Enterprise Agent

Option Type Default Value Description
global struct {“insecure”:false,“devMode”:false} global chart values which can be set from parent charts
global.insecure bool false Set to true to enable insecure communication between Gloo Mesh components
global.devMode bool false Set to true to enable dev mode for the logger.
defaultMetricsPort uint32 9091 The port on which to serve internal Prometheus metrics for the Gloo Mesh application. Set to 0 to disable.
relay struct {“cluster”:"",“serverAddress”:"",“authority”:“enterprise-networking.gloo-mesh”,“insecure”:false,“clientCertSecret”:{“name”:“relay-client-tls-secret”},“rootTlsSecret”:{“name”:“relay-root-tls-secret”},“tokenSecret”:{“name”:“relay-identity-token-secret”,“namespace”:"",“key”:“token”},“maxGrpcMessageSize”:“4294967295”} options for connecting relay
relay.cluster string cluster identifier for the relay agent
relay.serverAddress string address of the relay server
relay.authority string enterprise-networking.gloo-mesh set the authority/host header to this value when dialing the Relay gRPC Server
relay.insecure bool false communicate with relay server over plain HTTP
relay.clientCertSecret struct {“name”:“relay-client-tls-secret”} Reference to a Secret containing the Client TLS Certificates used to identify the Relay Agent to the Server. If the secret does not exist, a Token and Root cert secret are required.
relay.clientCertSecret.name string relay-client-tls-secret
relay.clientCertSecret.namespace string
relay.rootTlsSecret struct {“name”:“relay-root-tls-secret”} Reference to a Secret containing a Root TLS Certificates used to verify the Relay Server Certificate. The secret can also optionally specify a ‘tls.key’ which will be used to generate the Agent Client Certificate.
relay.rootTlsSecret.name string relay-root-tls-secret
relay.rootTlsSecret.namespace string
relay.tokenSecret struct {“name”:“relay-identity-token-secret”,“namespace”:"",“key”:“token”} Reference to a Secret containing a shared Token for authenticating to the Relay Server
relay.tokenSecret.name string relay-identity-token-secret Name of the Kubernetes Secret
relay.tokenSecret.namespace string Namespace of the Kubernetes Secret
relay.tokenSecret.key string token Key value of the data within the Kubernetes Secret
relay.maxGrpcMessageSize string 4294967295 Specify to set a custom maximum message size for grpc messages sent to the Relay server
settingsRef struct {“name”:“settings”,“namespace”:“gloo-mesh”} ref to the settings object that will be received from the networking server.
settingsRef.name string settings
settingsRef.namespace string gloo-mesh
istiodSidecar struct {“createRoleBinding”:false,“istiodServiceAccount”:{“name”:“istiod-service-account”,“namespace”:“istio-system”}} settings pertaining to the istiod sidecar deployment
istiodSidecar.createRoleBinding bool false create cluster role binding needed by istiod sidecar
istiodSidecar.istiodServiceAccount struct {“name”:“istiod-service-account”,“namespace”:“istio-system”} object reference to istiod service account
istiodSidecar.istiodServiceAccount.name string istiod-service-account
istiodSidecar.istiodServiceAccount.namespace string istio-system
verbose bool false enables verbose/debug logging
ext-auth-service struct {“enabled”:false,“extraTemplateAnnotations”:{“proxy.istio.io/config”:"{ "holdApplicationUntilProxyStarts": true }"}} customizations to the ext-auth-service helm chart
ext-auth-service.enabled bool false if true, deploy ExtAuth service (default false)
ext-auth-service.extraTemplateAnnotations map[string, string] extra annotations to add to the extauth service pods. Defaults to proxy.istio.io/config: ‘{ “holdApplicationUntilProxyStarts”: true }’
ext-auth-service.extraTemplateAnnotations.<MAP_KEY> string extra annotations to add to the extauth service pods. Defaults to proxy.istio.io/config: ‘{ “holdApplicationUntilProxyStarts”: true }’
ext-auth-service.extraTemplateAnnotations.proxy.istio.io/config string { “holdApplicationUntilProxyStarts”: true } extra annotations to add to the extauth service pods. Defaults to proxy.istio.io/config: ‘{ “holdApplicationUntilProxyStarts”: true }’
rate-limiter struct {“enabled”:false,“extraTemplateAnnotations”:{“proxy.istio.io/config”:"{ "holdApplicationUntilProxyStarts": true }"},“redis”:{“auth”:{“enabled”:false,“secretName”:“redis-secrets”,“passwordKey”:“redis-password”,“usernameKey”:“redis-username”},“certs”:{“caCert”:“redis.crt”,“enabled”:false,“mountPoint”:"/etc/tls”,“signingKey”:“redis.key”,“secretName”:“redis.crt”},“enabled”:true,“hostname”:“redis”,“service”:{“name”:“redis”,“port”:6379,“socket”:“tcp”}}} customizations to the rate-limiter helm chart
