# Global values nameOverride: "" fullnameOverride: "" replicaCount: 1 # Autoscaling configuration autoscaling: enabled: false minReplicas: 1 maxReplicas: 10 targetCPUUtilizationPercentage: 80 # targetMemoryUtilizationPercentage: 80 # Pod configuration podAnnotations: {} podSecurityContext: {} nodeSelector: {} tolerations: [] affinity: {} # Service account configuration serviceAccount: create: true annotations: {} name: "" # PostgreSQL database configuration postgresql: # Set to true to deploy PostgreSQL as part of this chart enabled: true image: repository: postgres tag: 16-alpine pullPolicy: IfNotPresent # Database configuration auth: database: kaneo username: kaneo_user password: kaneo_password # Use existing secret for database credentials (optional) existingSecret: "" secretKeys: adminPasswordKey: postgres-password userPasswordKey: password # Persistence for PostgreSQL data persistence: enabled: true size: 8Gi storageClass: "" accessMode: ReadWriteOnce # PostgreSQL service configuration service: type: ClusterIP port: 5432 # Resources for PostgreSQL resources: {} # resources: # limits: # cpu: 500m # memory: 512Mi # requests: # cpu: 100m # memory: 128Mi # API backend configuration api: image: repository: ghcr.io/usekaneo/api tag: latest pullPolicy: IfNotPresent securityContext: {} service: type: ClusterIP port: 1337 targetPort: 1337 # Resources are optional and disabled by default resources: {} # resources: # limits: # cpu: 500m # memory: 512Mi # requests: # cpu: 100m # memory: 128Mi # Environment variables for the API env: jwtAccess: appelflap existingSecret: enabled: false name: "" key: jwt-access disableRegistration: false # Database configuration database: # Use external PostgreSQL (set postgresql.enabled to false) # Important: when using external postgres, make sure you have set up the db user correctly: # CREATE DATABASE kaneo; # CREATE USER kaneo_user WITH PASSWORD 'your_password'; # GRANT ALL PRIVILEGES ON DATABASE kaneo TO kaneo_user; # \c kaneo; # GRANT USAGE ON SCHEMA public TO kaneo_user; # GRANT CREATE ON SCHEMA public TO kaneo_user; # ALTER SCHEMA public OWNER TO kaneo_user; external: enabled: false host: "" port: 5432 database: kaneo username: kaneo_user password: "" # Use existing secret for external database credentials in the form of a uri, e.g.: "postgresql://user:pass@host:port/db" existingSecret: enabled: false name: "" passwordKey: postgres_uri livenessProbe: httpGet: path: /me port: api initialDelaySeconds: 30 periodSeconds: 10 readinessProbe: httpGet: path: /me port: api initialDelaySeconds: 5 periodSeconds: 10 # Web frontend configuration web: image: repository: ghcr.io/usekaneo/web tag: latest pullPolicy: IfNotPresent # Environment variables for the Web env: # Optional: Override the default API URL (http://localhost:1337) # The /api path will be automatically appended to the URL # Make sure this url matches the ingress host # apiUrl: "https://kaneo.example.com" apiUrl: "" securityContext: {} service: type: ClusterIP port: 80 targetPort: 80 # Resources are optional and disabled by default resources: {} # resources: # limits: # cpu: 300m # memory: 256Mi # requests: # cpu: 100m # memory: 128Mi livenessProbe: httpGet: path: / port: web initialDelaySeconds: 30 periodSeconds: 10 readinessProbe: httpGet: path: / port: web initialDelaySeconds: 5 periodSeconds: 10 # Ingress configuration ingress: enabled: true className: traefik annotations: cert-manager.io/cluster-issuer: letsencrypt hosts: # Use the same host in the web env variable apiUrl (with http:// or https://) - host: projects.dgse.cloud paths: - path: /?(.*) pathType: ImplementationSpecific service: web port: 80 - path: /api/?(.*) pathType: ImplementationSpecific service: api port: 1337 tls: - projects.dgse.cloud