Gloo Mesh Agent

Option Type Default Value Description
leaderElection bool true Enable leader election for the high-availability deployment.
verbose bool false Enable verbose/debug logging.
devMode bool false Set to true to enable development mode for the logger, which can cause panics. Do not use in production.
insecure bool false Permit unencrypted and unauthenticated communication between Gloo control and data planes. Do not use in production.
readOnlyGeneratedResources bool false If true, the deployment only reads Istio resource outputs that are created by Gloo Platform, and filters out Istio resource fields that Gloo Mesh cannot properly unmarshal. These other resource outputs are not visible in the Gloo UI.
relay struct Configuration for securing relay communication between the workload agents and the management server.
relay.serverAddress string Address and port by which gloo-mesh-mgmt-server in the Gloo control plane can be accessed by the Gloo workload agents.
relay.authority string gloo-mesh-mgmt-server.gloo-mesh SNI name in the authority/host header used to connect to relay forwarding server. Must match server certificate CommonName. Do not change the default value.
relay.clientTlsSecret struct Custom certs: Secret containing client TLS certs used to identify the Gloo agent to the management server. If you do not specify a clientTlssSecret, you must specify a tokenSecret and a rootTlsSecret.
relay.clientTlsSecret.name string relay-client-tls-secret
relay.clientTlsSecret.namespace string
relay.rootTlsSecret struct Secret containing a root TLS cert used to verify the management server cert. The secret can also optionally specify a ‘tls.key’, which is used to generate the agent client cert.
relay.rootTlsSecret.name string relay-root-tls-secret
relay.rootTlsSecret.namespace string
relay.tokenSecret struct Secret containing a shared token for authenticating Gloo agents when they first communicate with the management server. A token secret is not needed with ACM certs.
relay.tokenSecret.name string relay-identity-token-secret Name of the Kubernetes secret.
relay.tokenSecret.namespace string Namespace of the Kubernetes secret.
relay.tokenSecret.key string token Key value of the data within the Kubernetes secret.
relay.clientTlsSecretRotationGracePeriodRatio string The ratio of the client TLS certificate lifetime to when the management server starts the certificate rotation process.
maxGrpcMessageSize string 4294967295 Maximum message size for gRPC messages sent and received by the management server.
metricsBufferSize int 50 Number of metrics messages to buffer per Envoy proxy.
accessLogsBufferSize int 50 Number of access logs to buffer per Envoy proxy.
istiodSidecar struct Configuration for the istiod sidecar deployment.
istiodSidecar.createRoleBinding bool false Create the cluster role binding for the istiod sidecar.
istiodSidecar.istiodServiceAccount struct Object reference for the istiod service account.
istiodSidecar.istiodServiceAccount.name string istiod
istiodSidecar.istiodServiceAccount.namespace string istio-system
cluster string Name of the workload cluster to deploy Gloo agent in.
ext-auth-service struct Customizations for the ext-auth-service Helm chart.
ext-auth-service.enabled bool false if true, deploy the dependency service (default false)
ext-auth-service.extraTemplateAnnotations map[string, string] {“proxy.istio.io/config”:"{ "holdApplicationUntilProxyStarts": true }"} extra annotations to add to the dependency service pods. Defaults to proxy.istio.io/config: ‘{ “holdApplicationUntilProxyStarts”: true }’
ext-auth-service.extraTemplateAnnotations.<MAP_KEY> string extra annotations to add to the dependency service pods. Defaults to proxy.istio.io/config: ‘{ “holdApplicationUntilProxyStarts”: true }’
ext-auth-service.extraTemplateAnnotations.proxy.istio.io/config string { “holdApplicationUntilProxyStarts”: true } extra annotations to add to the dependency service pods. Defaults to proxy.istio.io/config: ‘{ “holdApplicationUntilProxyStarts”: true }’
rate-limiter struct Customizations for the rate-limiter Helm chart.
