Page MenuHomePhorge

k3s.values.yaml
No OneTemporary

Authored By
Unknown
Size
3 KB
Referenced Files
None
Subscribers
None

k3s.values.yaml

# Specify your domain name
domainName: "DOMAIN"
# The admin user is always admin@domainName
adminPassword: "ADMIN_PASSWORD"
# Generate with "openssl passwd -1 simple123"
externalServiceUserPassword: "EXTERNAL_SERVICE_USER_PASSWORD"
# migrate:status is required to make sure we don't try to run commands before the db is ready
# TODO integrate this into the seeder I guess?
initCommands: [
"./artisan user:password admin@DOMAIN ADMIN_PASSWORD",
"./artisan user:create test1@DOMAIN --password=TEST_PASSWORD || :",
"./artisan user:create test2@DOMAIN --password=TEST_PASSWORD || :",
]
# Created above
testUser: "test1@DOMAIN"
testPassword: "TEST_PASSWORD"
# Generate
appKey: "APP_KEY"
image:
pullSecret: "PULL_SECRET"
certManager:
letsencryptIssuer:
enabled: true
email: "admin@DOMAIN"
# Configure which tls secret to use
tlsSecret:
name: kolab-cert-letsencrypt
type: letsencrypt
# This is how to inject an externally managed cert
# type: external
# secretName: externalSecret
# This is how to inject a static certificate
# type: static
# crt: |
# TLS_CERT
# key: |
# TLS_KEY
passport:
proxyOauthClientId: "PASSPORT_PROXY_OAUTH_CLIENT_ID"
proxyOauthClientSecret: "PASSPORT_PROXY_OAUTH_CLIENT_SECRET"
privateKey: |
PASSPORT_PRIVATE_KEY
publicKey: |
PASSPORT_PUBLIC_KEY
kolab:
resources:
limits:
memory: 1000Mi
requests:
memory: 100Mi
horizon:
resources:
limits:
memory: 500Mi
requests:
memory: 200Mi
meet:
publicIp: MEET_PUBLIC_IP
webhookToken: "MEET_WEBHOOK_TOKEN"
serverToken: "MEET_SERVER_TOKEN"
resources:
limits:
memory: 500Mi
collabora:
resources:
requests:
memory: 400Mi
imap:
adminLogin: "cyrus-admin"
adminPassword: "IMAP_ADMIN_PASSWORD"
resources:
limits:
memory: 500Mi
requests:
memory: 60Mi
volumes:
spool:
storageClassName: local-path
capacity: 100Mi
lib:
storageClassName: local-path
capacity: 100Mi
roundcube:
desKey: "ROUNDCUBE_DES_KEY"
resources:
limits:
memory: 500Mi
requests:
memory: 500Mi
mariadb:
rootPassword: "DB_ROOT_PASSWORD"
# Used by kolab to access the roundcube mfa db
mfaDsn: "mysql://roundcube:DB_ROUNDCUBE_PASSWORD@mariadb/roundcube"
kolabPassword: "DB_KOLAB_PASSWORD"
kolabLegacyPassword: "DB_LEGACY_PASSWORD"
roundcubePassword: "DB_ROUNDCUBE_PASSWORD"
volumes:
data:
storageClassName: local-path
capacity: 100Mi
resources:
limits:
memory: 500Mi
requests:
memory: 120Mi
redis:
password: "REDIS_PASSWORD"
resources:
limits:
memory: 500Mi
requests:
memory: 20Mi
postfix:
volumes:
spool:
storageClassName: local-path
capacity: 100Mi
lib:
storageClassName: local-path
capacity: 100Mi
resources:
limits:
memory: 500Mi
requests:
memory: 20Mi
amavis:
resources:
limits:
memory: 500Mi
requests:
memory: 20Mi
dkim:
identifier: DKIM_IDENTIFIER
# Generated via amavis genrsa, must match the public key in the DNS record
key: |
DKIM_KEY
mail:
# Used for the noreply@domainName sender
noreplyPassword: "MAIL_NOREPLY_PASSWORD"
minio:
rootUser: "admin"
rootPassword: "MINIO_ROOT_PASSWORD"
volumes:
data:
storageClassName: local-path
capacity: 100Mi
alertmanager:
enabled: false
openshift: false
prometheus:
clusterMonitoring: true
loki:
storage:
bucketNames:
chunks: chunks
ruler: ruler
admin: admin
type: s3
s3:
endpoint: http://minio:9000
region: local
secretAccessKey: admin
accessKeyId: MINIO_ROOT_PASSWORD
s3ForcePathStyle: true
insecure: true

File Metadata

Mime Type
text/plain
Expires
Sat, Apr 4, 1:32 AM (1 w, 6 d ago)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
18745155
Default Alt Text
k3s.values.yaml (3 KB)

Event Timeline