Harbor packaged by Bitnami¶
Harbor is an open source trusted cloud-native registry to store, sign, and scan content. It adds functionalities like security, identity, and management to the open source Docker distribution.
TL;DR¶
使用加速地址添加仓库:
Introduction¶
This Helm chart installs Harbor in a Kubernetes cluster. Welcome to contribute to Helm Chart for Harbor.
This Helm chart has been developed based on goharbor/harbor-helm chart but including some features common to the Bitnami chart library. For example, the following changes have been introduced:
- Possibility to pull all the required images from a private registry through the Global Docker image parameters.
- Redis® and PostgreSQL are managed as chart dependencies.
- Liveness and Readiness probes for all deployments are exposed to the values.yaml.
- Uses new Helm chart labels formatting.
- Uses Bitnami container images:
- non-root by default
- published for debian-10 and ol-7
- This chart support the Harbor optional components and Notary integrations.
Bitnami charts can be used with Kubeapps for deployment and management of Helm Charts in clusters.
Looking to use Harbor in production? Try VMware Application Catalog, the enterprise edition of Bitnami Application Catalog.
Prerequisites¶
- Kubernetes 1.19+
- Helm 3.2.0+
- PV provisioner support in the underlying infrastructure
- ReadWriteMany volumes for deployment scaling
Installing the Chart¶
To install the chart with the release name my-release
:
Uninstalling the Chart¶
To uninstall/delete the my-release
deployment:
Additionally, if persistence.resourcePolicy
is set to keep
, you should manually delete the PVCs.
Parameters¶
Global parameters¶
Name | Description | Value |
---|---|---|
global.imageRegistry | Global Docker image registry | "" |
global.imagePullSecrets | Global Docker registry secret names as an array | [] |
global.storageClass | Global StorageClass for Persistent Volume(s) | "" |
Common Parameters¶
Name | Description | Value |
---|---|---|
nameOverride | String to partially override common.names.fullname template (will maintain the release name) | "" |
fullnameOverride | String to fully override common.names.fullname template with a string | "" |
kubeVersion | Force target Kubernetes version (using Helm capabilities if not set) | "" |
clusterDomain | Kubernetes Cluster Domain | cluster.local |
commonAnnotations | Annotations to add to all deployed objects | {} |
commonLabels | Labels to add to all deployed objects | {} |
extraDeploy | Array of extra objects to deploy with the release (evaluated as a template). | [] |
diagnosticMode.enabled | Enable diagnostic mode (all probes will be disabled and the command will be overridden) | false |
diagnosticMode.command | Command to override all containers in the the deployment(s)/statefulset(s) | ["sleep"] |
diagnosticMode.args | Args to override all containers in the the deployment(s)/statefulset(s) | ["infinity"] |
Harbor common parameters¶
Name | Description | Value |
---|---|---|
adminPassword | The initial password of Harbor admin. Change it from portal after launching Harbor | "" |
externalURL | The external URL for Harbor Core service | https://core.harbor.domain |
proxy.httpProxy | The URL of the HTTP proxy server | "" |
proxy.httpsProxy | The URL of the HTTPS proxy server | "" |
proxy.noProxy | The URLs that the proxy settings not apply to | 127.0.0.1,localhost,.local,.internal |
proxy.components | The component list that the proxy settings apply to | ["core","jobservice","trivy"] |
logLevel | The log level used for Harbor services. Allowed values are [ fatal | error | warn | info | debug | trace ] | debug |
internalTLS.enabled | Use TLS in all the supported containers: core, jobservice, portal, registry and trivy | false |
internalTLS.caBundleSecret | Name of an existing secret with a custom CA that will be injected into the trust store for core, jobservice, registry, trivy components | "" |
ipFamily.ipv6.enabled | Enable listening on IPv6 ([::]) for NGINX-based components (NGINX,portal) | true |
ipFamily.ipv4.enabled | Enable listening on IPv4 for NGINX-based components (NGINX,portal) | true |
Traffic Exposure Parameters¶
Name | Description | Value |
---|---|---|
exposureType | The way to expose Harbor. Allowed values are [ ingress | proxy ] | proxy |
service.type | NGINX proxy service type | LoadBalancer |
service.ports.http | NGINX proxy service HTTP port | 80 |
service.ports.https | NGINX proxy service HTTPS port | 443 |
service.ports.notary | Notary service port | 4443 |
service.nodePorts.http | Node port for HTTP | "" |
service.nodePorts.https | Node port for HTTPS | "" |
service.nodePorts.notary | Node port for Notary | "" |
service.sessionAffinity | Control where client requests go, to the same pod or round-robin | None |
service.sessionAffinityConfig | Additional settings for the sessionAffinity | {} |
service.clusterIP | NGINX proxy service Cluster IP | "" |
service.loadBalancerIP | NGINX proxy service Load Balancer IP | "" |
service.loadBalancerSourceRanges | NGINX proxy service Load Balancer sources | [] |
service.externalTrafficPolicy | NGINX proxy service external traffic policy | Cluster |
service.annotations | Additional custom annotations for NGINX proxy service | {} |
service.extraPorts | Extra port to expose on NGINX proxy service | [] |
ingress.core.ingressClassName | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | "" |
ingress.core.pathType | Ingress path type | ImplementationSpecific |
ingress.core.apiVersion | Force Ingress API version (automatically detected if not set) | "" |
ingress.core.controller | The ingress controller type. Currently supports default , gce and ncp | default |
ingress.core.hostname | Default host for the ingress record | core.harbor.domain |
ingress.core.annotations | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | {} |
ingress.core.tls | Enable TLS configuration for the host defined at ingress.core.hostname parameter | false |
ingress.core.selfSigned | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | false |
ingress.core.extraHosts | An array with additional hostname(s) to be covered with the ingress record | [] |
ingress.core.extraPaths | An array with additional arbitrary paths that may need to be added to the ingress under the main host | [] |
ingress.core.extraTls | TLS configuration for additional hostname(s) to be covered with this ingress record | [] |
ingress.core.secrets | Custom TLS certificates as secrets | [] |
ingress.core.extraRules | Additional rules to be covered with this ingress record | [] |
ingress.notary.ingressClassName | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | "" |
ingress.notary.pathType | Ingress path type | ImplementationSpecific |
ingress.notary.apiVersion | Force Ingress API version (automatically detected if not set) | "" |
ingress.notary.controller | The ingress controller type. Currently supports default , gce and ncp | default |
ingress.notary.hostname | Default host for the ingress record | notary.harbor.domain |
ingress.notary.annotations | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | {} |
ingress.notary.tls | Enable TLS configuration for the host defined at ingress.hostname parameter | false |
ingress.notary.selfSigned | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | false |
ingress.notary.extraHosts | An array with additional hostname(s) to be covered with the ingress record | [] |
ingress.notary.extraPaths | An array with additional arbitrary paths that may need to be added to the ingress under the main host | [] |
ingress.notary.extraTls | TLS configuration for additional hostname(s) to be covered with this ingress record | [] |
ingress.notary.secrets | Custom TLS certificates as secrets | [] |
ingress.notary.extraRules | Additional rules to be covered with this ingress record | [] |
Persistence Parameters¶
Name | Description | Value |
---|---|---|
persistence.enabled | Enable the data persistence or not | true |
persistence.resourcePolicy | Setting it to keep to avoid removing PVCs during a helm delete operation. Leaving it empty will delete PVCs after the chart deleted | keep |
persistence.persistentVolumeClaim.registry.existingClaim | Name of an existing PVC to use | "" |
persistence.persistentVolumeClaim.registry.storageClass | PVC Storage Class for Harbor Registry data volume | "" |
persistence.persistentVolumeClaim.registry.subPath | The sub path used in the volume | "" |
persistence.persistentVolumeClaim.registry.accessModes | The access mode of the volume | ["ReadWriteOnce"] |
persistence.persistentVolumeClaim.registry.size | The size of the volume | 5Gi |
persistence.persistentVolumeClaim.registry.annotations | Annotations for the PVC | {} |
persistence.persistentVolumeClaim.registry.selector | Selector to match an existing Persistent Volume | {} |
persistence.persistentVolumeClaim.jobservice.existingClaim | Name of an existing PVC to use | "" |
persistence.persistentVolumeClaim.jobservice.storageClass | PVC Storage Class for Harbor Jobservice data volume | "" |
persistence.persistentVolumeClaim.jobservice.subPath | The sub path used in the volume | "" |
persistence.persistentVolumeClaim.jobservice.accessModes | The access mode of the volume | ["ReadWriteOnce"] |
persistence.persistentVolumeClaim.jobservice.size | The size of the volume | 1Gi |
persistence.persistentVolumeClaim.jobservice.annotations | Annotations for the PVC | {} |
persistence.persistentVolumeClaim.jobservice.selector | Selector to match an existing Persistent Volume | {} |
persistence.persistentVolumeClaim.jobservice.scanData.existingClaim | Name of an existing PVC to use | "" |
persistence.persistentVolumeClaim.jobservice.scanData.storageClass | PVC Storage Class for Harbor Jobservice scan data volume | "" |
persistence.persistentVolumeClaim.jobservice.scanData.subPath | The sub path used in the volume | "" |
persistence.persistentVolumeClaim.jobservice.scanData.accessModes | The access mode of the volume | ["ReadWriteOnce"] |
persistence.persistentVolumeClaim.jobservice.scanData.size | The size of the volume | 1Gi |
persistence.persistentVolumeClaim.jobservice.scanData.annotations | Annotations for the PVC | {} |
persistence.persistentVolumeClaim.jobservice.scanData.selector | Selector to match an existing Persistent Volume | {} |
persistence.persistentVolumeClaim.trivy.storageClass | PVC Storage Class for Trivy data volume | "" |
persistence.persistentVolumeClaim.trivy.accessModes | The access mode of the volume | ["ReadWriteOnce"] |
persistence.persistentVolumeClaim.trivy.size | The size of the volume | 5Gi |
persistence.persistentVolumeClaim.trivy.annotations | Annotations for the PVC | {} |
persistence.persistentVolumeClaim.trivy.selector | Selector to match an existing Persistent Volume | {} |
persistence.imageChartStorage.caBundleSecret | Specify the caBundleSecret if the storage service uses a self-signed certificate. The secret must contain keys named ca.crt which will be injected into the trust store of registry's containers. | "" |
persistence.imageChartStorage.disableredirect | The configuration for managing redirects from content backends. For backends which do not supported it (such as using MinIO® for s3 storage type), please set it to true to disable redirects. Refer to the guide for more information about the detail | false |
persistence.imageChartStorage.type | The type of storage for images and charts: filesystem , azure , gcs , s3 , swift or oss . The type must be filesystem if you want to use persistent volumes for registry. Refer to the guide for more information about the detail | filesystem |
persistence.imageChartStorage.filesystem.rootdirectory | Filesystem storage type setting: Storage root directory | /storage |
persistence.imageChartStorage.filesystem.maxthreads | Filesystem storage type setting: Maximum threads directory | "" |
persistence.imageChartStorage.azure.accountname | Azure storage type setting: Name of the Azure account | accountname |
persistence.imageChartStorage.azure.accountkey | Azure storage type setting: Key of the Azure account | base64encodedaccountkey |
persistence.imageChartStorage.azure.container | Azure storage type setting: Container | containername |