rate-limiter.enabled bool false if true, deploy the dependency service (default false)
rate-limiter.extraTemplateAnnotations map[string, string] {“proxy.istio.io/config”:"{ "holdApplicationUntilProxyStarts": true }"} extra annotations to add to the dependency service pods. Defaults to proxy.istio.io/config: ‘{ “holdApplicationUntilProxyStarts”: true }’
rate-limiter.extraTemplateAnnotations.<MAP_KEY> string extra annotations to add to the dependency service pods. Defaults to proxy.istio.io/config: ‘{ “holdApplicationUntilProxyStarts”: true }’
rate-limiter.extraTemplateAnnotations.proxy.istio.io/config string { “holdApplicationUntilProxyStarts”: true } extra annotations to add to the dependency service pods. Defaults to proxy.istio.io/config: ‘{ “holdApplicationUntilProxyStarts”: true }’
sidecar-accel struct Customizations for eBPF sidecar acceleration. Do not use in production.
sidecar-accel.enabled bool false if true, deploy the dependency service (default false)
gloo-network-agent struct Customizations for the Gloo Network-specific agent functionality.
gloo-network-agent.enabled bool false if true, deploy the dependency service (default false)
managedInstallations struct Subchart for setting up managed installations of Control Planes and Gateways in workload clusters.
managedInstallations.controlPlane struct Configuration for the managed Istio control plane instance.
managedInstallations.controlPlane.enabled bool true Install the managed Istio control plane instance in the cluster.
managedInstallations.controlPlane.installations[] []struct [{“revision”:“1-13”,“clusters”:[{“name”:"",“defaultRevision”:true,“trustDomain”:""}],“istioOperatorSpec”:{“hub”:“us-docker.pkg.dev/gloo-mesh/istio-a9797008feb0”,“tag”:“1.13.5”}}] List of Istio control plane installations.
managedInstallations.controlPlane.installations[] struct List of Istio control plane installations.
managedInstallations.controlPlane.installations[].revision string Istio revision for this installation, such as ‘1-17’. Label workload resources with ‘istio.io/rev=$REVISION’ to use this installation.
managedInstallations.controlPlane.installations[].clusters[] []ptr Clusters to install the Istio control planes in.
managedInstallations.controlPlane.installations[].clusters[] struct Clusters to install the Istio control planes in.
managedInstallations.controlPlane.installations[].clusters[].name string Name of the cluster to install Istio into. Must match the registered cluster name.
managedInstallations.controlPlane.installations[].clusters[].defaultRevision bool When set to true, the installation for this revision is applied as the active Istio installation in the cluster. Resources with the ‘istio-injection=true’ label entry use this revision. You might change this setting for Istio installations during a canary upgrade. For more info, see the upgrade docs.
managedInstallations.controlPlane.installations[].clusters[].trustDomain string Trust domain value for this cluster's Istio installation mesh config. Defaults to the cluster's name.
managedInstallations.controlPlane.installations[].IstioOperatorSpec struct IstioOperator specification for the control plane. For more info, see the IstioOperatorSpec reference.
managedInstallations.northSouthGateways[] []struct [{“name”:“istio-ingressgateway”,“enabled”:true,“installations”:[{“gatewayRevision”:“1-13”,“clusters”:[{“name”:"",“activeGateway”:true,“trustDomain”:""}],“istioOperatorSpec”:{“hub”:“us-docker.pkg.dev/gloo-mesh/istio-a9797008feb0”,“tag”:“1.13.5”}}]}] Configuration for the managed north-south (ingress) gateway. Requires a Gloo Gateway license.
managedInstallations.northSouthGateways[] struct Configuration for the managed north-south (ingress) gateway. Requires a Gloo Gateway license.
managedInstallations.northSouthGateways[].name string Name of the gateway. Must be unique.
managedInstallations.northSouthGateways[].enabled bool Install the gateway in the cluster.
managedInstallations.northSouthGateways[].installations[] []struct List of Istio gateway installations. For more info, see the GatewayInstallation reference.
managedInstallations.northSouthGateways[].installations[] struct List of Istio gateway installations. For more info, see the GatewayInstallation reference.
managedInstallations.northSouthGateways[].installations[].controlPlaneRevision string Optional: The revision of an Istio control plane in the cluster that this gateway should also use. If a control plane installation of this revisions is not found, no gateway is created.
managedInstallations.northSouthGateways[].installations[].gatewayRevision string Istio revision for this installation, such as ‘1-17’.
managedInstallations.northSouthGateways[].installations[].clusters[] []ptr Clusters to install the gateway in.
managedInstallations.northSouthGateways[].installations[].clusters[] struct Clusters to install the gateway in.
managedInstallations.northSouthGateways[].installations[].clusters[].name string Name of the cluster to install the gateway into. Must match the registered cluster name.
