You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
`fullnameOverride` | override full name of app | `""`
134
-
`podLabels` | labels to be added to pods | `{}`
135
-
`podAnnotations` | annotations to be added to pods | `{}`
136
-
`dpr.enabled` | enable the injection of docker private registry credentials | `false`
137
-
`dpr.existingSecretName` | defines an existing secret (in kube-system namespace) containing the credentials| `""`
138
-
`dpr.user` | user for authenticating with docker private registry. Only applicable if dpr.existingSecretName is empty | `""`
139
-
`dpr.server` | hostname/IP Address of the docker private registry. Only applicable if dpr.existingSecretName is empty | `""`
140
-
`dpr.password` | password for authentication with the selected docker private registry. Only applicable if dpr.existingSecretName is empty | `""`
141
-
`ecr.enabled` | enable the injection of elastic container registry credentials | `""`
142
-
`ecr.existingSecretName` | defines an existing secret (in kube-system namespace) containing the credentials| `""`
143
-
`ecr.awsAccessKeyId` | ID of the key used to access ECR. Not needed for machines within AWS. Only applicable if ecr.existingSecretName is empty | `""`
144
-
`ecr.awsSecretAccessKey` | secret of the key used to access ECR. Not needed for machines within AWS. Only applicable if ecr.existingSecretName is empty | `""`
145
-
`ecr.awsAccount` | comma separated list of AWS Account Ids. Only applicable if ecr.existingSecretName is empty | `""`
146
-
`ecr.awsRegion` | optional AWS region to override the default. Only applicable if ecr.existingSecretName is empty | `""`
147
-
`ecr.awsAssumeRole` | optional role to be assumed by AWS and used to retrieve tokens. Only applicable if ecr.existingSecretName is empty | `""`
148
-
`gcr.enabled` | enables the injection of google container registry credentials | `false`
149
-
`gcr.existingSecretName` | defines an existing secret (in kube-system namespace) containing the credentials| `""`
150
-
`gcr.applicationDefaultCredentialsJson` | JSON representing google cloud credentials. Only applicable if gcr.existingSecretName is empty | `""`
151
-
`gcr.url` | URL for google container registry. Only applicable if gcr.existingSecretName is empty | `"https://gcr.io"`
152
-
`acr.enabled` | enables the injection of azure container registry credentials | `false`
153
-
`acr.existingSecretName` | defines an existing secret (in kube-system namespace) containing the credentials| `""`
154
-
`acr.url` | defines the url of azure container registry| Only applicable if acr.existingSecretName is empty | `""`
155
-
`acr.clientId` | is the client id used to access azure container registry | Only applicable if acr.existingSecretName is empty | `""`
156
-
`acr.password` | is the client password used to access azure container registry | Only applicable if acr.existingSecretName is empty | `""`
157
-
`rbac.enabled` | enables the usage of RBAC for registry-creds (needed for clusters with RBAC enabled) | `true`
158
-
`rbac.existingServiceAccountName` | name of an existing service account to be used for RBAC permissions. If not defined a new service account will be created by the chart | `""`
|`fullnameOverride`| override full name of app |`""`|
135
+
|`podLabels`| labels to be added to pods |`{}`|
136
+
|`podAnnotations`| annotations to be added to pods |`{}`|
137
+
|`dpr.enabled`| enable the injection of docker private registry credentials |`false`|
138
+
|`dpr.existingSecretName`| defines an existing secret (in kube-system namespace) containing the credentials |`""`|
139
+
|`dpr.user`| user for authenticating with docker private registry. Only applicable if dpr.existingSecretName is empty |`""`|
140
+
|`dpr.server`| hostname/IP Address of the docker private registry. Only applicable if dpr.existingSecretName is empty |`""`|
141
+
|`dpr.password`| password for authentication with the selected docker private registry. Only applicable if dpr.existingSecretName is empty |`""`|
142
+
|`ecr.enabled`| enable the injection of elastic container registry credentials |`""`|
143
+
|`ecr.existingSecretName`| defines an existing secret (in kube-system namespace) containing the credentials |`""`|
144
+
|`ecr.awsAccessKeyId`| ID of the key used to access ECR. Not needed for machines within AWS. Only applicable if ecr.existingSecretName is empty |`""`|
145
+
|`ecr.awsSecretAccessKey`| secret of the key used to access ECR. Not needed for machines within AWS. Only applicable if ecr.existingSecretName is empty |`""`|
146
+
|`ecr.awsAccount`| comma separated list of AWS Account Ids. Only applicable if ecr.existingSecretName is empty |`""`|
147
+
|`ecr.awsRegion`| optional AWS region to override the default. Only applicable if ecr.existingSecretName is empty |`""`|
148
+
|`ecr.awsAssumeRole`| optional role to be assumed by AWS and used to retrieve tokens. Only applicable if ecr.existingSecretName is empty |`""`|
149
+
|`gcr.enabled`| enables the injection of google container registry credentials |`false`|
150
+
|`gcr.existingSecretName`| defines an existing secret (in kube-system namespace) containing the credentials |`""`|
151
+
|`gcr.applicationDefaultCredentialsJson`| JSON representing google cloud credentials. Only applicable if gcr.existingSecretName is empty |`""`|
152
+
|`gcr.url`| URL for google container registry. Only applicable if gcr.existingSecretName is empty |`"https://gcr.io"`|
153
+
|`acr.enabled`| enables the injection of azure container registry credentials |`false`|
154
+
|`acr.existingSecretName`| defines an existing secret (in kube-system namespace) containing the credentials |`""`|
155
+
|`acr.url`| defines the url of azure container registry. Only applicable if acr.existingSecretName is empty |`""`|
156
+
|`acr.clientId`| is the client id used to access azure container registry. Only applicable if acr.existingSecretName is empty |`""`|
157
+
|`acr.password`| is the client password used to access azure container registry. Only applicable if acr.existingSecretName is empty |`""`|
158
+
|`rbac.enabled`| enables the usage of RBAC for registry-creds (needed for clusters with RBAC enabled) |`true`|
159
+
|`rbac.existingServiceAccountName`| name of an existing service account to be used for RBAC permissions. If not defined a new service account will be created by the chart |`""`|
0 commit comments