persistence.imageChartStorage.azure.storagePrefix | Azure storage type setting: Storage prefix | /azure/harbor/charts |
persistence.imageChartStorage.azure.realm | Azure storage type setting: Realm of the Azure account | "" |
persistence.imageChartStorage.gcs.bucket | GCS storage type setting: Bucket name | bucketname |
persistence.imageChartStorage.gcs.encodedkey | GCS storage type setting: Base64 encoded key | "" |
persistence.imageChartStorage.gcs.rootdirectory | GCS storage type setting: Root directory name | "" |
persistence.imageChartStorage.gcs.chunksize | GCS storage type setting: Chunk size name | "" |
persistence.imageChartStorage.s3.region | S3 storage type setting: Region | us-west-1 |
persistence.imageChartStorage.s3.bucket | S3 storage type setting: Bucket name | bucketname |
persistence.imageChartStorage.s3.accesskey | S3 storage type setting: Access key name | "" |
persistence.imageChartStorage.s3.secretkey | S3 storage type setting: Secret Key name | "" |
persistence.imageChartStorage.s3.regionendpoint | S3 storage type setting: Region Endpoint | "" |
persistence.imageChartStorage.s3.encrypt | S3 storage type setting: Encrypt | "" |
persistence.imageChartStorage.s3.keyid | S3 storage type setting: Key ID | "" |
persistence.imageChartStorage.s3.secure | S3 storage type setting: Secure | "" |
persistence.imageChartStorage.s3.skipverify | S3 storage type setting: TLS skip verification | "" |
persistence.imageChartStorage.s3.v4auth | S3 storage type setting: V4 authorization | "" |
persistence.imageChartStorage.s3.chunksize | S3 storage type setting: V4 authorization | "" |
persistence.imageChartStorage.s3.rootdirectory | S3 storage type setting: Root directory name | "" |
persistence.imageChartStorage.s3.storageClass | S3 storage type setting: Storage class | "" |
persistence.imageChartStorage.s3.sse | S3 storage type setting: SSE name | "" |
persistence.imageChartStorage.swift.authurl | Swift storage type setting: Authentication url | https://storage.myprovider.com/v3/auth |
persistence.imageChartStorage.swift.username | Swift storage type setting: Authentication url | "" |
persistence.imageChartStorage.swift.password | Swift storage type setting: Password | "" |
persistence.imageChartStorage.swift.container | Swift storage type setting: Container | "" |
persistence.imageChartStorage.swift.region | Swift storage type setting: Region | "" |
persistence.imageChartStorage.swift.tenant | Swift storage type setting: Tenant | "" |
persistence.imageChartStorage.swift.tenantid | Swift storage type setting: TenantID | "" |
persistence.imageChartStorage.swift.domain | Swift storage type setting: Domain | "" |
persistence.imageChartStorage.swift.domainid | Swift storage type setting: DomainID | "" |
persistence.imageChartStorage.swift.trustid | Swift storage type setting: TrustID | "" |
persistence.imageChartStorage.swift.insecureskipverify | Swift storage type setting: Verification | "" |
persistence.imageChartStorage.swift.chunksize | Swift storage type setting: Chunk | "" |
persistence.imageChartStorage.swift.prefix | Swift storage type setting: Prefix | "" |
persistence.imageChartStorage.swift.secretkey | Swift storage type setting: Secre Key | "" |
persistence.imageChartStorage.swift.accesskey | Swift storage type setting: Access Key | "" |
persistence.imageChartStorage.swift.authversion | Swift storage type setting: Auth | "" |
persistence.imageChartStorage.swift.endpointtype | Swift storage type setting: Endpoint | "" |
persistence.imageChartStorage.swift.tempurlcontainerkey | Swift storage type setting: Temp URL container key | "" |
persistence.imageChartStorage.swift.tempurlmethods | Swift storage type setting: Temp URL methods | "" |
persistence.imageChartStorage.oss.accesskeyid | OSS storage type setting: Access key ID | "" |
persistence.imageChartStorage.oss.accesskeysecret | OSS storage type setting: Access key secret name containing the token | "" |
persistence.imageChartStorage.oss.region | OSS storage type setting: Region name | "" |
persistence.imageChartStorage.oss.bucket | OSS storage type setting: Bucket name | "" |
persistence.imageChartStorage.oss.endpoint | OSS storage type setting: Endpoint | "" |
persistence.imageChartStorage.oss.internal | OSS storage type setting: Internal | "" |
persistence.imageChartStorage.oss.encrypt | OSS storage type setting: Encrypt | "" |
persistence.imageChartStorage.oss.secure | OSS storage type setting: Secure | "" |
persistence.imageChartStorage.oss.chunksize | OSS storage type setting: Chunk | "" |
persistence.imageChartStorage.oss.rootdirectory | OSS storage type setting: Directory | "" |
persistence.imageChartStorage.oss.secretkey | OSS storage type setting: Secret key | "" |
Tracing parameters¶
Name | Description | Value |
---|---|---|
tracing.enabled | Enable tracing | false |
tracing.sampleRate | Tracing sample rate from 0 to 1 | 1 |
tracing.namespace | Used to differentiate traces between different harbor services | "" |
tracing.attributes | A key value dict containing user defined attributes used to initialize the trace provider | {} |
tracing.jaeger | Configuration for exporting to jaeger. If using jaeger collector mode, use endpoint, username and password. If using jaeger agent mode, use agentHostname and agentPort. | |
tracing.jaeger.enabled | Enable jaeger export | false |
tracing.jaeger.endpoint | Jaeger endpoint | "" |
tracing.jaeger.username | Jaeger username | "" |
tracing.jaeger.password | Jaeger password | "" |
tracing.jaeger.agentHost | Jaeger agent hostname | "" |
tracing.jaeger.agentPort | Jaeger agent port | "" |
tracing.otel | Configuration for exporting to an otel endpoint | |
tracing.otel.enabled | Enable otel export | false |
tracing.otel.endpoint | The hostname and port for an otel compatible backend | hostname:4318 |
tracing.otel.urlpath | Url path of otel endpoint | /v1/traces |
tracing.otel.compression | Enable data compression | false |
tracing.otel.timeout | The timeout for data transfer | 10s |
tracing.otel.insecure | Ignore cert verification for otel backend | true |
Volume Permissions parameters¶
Name | Description | Value |
---|---|---|
volumePermissions.enabled | Enable init container that changes the owner and group of the persistent volume | false |
volumePermissions.image.registry | Init container volume-permissions image registry | docker.io |
volumePermissions.image.repository | Init container volume-permissions image repository | bitnami/bitnami-shell |
volumePermissions.image.tag | Init container volume-permissions image tag (immutable tags are recommended) | 11-debian-11-r127 |
volumePermissions.image.digest | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | "" |
volumePermissions.image.pullPolicy | Init container volume-permissions image pull policy | IfNotPresent |
volumePermissions.image.pullSecrets | Init container volume-permissions image pull secrets | [] |
volumePermissions.resources.limits | Init container volume-permissions resource limits | {} |
volumePermissions.resources.requests | Init container volume-permissions resource requests | {} |
volumePermissions.containerSecurityContext.enabled | Enable init container Security Context | true |
volumePermissions.containerSecurityContext.runAsUser | User ID for the init container | 0 |
NGINX Parameters¶
Name | Description | Value |
---|---|---|
nginx.image.registry | NGINX image registry | docker.io |
nginx.image.repository | NGINX image repository | bitnami/nginx |
nginx.image.tag | NGINX image tag (immutable tags are recommended) | 1.25.1-debian-11-r2 |
nginx.image.digest | NGINX image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | "" |
nginx.image.pullPolicy | NGINX image pull policy | IfNotPresent |
nginx.image.pullSecrets | NGINX image pull secrets | [] |
nginx.image.debug | Enable NGINX image debug mode | false |
nginx.tls.enabled | Enable TLS termination | true |
nginx.tls.existingSecret | Existing secret name containing your own TLS certificates. | "" |
nginx.tls.commonName | The common name used to generate the self-signed TLS certificates | core.harbor.domain |
nginx.behindReverseProxy | If NGINX is behind another reverse proxy, set to true | false |
nginx.command | Override default container command (useful when using custom images) | [] |
nginx.args | Override default container args (useful when using custom images) | [] |
nginx.extraEnvVars | Array with extra environment variables to add NGINX pods | [] |
nginx.extraEnvVarsCM | ConfigMap containing extra environment variables for NGINX pods | "" |
nginx.extraEnvVarsSecret | Secret containing extra environment variables (in case of sensitive data) for NGINX pods | "" |
nginx.containerPorts.http | NGINX HTTP container port | 8080 |
nginx.containerPorts.https | NGINX HTTPS container port | 8443 |
nginx.containerPorts.notary | NGINX container port where Notary svc is exposed | 4443 |
nginx.replicaCount | Number of NGINX replicas | 1 |
nginx.livenessProbe.enabled | Enable livenessProbe on NGINX containers | true |
nginx.livenessProbe.initialDelaySeconds | Initial delay seconds for livenessProbe | 20 |
nginx.livenessProbe.periodSeconds | Period seconds for livenessProbe | 10 |
nginx.livenessProbe.timeoutSeconds | Timeout seconds for livenessProbe | 5 |
nginx.livenessProbe.failureThreshold | Failure threshold for livenessProbe | 6 |
nginx.livenessProbe.successThreshold | Success threshold for livenessProbe | 1 |
nginx.readinessProbe.enabled | Enable readinessProbe on NGINX containers | true |
nginx.readinessProbe.initialDelaySeconds | Initial delay seconds for readinessProbe | 20 |
nginx.readinessProbe.periodSeconds | Period seconds for readinessProbe | 10 |
nginx.readinessProbe.timeoutSeconds | Timeout seconds for readinessProbe | 5 |
nginx.readinessProbe.failureThreshold | Failure threshold for readinessProbe | 6 |
nginx.readinessProbe.successThreshold | Success threshold for readinessProbe | 1 |
nginx.startupProbe.enabled | Enable startupProbe on NGINX containers | false |
nginx.startupProbe.initialDelaySeconds | Initial delay seconds for startupProbe | 10 |
nginx.startupProbe.periodSeconds | Period seconds for startupProbe | 10 |
nginx.startupProbe.timeoutSeconds | Timeout seconds for startupProbe | 1 |
nginx.startupProbe.failureThreshold | Failure threshold for startupProbe | 15 |
nginx.startupProbe.successThreshold | Success threshold for startupProbe | 1 |
nginx.customLivenessProbe | Custom livenessProbe that overrides the default one | {} |
nginx.customReadinessProbe | Custom readinessProbe that overrides the default one | {} |
nginx.customStartupProbe | Custom startupProbe that overrides the default one | {} |
nginx.resources.limits | The resources limits for the NGINX containers | {} |
nginx.resources.requests | The requested resources for the NGINX containers | {} |
nginx.podSecurityContext.enabled | Enabled NGINX pods' Security Context | true |
nginx.podSecurityContext.fsGroup | Set NGINX pod's Security Context fsGroup | 1001 |
nginx.containerSecurityContext.enabled | Enabled NGINX containers' Security Context | true |
nginx.containerSecurityContext.runAsUser | Set NGINX containers' Security Context runAsUser | 1001 |
nginx.containerSecurityContext.runAsNonRoot | Set NGINX containers' Security Context runAsNonRoot | true |
nginx.updateStrategy.type | NGINX deployment strategy type - only really applicable for deployments with RWO PVs attached | RollingUpdate |
nginx.lifecycleHooks | LifecycleHook for the NGINX container(s) to automate configuration before or after startup | {} |
nginx.hostAliases | NGINX pods host aliases | [] |
nginx.podLabels | Add additional labels to the NGINX pods (evaluated as a template) | {} |
nginx.podAnnotations | Annotations to add to the NGINX pods (evaluated as a template) | {} |
nginx.podAffinityPreset | NGINX Pod affinity preset. Ignored if affinity is set. Allowed values: soft or hard | "" |
nginx.podAntiAffinityPreset | NGINX Pod anti-affinity preset. Ignored if affinity is set. Allowed values: soft or hard | soft |
nginx.nodeAffinityPreset.type | NGINX Node affinity preset type. Ignored if affinity is set. Allowed values: soft or hard | "" |
