100 lines
1.7 KiB
YAML

global:
security:
allowInsecureImages: true
image:
registry: public.ecr.aws
repository: bitnami/keycloak
tag: 26.5.5-debian-12-r0
digest: ""
auth:
adminUser: admin
adminPassword: adminpassword
production: true
proxy: edge
proxyHeaders: xforwarded
replicaCount: 1
tls:
enabled: false
service:
type: ClusterIP
ports:
http: 8080
https: 8443
ingress:
enabled: true
ingressClassName: traefik
hostname: keycloak.dvirlabs.com
path: /
pathType: Prefix
servicePort: http
annotations:
traefik.ingress.kubernetes.io/router.entrypoints: websecure
traefik.ingress.kubernetes.io/router.tls: "true"
tls: true
postgresql:
enabled: true
auth:
postgresPassword: keycloak-postgres
password: keycloakpassword
primary:
persistence:
enabled: true
storageClass: nfs-client
size: 8Gi
persistentVolumeClaimRetentionPolicy:
enabled: true
whenDeleted: Retain
whenScaled: Retain
customStartupProbe:
httpGet:
path: /realms/master
port: http
scheme: HTTP
initialDelaySeconds: 30
periodSeconds: 10
timeoutSeconds: 5
failureThreshold: 18
successThreshold: 1
customLivenessProbe:
httpGet:
path: /realms/master
port: http
scheme: HTTP
initialDelaySeconds: 120
periodSeconds: 10
timeoutSeconds: 5
failureThreshold: 6
successThreshold: 1
customReadinessProbe:
httpGet:
path: /realms/master
port: http
scheme: HTTP
initialDelaySeconds: 60
periodSeconds: 10
timeoutSeconds: 5
failureThreshold: 12
successThreshold: 1
extraEnvVars:
- name: KEYCLOAK_LOGLEVEL
value: INFO
- name: KC_HTTP_ENABLED
value: "true"
- name: KC_PROXY_HEADERS
value: xforwarded
configuration: ""
existingConfigmap: ""