managedInstallations.northSouthGateways[].installations[].clusters[].activeGateway bool When set to true, the installation for this revision is applied as the active gateway through which primary service traffic is routed in the cluster. If the istioOperatorSpec defines a service, this field switches the service selectors to the revision specified in the gatewayRevsion. You might change this setting for gateway installations during a canary upgrade. For more info, see the upgrade docs.
managedInstallations.northSouthGateways[].installations[].clusters[].trustDomain string Trust domain value for this cluster's Istio installation mesh config. Defaults to the cluster's name.
managedInstallations.northSouthGateways[].installations[].IstioOperatorSpec struct IstioOperator specification for the gateway. For more info, see the IstioOperatorSpec reference.
managedInstallations.eastWestGateways[] []struct null Configuration for the managed east-west gateway.
managedInstallations.eastWestGateways[] struct Configuration for the managed east-west gateway.
managedInstallations.eastWestGateways[].name string Name of the gateway. Must be unique.
managedInstallations.eastWestGateways[].enabled bool Install the gateway in the cluster.
managedInstallations.eastWestGateways[].installations[] []struct List of Istio gateway installations. For more info, see the GatewayInstallation reference.
managedInstallations.eastWestGateways[].installations[] struct List of Istio gateway installations. For more info, see the GatewayInstallation reference.
managedInstallations.eastWestGateways[].installations[].controlPlaneRevision string Optional: The revision of an Istio control plane in the cluster that this gateway should also use. If a control plane installation of this revisions is not found, no gateway is created.
managedInstallations.eastWestGateways[].installations[].gatewayRevision string Istio revision for this installation, such as ‘1-17’.
managedInstallations.eastWestGateways[].installations[].clusters[] []ptr Clusters to install the gateway in.
managedInstallations.eastWestGateways[].installations[].clusters[] struct Clusters to install the gateway in.
managedInstallations.eastWestGateways[].installations[].clusters[].name string Name of the cluster to install the gateway into. Must match the registered cluster name.
managedInstallations.eastWestGateways[].installations[].clusters[].activeGateway bool When set to true, the installation for this revision is applied as the active gateway through which primary service traffic is routed in the cluster. If the istioOperatorSpec defines a service, this field switches the service selectors to the revision specified in the gatewayRevsion. You might change this setting for gateway installations during a canary upgrade. For more info, see the upgrade docs.
managedInstallations.eastWestGateways[].installations[].clusters[].trustDomain string Trust domain value for this cluster's Istio installation mesh config. Defaults to the cluster's name.
managedInstallations.eastWestGateways[].installations[].IstioOperatorSpec struct IstioOperator specification for the gateway. For more info, see the IstioOperatorSpec reference.
managedInstallations.enabled bool false Enable managed Istio installations.
metricscollector struct Helm values for configuring the Gloo Platform Metrics Collector. See the OpenTelemetry Helm chart for the complete set of values.
metricscollector.nameOverride string
metricscollector.fullnameOverride string gloo-metrics-collector
metricscollector.enabled bool false
metricscollector.mode string daemonset
metricscollector.replicaCount int 0
metricscollector.command map[string, interface] {“extraArgs”:["–config=/conf/relay.yaml”],“name”:“gloo-otel-collector”}
metricscollector.command.<MAP_KEY> interface
metricscollector.command.extraArgs interface
metricscollector.command.name interface
metricscollector.image struct
metricscollector.image.pullPolicy string IfNotPresent
metricscollector.image.repository string gcr.io/gloo-mesh/gloo-otel-collector
metricscollector.image.tag string
metricscollector.extraVolumes[] []map [{“name”:“root-ca”,“secret”:{“defaultMode”:420,“secretName”:“relay-root-tls-secret”}},{“configMap”:{“items”:[{“key”:“relay”,“path”:“relay.yaml”}],“name”:“gloo-metrics-collector-config”},“name”:“metrics-configmap”}]
metricscollector.extraVolumes[] map[string, interface]
