Page Menu
Home
Phorge
Search
Configure Global Search
Log In
Files
F117749308
k3s.values.yaml
No One
Temporary
Actions
View File
Edit File
Delete File
View Transforms
Subscribe
Flag For Later
Award Token
Authored By
Unknown
Size
3 KB
Referenced Files
None
Subscribers
None
k3s.values.yaml
View Options
# Specify your domain name
domainName
:
"DOMAIN"
# The admin user is always admin@domainName
adminPassword
:
"ADMIN_PASSWORD"
# Generate with "openssl passwd -1 simple123"
externalServiceUserPassword
:
"EXTERNAL_SERVICE_USER_PASSWORD"
# migrate:status is required to make sure we don't try to run commands before the db is ready
# TODO integrate this into the seeder I guess?
initCommands
:
[
"./artisan
user:password
admin@DOMAIN
ADMIN_PASSWORD"
,
"./artisan
user:create
test1@DOMAIN
--password=TEST_PASSWORD
||
:"
,
"./artisan
user:create
test2@DOMAIN
--password=TEST_PASSWORD
||
:"
,
]
# Created above
testUser
:
"test1@DOMAIN"
testPassword
:
"TEST_PASSWORD"
# Generate
appKey
:
"APP_KEY"
image
:
pullSecret
:
"PULL_SECRET"
certManager
:
letsencryptIssuer
:
enabled
:
true
email
:
"admin@DOMAIN"
# Configure which tls secret to use
tlsSecret
:
name
:
kolab-cert-letsencrypt
type
:
letsencrypt
# This is how to inject an externally managed cert
# type: external
# secretName: externalSecret
# This is how to inject a static certificate
# type: static
# crt: |
# TLS_CERT
# key: |
# TLS_KEY
passport
:
proxyOauthClientId
:
"PASSPORT_PROXY_OAUTH_CLIENT_ID"
proxyOauthClientSecret
:
"PASSPORT_PROXY_OAUTH_CLIENT_SECRET"
privateKey
:
|
PASSPORT_PRIVATE_KEY
publicKey
:
|
PASSPORT_PUBLIC_KEY
kolab
:
resources
:
limits
:
memory
:
1000Mi
requests
:
memory
:
100Mi
horizon
:
resources
:
limits
:
memory
:
500Mi
requests
:
memory
:
200Mi
meet
:
publicIp
:
MEET_PUBLIC_IP
webhookToken
:
"MEET_WEBHOOK_TOKEN"
serverToken
:
"MEET_SERVER_TOKEN"
resources
:
limits
:
memory
:
500Mi
collabora
:
resources
:
requests
:
memory
:
400Mi
imap
:
adminLogin
:
"cyrus-admin"
adminPassword
:
"IMAP_ADMIN_PASSWORD"
resources
:
limits
:
memory
:
500Mi
requests
:
memory
:
60Mi
volumes
:
spool
:
storageClassName
:
local-path
capacity
:
100Mi
lib
:
storageClassName
:
local-path
capacity
:
100Mi
roundcube
:
desKey
:
"ROUNDCUBE_DES_KEY"
resources
:
limits
:
memory
:
500Mi
requests
:
memory
:
500Mi
mariadb
:
rootPassword
:
"DB_ROOT_PASSWORD"
# Used by kolab to access the roundcube mfa db
mfaDsn
:
"mysql://roundcube:DB_ROUNDCUBE_PASSWORD@mariadb/roundcube"
kolabPassword
:
"DB_KOLAB_PASSWORD"
kolabLegacyPassword
:
"DB_LEGACY_PASSWORD"
roundcubePassword
:
"DB_ROUNDCUBE_PASSWORD"
volumes
:
data
:
storageClassName
:
local-path
capacity
:
100Mi
resources
:
limits
:
memory
:
500Mi
requests
:
memory
:
120Mi
redis
:
password
:
"REDIS_PASSWORD"
resources
:
limits
:
memory
:
500Mi
requests
:
memory
:
20Mi
postfix
:
volumes
:
spool
:
storageClassName
:
local-path
capacity
:
100Mi
lib
:
storageClassName
:
local-path
capacity
:
100Mi
resources
:
limits
:
memory
:
500Mi
requests
:
memory
:
20Mi
amavis
:
resources
:
limits
:
memory
:
500Mi
requests
:
memory
:
20Mi
dkim
:
identifier
:
DKIM_IDENTIFIER
# Generated via amavis genrsa, must match the public key in the DNS record
key
:
|
DKIM_KEY
mail
:
# Used for the noreply@domainName sender
noreplyPassword
:
"MAIL_NOREPLY_PASSWORD"
minio
:
rootUser
:
"admin"
rootPassword
:
"MINIO_ROOT_PASSWORD"
volumes
:
data
:
storageClassName
:
local-path
capacity
:
100Mi
alertmanager
:
enabled
:
false
openshift
:
false
prometheus
:
clusterMonitoring
:
true
loki
:
storage
:
bucketNames
:
chunks
:
chunks
ruler
:
ruler
admin
:
admin
type
:
s3
s3
:
endpoint
:
http://minio:9000
region
:
local
secretAccessKey
:
admin
accessKeyId
:
MINIO_ROOT_PASSWORD
s3ForcePathStyle
:
true
insecure
:
true
File Metadata
Details
Attached
Mime Type
text/plain
Expires
Sat, Apr 4, 1:32 AM (1 w, 6 d ago)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
18745155
Default Alt Text
k3s.values.yaml (3 KB)
Attached To
Mode
R114 kolab-infrastructure
Attached
Detach File
Event Timeline