A Helm chart for Permission Manager, a simple to use, web application that enables a super-easy and user-friendly RBAC management for Kubernetes.
The following table lists the configurable parameters of the Permission Manager chart and their default values.
Parameter | Description | Default |
---|---|---|
replicaCount |
1 | |
image.repository |
"quay.io/sighup/permission-manager" | |
image.pullPolicy |
"IfNotPresent" | |
image.tag |
"v1.9.0" | |
imagePullSecrets |
[] | |
nameOverride |
"" | |
fullnameOverride |
"" | |
serviceAccount.create |
true | |
serviceAccount.annotations |
{} | |
serviceAccount.name |
"" | |
podAnnotations |
{} | |
podSecurityContext.fsGroup |
2000 | |
securityContext |
{} | |
service.type |
"ClusterIP" | |
service.port |
80 | |
service.nodePort |
null | |
ingress.enabled |
false | |
ingress.annotations |
null | |
ingress.hosts |
[{"host": "permission-manager.domain.com", "paths": [{"path": "/", "pathType": "ImplementationSpecific"}]}] | |
resources |
{} | |
autoscaling.enabled |
false | |
autoscaling.minReplicas |
1 | |
autoscaling.maxReplicas |
100 | |
autoscaling.targetCPUUtilizationPercentage |
80 | |
nodeSelector |
{} | |
tolerations |
[] | |
affinity |
{} | |
config.clusterName |
"" | |
config.controlPlaneAddress |
"" | |
config.basicAuthPassword |
"" | |
config.templates |
[{"name": "operation", "rules": [{"apiGroups": [""], "resources": [""], "verbs": [""]}]}, {"name": "developer", "rules": [{"apiGroups": [""], "resources": ["configmaps", "endpoints", "persistentvolumeclaims", "pods", "pods/log", "pods/portforward", "podtemplates", "replicationcontrollers", "resourcequotas", "secrets", "services", "events", "daemonsets", "deployments", "replicasets", "ingresses", "networkpolicies", "poddisruptionbudgets"], "verbs": ["*"]}]}] |