metricscollector.extraVolumes[].<MAP_KEY> interface
metricscollector.extraVolumeMounts[] []map [{“mountPath”:"/etc/otel-certs”,“name”:“root-ca”,“readOnly”:true},{“mountPath”:"/conf”,“name”:“metrics-configmap”}]
metricscollector.extraVolumeMounts[] map[string, interface]
metricscollector.extraVolumeMounts[].<MAP_KEY> interface
metricscollector.resources map[string, interface] {“requests”:{“cpu”:“100m”,“memory”:“300Mi”}}
metricscollector.resources.<MAP_KEY> interface
metricscollector.resources.requests interface
metricscollector.extraEnvs[] []map [{“name”:“KUBE_NODE_NAME”,“valueFrom”:{“fieldRef”:{“fieldPath”:“spec.nodeName”}}},{“name”:“KUBE_POD_NAME”,“valueFrom”:{“fieldRef”:{“fieldPath”:“metadata.name”}}}]
metricscollector.extraEnvs[] map[string, interface]
metricscollector.extraEnvs[].<MAP_KEY> interface
metricscollector.presets map[string, interface] {“clusterMetrics”:{“enabled”:false},“hostMetrics”:{“enabled”:false},“kubeletMetrics”:{“enabled”:false},“kubernetesAttributes”:{“enabled”:false},“logsCollection”:{“enabled”:false,“includeCollectorLogs”:false}}
metricscollector.presets.<MAP_KEY> interface
metricscollector.presets.clusterMetrics interface
metricscollector.presets.hostMetrics interface
metricscollector.presets.kubeletMetrics interface
metricscollector.presets.kubernetesAttributes interface
metricscollector.presets.logsCollection interface
metricscollector.configMap map[string, interface] {“create”:false}
metricscollector.configMap.<MAP_KEY> interface
metricscollector.configMap.create interface
metricscollector.clusterRole map[string, interface] {“create”:true,“rules”:[{“apiGroups”:[""],“resources”:[“nodes”,“nodes/proxy”,“nodes/metrics”,“services”,“endpoints”,“pods”,“ingresses”,“configmaps”],“verbs”:[“get”,“list”,“watch”]},{“apiGroups”:[“extensions”,“networking.k8s.io”],“resources”:[“ingresses/status”,“ingresses”],“verbs”:[“get”,“list”,“watch”]},{“nonResourceURLs”:["/metrics”],“verbs”:[“get”]}]}
metricscollector.clusterRole.<MAP_KEY> interface
metricscollector.clusterRole.create interface
metricscollector.clusterRole.rules interface
metricscollector.service map[string, interface] null
metricscollector.service.<MAP_KEY> interface
metricscollector.podAnnotations map[string, interface] null
metricscollector.podAnnotations.<MAP_KEY> interface
metricscollector.ports map[string, interface] {“jaeger-compact”:{“hostPort”:0},“jaeger-grpc”:{“hostPort”:0},“jaeger-thrift”:{“hostPort”:0},“otlp”:{“hostPort”:0},“otlp-http”:{“hostPort”:0},“zipkin”:{“hostPort”:0}}
metricscollector.ports.<MAP_KEY> interface
metricscollector.ports.jaeger-compact interface
metricscollector.ports.jaeger-grpc interface
metricscollector.ports.jaeger-thrift interface
metricscollector.ports.otlp interface
metricscollector.ports.otlp-http interface
metricscollector.ports.zipkin interface
metricscollectorCustomization struct Helm values for customizing the Gloo Platform Metrics Collector.
metricscollectorCustomization.serverName string gloo-metrics-gateway.gloo-mesh SNI and certificate subject alternative name used in the collector certificate.
metricscollectorCustomization.extraReceivers map[string, interface] null Configuration for extra receivers, such as to scrape extra Prometheus targets. Receivers listen on a network port to receive telemetry data.
metricscollectorCustomization.extraReceivers.<MAP_KEY> interface Configuration for extra receivers, such as to scrape extra Prometheus targets. Receivers listen on a network port to receive telemetry data.
metricscollectorCustomization.extraProcessors map[string, interface] {“batch”:{“send_batch_max_size”:3000,“send_batch_size”:2000,“timeout”:“600ms”},“memory_limiter”:{“check_interval”:“1s”,“limit_percentage”:85,“spike_limit_percentage”:10}} Configuration for extra processors to drop and generate new data. Processors can transform the data before it is forwarded to another processor and an exporter.
metricscollectorCustomization.extraProcessors.<MAP_KEY> interface Configuration for extra processors to drop and generate new data. Processors can transform the data before it is forwarded to another processor and an exporter.
metricscollectorCustomization.extraProcessors.batch interface Configuration for extra processors to drop and generate new data. Processors can transform the data before it is forwarded to another processor and an exporter.
