glooMeshUi.sidecars.envoy.image.tagstringVersion tag for the container image.
glooMeshUi.sidecars.envoy.image.repositorystringgloo-mesh-envoyImage name (repository).
glooMeshUi.sidecars.envoy.image.registrystringgcr.io/gloo-meshImage registry.
glooMeshUi.sidecars.envoy.image.pullPolicystringIfNotPresentImage pull policy.
glooMeshUi.sidecars.envoy.image.pullSecretstringImage pull secret.
glooMeshUi.sidecars.envoy.env[]slice[{“name”:“ENVOY_UID”,“value”:“0”}]Environment variables for the container. For more info, see the Kubernetes documentation.
glooMeshUi.sidecars.envoy.extraEnvsstructExtra environment variables for the container
glooMeshUi.sidecars.envoy.resourcesstruct{“requests”:{“cpu”:“500m”,“memory”:“256Mi”}}Container resource requirements. For more info, see the Kubernetes documentation.
glooMeshUi.sidecars.envoy.securityContextstructContainer security context. Set to ‘false’ to omit the security context entirely. For more info, see the Kubernetes documentation.
glooMeshUi.floatingUserIdboolfalseAllow the pod to be assigned a dynamic user ID. Required for OpenShift installations.
glooMeshUi.runAsUseruint3210101Static user ID to run the containers as. Unused if floatingUserId is ’true’.
glooMeshUi.serviceTypestringClusterIPKubernetes service type. Can be either “ClusterIP”, “NodePort”, “LoadBalancer”, or “ExternalName”.
glooMeshUi.portsmap[string, uint32]{“console”:8090,“grpc”:10101,“healthcheck”:8081}Service ports as a map from port name to port number.
glooMeshUi.ports.<MAP_KEY>uint32Service ports as a map from port name to port number.
glooMeshUi.ports.consoleuint328090Service ports as a map from port name to port number.
glooMeshUi.ports.grpcuint3210101Service ports as a map from port name to port number.
glooMeshUi.ports.healthcheckuint328081Service ports as a map from port name to port number.
glooMeshUi.deploymentOverridesstructArbitrary overrides for the component’s deployment template
glooMeshUi.serviceOverridesstructArbitrary overrides for the component’s service template.
glooMeshUi.enabledbooltrueEnable creation of the deployment/service.
glooMeshRedisstructConfiguration for the glooMeshRedis deployment.
glooMeshRedis.enabledbooltrueDeploy the default Redis instance.
glooMeshRedis.addrstringDeprecated: Use ‘redis.address’ instead.
glooMeshRedisstructConfiguration for the glooMeshRedis deployment.
glooMeshRedisstruct
glooMeshRedis.imagestructContainer image.
glooMeshRedis.image.tagstringVersion tag for the container image.
glooMeshRedis.image.repositorystringredisImage name (repository).
glooMeshRedis.image.registrystringdocker.ioImage registry.
glooMeshRedis.image.pullPolicystringIfNotPresentImage pull policy.
glooMeshRedis.image.pullSecretstringImage pull secret.
glooMeshRedis.env[]slice[{“name”:“MASTER”,“value”:“true”}]Environment variables for the container. For more info, see the Kubernetes documentation.
glooMeshRedis.extraEnvsstructExtra environment variables for the container
glooMeshRedis.resourcesstruct{“requests”:{“cpu”:“125m”,“memory”:“256Mi”}}Container resource requirements. For more info, see the Kubernetes documentation.
glooMeshRedis.securityContextstructContainer security context. Set to ‘false’ to omit the security context entirely. For more info, see the Kubernetes documentation.
glooMeshRedis.sidecarsmap[string, struct]{}Optional configuration for the deployed containers.
glooMeshRedis.sidecars.<MAP_KEY>structOptional configuration for the deployed containers.
glooMeshRedis.sidecars.<MAP_KEY>.imagestructContainer image.
glooMeshRedis.sidecars.<MAP_KEY>.image.tagstringVersion tag for the container image.
glooMeshRedis.sidecars.<MAP_KEY>.image.repositorystringImage name (repository).
glooMeshRedis.sidecars.<MAP_KEY>.image.registrystringImage registry.
glooMeshRedis.sidecars.<MAP_KEY>.image.pullPolicystringImage pull policy.
glooMeshRedis.sidecars.<MAP_KEY>.image.pullSecretstringImage pull secret.
glooMeshRedis.sidecars.<MAP_KEY>.env[]sliceEnvironment variables for the container. For more info, see the Kubernetes documentation.
glooMeshRedis.sidecars.<MAP_KEY>.extraEnvsstructExtra environment variables for the container
glooMeshRedis.sidecars.<MAP_KEY>.resourcesstructContainer resource requirements. For more info, see the Kubernetes documentation.
glooMeshRedis.sidecars.<MAP_KEY>.securityContextstructContainer security context. Set to ‘false’ to omit the security context entirely. For more info, see the Kubernetes documentation.
glooMeshRedis.floatingUserIdboolfalseAllow the pod to be assigned a dynamic user ID. Required for OpenShift installations.
glooMeshRedis.runAsUseruint3210101Static user ID to run the containers as. Unused if floatingUserId is ’true’.
glooMeshRedis.serviceTypestringClusterIPKubernetes service type. Can be either “ClusterIP”, “NodePort”, “LoadBalancer”, or “ExternalName”.
glooMeshRedis.portsmap[string, uint32]{“redis”:6379}Service ports as a map from port name to port number.
glooMeshRedis.ports.<MAP_KEY>uint32Service ports as a map from port name to port number.
glooMeshRedis.ports.redisuint326379Service ports as a map from port name to port number.
glooMeshRedis.deploymentOverridesstructArbitrary overrides for the component’s deployment template
glooMeshRedis.serviceOverridesstructArbitrary overrides for the component’s service template.
glooMeshRedis.enabledbooltrueEnable creation of the deployment/service.