nginx.nodeAffinityPreset.key | NGINX Node label key to match Ignored if affinity is set. | "" |
nginx.nodeAffinityPreset.values | NGINX Node label values to match. Ignored if affinity is set. | [] |
nginx.affinity | NGINX Affinity for pod assignment | {} |
nginx.nodeSelector | NGINX Node labels for pod assignment | {} |
nginx.tolerations | NGINX Tolerations for pod assignment | [] |
nginx.topologySpreadConstraints | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | [] |
nginx.priorityClassName | Priority Class Name | "" |
nginx.schedulerName | Use an alternate scheduler, e.g. "stork". | "" |
nginx.sidecars | Add additional sidecar containers to the NGINX pods | [] |
nginx.initContainers | Add additional init containers to the NGINX pods | [] |
nginx.extraVolumeMounts | Optionally specify extra list of additional volumeMounts for the NGINX pods | [] |
nginx.extraVolumes | Optionally specify extra list of additional volumes for the NGINX pods | [] |
Harbor Portal Parameters¶
Name | Description | Value |
---|---|---|
portal.image.registry | Harbor Portal image registry | docker.io |
portal.image.repository | Harbor Portal image repository | bitnami/harbor-portal |
portal.image.tag | Harbor Portal image tag (immutable tags are recommended) | 2.8.2-debian-11-r5 |
portal.image.digest | Harbor Portal image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | "" |
portal.image.pullPolicy | Harbor Portal image pull policy | IfNotPresent |
portal.image.pullSecrets | Harbor Portal image pull secrets | [] |
portal.image.debug | Enable Harbor Portal image debug mode | false |
portal.tls.existingSecret | Name of an existing secret with the certificates for internal TLS access | "" |
portal.command | Override default container command (useful when using custom images) | [] |
portal.args | Override default container args (useful when using custom images) | [] |
portal.extraEnvVars | Array with extra environment variables to add Harbor Portal pods | [] |
portal.extraEnvVarsCM | ConfigMap containing extra environment variables for Harbor Portal pods | "" |
portal.extraEnvVarsSecret | Secret containing extra environment variables (in case of sensitive data) for Harbor Portal pods | "" |
portal.containerPorts.http | Harbor Portal HTTP container port | 8080 |
portal.containerPorts.https | Harbor Portal HTTPS container port | 8443 |
portal.replicaCount | Number of Harbor Portal replicas | 1 |
portal.livenessProbe.enabled | Enable livenessProbe on Harbor Portal containers | true |
portal.livenessProbe.initialDelaySeconds | Initial delay seconds for livenessProbe | 20 |
portal.livenessProbe.periodSeconds | Period seconds for livenessProbe | 10 |
portal.livenessProbe.timeoutSeconds | Timeout seconds for livenessProbe | 5 |
portal.livenessProbe.failureThreshold | Failure threshold for livenessProbe | 6 |
portal.livenessProbe.successThreshold | Success threshold for livenessProbe | 1 |
portal.readinessProbe.enabled | Enable readinessProbe on Harbor Portal containers | true |
portal.readinessProbe.initialDelaySeconds | Initial delay seconds for readinessProbe | 20 |
portal.readinessProbe.periodSeconds | Period seconds for readinessProbe | 10 |
portal.readinessProbe.timeoutSeconds | Timeout seconds for readinessProbe | 5 |
portal.readinessProbe.failureThreshold | Failure threshold for readinessProbe | 6 |
portal.readinessProbe.successThreshold | Success threshold for readinessProbe | 1 |
portal.startupProbe.enabled | Enable startupProbe on Harbor Portal containers | false |
portal.startupProbe.initialDelaySeconds | Initial delay seconds for startupProbe | 5 |
portal.startupProbe.periodSeconds | Period seconds for startupProbe | 10 |
portal.startupProbe.timeoutSeconds | Timeout seconds for startupProbe | 1 |
portal.startupProbe.failureThreshold | Failure threshold for startupProbe | 15 |
portal.startupProbe.successThreshold | Success threshold for startupProbe | 1 |
portal.customLivenessProbe | Custom livenessProbe that overrides the default one | {} |
portal.customReadinessProbe | Custom readinessProbe that overrides the default one | {} |
portal.customStartupProbe | Custom startupProbe that overrides the default one | {} |
portal.resources.limits | The resources limits for the Harbor Portal containers | {} |
portal.resources.requests | The requested resources for the Harbor Portal containers | {} |
portal.podSecurityContext.enabled | Enabled Harbor Portal pods' Security Context | true |
portal.podSecurityContext.fsGroup | Set Harbor Portal pod's Security Context fsGroup | 1001 |
portal.containerSecurityContext.enabled | Enabled Harbor Portal containers' Security Context | true |
portal.containerSecurityContext.runAsUser | Set Harbor Portal containers' Security Context runAsUser | 1001 |
portal.containerSecurityContext.runAsNonRoot | Set Harbor Portal containers' Security Context runAsNonRoot | true |
portal.updateStrategy.type | Harbor Portal deployment strategy type - only really applicable for deployments with RWO PVs attached | RollingUpdate |
portal.lifecycleHooks | LifecycleHook for the Harbor Portal container(s) to automate configuration before or after startup | {} |
portal.hostAliases | Harbor Portal pods host aliases | [] |
portal.podLabels | Add additional labels to the Harbor Portal pods (evaluated as a template) | {} |
portal.podAnnotations | Annotations to add to the Harbor Portal pods (evaluated as a template) | {} |
portal.podAffinityPreset | Harbor Portal Pod affinity preset. Ignored if portal.affinity is set. Allowed values: soft or hard | "" |
portal.podAntiAffinityPreset | Harbor Portal Pod anti-affinity preset. Ignored if portal.affinity is set. Allowed values: soft or hard | soft |
portal.nodeAffinityPreset.type | Harbor Portal Node affinity preset type. Ignored if portal.affinity is set. Allowed values: soft or hard | "" |
portal.nodeAffinityPreset.key | Harbor Portal Node label key to match Ignored if portal.affinity is set. | "" |
portal.nodeAffinityPreset.values | Harbor Portal Node label values to match. Ignored if portal.affinity is set. | [] |
portal.affinity | Harbor Portal Affinity for pod assignment | {} |
portal.nodeSelector | Harbor Portal Node labels for pod assignment | {} |
portal.tolerations | Harbor Portal Tolerations for pod assignment | [] |
portal.topologySpreadConstraints | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | [] |
portal.priorityClassName | Priority Class Name | "" |
portal.schedulerName | Use an alternate scheduler, e.g. "stork". | "" |
portal.sidecars | Add additional sidecar containers to the Harbor Portal pods | [] |
portal.initContainers | Add additional init containers to the Harbor Portal pods | [] |
portal.extraVolumeMounts | Optionally specify extra list of additional volumeMounts for the Harbor Portal pods | [] |
portal.extraVolumes | Optionally specify extra list of additional volumes for the Harbor Portal pods | [] |
portal.automountServiceAccountToken | Automount service account token | false |
portal.service.ports.http | Harbor Portal HTTP service port | 80 |
portal.service.ports.https | Harbor Portal HTTPS service port | 443 |
Harbor Core Parameters¶
Name | Description | Value |
---|---|---|
core.image.registry | Harbor Core image registry | docker.io |
core.image.repository | Harbor Core image repository | bitnami/harbor-core |
core.image.tag | Harbor Core image tag (immutable tags are recommended) | 2.8.2-debian-11-r6 |
core.image.digest | Harbor Core image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | "" |
core.image.pullPolicy | Harbor Core image pull policy | IfNotPresent |
core.image.pullSecrets | Harbor Core image pull secrets | [] |
core.image.debug | Enable Harbor Core image debug mode | false |
core.sessionLifetime | Explicitly set a session timeout (in seconds) overriding the backend default. | "" |
core.uaaSecret | If using external UAA auth which has a self signed cert, you can provide a pre-created secret containing it under the key ca.crt . | "" |
core.secretKey | The key used for encryption. Must be a string of 16 chars | "" |
core.secret | Secret used when the core server communicates with other components. If a secret key is not specified, Helm will generate one. Must be a string of 16 chars. | "" |
core.tokenKey | Key of the certificate used for token encryption/decryption. | "" |
core.tokenCert | Certificate used for token encryption/decryption. | "" |
core.secretName | Fill the name of a kubernetes secret if you want to use your own TLS certificate and private key for token encryption/decryption. The secret must contain two keys named: tls.crt - the certificate and tls.key - the private key. The default key pair will be used if it isn't set | "" |
core.existingSecret | Existing secret for core | "" |
core.existingEnvVarsSecret | Existing secret for core envvars | "" |
core.csrfKey | The CSRF key. Will be generated automatically if it isn't specified | "" |
core.tls.existingSecret | Name of an existing secret with the certificates for internal TLS access | "" |
core.command | Override default container command (useful when using custom images) | [] |
core.args | Override default container args (useful when using custom images) | [] |
core.extraEnvVars | Array with extra environment variables to add Harbor Core pods | [] |
core.extraEnvVarsCM | ConfigMap containing extra environment variables for Harbor Core pods | "" |
core.extraEnvVarsSecret | Secret containing extra environment variables (in case of sensitive data) for Harbor Core pods | "" |
core.configOverwriteJson | String containing a JSON with configuration overrides | "" |
core.configOverwriteJsonSecret | Secret containing the JSON configuration overrides | "" |
core.containerPorts.http | Harbor Core HTTP container port | 8080 |
core.containerPorts.https | Harbor Core HTTPS container port | 8443 |
core.containerPorts.metrics | Harbor Core metrics container port | 8001 |
core.replicaCount | Number of Harbor Core replicas | 1 |
core.livenessProbe.enabled | Enable livenessProbe on Harbor Core containers | true |
core.livenessProbe.initialDelaySeconds | Initial delay seconds for livenessProbe | 20 |
core.livenessProbe.periodSeconds | Period seconds for livenessProbe | 10 |
core.livenessProbe.timeoutSeconds | Timeout seconds for livenessProbe | 5 |
core.livenessProbe.failureThreshold | Failure threshold for livenessProbe | 6 |
core.livenessProbe.successThreshold | Success threshold for livenessProbe | 1 |
core.readinessProbe.enabled | Enable readinessProbe on Harbor Core containers | true |
core.readinessProbe.initialDelaySeconds | Initial delay seconds for readinessProbe | 20 |
core.readinessProbe.periodSeconds | Period seconds for readinessProbe | 10 |
core.readinessProbe.timeoutSeconds | Timeout seconds for readinessProbe | 5 |
core.readinessProbe.failureThreshold | Failure threshold for readinessProbe | 6 |
core.readinessProbe.successThreshold | Success threshold for readinessProbe | 1 |
core.startupProbe.enabled | Enable startupProbe on Harbor Core containers | false |
core.startupProbe.initialDelaySeconds | Initial delay seconds for startupProbe | 5 |
core.startupProbe.periodSeconds | Period seconds for startupProbe | 10 |
core.startupProbe.timeoutSeconds | Timeout seconds for startupProbe | 1 |
core.startupProbe.failureThreshold | Failure threshold for startupProbe | 15 |
core.startupProbe.successThreshold | Success threshold for startupProbe | 1 |
core.customLivenessProbe | Custom livenessProbe that overrides the default one | {} |
core.customReadinessProbe | Custom readinessProbe that overrides the default one | {} |
core.customStartupProbe | Custom startupProbe that overrides the default one | {} |
core.resources.limits | The resources limits for the Harbor Core containers | {} |
core.resources.requests | The requested resources for the Harbor Core containers | {} |
core.podSecurityContext.enabled | Enabled Harbor Core pods' Security Context | true |
core.podSecurityContext.fsGroup | Set Harbor Core pod's Security Context fsGroup | 1001 |
core.containerSecurityContext.enabled | Enabled Harbor Core containers' Security Context | true |
core.containerSecurityContext.runAsUser | Set Harbor Core containers' Security Context runAsUser | 1001 |