rate-limiter.enabled bool false if true, deploy rate limit service (default false)
rate-limiter.extraTemplateAnnotations map[string, string] extra annotations to add to the ratelimit service pods. Defaults to proxy.istio.io/config: ‘{ “holdApplicationUntilProxyStarts”: true }’
rate-limiter.extraTemplateAnnotations.<MAP_KEY> string extra annotations to add to the ratelimit service pods. Defaults to proxy.istio.io/config: ‘{ “holdApplicationUntilProxyStarts”: true }’
rate-limiter.extraTemplateAnnotations.proxy.istio.io/config string { “holdApplicationUntilProxyStarts”: true } extra annotations to add to the ratelimit service pods. Defaults to proxy.istio.io/config: ‘{ “holdApplicationUntilProxyStarts”: true }’
rate-limiter.redis struct {“auth”:{“enabled”:false,“secretName”:“redis-secrets”,“passwordKey”:“redis-password”,“usernameKey”:“redis-username”},“certs”:{“caCert”:“redis.crt”,“enabled”:false,“mountPoint”:"/etc/tls”,“signingKey”:“redis.key”,“secretName”:“redis.crt”},“enabled”:true,“hostname”:“redis”,“service”:{“name”:“redis”,“port”:6379,“socket”:“tcp”}} customizations for ratelimiter redis cache
rate-limiter.redis.auth struct {“enabled”:false,“secretName”:“redis-secrets”,“passwordKey”:“redis-password”,“usernameKey”:“redis-username”} Redis authorization settings
rate-limiter.redis.auth.enabled bool false use authentication (redis AUTH) when conecting to Redis (default: false)
rate-limiter.redis.auth.secretName string redis-secrets name of the kubernetes secret that contains redis username and password (default: ‘redis-secrets’)
rate-limiter.redis.auth.passwordKey string redis-password key for the kubernetes secret that contains the redis password (default: ‘redis-password’)
rate-limiter.redis.auth.usernameKey string redis-username key for the kubernetes secret that contains the redis username. Note: the value contained within this secret should be ‘default’ if no explicit username is set (default: ‘redis-username’)
rate-limiter.redis.certs struct {“caCert”:“redis.crt”,“enabled”:false,“mountPoint”:"/etc/tls”,“signingKey”:“redis.key”,“secretName”:“redis.crt”} configuration to allow using explicit CA certs if using redis with TLS
rate-limiter.redis.certs.caCert string redis.crt file name for the mounted secret that contains the ca cert (default: ‘redis.crt’)
rate-limiter.redis.certs.enabled bool false set to true if you want to use an expliciy CA cert when connecting to Redis (e.g. to support self-signed certs) (default: ‘false’)
rate-limiter.redis.certs.mountPoint string /etc/tls Mount point for the secret that contains the cert (default: ‘/etc/tls’)
rate-limiter.redis.certs.signingKey string redis.key file name for the mounted secret that contains a signing key. Note: this is only relevant if helm is going to install Redis using self-signed certs. For connecting to an existing Redis, this will be ignored. (default: ‘redis.key’)
rate-limiter.redis.certs.secretName string redis.crt name of the secret containing the cacert (default: ‘redis-certs-keys’)
rate-limiter.redis.enabled bool true if true, deploy redis service (default true). If false, it is assumed than an external redis already exists and will be pointed to in config
rate-limiter.redis.hostname string redis the hostname of the redis service (default ‘redis’)
rate-limiter.redis.service struct {“name”:“redis”,“port”:6379,“socket”:“tcp”} connection and service details for the ratelimiter redis instance
rate-limiter.redis.service.name string redis redis kubernetes service name. Ignored if redis.enabled=false (external redis not in kubernetes). (default: ‘redis’)
rate-limiter.redis.service.port int 6379 redis port the ratelimiter service will connect to (default: 6379)
rate-limiter.redis.service.socket string tcp Socket type for connection to redis. Valis values are ‘tcp’, ‘tls’, and ‘unix’. (Default: tcp)
enterpriseAgent struct {“image”:{“repository”:“enterprise-agent”,“registry”:“gcr.io/gloo-mesh”,“pullPolicy”:“IfNotPresent”},“env”:[{“name”:“POD_NAMESPACE”,“valueFrom”:{“fieldRef”:{“fieldPath”:“metadata.namespace”}}}],“resources”:{“requests”:{“cpu”:“50m”,“memory”:“128Mi”}},“sidecars”:{},“floatingUserId”:false,“runAsUser”:10101,“serviceType”:“ClusterIP”,“ports”:{“grpc”:9977,“healthcheck”:8090,“http”:9988},“enabled”:true} Configuration for the enterpriseAgent deployment.
