2# - name: my-repository-secret
4 repository: cgr.dev/chainguard-private/akhq
5 tag: latest@sha256:03de876c75acb07f72722261975cf138d34bc90d75434965bb688650cabaa34a
6# Number of old deployment ReplicaSets to retain. The rest will be garbage collected.
7revisionHistoryLimit: 10
8# custom annotations (example: for prometheus)
10#prometheus.io/scrape: 'true'
11#prometheus.io/port: '8080'
12#prometheus.io/path: '/prometheus'
15configmapAnnotations: {}
16# vault.security.banzaicloud.io/vault-role: akhq
17# vault.security.banzaicloud.io/vault-serviceaccount: akhq
20# same as configmapAnnotations
27## You can put directly your configuration here... or add java opts or any other env vars
29# - name: AKHQ_CONFIGURATION
35# bootstrap.servers: "kafka:9092"
37# value: "-Djavax.net.ssl.trustStore=/opt/java/openjdk/lib/security/cacerts -Djavax.net.ssl.trustStorePassword=password"
39# value: "/any/additional/jars/desired.jar:/go/here.jar"
41## Or you can also use configmap for the configuration...
47# name: org.akhq.log.access
49##... and secret for connection information
51# name of the existingSecret
55# my-cluster-plain-text:
57# bootstrap.servers: "kafka:9092"
59# url: "http://schema-registry:8085"
61# basic-auth-username: basic-auth-user
62# basic-auth-password: basic-auth-pass
65# url: "http://connect:8083"
66# basic-auth-username: basic-auth-user
67# basic-auth-password: basic-auth-pass
69#Provide extra base64 encoded kubernetes secrets (keystore/truststore)
71# truststore.jks: MIIIE...
72# keystore.jks: MIIIE...
74# Any extra volumes to define for the pod (like keystore/truststore)
76# - name: certstore-secret
78# secretName: akhq-secrets
80# - key: "truststore.jks"
81# path: "truststore.jks"
82# - key: "keystore.jks"
85# Any extra volume mounts to define for the akhq container
87# - name: certstore-secret
88# mountPath: "/secrets"
91# Specify ServiceAccount for pod
92serviceAccountName: null
96 # eks.amazonaws.com/role-arn: arn:aws:iam::123456789000:role/iam-role-name-here
97# Add your own init container or uncomment and modify the example.
100# image: "eclipse-temurin:11-jre"
101# command: ['sh', '-c', 'keytool']
106# Configure the Pod Security Context
107# ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
112# Configure the Container Security Context
113# ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
114containerSecurityContext: {}
115# allowPrivilegeEscalation: false
122# readOnlyRootFilesystem: true
128 managementPort: 28081
130 #managementNodePort: 32552
134 # cloud.google.com/load-balancer-type: "Internal"
139 # kubernetes.io/ingress.class: nginx
140 # kubernetes.io/tls-acme: "true"
144 pathType: "ImplementationSpecific"
148 # - secretName: akhq-tls
151### Readiness / Liveness probe config.
152### ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/
155 prefix: "" # set same as `micronaut.server.context-path`
158 initialDelaySeconds: 5
166 prefix: "" # set same as `micronaut.server.context-path`
169 initialDelaySeconds: 5