core.containerSecurityContext.runAsNonRoot | Set Harbor Core containers' Security Context runAsNonRoot | true |
core.updateStrategy.type | Harbor Core deployment strategy type - only really applicable for deployments with RWO PVs attached | RollingUpdate |
core.lifecycleHooks | LifecycleHook for the Harbor Core container(s) to automate configuration before or after startup | {} |
core.hostAliases | Harbor Core pods host aliases | [] |
core.podLabels | Add additional labels to the Harbor Core pods (evaluated as a template) | {} |
core.podAnnotations | Annotations to add to the Harbor Core pods (evaluated as a template) | {} |
core.podAffinityPreset | Harbor Core Pod affinity preset. Ignored if core.affinity is set. Allowed values: soft or hard | "" |
core.podAntiAffinityPreset | Harbor Core Pod anti-affinity preset. Ignored if core.affinity is set. Allowed values: soft or hard | soft |
core.nodeAffinityPreset.type | Harbor Core Node affinity preset type. Ignored if core.affinity is set. Allowed values: soft or hard | "" |
core.nodeAffinityPreset.key | Harbor Core Node label key to match Ignored if core.affinity is set. | "" |
core.nodeAffinityPreset.values | Harbor Core Node label values to match. Ignored if core.affinity is set. | [] |
core.affinity | Harbor Core Affinity for pod assignment | {} |
core.nodeSelector | Harbor Core Node labels for pod assignment | {} |
core.tolerations | Harbor Core Tolerations for pod assignment | [] |
core.topologySpreadConstraints | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | [] |
core.priorityClassName | Priority Class Name | "" |
core.schedulerName | Use an alternate scheduler, e.g. "stork". | "" |
core.sidecars | Add additional sidecar containers to the Harbor Core pods | [] |
core.initContainers | Add additional init containers to the Harbor Core pods | [] |
core.extraVolumeMounts | Optionally specify extra list of additional volumeMounts for the Harbor Core pods | [] |
core.extraVolumes | Optionally specify extra list of additional volumes for the Harbor Core pods | [] |
core.automountServiceAccountToken | Automount service account token | false |
core.service.ports.http | Harbor Core HTTP service port | 80 |
core.service.ports.https | Harbor Core HTTPS service port | 443 |
core.service.ports.metrics | Harbor Core metrics service port | 8001 |
Harbor Jobservice Parameters¶
Name | Description | Value |
---|---|---|
jobservice.image.registry | Harbor Jobservice image registry | docker.io |
jobservice.image.repository | Harbor Jobservice image repository | bitnami/harbor-jobservice |
jobservice.image.tag | Harbor Jobservice image tag (immutable tags are recommended) | 2.8.2-debian-11-r5 |
jobservice.image.digest | Harbor Jobservice image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | "" |
jobservice.image.pullPolicy | Harbor Jobservice image pull policy | IfNotPresent |
jobservice.image.pullSecrets | Harbor Jobservice image pull secrets | [] |
jobservice.image.debug | Enable Harbor Jobservice image debug mode | false |
jobservice.maxJobWorkers | The max job workers | 10 |
jobservice.redisNamespace | Redis namespace for jobservice | harbor_job_service_namespace |
jobservice.jobLogger | The logger for jobs: file , database or stdout | file |
jobservice.secret | Secret used when the job service communicates with other components. If a secret key is not specified, Helm will generate one. Must be a string of 16 chars. | "" |
jobservice.existingSecret | Existing secret for jobservice | "" |
jobservice.tls.existingSecret | Name of an existing secret with the certificates for internal TLS access | "" |
jobservice.command | Override default container command (useful when using custom images) | [] |
jobservice.args | Override default container args (useful when using custom images) | [] |
jobservice.extraEnvVars | Array with extra environment variables to add Harbor Jobservice pods | [] |
jobservice.extraEnvVarsCM | ConfigMap containing extra environment variables for Harbor Jobservice pods | "" |
jobservice.extraEnvVarsSecret | Secret containing extra environment variables (in case of sensitive data) for Harbor Jobservice pods | "" |
jobservice.containerPorts.http | Harbor Jobservice HTTP container port | 8080 |
jobservice.containerPorts.https | Harbor Jobservice HTTPS container port | 8443 |
jobservice.containerPorts.metrics | Harbor Jobservice metrics container port | 8001 |
jobservice.replicaCount | Number of Harbor Jobservice replicas | 1 |
jobservice.livenessProbe.enabled | Enable livenessProbe on Harbor Jobservice containers | true |
jobservice.livenessProbe.initialDelaySeconds | Initial delay seconds for livenessProbe | 20 |
jobservice.livenessProbe.periodSeconds | Period seconds for livenessProbe | 10 |
jobservice.livenessProbe.timeoutSeconds | Timeout seconds for livenessProbe | 5 |
jobservice.livenessProbe.failureThreshold | Failure threshold for livenessProbe | 6 |
jobservice.livenessProbe.successThreshold | Success threshold for livenessProbe | 1 |
jobservice.readinessProbe.enabled | Enable readinessProbe on Harbor Jobservice containers | true |
jobservice.readinessProbe.initialDelaySeconds | Initial delay seconds for readinessProbe | 20 |
jobservice.readinessProbe.periodSeconds | Period seconds for readinessProbe | 10 |
jobservice.readinessProbe.timeoutSeconds | Timeout seconds for readinessProbe | 5 |
jobservice.readinessProbe.failureThreshold | Failure threshold for readinessProbe | 6 |
jobservice.readinessProbe.successThreshold | Success threshold for readinessProbe | 1 |
jobservice.startupProbe.enabled | Enable startupProbe on Harbor Jobservice containers | false |
jobservice.startupProbe.initialDelaySeconds | Initial delay seconds for startupProbe | 5 |
jobservice.startupProbe.periodSeconds | Period seconds for startupProbe | 10 |
jobservice.startupProbe.timeoutSeconds | Timeout seconds for startupProbe | 1 |
jobservice.startupProbe.failureThreshold | Failure threshold for startupProbe | 15 |
jobservice.startupProbe.successThreshold | Success threshold for startupProbe | 1 |
jobservice.customLivenessProbe | Custom livenessProbe that overrides the default one | {} |
jobservice.customReadinessProbe | Custom readinessProbe that overrides the default one | {} |
jobservice.customStartupProbe | Custom startupProbe that overrides the default one | {} |
jobservice.resources.limits | The resources limits for the Harbor Jobservice containers | {} |
jobservice.resources.requests | The requested resources for the Harbor Jobservice containers | {} |
jobservice.podSecurityContext.enabled | Enabled Harbor Jobservice pods' Security Context | true |
jobservice.podSecurityContext.fsGroup | Set Harbor Jobservice pod's Security Context fsGroup | 1001 |
jobservice.containerSecurityContext.enabled | Enabled Harbor Jobservice containers' Security Context | true |
jobservice.containerSecurityContext.runAsUser | Set Harbor Jobservice containers' Security Context runAsUser | 1001 |
jobservice.containerSecurityContext.runAsNonRoot | Set Harbor Jobservice containers' Security Context runAsNonRoot | true |
jobservice.updateStrategy.type | Harbor Jobservice deployment strategy type - only really applicable for deployments with RWO PVs attached | RollingUpdate |
jobservice.lifecycleHooks | LifecycleHook for the Harbor Jobservice container(s) to automate configuration before or after startup | {} |
jobservice.hostAliases | Harbor Jobservice pods host aliases | [] |
jobservice.podLabels | Add additional labels to the Harbor Jobservice pods (evaluated as a template) | {} |
jobservice.podAnnotations | Annotations to add to the Harbor Jobservice pods (evaluated as a template) | {} |
jobservice.podAffinityPreset | Harbor Jobservice Pod affinity preset. Ignored if jobservice.affinity is set. Allowed values: soft or hard | "" |
jobservice.podAntiAffinityPreset | Harbor Jobservice Pod anti-affinity preset. Ignored if jobservice.affinity is set. Allowed values: soft or hard | soft |
jobservice.nodeAffinityPreset.type | Harbor Jobservice Node affinity preset type. Ignored if jobservice.affinity is set. Allowed values: soft or hard | "" |
jobservice.nodeAffinityPreset.key | Harbor Jobservice Node label key to match Ignored if jobservice.affinity is set. | "" |
jobservice.nodeAffinityPreset.values | Harbor Jobservice Node label values to match. Ignored if jobservice.affinity is set. | [] |
jobservice.affinity | Harbor Jobservice Affinity for pod assignment | {} |
jobservice.nodeSelector | Harbor Jobservice Node labels for pod assignment | {} |
jobservice.tolerations | Harbor Jobservice Tolerations for pod assignment | [] |
jobservice.topologySpreadConstraints | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | [] |
jobservice.priorityClassName | Priority Class Name | "" |
jobservice.schedulerName | Use an alternate scheduler, e.g. "stork". | "" |
jobservice.sidecars | Add additional sidecar containers to the Harbor Jobservice pods | [] |
jobservice.initContainers | Add additional init containers to the Harbor Jobservice pods | [] |
jobservice.extraVolumeMounts | Optionally specify extra list of additional volumeMounts for the Harbor Jobservice pods | [] |
jobservice.extraVolumes | Optionally specify extra list of additional volumes for the Harbor Jobservice pods | [] |
jobservice.automountServiceAccountToken | Automount service account token | false |
jobservice.service.ports.http | Harbor Jobservice HTTP service port | 80 |
jobservice.service.ports.https | Harbor Jobservice HTTPS service port | 443 |
jobservice.service.ports.metrics | Harbor Jobservice HTTPS service port | 8001 |
Harbor Registry Parameters¶
Name | Description | Value |
---|---|---|
registry.secret | Secret is used to secure the upload state from client and registry storage backend. See: https://github.com/docker/distribution/blob/master/docs/configuration.md | "" |
registry.existingSecret | Existing secret for registry | "" |
registry.relativeurls | Make the registry return relative URLs in Location headers. The client is responsible for resolving the correct URL. | false |
registry.credentials.username | The username for accessing the registry instance, which is hosted by htpasswd auth mode. More details see official docs | harbor_registry_user |
registry.credentials.password | The password for accessing the registry instance, which is hosted by htpasswd auth mode. More details see official docs. It is suggested you update this value before installation. | harbor_registry_password |
registry.credentials.htpasswd | The content of htpasswd file based on the value of registry.credentials.username registry.credentials.password . Currently helm does not support bcrypt in the template script, if the credential is updated you need to manually generated by calling | harbor_registry_user:$2y$10$9L4Tc0DJbFFMB6RdSCunrOpTHdwhid4ktBJmLD00bYgqkkGOvll3m |
registry.middleware.enabled | Middleware is used to add support for a CDN between backend storage and docker pull recipient. See | false |
registry.middleware.type | CDN type for the middleware | cloudFront |
registry.middleware.cloudFront.baseurl | CloudFront CDN settings: Base URL | example.cloudfront.net |
registry.middleware.cloudFront.keypairid | CloudFront CDN settings: Keypair ID | KEYPAIRID |
registry.middleware.cloudFront.duration | CloudFront CDN settings: Duration | 3000s |
registry.middleware.cloudFront.ipfilteredby | CloudFront CDN settings: IP filters | none |
registry.middleware.cloudFront.privateKeySecret | CloudFront CDN settings: Secret name with the private key | my-secret |
registry.tls.existingSecret | Name of an existing secret with the certificates for internal TLS access | "" |
registry.replicaCount | Number of Harbor Registry replicas | 1 |
registry.podSecurityContext.enabled | Enabled Harbor Registry pods' Security Context | true |
registry.podSecurityContext.fsGroup | Set Harbor Registry pod's Security Context fsGroup | 1001 |
registry.updateStrategy.type | Harbor Registry deployment strategy type - only really applicable for deployments with RWO PVs attached | RollingUpdate |
registry.hostAliases | Harbor Registry pods host aliases | [] |
registry.podLabels | Add additional labels to the Harbor Registry pods (evaluated as a template) | {} |
