You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+60Lines changed: 60 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,3 +42,63 @@ Please refer to [SECURITY.md](SECURITY.md) for details on how to report security
42
42
### Changelog
43
43
44
44
Releases are managed independently for each helm chart, and changelogs are tracked on each release. Read more about this process [here](https://github.com/argoproj/argo-helm/blob/main/CONTRIBUTING.md#changelog).
45
+
46
+
## Charts use Helm "Capabilities"
47
+
48
+
Our charts make use of the Helm built-in object "Capabilities":
49
+
> This provides information about what capabilities the Kubernetes cluster supports.
-`.Capabilities.APIVersions.Has` mostly to determine whether the CRDs for ServiceMonitors (from prometheus-operator) exists inside the cluster
55
+
-`.Capabilities.KubeVersion.Version` to handle correct apiVersion of a specific resource kind (eg. "policy/v1" vs. "policy/v1beta1")
56
+
57
+
If you use the charts only to template the manifests, without installing (`helm install ..`), you need to make sure that Helm (or the Helm SDK) receives the available APIs from your Kubernetes cluster.
58
+
59
+
For this you need to pass the `--api-versions` parameter to the `helm template` command:
60
+
61
+
```bash
62
+
helm template argocd \
63
+
oci://ghcr.io/argoproj/argo-helm/argo-cd \
64
+
--api-versions monitoring.coreos.com/v1 \
65
+
--values my-argocd-values.yaml
66
+
```
67
+
68
+
If you use other tools like [Kustomize](https://kubectl.docs.kubernetes.io/references/kustomize/builtins/) or [helmfile](https://helmfile.readthedocs.io/en/latest/#configuration) to render it, there are equivalent options.
Copy file name to clipboardExpand all lines: charts/argo-cd/README.md
+43-4Lines changed: 43 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -278,6 +278,31 @@ For full list of changes please check ArtifactHub [changelog].
278
278
279
279
Highlighted versions provide information about additional steps that should be performed by user when upgrading to newer version.
280
280
281
+
### 7.0.0
282
+
283
+
We changed the type of `.Values.configs.clusterCredentials` from `list` to `object`.
284
+
If you used the value, please migrate like below.
285
+
286
+
```yaml
287
+
# before
288
+
configs:
289
+
clusterCredentials:
290
+
- mycluster:
291
+
server: https://mycluster.example.com
292
+
labels: {}
293
+
annotations: {}
294
+
# ...
295
+
296
+
# after
297
+
configs:
298
+
clusterCredentials:
299
+
mycluster:
300
+
server: https://mycluster.example.com
301
+
labels: {}
302
+
annotations: {}
303
+
# ...
304
+
```
305
+
281
306
### 6.10.0
282
307
283
308
This version introduces authentication for Redis to mitigate GHSA-9766-5277-j5hr.
@@ -744,6 +769,8 @@ NAME: my-release
744
769
| global.deploymentAnnotations | object | `{}` | Annotations for the all deployed Deployments |
745
770
| global.deploymentStrategy | object | `{}` | Deployment strategy for the all deployed Deployments |
746
771
| global.domain | string | `"argocd.example.com"` | Default domain used by all components |
772
+
| global.dualStack.ipFamilies | list | `[]` | IP families that should be supported and the order in which they should be applied to ClusterIP as well. Can be IPv4 and/or IPv6. |
773
+
| global.dualStack.ipFamilyPolicy | string | `""` | IP family policy to configure dual-stack see [Configure dual-stack](https://kubernetes.io/docs/concepts/services-networking/dual-stack/#services) |
747
774
| global.env | list | `[]` | Environment variables to pass to all deployed Deployments |
748
775
| global.hostAliases | list | `[]` | Mapping between IP and hostnames that will be injected as entries in the pod's hosts files |
749
776
| global.image.imagePullPolicy | string | `"IfNotPresent"` | If defined, a imagePullPolicy applied to all Argo CD deployments |
@@ -768,7 +795,7 @@ NAME: my-release
768
795
769
796
| Key | Type | Default | Description |
770
797
|-----|------|---------|-------------|
771
-
| configs.clusterCredentials | list | `[]` (See [values.yaml]) | Provide one or multiple [external cluster credentials] |
798
+
| configs.clusterCredentials | object | `{}` (See [values.yaml]) | Provide one or multiple [external cluster credentials] |
772
799
| configs.cm."admin.enabled" | bool | `true` | Enable local admin user |
773
800
| configs.cm."application.instanceLabelKey" | string | Defaults to app.kubernetes.io/instance | The name of tracking label used by Argo CD for resource pruning |
| server.certificate.privateKey.rotationPolicy | string | `"Never"` | Rotation policy of private key when certificate is re-issued. Either: `Never`or `Always` |
1040
1067
| server.certificate.privateKey.size | int | `2048` | Key bit size of the private key. If algorithm is set to `Ed25519`, size is ignored. |
1041
1068
| server.certificate.renewBefore | string | `""` (defaults to 360h = 15d if not specified) | How long before the expiry a certificate should be renewed. |
1042
-
| server.certificate.secretName | string | `"argocd-server-tls"` | The name of the Secret that will be automatically created and managed by this Certificate resource |
1069
+
| server.certificate.secretTemplateAnnotations | object | `{}` | Annotations that allow the certificate to be composed from data residing in existing Kubernetes Resources |