metricscollectorCustomization.extraProcessors.memory_limiter interface Configuration for extra processors to drop and generate new data. Processors can transform the data before it is forwarded to another processor and an exporter.
metricscollectorCustomization.extraExporters map[string, interface] null Configuration for extra exporters, such as to forward your data to a third-party provider. Exporters forward the data they get to a destination on the local or remote network.
metricscollectorCustomization.extraExporters.<MAP_KEY> interface Configuration for extra exporters, such as to forward your data to a third-party provider. Exporters forward the data they get to a destination on the local or remote network.
metricscollectorCustomization.extraPipelines map[string, interface] null Specify any added receivers, processors, or exporters in an extra pipeline.
metricscollectorCustomization.extraPipelines.<MAP_KEY> interface Specify any added receivers, processors, or exporters in an extra pipeline.
metricscollectorCustomization.telemetry map[string, interface] {“metrics”:{“address”:“0.0.0.0:8888”}} Configure the service telemetry (logs and metrics) as described in the otel-collector docs.
metricscollectorCustomization.telemetry.<MAP_KEY> interface Configure the service telemetry (logs and metrics) as described in the otel-collector docs.
metricscollectorCustomization.telemetry.metrics interface Configure the service telemetry (logs and metrics) as described in the otel-collector docs.
glooMeshAgent struct Configuration for the glooMeshAgent deployment.
glooMeshAgent struct
glooMeshAgent.image struct Container image.
glooMeshAgent.image.tag string Version tag for the container image.
glooMeshAgent.image.repository string gloo-mesh-agent Image name (repository).
glooMeshAgent.image.registry string gcr.io/gloo-mesh Image registry.
glooMeshAgent.image.pullPolicy string IfNotPresent Image pull policy.
glooMeshAgent.image.pullSecret string Image pull secret.
glooMeshAgent.Env[] slice [{“name”:“POD_NAMESPACE”,“valueFrom”:{“fieldRef”:{“fieldPath”:“metadata.namespace”}}}] Environment variables for the container. For more info, see the Kubernetes documentation.
glooMeshAgent.Resources struct {“requests”:{“cpu”:“50m”,“memory”:“128Mi”}} Container resource requirements. For more info, see the Kubernetes documentation.
glooMeshAgent.SecurityContext struct Container security context. Set to ‘false’ to omit the security context entirely. For more info, see the Kubernetes documentation.
glooMeshAgent.sidecars map[string, struct] {} Optional configuration for the deployed containers.
glooMeshAgent.sidecars.<MAP_KEY> struct Optional configuration for the deployed containers.
glooMeshAgent.sidecars.<MAP_KEY>.image struct Container image.
glooMeshAgent.sidecars.<MAP_KEY>.image.tag string Version tag for the container image.
glooMeshAgent.sidecars.<MAP_KEY>.image.repository string Image name (repository).
glooMeshAgent.sidecars.<MAP_KEY>.image.registry string Image registry.
glooMeshAgent.sidecars.<MAP_KEY>.image.pullPolicy string Image pull policy.
glooMeshAgent.sidecars.<MAP_KEY>.image.pullSecret string Image pull secret.
glooMeshAgent.sidecars.<MAP_KEY>.Env[] slice Environment variables for the container. For more info, see the Kubernetes documentation.
glooMeshAgent.sidecars.<MAP_KEY>.Resources struct Container resource requirements. For more info, see the Kubernetes documentation.
glooMeshAgent.sidecars.<MAP_KEY>.SecurityContext struct Container security context. Set to ‘false’ to omit the security context entirely. For more info, see the Kubernetes documentation.
glooMeshAgent.floatingUserId bool false Allow the pod to be assigned a dynamic user ID. Required for OpenShift installations.
glooMeshAgent.runAsUser uint32 10101 Static user ID to run the containers as. Unused if floatingUserId is ‘true’.
glooMeshAgent.serviceType string ClusterIP Kubernetes service type. Can be either “ClusterIP”, “NodePort”, “LoadBalancer”, or “ExternalName”.
glooMeshAgent.ports map[string, uint32] {“grpc”:9977,“http”:9988,“stats”:9091} Service ports as a map from port name to port number.
glooMeshAgent.ports.<MAP_KEY> uint32 Service ports as a map from port name to port number.
glooMeshAgent.ports.grpc uint32 9977 Service ports as a map from port name to port number.