registry.podAnnotations | Annotations to add to the Harbor Registry pods (evaluated as a template) | {} |
registry.podAffinityPreset | Harbor Registry Pod affinity preset. Ignored if registry.affinity is set. Allowed values: soft or hard | "" |
registry.podAntiAffinityPreset | Harbor Registry Pod anti-affinity preset. Ignored if registry.affinity is set. Allowed values: soft or hard | soft |
registry.nodeAffinityPreset.type | Harbor Registry Node affinity preset type. Ignored if registry.affinity is set. Allowed values: soft or hard | "" |
registry.nodeAffinityPreset.key | Harbor Registry Node label key to match Ignored if registry.affinity is set. | "" |
registry.nodeAffinityPreset.values | Harbor Registry Node label values to match. Ignored if registry.affinity is set. | [] |
registry.affinity | Harbor Registry Affinity for pod assignment | {} |
registry.nodeSelector | Harbor Registry Node labels for pod assignment | {} |
registry.tolerations | Harbor Registry Tolerations for pod assignment | [] |
registry.topologySpreadConstraints | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | [] |
registry.priorityClassName | Priority Class Name | "" |
registry.schedulerName | Use an alternate scheduler, e.g. "stork". | "" |
registry.sidecars | Add additional sidecar containers to the Harbor Registry pods | [] |
registry.initContainers | Add additional init containers to the Harbor Registry pods | [] |
registry.extraVolumes | Optionally specify extra list of additional volumes for the Harbor Registry pods | [] |
registry.automountServiceAccountToken | Automount service account token | false |
registry.server.image.registry | Harbor Registry image registry | docker.io |
registry.server.image.repository | Harbor Registry image repository | bitnami/harbor-registry |
registry.server.image.tag | Harbor Registry image tag (immutable tags are recommended) | 2.8.2-debian-11-r5 |
registry.server.image.digest | Harbor Registry image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | "" |
registry.server.image.pullPolicy | Harbor Registry image pull policy | IfNotPresent |
registry.server.image.pullSecrets | Harbor Registry image pull secrets | [] |
registry.server.image.debug | Enable Harbor Registry image debug mode | false |
registry.server.command | Override default container command (useful when using custom images) | [] |
registry.server.args | Override default container args (useful when using custom images) | [] |
registry.server.extraEnvVars | Array with extra environment variables to add Harbor Registry main containers | [] |
registry.server.extraEnvVarsCM | ConfigMap containing extra environment variables for Harbor Registry main containers | "" |
registry.server.extraEnvVarsSecret | Secret containing extra environment variables (in case of sensitive data) for Harbor Registry main containers | "" |
registry.server.containerPorts.http | Harbor Registry HTTP container port | 5000 |
registry.server.containerPorts.https | Harbor Registry HTTPS container port | 5443 |
registry.server.containerPorts.debug | Harbor Registry debug container port | 5001 |
registry.server.containerPorts.metrics | Harbor Registry metrics container port | 8001 |
registry.server.livenessProbe.enabled | Enable livenessProbe on Harbor Registry main containers | true |
registry.server.livenessProbe.initialDelaySeconds | Initial delay seconds for livenessProbe | 20 |
registry.server.livenessProbe.periodSeconds | Period seconds for livenessProbe | 10 |
registry.server.livenessProbe.timeoutSeconds | Timeout seconds for livenessProbe | 5 |
registry.server.livenessProbe.failureThreshold | Failure threshold for livenessProbe | 6 |
registry.server.livenessProbe.successThreshold | Success threshold for livenessProbe | 1 |
registry.server.readinessProbe.enabled | Enable readinessProbe on Harbor Registry main containers | true |
registry.server.readinessProbe.initialDelaySeconds | Initial delay seconds for readinessProbe | 20 |
registry.server.readinessProbe.periodSeconds | Period seconds for readinessProbe | 10 |
registry.server.readinessProbe.timeoutSeconds | Timeout seconds for readinessProbe | 5 |
registry.server.readinessProbe.failureThreshold | Failure threshold for readinessProbe | 6 |
registry.server.readinessProbe.successThreshold | Success threshold for readinessProbe | 1 |
registry.server.startupProbe.enabled | Enable startupProbe on Harbor Registry main containers | false |
registry.server.startupProbe.initialDelaySeconds | Initial delay seconds for startupProbe | 5 |
registry.server.startupProbe.periodSeconds | Period seconds for startupProbe | 10 |
registry.server.startupProbe.timeoutSeconds | Timeout seconds for startupProbe | 1 |
registry.server.startupProbe.failureThreshold | Failure threshold for startupProbe | 15 |
registry.server.startupProbe.successThreshold | Success threshold for startupProbe | 1 |
registry.server.customLivenessProbe | Custom livenessProbe that overrides the default one | {} |
registry.server.customReadinessProbe | Custom readinessProbe that overrides the default one | {} |
registry.server.customStartupProbe | Custom startupProbe that overrides the default one | {} |
registry.server.resources.limits | The resources limits for the Harbor Registry main containers | {} |
registry.server.resources.requests | The requested resources for the Harbor Registry main containers | {} |
registry.server.containerSecurityContext.enabled | Enabled Harbor Registry main containers' Security Context | true |
registry.server.containerSecurityContext.runAsUser | Set Harbor Registry main containers' Security Context runAsUser | 1001 |
registry.server.containerSecurityContext.runAsNonRoot | Set Harbor Registry main containers' Security Context runAsNonRoot | true |
registry.server.lifecycleHooks | LifecycleHook for the Harbor Registry main container(s) to automate configuration before or after startup | {} |
registry.server.extraVolumeMounts | Optionally specify extra list of additional volumeMounts for the Harbor Registry main pods | [] |
registry.server.service.ports.http | Harbor Registry HTTP service port | 5000 |
registry.server.service.ports.https | Harbor Registry HTTPS service port | 5443 |
registry.server.service.ports.metrics | Harbor Registry metrics service port | 8001 |
registry.controller.image.registry | Harbor Registryctl image registry | docker.io |
registry.controller.image.repository | Harbor Registryctl image repository | bitnami/harbor-registryctl |
registry.controller.image.tag | Harbor Registryctl image tag (immutable tags are recommended) | 2.8.2-debian-11-r5 |
registry.controller.image.digest | Harbor Registryctl image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | "" |
registry.controller.image.pullPolicy | Harbor Registryctl image pull policy | IfNotPresent |
registry.controller.image.pullSecrets | Harbor Registryctl image pull secrets | [] |
registry.controller.image.debug | Enable Harbor Registryctl image debug mode | false |
registry.controller.command | Override default container command (useful when using custom images) | [] |
registry.controller.args | Override default container args (useful when using custom images) | [] |
registry.controller.extraEnvVars | Array with extra environment variables to add Harbor Registryctl containers | [] |
registry.controller.extraEnvVarsCM | ConfigMap containing extra environment variables for Harbor Registryctl containers | "" |
registry.controller.extraEnvVarsSecret | Secret containing extra environment variables (in case of sensitive data) for Harbor Registryctl containers | "" |
registry.controller.containerPorts.http | Harbor Registryctl HTTP container port | 8080 |
registry.controller.containerPorts.https | Harbor Registryctl HTTPS container port | 8443 |
registry.controller.livenessProbe.enabled | Enable livenessProbe on Harbor Registryctl containers | true |
registry.controller.livenessProbe.initialDelaySeconds | Initial delay seconds for livenessProbe | 20 |
registry.controller.livenessProbe.periodSeconds | Period seconds for livenessProbe | 10 |
registry.controller.livenessProbe.timeoutSeconds | Timeout seconds for livenessProbe | 5 |
registry.controller.livenessProbe.failureThreshold | Failure threshold for livenessProbe | 6 |
registry.controller.livenessProbe.successThreshold | Success threshold for livenessProbe | 1 |
registry.controller.readinessProbe.enabled | Enable readinessProbe on Harbor Registryctl containers | true |
registry.controller.readinessProbe.initialDelaySeconds | Initial delay seconds for readinessProbe | 20 |
registry.controller.readinessProbe.periodSeconds | Period seconds for readinessProbe | 10 |
registry.controller.readinessProbe.timeoutSeconds | Timeout seconds for readinessProbe | 5 |
registry.controller.readinessProbe.failureThreshold | Failure threshold for readinessProbe | 6 |
registry.controller.readinessProbe.successThreshold | Success threshold for readinessProbe | 1 |
registry.controller.startupProbe.enabled | Enable startupProbe on Harbor Registryctl containers | false |
registry.controller.startupProbe.initialDelaySeconds | Initial delay seconds for startupProbe | 5 |
registry.controller.startupProbe.periodSeconds | Period seconds for startupProbe | 10 |
registry.controller.startupProbe.timeoutSeconds | Timeout seconds for startupProbe | 1 |
registry.controller.startupProbe.failureThreshold | Failure threshold for startupProbe | 15 |
registry.controller.startupProbe.successThreshold | Success threshold for startupProbe | 1 |
registry.controller.customLivenessProbe | Custom livenessProbe that overrides the default one | {} |
registry.controller.customReadinessProbe | Custom readinessProbe that overrides the default one | {} |
registry.controller.customStartupProbe | Custom startupProbe that overrides the default one | {} |
registry.controller.resources.limits | The resources limits for the Harbor Registryctl containers | {} |
registry.controller.resources.requests | The requested resources for the Harbor Registryctl containers | {} |
registry.controller.containerSecurityContext.enabled | Enabled Harbor Registryctl containers' Security Context | true |
registry.controller.containerSecurityContext.runAsUser | Set Harbor Registryctl containers' Security Context runAsUser | 1001 |
registry.controller.containerSecurityContext.runAsNonRoot | Set Harbor Registryctl containers' Security Context runAsNonRoot | true |
registry.controller.lifecycleHooks | LifecycleHook for the Harbor Registryctl container(s) to automate configuration before or after startup | {} |
registry.controller.extraVolumeMounts | Optionally specify extra list of additional volumeMounts for the Harbor Registryctl pods | [] |
registry.controller.service.ports.http | Harbor Registryctl HTTP service port | 8080 |
registry.controller.service.ports.https | Harbor Registryctl HTTPS service port | 8443 |
notary.enabled | Enable Notary | true |
notary.secretName | Fill the name of a kubernetes secret if you want to use your own TLS certificate authority, certificate and private key for notary communications. The secret must contain keys named notary-signer-ca.crt , notary-signer.key and notary-signer.crt that contain the CA, certificate and private key. They will be generated if not set. | "" |
notary.server.image.registry | Harbor Notary Server image registry | docker.io |
notary.server.image.repository | Harbor Notary Server image repository | bitnami/harbor-notary-server |
notary.server.image.tag | Harbor Notary Server image tag (immutable tags are recommended) | 2.8.2-debian-11-r6 |
notary.server.image.digest | Notary Server image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | "" |
notary.server.image.pullPolicy | Harbor Notary Server image pull policy | IfNotPresent |
notary.server.image.pullSecrets | Harbor Notary Server image pull secrets | [] |
notary.server.image.debug | Enable Harbor Notary Server image debug mode | false |
notary.server.command | Override default container command (useful when using custom images) | [] |
notary.server.args | Override default container args (useful when using custom images) | [] |