enterpriseAgent struct {“image”:{“repository”:“enterprise-agent”,“registry”:“gcr.io/gloo-mesh”,“pullPolicy”:“IfNotPresent”},“env”:[{“name”:“POD_NAMESPACE”,“valueFrom”:{“fieldRef”:{“fieldPath”:“metadata.namespace”}}}],“resources”:{“requests”:{“cpu”:“50m”,“memory”:“128Mi”}}}
enterpriseAgent.image struct {“repository”:“enterprise-agent”,“registry”:“gcr.io/gloo-mesh”,“pullPolicy”:“IfNotPresent”} Specify the container image
enterpriseAgent.image.tag string Tag for the container.
enterpriseAgent.image.repository string enterprise-agent Image name (repository).
enterpriseAgent.image.registry string gcr.io/gloo-mesh Image registry.
enterpriseAgent.image.pullPolicy string IfNotPresent Image pull policy.
enterpriseAgent.image.pullSecret string Image pull secret.
enterpriseAgent.Env[] slice [{“name”:“POD_NAMESPACE”,“valueFrom”:{“fieldRef”:{“fieldPath”:“metadata.namespace”}}}] Specify environment variables for the container. See the Kubernetes documentation for specification details.
enterpriseAgent.resources struct {“requests”:{“cpu”:“50m”,“memory”:“128Mi”}} Specify container resource requirements. See the Kubernetes documentation for specification details.
enterpriseAgent.resources.limits map[string, struct]
enterpriseAgent.resources.limits.<MAP_KEY> struct
enterpriseAgent.resources.limits.<MAP_KEY> string
enterpriseAgent.resources.requests map[string, struct]
enterpriseAgent.resources.requests.<MAP_KEY> struct
enterpriseAgent.resources.requests.<MAP_KEY> string
enterpriseAgent.resources.requests.cpu struct "50m”
enterpriseAgent.resources.requests.cpu string DecimalSI
enterpriseAgent.resources.requests.memory struct "128Mi”
enterpriseAgent.resources.requests.memory string BinarySI
enterpriseAgent.sidecars map[string, struct] Configuration for the deployed containers.
enterpriseAgent.sidecars.<MAP_KEY> struct Configuration for the deployed containers.
enterpriseAgent.sidecars.<MAP_KEY>.image struct Specify the container image
enterpriseAgent.sidecars.<MAP_KEY>.image.tag string Tag for the container.
enterpriseAgent.sidecars.<MAP_KEY>.image.repository string Image name (repository).
enterpriseAgent.sidecars.<MAP_KEY>.image.registry string Image registry.
enterpriseAgent.sidecars.<MAP_KEY>.image.pullPolicy string Image pull policy.
enterpriseAgent.sidecars.<MAP_KEY>.image.pullSecret string Image pull secret.
enterpriseAgent.sidecars.<MAP_KEY>.Env[] slice Specify environment variables for the container. See the Kubernetes documentation for specification details.
enterpriseAgent.sidecars.<MAP_KEY>.resources struct Specify container resource requirements. See the Kubernetes documentation for specification details.
enterpriseAgent.sidecars.<MAP_KEY>.resources.limits map[string, struct]
enterpriseAgent.sidecars.<MAP_KEY>.resources.limits.<MAP_KEY> struct
enterpriseAgent.sidecars.<MAP_KEY>.resources.limits.<MAP_KEY> string
enterpriseAgent.sidecars.<MAP_KEY>.resources.requests map[string, struct]
enterpriseAgent.sidecars.<MAP_KEY>.resources.requests.<MAP_KEY> struct
enterpriseAgent.sidecars.<MAP_KEY>.resources.requests.<MAP_KEY> string
enterpriseAgent.floatingUserId bool false Allow the pod to be assigned a dynamic user ID.
enterpriseAgent.runAsUser uint32 10101 Static user ID to run the containers as. Unused if floatingUserId is ‘true’.
enterpriseAgent.serviceType string ClusterIP Specify the service type. Can be either “ClusterIP”, “NodePort”, “LoadBalancer”, or “ExternalName”.
enterpriseAgent.ports map[string, uint32] Specify service ports as a map from port name to port number.
enterpriseAgent.ports.<MAP_KEY> uint32 Specify service ports as a map from port name to port number.
enterpriseAgent.ports.grpc uint32 9977 Specify service ports as a map from port name to port number.
enterpriseAgent.ports.healthcheck uint32 8090 Specify service ports as a map from port name to port number.
enterpriseAgent.ports.http uint32 9988 Specify service ports as a map from port name to port number.
enterpriseAgent.DeploymentOverrides invalid Provide arbitrary overrides for the component's deployment template
enterpriseAgent.ServiceOverrides invalid Provide arbitrary overrides for the component's service template.
enterpriseAgent.enabled bool true Enables or disables creation of the operator deployment/service