glooMeshAgent.ports.http uint32 9988 Service ports as a map from port name to port number.
glooMeshAgent.ports.stats uint32 9091 Service ports as a map from port name to port number.
glooMeshAgent.DeploymentOverrides struct Arbitrary overrides for the component's deployment template
glooMeshAgent.ServiceOverrides struct Arbitrary overrides for the component's service template.
glooMeshAgent.enabled bool true Enable creation of the deployment/service.
glooMeshPortalServer struct Configuration for the glooMeshPortalServer deployment.
glooMeshPortalServer struct
glooMeshPortalServer.verbose bool false Enable verbose/debug logging.
glooMeshPortalServer struct
glooMeshPortalServer.devMode bool false Set to true to enable development mode for the logger, which can cause panics. Do not use in production.
glooMeshPortalServer.enabled bool false Deploy the Developer Portal server to the cluster.
glooMeshPortalServer struct Configuration for the glooMeshPortalServer deployment.
glooMeshPortalServer struct
glooMeshPortalServer.image struct Container image.
glooMeshPortalServer.image.tag string Version tag for the container image.
glooMeshPortalServer.image.repository string gloo-mesh-portal-server Image name (repository).
glooMeshPortalServer.image.registry string gcr.io/gloo-mesh Image registry.
glooMeshPortalServer.image.pullPolicy string IfNotPresent Image pull policy.
glooMeshPortalServer.image.pullSecret string Image pull secret.
glooMeshPortalServer.Env[] slice [{“name”:“POD_NAMESPACE”,“valueFrom”:{“fieldRef”:{“fieldPath”:“metadata.namespace”}}}] Environment variables for the container. For more info, see the Kubernetes documentation.
glooMeshPortalServer.Resources struct {“requests”:{“cpu”:“50m”,“memory”:“128Mi”}} Container resource requirements. For more info, see the Kubernetes documentation.
glooMeshPortalServer.SecurityContext struct Container security context. Set to ‘false’ to omit the security context entirely. For more info, see the Kubernetes documentation.
glooMeshPortalServer.sidecars map[string, struct] {} Optional configuration for the deployed containers.
glooMeshPortalServer.sidecars.<MAP_KEY> struct Optional configuration for the deployed containers.
glooMeshPortalServer.sidecars.<MAP_KEY>.image struct Container image.
glooMeshPortalServer.sidecars.<MAP_KEY>.image.tag string Version tag for the container image.
glooMeshPortalServer.sidecars.<MAP_KEY>.image.repository string Image name (repository).
glooMeshPortalServer.sidecars.<MAP_KEY>.image.registry string Image registry.
glooMeshPortalServer.sidecars.<MAP_KEY>.image.pullPolicy string Image pull policy.
glooMeshPortalServer.sidecars.<MAP_KEY>.image.pullSecret string Image pull secret.
glooMeshPortalServer.sidecars.<MAP_KEY>.Env[] slice Environment variables for the container. For more info, see the Kubernetes documentation.
glooMeshPortalServer.sidecars.<MAP_KEY>.Resources struct Container resource requirements. For more info, see the Kubernetes documentation.
glooMeshPortalServer.sidecars.<MAP_KEY>.SecurityContext struct Container security context. Set to ‘false’ to omit the security context entirely. For more info, see the Kubernetes documentation.
glooMeshPortalServer.floatingUserId bool false Allow the pod to be assigned a dynamic user ID. Required for OpenShift installations.
glooMeshPortalServer.runAsUser uint32 10101 Static user ID to run the containers as. Unused if floatingUserId is ‘true’.
glooMeshPortalServer.serviceType string ClusterIP Kubernetes service type. Can be either “ClusterIP”, “NodePort”, “LoadBalancer”, or “ExternalName”.
glooMeshPortalServer.ports map[string, uint32] {“http”:8080} Service ports as a map from port name to port number.
glooMeshPortalServer.ports.<MAP_KEY> uint32 Service ports as a map from port name to port number.
glooMeshPortalServer.ports.http uint32 8080 Service ports as a map from port name to port number.
glooMeshPortalServer.DeploymentOverrides struct Arbitrary overrides for the component's deployment template
glooMeshPortalServer.ServiceOverrides struct Arbitrary overrides for the component's service template.
glooMeshPortalServer.enabled bool true Enable creation of the deployment/service.