notary.server.extraEnvVars | Array with extra environment variables to add Harbor Notary Server pods | [] |
notary.server.extraEnvVarsCM | ConfigMap containing extra environment variables for Harbor Notary Server pods | "" |
notary.server.extraEnvVarsSecret | Secret containing extra environment variables (in case of sensitive data) for Harbor Notary Server pods | "" |
notary.server.containerPorts.server | Harbor Notary Server container port | 4443 |
notary.server.replicaCount | Number of Harbor Notary Server replicas | 1 |
notary.server.livenessProbe.enabled | Enable livenessProbe on Harbor Notary Server containers | true |
notary.server.livenessProbe.initialDelaySeconds | Initial delay seconds for livenessProbe | 20 |
notary.server.livenessProbe.periodSeconds | Period seconds for livenessProbe | 10 |
notary.server.livenessProbe.timeoutSeconds | Timeout seconds for livenessProbe | 5 |
notary.server.livenessProbe.failureThreshold | Failure threshold for livenessProbe | 6 |
notary.server.livenessProbe.successThreshold | Success threshold for livenessProbe | 1 |
notary.server.readinessProbe.enabled | Enable readinessProbe on Harbor Notary Server containers | true |
notary.server.readinessProbe.initialDelaySeconds | Initial delay seconds for readinessProbe | 20 |
notary.server.readinessProbe.periodSeconds | Period seconds for readinessProbe | 10 |
notary.server.readinessProbe.timeoutSeconds | Timeout seconds for readinessProbe | 5 |
notary.server.readinessProbe.failureThreshold | Failure threshold for readinessProbe | 6 |
notary.server.readinessProbe.successThreshold | Success threshold for readinessProbe | 1 |
notary.server.startupProbe.enabled | Enable startupProbe on Harbor Notary Server containers | false |
notary.server.startupProbe.initialDelaySeconds | Initial delay seconds for startupProbe | 5 |
notary.server.startupProbe.periodSeconds | Period seconds for startupProbe | 10 |
notary.server.startupProbe.timeoutSeconds | Timeout seconds for startupProbe | 1 |
notary.server.startupProbe.failureThreshold | Failure threshold for startupProbe | 15 |
notary.server.startupProbe.successThreshold | Success threshold for startupProbe | 1 |
notary.server.customLivenessProbe | Custom livenessProbe that overrides the default one | {} |
notary.server.customReadinessProbe | Custom readinessProbe that overrides the default one | {} |
notary.server.customStartupProbe | Custom startupProbe that overrides the default one | {} |
notary.server.resources.limits | The resources limits for the Harbor Notary Server containers | {} |
notary.server.resources.requests | The requested resources for the Harbor Notary Server containers | {} |
notary.server.podSecurityContext.enabled | Enabled Harbor Notary Server pods' Security Context | true |
notary.server.podSecurityContext.fsGroup | Set Harbor Notary Server pod's Security Context fsGroup | 1001 |
notary.server.containerSecurityContext.enabled | Enabled Harbor Notary Server containers' Security Context | true |
notary.server.containerSecurityContext.runAsUser | Set Harbor Notary Server containers' Security Context runAsUser | 1001 |
notary.server.containerSecurityContext.runAsNonRoot | Set Harbor Notary Server containers' Security Context runAsNonRoot | true |
notary.server.updateStrategy.type | Harbor Notary Server deployment strategy type - only really applicable for deployments with RWO PVs attached | RollingUpdate |
notary.server.lifecycleHooks | LifecycleHook for the Harbor Notary Server container(s) to automate configuration before or after startup | {} |
notary.server.hostAliases | Harbor Notary Server pods host aliases | [] |
notary.server.podLabels | Add additional labels to the Harbor Notary Server pods (evaluated as a template) | {} |
notary.server.podAnnotations | Annotations to add to the Harbor Notary Server pods (evaluated as a template) | {} |
notary.server.podAffinityPreset | Harbor Notary Server Pod affinity preset. Ignored if notary.server.affinity is set. Allowed values: soft or hard | "" |
notary.server.podAntiAffinityPreset | Harbor Notary Server Pod anti-affinity preset. Ignored if notary.server.affinity is set. Allowed values: soft or hard | soft |
notary.server.nodeAffinityPreset.type | Harbor Notary Server Node affinity preset type. Ignored if notary.server.affinity is set. Allowed values: soft or hard | "" |
notary.server.nodeAffinityPreset.key | Harbor Notary Server Node label key to match Ignored if notary.server.affinity is set. | "" |
notary.server.nodeAffinityPreset.values | Harbor Notary Server Node label values to match. Ignored if notary.server.affinity is set. | [] |
notary.server.affinity | Harbor Notary Server Affinity for pod assignment | {} |
notary.server.nodeSelector | Harbor Notary Server Node labels for pod assignment | {} |
notary.server.tolerations | Harbor Notary Server Tolerations for pod assignment | [] |
notary.server.topologySpreadConstraints | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | [] |
notary.server.priorityClassName | Priority Class Name | "" |
notary.server.schedulerName | Use an alternate scheduler, e.g. "stork". | "" |
notary.server.sidecars | Add additional sidecar containers to the Harbor Notary Server pods | [] |
notary.server.initContainers | Add additional init containers to the Harbor Notary Server pods | [] |
notary.server.extraVolumeMounts | Optionally specify extra list of additional volumeMounts for the Harbor Notary Server pods | [] |
notary.server.extraVolumes | Optionally specify extra list of additional volumes for the Harbor Notary Server pods | [] |
notary.server.automountServiceAccountToken | Automount service account token | false |
notary.signer.image.registry | Harbor Notary Signer image registry | docker.io |
notary.signer.image.repository | Harbor Notary Signer image repository | bitnami/harbor-notary-signer |
notary.signer.image.tag | Harbor Notary Signer image tag (immutable tags are recommended) | 2.8.2-debian-11-r6 |
notary.signer.image.digest | Harbor Notary Signer image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | "" |
notary.signer.image.pullPolicy | Harbor Notary Signer image pull policy | IfNotPresent |
notary.signer.image.pullSecrets | Harbor Notary Signer image pull secrets | [] |
notary.signer.image.debug | Enable Harbor Notary Signer image debug mode | false |
notary.signer.command | Override default container command (useful when using custom images) | [] |
notary.signer.args | Override default container args (useful when using custom images) | [] |
notary.signer.extraEnvVars | Array with extra environment variables to add Harbor Notary Signer pods | [] |
notary.signer.extraEnvVarsCM | ConfigMap containing extra environment variables for Harbor Notary Signer pods | "" |
notary.signer.extraEnvVarsSecret | Secret containing extra environment variables (in case of sensitive data) for Harbor Notary Signer pods | "" |
notary.signer.containerPorts.signer | Harbor Notary Signer container port | 7899 |
notary.signer.replicaCount | Number of Harbor Notary Signer replicas | 1 |
notary.signer.livenessProbe.enabled | Enable livenessProbe on Harbor Notary Signer containers | true |
notary.signer.livenessProbe.initialDelaySeconds | Initial delay seconds for livenessProbe | 20 |
notary.signer.livenessProbe.periodSeconds | Period seconds for livenessProbe | 10 |
notary.signer.livenessProbe.timeoutSeconds | Timeout seconds for livenessProbe | 5 |
notary.signer.livenessProbe.failureThreshold | Failure threshold for livenessProbe | 6 |
notary.signer.livenessProbe.successThreshold | Success threshold for livenessProbe | 1 |
notary.signer.readinessProbe.enabled | Enable readinessProbe on Harbor Notary Signer containers | true |
notary.signer.readinessProbe.initialDelaySeconds | Initial delay seconds for readinessProbe | 20 |
notary.signer.readinessProbe.periodSeconds | Period seconds for readinessProbe | 10 |
notary.signer.readinessProbe.timeoutSeconds | Timeout seconds for readinessProbe | 5 |
notary.signer.readinessProbe.failureThreshold | Failure threshold for readinessProbe | 6 |
notary.signer.readinessProbe.successThreshold | Success threshold for readinessProbe | 1 |
notary.signer.startupProbe.enabled | Enable startupProbe on Harbor Notary Signer containers | false |
notary.signer.startupProbe.initialDelaySeconds | Initial delay seconds for startupProbe | 5 |
notary.signer.startupProbe.periodSeconds | Period seconds for startupProbe | 10 |
notary.signer.startupProbe.timeoutSeconds | Timeout seconds for startupProbe | 1 |
notary.signer.startupProbe.failureThreshold | Failure threshold for startupProbe | 15 |
notary.signer.startupProbe.successThreshold | Success threshold for startupProbe | 1 |
notary.signer.customLivenessProbe | Custom livenessProbe that overrides the default one | {} |
notary.signer.customReadinessProbe | Custom readinessProbe that overrides the default one | {} |
notary.signer.customStartupProbe | Custom startupProbe that overrides the default one | {} |
notary.signer.resources.limits | The resources limits for the Harbor Notary Signer containers | {} |
notary.signer.resources.requests | The requested resources for the Harbor Notary Signer containers | {} |
notary.signer.podSecurityContext.enabled | Enabled Harbor Notary Signer pods' Security Context | true |
notary.signer.podSecurityContext.fsGroup | Set Harbor Notary Signer pod's Security Context fsGroup | 1001 |
notary.signer.containerSecurityContext.enabled | Enabled Harbor Notary Signer containers' Security Context | true |
notary.signer.containerSecurityContext.runAsUser | Set Harbor Notary Signer containers' Security Context runAsUser | 1001 |
notary.signer.containerSecurityContext.runAsNonRoot | Set Harbor Notary Signer containers' Security Context runAsNonRoot | true |
notary.signer.updateStrategy.type | Harbor Notary Signer deployment strategy type - only really applicable for deployments with RWO PVs attached | RollingUpdate |
notary.signer.lifecycleHooks | LifecycleHook for the Harbor Notary Signer container(s) to automate configuration before or after startup | {} |
notary.signer.hostAliases | Harbor Notary Signer pods host aliases | [] |
notary.signer.podLabels | Add additional labels to the Harbor Notary Signer pods (evaluated as a template) | {} |
notary.signer.podAnnotations | Annotations to add to the Harbor Notary Signer pods (evaluated as a template) | {} |
notary.signer.podAffinityPreset | Harbor Notary Signer Pod affinity preset. Ignored if notary.signer.affinity is set. Allowed values: soft or hard | "" |
notary.signer.podAntiAffinityPreset | Harbor Notary Signer Pod anti-affinity preset. Ignored if notary.signer.affinity is set. Allowed values: soft or hard | soft |
notary.signer.nodeAffinityPreset.type | Harbor Notary Signer Node affinity preset type. Ignored if notary.signer.affinity is set. Allowed values: soft or hard | "" |
notary.signer.nodeAffinityPreset.key | Harbor Notary Signer Node label key to match Ignored if notary.signer.affinity is set. | "" |
notary.signer.nodeAffinityPreset.values | Harbor Notary Signer Node label values to match. Ignored if notary.signer.affinity is set. | [] |
notary.signer.affinity | Harbor Notary Signer Affinity for pod assignment | {} |
notary.signer.nodeSelector | Harbor Notary Signer Node labels for pod assignment | {} |
notary.signer.tolerations | Harbor Notary Signer Tolerations for pod assignment | [] |
notary.signer.topologySpreadConstraints | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | [] |
notary.signer.priorityClassName | Priority Class Name | "" |
notary.signer.schedulerName | Use an alternate scheduler, e.g. "stork". | "" |
notary.signer.sidecars | Add additional sidecar containers to the Harbor Notary Signer pods | [] |
notary.signer.initContainers | Add additional init containers to the Harbor Notary Signer pods | [] |
notary.signer.extraVolumeMounts | Optionally specify extra list of additional volumeMounts for the Harbor Notary Signer pods | [] |
notary.signer.extraVolumes | Optionally specify extra list of additional volumes for the Harbor Notary Signer pods | [] |
notary.signer.automountServiceAccountToken | Automount service account token | false |
notary.service.ports.server | Harbor Notary server service port | 4443 |
