Доступно с ограничениями в редакциях: BE, SE, SE+, EE, CSE Lite (1.67), CSE Pro (1.67)
параметры
Версия схемы: 1
-
-
булевыйsettings.enableAuditLogEnables audit log.
По умолчанию:
falseПример:
enableAuditLog: true -
булевыйsettings.enableUserInterfaceEnables User Interface.
По умолчанию:
trueПример:
enableUserInterface: false -
объектsettings.https
What certificate type to use with Stronghold.
This parameter completely overrides the
global.modules.httpssettings.Примеры:
customCertificate: secretName: stronghold-tls mode: CustomCertificatecertManager: clusterIssuerName: letsencrypt mode: CertManager-
объектsettings.https.certManager
-
строкаsettings.https.certManager.clusterIssuerName
What ClusterIssuer to use for Stronghold.
Currently,
letsencrypt,letsencrypt-staging,selfsignedare available. Also, you can define your own.По умолчанию:
letsencrypt
-
-
объектsettings.https.customCertificate
По умолчанию:
{}-
строкаsettings.https.customCertificate.secretName
The name of the secret in the
d8-strognholdnamespace to use with Stronghold.This secret must have the kubernetes.io/tls format.
По умолчанию:
false
-
-
строкаsettings.https.mode
The HTTPS usage mode:
CertManager— Stronghold will use HTTPS and get a certificate from the clusterissuer defined in thecertManager.clusterIssuerNameparameter.CustomCertificate— Stronghold will use HTTPS using the certificate from thed8-systemnamespace.
По умолчанию:
CertManagerДопустимые значения:
CertManager,CustomCertificate
-
-
объектsettings.ingress
По умолчанию:
{}-
строкаsettings.ingress.class
The class of the Ingress controller used for Stronghold.
An optional parameter. By default, the
modules.ingressClassglobal value is used.Шаблон:
^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$Пример:
class: public
-
-
строкаsettings.inlet
The way the connection to Stronghold is implemented.
The following inlet types are supported:
Ingress— access via ingress-nginx controller.
По умолчанию:
IngressДопустимые значения:
Ingress -
объектsettings.management
По умолчанию:
{}-
массив объектовsettings.management.administratorsAn list of users and groups that can access Stronghold as administrators. Other authenticated users will access Stronghold with default policy.
Пример:
administrators: - name: admins type: Group - name: security type: Group - name: manager@mycompany.tld type: User-
строкаsettings.management.administrators.name
-
строкаsettings.management.administrators.type
Допустимые значения:
Group,User
-
-
строкаsettings.management.modeAutomatic - enable Stronghold auto-init and auto-unseal. Root token will be stored in
stronghold-keysSecret resourceПо умолчанию:
AutomaticДопустимые значения:
AutomaticПример:
mode: Automatic
-
-