1043
1070
| server.certificate.usages | list | `[]` | Usages for the certificate |
1044
1071
| server.certificateSecret.annotations | object | `{}` | Annotations to be added to argocd-server-tls secret |
1045
1072
| server.certificateSecret.crt | string | `""` | Certificate data |
@@ -1154,6 +1181,7 @@ NAME: my-release
1154
1181
| server.service.externalIPs | list | `[]` | Server service external IPs |
1155
1182
| server.service.externalTrafficPolicy | string | `"Cluster"` | Denotes if this Service desires to route external traffic to node-local or cluster-wide endpoints |
1156
1183
| server.service.labels | object | `{}` | Server service labels |
1184
+
| server.service.loadBalancerClass | string | `""` | The class of the load balancer implementation |
1157
1185
| server.service.loadBalancerIP | string | `""` | LoadBalancer will get created with the IP specified in this field |
1158
1186
| server.service.loadBalancerSourceRanges | list | `[]` | Source IP ranges to allow access to service from |
1159
1187
| server.service.nodePortHttp | int | `30080` | Server service http port for NodePort service type (only if `server.service.type` is set to "NodePort") |
@@ -1418,7 +1446,7 @@ If you want to use an existing Redis (eg. a managed service from a cloud provide
1418
1446
1419
1447
| Key | Type | Default | Description |
1420
1448
|-----|------|---------|-------------|
1421
-
| externalRedis.existingSecret | string | `""` | The name of an existing secret with Redis credentials (must contain key `redis-password`). When it's set, the `externalRedis.password` parameter is ignored |
1449
+
| externalRedis.existingSecret | string | `""` | The name of an existing secret with Redis (must contain key `redis-password`) and Sentinel credentials. When it's set, the `externalRedis.password` parameter is ignored |
| externalRedis.port | int | `6379` | External Redis server port |
@@ -1472,7 +1500,6 @@ If you use an External Redis (See Option 3 above), this Job is not deployed.
1472
1500
| applicationSet.certificate.privateKey.rotationPolicy | string | `"Never"` | Rotation policy of private key when certificate is re-issued. Either: `Never`or `Always` |
1473
1501
| applicationSet.certificate.privateKey.size | int | `2048` | Key bit size of the private key. If algorithm is set to `Ed25519`, size is ignored. |
1474
1502
| applicationSet.certificate.renewBefore | string | `""` (defaults to 360h = 15d if not specified) | How long before the expiry a certificate should be renewed. |
1475
-
| applicationSet.certificate.secretName | string | `"argocd-applicationset-controller-tls"` | The name of the Secret that will be automatically created and managed by this Certificate resource |
1476
1503
| applicationSet.containerPorts.metrics | int | `8080` | Metrics container port |
1477
1504
| applicationSet.containerPorts.probe | int | `8081` | Probe container port |
1478
1505
| applicationSet.containerPorts.webhook | int | `7000` | Webhook container port |
@@ -1589,6 +1616,12 @@ If you use an External Redis (See Option 3 above), this Job is not deployed.
1589
1616
| notifications.image.tag | string | `""` (defaults to global.image.tag) | Tag to use for the notifications controller |
1590
1617
| notifications.imagePullSecrets | list | `[]` (defaults to global.imagePullSecrets) | Secrets with credentials to pull images from a private registry |
1591
1618
| notifications.initContainers | list | `[]` | Init containers to add to the notifications controller pod |
| notifications.livenessProbe.failureThreshold | int | `3` | Minimum consecutive failures for the [probe] to be considered failed after having succeeded |
1621
+
| notifications.livenessProbe.initialDelaySeconds | int | `10` | Number of seconds after the container has started before [probe] is initiated |
1622
+
| notifications.livenessProbe.periodSeconds | int | `10` | How often (in seconds) to perform the [probe] |
1623
+
| notifications.livenessProbe.successThreshold | int | `1` | Minimum consecutive successes for the [probe] to be considered successful after having failed |
1624
+
| notifications.livenessProbe.timeoutSeconds | int | `1` | Number of seconds after which the [probe] times out |
1592
1625
| notifications.logFormat | string | `""` (defaults to global.logging.format) | Notifications controller log format. Either `text` or `json` |
| notifications.readinessProbe.failureThreshold | int | `3` | Minimum consecutive failures for the [probe] to be considered failed after having succeeded |
1655
+
| notifications.readinessProbe.initialDelaySeconds | int | `10` | Number of seconds after the container has started before [probe] is initiated |
1656
+
| notifications.readinessProbe.periodSeconds | int | `10` | How often (in seconds) to perform the [probe] |
1657
+
| notifications.readinessProbe.successThreshold | int | `1` | Minimum consecutive successes for the [probe] to be considered successful after having failed |
1658
+
| notifications.readinessProbe.timeoutSeconds | int | `1` | Number of seconds after which the [probe] times out |
1620
1659
| notifications.resources | object | `{}` | Resource limits and requests for the notifications controller |
1621
1660
| notifications.secret.annotations | object | `{}` | key:value pairs of annotations to be added to the secret |
0 commit comments