notary.service.ports.signer | Harbor Notary signer service port | 7899 |
Harbor Adapter Trivy Parameters¶
Name | Description | Value |
---|---|---|
trivy.image.registry | Harbor Adapter Trivy image registry | docker.io |
trivy.image.repository | Harbor Adapter Trivy image repository | bitnami/harbor-adapter-trivy |
trivy.image.tag | Harbor Adapter Trivy image tag (immutable tags are recommended) | 2.8.2-debian-11-r2 |
trivy.image.digest | Harbor Adapter Trivy image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | "" |
trivy.image.pullPolicy | Harbor Adapter Trivy image pull policy | IfNotPresent |
trivy.image.pullSecrets | Harbor Adapter Trivy image pull secrets | [] |
trivy.image.debug | Enable Harbor Adapter Trivy image debug mode | false |
trivy.enabled | Enable Trivy | true |
trivy.debugMode | The flag to enable Trivy debug mode | false |
trivy.vulnType | Comma-separated list of vulnerability types. Possible values os and library . | os,library |
trivy.severity | Comma-separated list of severities to be checked | UNKNOWN,LOW,MEDIUM,HIGH,CRITICAL |
trivy.ignoreUnfixed | The flag to display only fixed vulnerabilities | false |
trivy.insecure | The flag to skip verifying registry certificate | false |
trivy.gitHubToken | The GitHub access token to download Trivy DB | "" |
trivy.skipUpdate | The flag to disable Trivy DB downloads from GitHub | false |
trivy.cacheDir | Directory to store the cache | /bitnami/harbor-adapter-trivy/.cache |
trivy.tls.existingSecret | Name of an existing secret with the certificates for internal TLS access | "" |
trivy.command | Override default container command (useful when using custom images) | [] |
trivy.args | Override default container args (useful when using custom images) | [] |
trivy.extraEnvVars | Array with extra environment variables to add Trivy pods | [] |
trivy.extraEnvVarsCM | ConfigMap containing extra environment variables for Trivy pods | "" |
trivy.extraEnvVarsSecret | Secret containing extra environment variables (in case of sensitive data) for Trivy pods | "" |
trivy.containerPorts.http | Trivy HTTP container port | 8080 |
trivy.containerPorts.https | Trivy HTTPS container port | 8443 |
trivy.replicaCount | Number of Trivy replicas | 1 |
trivy.livenessProbe.enabled | Enable livenessProbe on Trivy containers | true |
trivy.livenessProbe.initialDelaySeconds | Initial delay seconds for livenessProbe | 20 |
trivy.livenessProbe.periodSeconds | Period seconds for livenessProbe | 10 |
trivy.livenessProbe.timeoutSeconds | Timeout seconds for livenessProbe | 5 |
trivy.livenessProbe.failureThreshold | Failure threshold for livenessProbe | 6 |
trivy.livenessProbe.successThreshold | Success threshold for livenessProbe | 1 |
trivy.readinessProbe.enabled | Enable readinessProbe on Trivy containers | true |
trivy.readinessProbe.initialDelaySeconds | Initial delay seconds for readinessProbe | 20 |
trivy.readinessProbe.periodSeconds | Period seconds for readinessProbe | 10 |
trivy.readinessProbe.timeoutSeconds | Timeout seconds for readinessProbe | 5 |
trivy.readinessProbe.failureThreshold | Failure threshold for readinessProbe | 6 |
trivy.readinessProbe.successThreshold | Success threshold for readinessProbe | 1 |
trivy.startupProbe.enabled | Enable startupProbe on Trivy containers | false |
trivy.startupProbe.initialDelaySeconds | Initial delay seconds for startupProbe | 5 |
trivy.startupProbe.periodSeconds | Period seconds for startupProbe | 10 |
trivy.startupProbe.timeoutSeconds | Timeout seconds for startupProbe | 1 |
trivy.startupProbe.failureThreshold | Failure threshold for startupProbe | 15 |
trivy.startupProbe.successThreshold | Success threshold for startupProbe | 1 |
trivy.customLivenessProbe | Custom livenessProbe that overrides the default one | {} |
trivy.customReadinessProbe | Custom readinessProbe that overrides the default one | {} |
trivy.customStartupProbe | Custom startupProbe that overrides the default one | {} |
trivy.resources.limits | The resources limits for the Trivy containers | {} |
trivy.resources.requests | The requested resources for the Trivy containers | {} |
trivy.podSecurityContext.enabled | Enabled Trivy pods' Security Context | true |
trivy.podSecurityContext.fsGroup | Set Trivy pod's Security Context fsGroup | 1001 |
trivy.containerSecurityContext.enabled | Enabled Trivy containers' Security Context | true |
trivy.containerSecurityContext.runAsUser | Set Trivy containers' Security Context runAsUser | 1001 |
trivy.containerSecurityContext.runAsNonRoot | Set Trivy containers' Security Context runAsNonRoot | true |
trivy.updateStrategy.type | Trivy deployment strategy type - only really applicable for deployments with RWO PVs attached | RollingUpdate |
trivy.lifecycleHooks | LifecycleHook for the Trivy container(s) to automate configuration before or after startup | {} |
trivy.hostAliases | Trivy pods host aliases | [] |
trivy.podLabels | Add additional labels to the Trivy pods (evaluated as a template) | {} |
trivy.podAnnotations | Annotations to add to the Trivy pods (evaluated as a template) | {} |
trivy.podAffinityPreset | Trivy Pod affinity preset. Ignored if trivy.affinity is set. Allowed values: soft or hard | "" |
trivy.podAntiAffinityPreset | Trivy Pod anti-affinity preset. Ignored if trivy.affinity is set. Allowed values: soft or hard | soft |
trivy.nodeAffinityPreset.type | Trivy Node affinity preset type. Ignored if trivy.affinity is set. Allowed values: soft or hard | "" |
trivy.nodeAffinityPreset.key | Trivy Node label key to match Ignored if trivy.affinity is set. | "" |
trivy.nodeAffinityPreset.values | Trivy Node label values to match. Ignored if trivy.affinity is set. | [] |
trivy.affinity | Trivy Affinity for pod assignment | {} |
trivy.nodeSelector | Trivy Node labels for pod assignment | {} |
trivy.tolerations | Trivy Tolerations for pod assignment | [] |
trivy.topologySpreadConstraints | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | [] |
trivy.priorityClassName | Priority Class Name | "" |
trivy.schedulerName | Use an alternate scheduler, e.g. "stork". | "" |
trivy.sidecars | Add additional sidecar containers to the Trivy pods | [] |
trivy.initContainers | Add additional init containers to the Trivy pods | [] |
trivy.extraVolumeMounts | Optionally specify extra list of additional volumeMounts for the Trivy pods | [] |
trivy.extraVolumes | Optionally specify extra list of additional volumes for the Trivy pods | [] |
trivy.automountServiceAccountToken | Automount service account token | false |
trivy.service.ports.http | Trivy HTTP service port | 8080 |
trivy.service.ports.https | Trivy HTTPS service port | 8443 |
Harbor Exporter Parameters¶
Name | Description | Value |
---|---|---|
exporter.image.registry | Harbor Exporter image registry | docker.io |
exporter.image.repository | Harbor Exporter image repository | bitnami/harbor-exporter |
exporter.image.tag | Harbor Exporter image tag | 2.8.2-debian-11-r5 |
exporter.image.digest | Harbor Exporter image image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | "" |
exporter.image.pullPolicy | Harbor exporter image pull policy | IfNotPresent |
exporter.image.pullSecrets | Specify docker-registry secret names as an array | [] |
exporter.image.debug | Specify if debug logs should be enabled | false |
exporter.command | Override default container command (useful when using custom images) | [] |
exporter.args | Override default container args (useful when using custom images) | [] |
exporter.extraEnvVars | Array containing extra env vars | [] |
exporter.extraEnvVarsCM | ConfigMap containing extra env vars | "" |
exporter.extraEnvVarsSecret | Secret containing extra env vars (in case of sensitive data) | "" |
exporter.containerPorts.metrics | Harbor Exporter HTTP container port | 8001 |
exporter.replicaCount | The replica count | 1 |
exporter.livenessProbe.enabled | Enable livenessProbe | true |
exporter.livenessProbe.initialDelaySeconds | Initial delay seconds for livenessProbe | 20 |
exporter.livenessProbe.periodSeconds | Period seconds for livenessProbe | 10 |
exporter.livenessProbe.timeoutSeconds | Timeout seconds for livenessProbe | 5 |
exporter.livenessProbe.failureThreshold | Failure threshold for livenessProbe | 6 |
exporter.livenessProbe.successThreshold | Success threshold for livenessProbe | 1 |
exporter.readinessProbe.enabled | Enable readinessProbe | true |
exporter.readinessProbe.initialDelaySeconds | Initial delay seconds for readinessProbe | 20 |
exporter.readinessProbe.periodSeconds | Period seconds for readinessProbe | 10 |
exporter.readinessProbe.timeoutSeconds | Timeout seconds for readinessProbe | 5 |
exporter.readinessProbe.failureThreshold | Failure threshold for readinessProbe | 6 |
exporter.readinessProbe.successThreshold | Success threshold for readinessProbe | 1 |
exporter.startupProbe.enabled | Enable startupProbe on Harbor Exporter containers | false |
exporter.startupProbe.initialDelaySeconds | Initial delay seconds for startupProbe | 5 |
exporter.startupProbe.periodSeconds | Period seconds for startupProbe | 10 |
exporter.startupProbe.timeoutSeconds | Timeout seconds for startupProbe | 1 |
exporter.startupProbe.failureThreshold | Failure threshold for startupProbe | 15 |
exporter.startupProbe.successThreshold | Success threshold for startupProbe | 1 |
exporter.customLivenessProbe | Custom livenessProbe that overrides the default one | {} |
exporter.customReadinessProbe | Custom readinessProbe that overrides the default one | {} |
exporter.customStartupProbe | Custom startupProbe that overrides the default one | {} |
exporter.resources.limits | The resources limits for the Harbor Exporter containers | {} |
exporter.resources.requests | The requested resources for the Harbor Exporter containers | {} |
exporter.podSecurityContext.enabled | Enabled Exporter pods' Security Context | true |
exporter.podSecurityContext.fsGroup | Set Exporter pod's Security Context fsGroup | 1001 |
exporter.containerSecurityContext.enabled | Enabled Exporter containers' Security Context | true |
exporter.containerSecurityContext.runAsUser | Set Exporter containers' Security Context runAsUser | 1001 |
exporter.containerSecurityContext.runAsNonRoot | Set Exporter containers' Security Context runAsNonRoot | true |
exporter.updateStrategy.type | The update strategy for deployments with persistent volumes: RollingUpdate or Recreate. Set it as Recreate when RWM for volumes isn't supported | RollingUpdate |
exporter.lifecycleHooks | LifecycleHook to set additional configuration at startup, e.g. LDAP settings via REST API. Evaluated as a template | {} |
exporter.hostAliases | Exporter pods host aliases | [] |
exporter.podLabels | Add additional labels to the pod (evaluated as a template) | {} |
exporter.podAnnotations | Annotations to add to the exporter pod | {} |
exporter.podAffinityPreset | Harbor Exporter Pod affinity preset. Ignored if affinity is set. Allowed values: soft or hard | "" |
exporter.podAntiAffinityPreset | Harbor Exporter Pod anti-affinity preset. Ignored if affinity is set. Allowed values: soft or hard | soft |
exporter.nodeAffinityPreset.type | Harbor Exporter Node affinity preset type. Ignored if exporter.affinity is set. Allowed values: soft or hard | "" |
exporter.nodeAffinityPreset.key | Harbor Exporter Node label key to match Ignored if exporter.affinity is set. | "" |
exporter.nodeAffinityPreset.values | Harbor Exporter Node label values to match. Ignored if exporter.affinity is set. | [] |
exporter.affinity | Harbor Exporter Affinity for pod assignment | {} |
exporter.priorityClassName | Exporter pods Priority Class Name | "" |
exporter.schedulerName | Name of the k8s scheduler (other than default) | "" |
exporter.serviceAccountName | Name of the serviceAccountName for Harbor Exporter pods | "" |
exporter.nodeSelector | Harbor Exporter Node labels for pod assignment | {} |
exporter.tolerations | Harbor Exporter Tolerations for pod assignment | [] |
exporter.topologySpreadConstraints | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | [] |
exporter.initContainers | Add additional init containers to the pod (evaluated as a template) | [] |
exporter.extraVolumeMounts | [] | |
exporter.extraVolumes | [] | |
exporter.sidecars | Attach additional containers to the pod (evaluated as a template) | [] |
exporter.automountServiceAccountToken | Automount service account token | false |
exporter.service.ports.metrics | Exporter HTTP service port | 8001 |
PostgreSQL Parameters¶
Name | Description | Value |
---|---|---|
postgresql.enabled | Switch to enable or disable the PostgreSQL helm chart | true |
postgresql.auth.enablePostgresUser | Assign a password to the "postgres" admin user. Otherwise, remote access will be blocked for this user | true |
postgresql.auth.postgresPassword | Password for the "postgres" admin user | not-secure-database-password |
postgresql.auth.existingSecret | Name of existing secret to use for PostgreSQL credentials | "" |
postgresql.architecture | PostgreSQL architecture (standalone or replication ) | standalone |
postgresql.primary.extendedConfiguration | Extended PostgreSQL Primary configuration (appended to main or default configuration) | `max_connections = 1024 |
` | ||
postgresql.primary.initdb.scripts | Initdb scripts to create Harbor databases | {} |
postgresql.image.registry | PostgreSQL image registry | docker.io |
postgresql.image.repository | PostgreSQL image repository | bitnami/postgresql |
postgresql.image.tag | PostgreSQL image tag (immutable tags are recommended) | 13.11.0-debian-11-r15 |
postgresql.image.digest | PostgreSQL image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | "" |
externalDatabase.host | Database host | localhost |
externalDatabase.port | Database port number | 5432 |
externalDatabase.user | Non-root username for Harbor | bn_harbor |
externalDatabase.password | Password for the non-root username for Harbor | "" |
externalDatabase.sslmode | External database ssl mode | disable |
externalDatabase.coreDatabase | External database name for core | "" |
externalDatabase.notaryServerDatabase | External database name for notary server | "" |
externalDatabase.notaryServerUsername | External database username for notary server | "" |
externalDatabase.notaryServerPassword | External database password for notary server | "" |
externalDatabase.notarySignerDatabase | External database name for notary signer | "" |
externalDatabase.notarySignerUsername | External database username for notary signer | "" |
externalDatabase.notarySignerPassword | External database password for notary signer | "" |
Redis® parameters¶
Name | Description | Value |
---|---|---|
redis.enabled | Switch to enable or disable the Redis® helm | true |
redis.auth.enabled | Enable password authentication | false |
redis.auth.password | Redis® password | "" |
redis.auth.existingSecret | The name of an existing secret with Redis® credentials | "" |
redis.architecture | Redis® architecture. Allowed values: standalone or replication | standalone |
redis.sentinel.enabled | Use Redis® Sentinel on Redis® pods. | false |
redis.sentinel.masterSet | Master set name | mymaster |
redis.sentinel.service.ports.sentinel | Redis® service port for Redis® Sentinel | 26379 |
externalRedis.host | Redis® host | localhost |
externalRedis.port | Redis® port number | 6379 |
externalRedis.password | Redis® password | "" |
externalRedis.coreDatabaseIndex | Index for core database | 0 |
externalRedis.jobserviceDatabaseIndex | Index for jobservice database | 1 |
externalRedis.registryDatabaseIndex | Index for registry database | 2 |
externalRedis.trivyAdapterDatabaseIndex | Index for trivy adapter database | 5 |
externalRedis.sentinel.enabled | If external redis with sentinal is used, set it to true | false |
externalRedis.sentinel.masterSet | Name of sentinel masterSet if sentinel is used | mymaster |
externalRedis.sentinel.hosts | Sentinel hosts and ports in the format | "" |
Harbor metrics parameters¶
Name | Description | Value |
---|---|---|
metrics.enabled | Whether or not to enable metrics for different | false |
metrics.path | Path where metrics are exposed | /metrics |
metrics.serviceMonitor.enabled | if true , creates a Prometheus Operator ServiceMonitor (requires metrics.enabled to be true ) | false |
metrics.serviceMonitor.namespace | Namespace in which Prometheus is running | "" |
metrics.serviceMonitor.interval | Interval at which metrics should be scraped | "" |
metrics.serviceMonitor.scrapeTimeout | Timeout after which the scrape is ended | "" |
metrics.serviceMonitor.labels | Additional labels that can be used so ServiceMonitor will be discovered by Prometheus | {} |
metrics.serviceMonitor.selector | Prometheus instance selector labels | {} |
metrics.serviceMonitor.relabelings | RelabelConfigs to apply to samples before scraping | [] |
metrics.serviceMonitor.metricRelabelings | MetricRelabelConfigs to apply to samples before ingestion | [] |
metrics.serviceMonitor.honorLabels | Specify honorLabels parameter to add the scrape endpoint | false |
metrics.serviceMonitor.jobLabel | The name of the label on the target service to use as the job name in prometheus. | "" |
Specify each parameter using the --set key=value[,key=value]
argument to helm install
. For example,
The above command sets the Harbor administrator account password to password
.
NOTE: Once this chart is deployed, it is not possible to change the application's access credentials, such as usernames or passwords, using Helm. To change these application credentials after deployment, delete any persistent volumes (PVs) used by the chart and re-deploy it, or use the application's built-in administrative tools if available.
Alternatively, a YAML file that specifies the values for the above parameters can be provided while installing the chart. For example,
Configuration and installation details¶
Rolling VS Immutable tags¶
It is strongly recommended to use immutable tags in a production environment. This ensures your deployment does not change automatically if the same tag is updated with a different image.
Bitnami will release a new chart updating its containers if a new version of the main container, significant changes, or critical vulnerabilities exist.
Configure the way how to expose Harbor core¶
You can expose Harbor core using two methods:
- An Ingress Controller,
exposureType
should be set toingress
. - An ingress controller must be installed in the Kubernetes cluster.
- If the TLS is disabled, the port must be included in the command when pulling/pushing images. Refer to issue #5291 for the detail.
- An NGINX Proxy,
exposureType
should be set toproxy
. There are three ways to do so depending on the NGINX Proxy service type: - ClusterIP: Exposes the service on a cluster-internal IP. Choosing this value makes the service only reachable from within the cluster:
- NodePort: Exposes the service on each Node's IP at a static port (the NodePort). You'll be able to contact the NodePort service, from outside the cluster, by requesting
NodeIP:NodePort
. - LoadBalancer: Exposes the service externally using a cloud provider's load balancer.
Configure the external URL¶
The external URL for Harbor core service is used to:
- populate the docker/helm commands showed on portal
- populate the token service URL returned to docker/notary client
Format: protocol://domain[:port]
. Usually:
- if expose Harbor core service via Ingress, the
domain
should be the value ofingress.core.hostname
. - if expose Harbor core via NGINX proxy using a
ClusterIP
service type, thedomain
should be the value ofservice.clusterIP
. - if expose Harbor core via NGINX proxy using a
NodePort
service type, thedomain
should be the IP address of one Kubernetes node. - if expose Harbor core via NGINX proxy using a
LoadBalancer
service type, set thedomain
as your own domain name and add a CNAME record to map the domain name to the one you got from the cloud provider.
If Harbor is deployed behind the proxy, set it as the URL of proxy.
Sidecars and Init Containers¶
If you have a need for additional containers to run within the same pod as any of the Harbor components (e.g. an additional metrics or logging exporter), you can do so via the sidecars
config parameter inside each component subsection. Simply define your container according to the Kubernetes container spec.
core:
sidecars:
- name: your-image-name
image: your-image
imagePullPolicy: Always
ports:
- name: portname
containerPort: 1234
Similarly, you can add extra init containers using the initContainers
parameter.
core:
initContainers:
- name: your-image-name
image: your-image
imagePullPolicy: Always
ports:
- name: portname
containerPort: 1234
Adding extra environment variables¶
In case you want to add extra environment variables (useful for advanced operations like custom init scripts), you can use the extraEnvVars
property inside each component subsection.
Alternatively, you can use a ConfigMap or a Secret with the environment variables. To do so, use the extraEnvVarsCM
or the extraEnvVarsSecret
values inside each component subsection.
Configure data persistence¶
- Disable: The data does not survive the termination of a pod.
- Persistent Volume Claim(default): A default
StorageClass
is needed in the Kubernetes cluster to dynamically provision the volumes. Specify another StorageClass in thestorageClass
or setexistingClaim
if you have already existing persistent volumes to use. - External Storage(only for images and charts): For images and charts, the external storages are supported:
azure
,gcs
,s3
swift
andoss
.
Configure the secrets¶
- Secrets: Secrets are used for encryption and to secure communication between components. Fill
core.secret
,jobservice.secret
andregistry.secret
to configure then statically through the helm values. it expects the "key or password", not the secret name where secrets are stored. - Certificates: Used for token encryption/decryption. Fill
core.secretName
to configure.
Secrets and certificates must be setup to avoid changes on every Helm upgrade (see: #107).
If you want to manage full Secret objects by your own, you can use existingSecret & existingEnvVarsSecret parameters. This could be useful for some secure GitOps workflows, of course, you will have to ensure to define all expected keys for those secrets.
The core service have two Secret
objects, the default one for data & communication which is very important as it's contains the data encryption key of your harbor instance ! and a second one which contains standard passwords, database access password, ... Keep in mind that the HARBOR_ADMIN_PASSWORD
is only used to boostrap your harbor instance, if you update it after the deployment, the password is updated in database, but the secret will remain the initial one.
Setting Pod's affinity¶
This chart allows you to set your custom affinity using the XXX.affinity
parameter(s). Find more information about Pod's affinity in the kubernetes documentation.
As an alternative, you can use of the preset configurations for pod affinity, pod anti-affinity, and node affinity available at the bitnami/common chart. To do so, set the XXX.podAffinityPreset
, XXX.podAntiAffinityPreset
, or XXX.nodeAffinityPreset
parameters.
Adjust permissions of persistent volume mountpoint¶
As the images run as non-root by default, it is necessary to adjust the ownership of the persistent volumes so that the containers can write data into it.
By default, the chart is configured to use Kubernetes Security Context to automatically change the ownership of the volume. However, this feature does not work in all Kubernetes distributions. As an alternative, this chart supports using an initContainer to change the ownership of the volume before mounting it in the final destination.
You can enable this initContainer by setting volumePermissions.enabled
to true
.
Troubleshooting¶
Find more information about how to deal with common errors related to Bitnami's Helm charts in this troubleshooting guide.
Upgrading¶
To 16.0.0¶
This major updates the PostgreSQL subchart to its newest major, 12.0.0. Here you can find more information about the changes introduced in that version.
To any previous version¶
Refer to the chart documentation for more information about how to upgrade from previous releases.
License¶
Copyright © 2023 VMware, Inc.
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.