You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+60Lines changed: 60 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,3 +42,63 @@ Please refer to [SECURITY.md](SECURITY.md) for details on how to report security
42
42
### Changelog
43
43
44
44
Releases are managed independently for each helm chart, and changelogs are tracked on each release. Read more about this process [here](https://github.com/argoproj/argo-helm/blob/main/CONTRIBUTING.md#changelog).
45
+
46
+
## Charts use Helm "Capabilities"
47
+
48
+
Our charts make use of the Helm built-in object "Capabilities":
49
+
> This provides information about what capabilities the Kubernetes cluster supports.
-`.Capabilities.APIVersions.Has` mostly to determine whether the CRDs for ServiceMonitors (from prometheus-operator) exists inside the cluster
55
+
-`.Capabilities.KubeVersion.Version` to handle correct apiVersion of a specific resource kind (eg. "policy/v1" vs. "policy/v1beta1")
56
+
57
+
If you use the charts only to template the manifests, without installing (`helm install ..`), you need to make sure that Helm (or the Helm SDK) receives the available APIs from your Kubernetes cluster.
58
+
59
+
For this you need to pass the `--api-versions` parameter to the `helm template` command:
60
+
61
+
```bash
62
+
helm template argocd \
63
+
oci://ghcr.io/argoproj/argo-helm/argo-cd \
64
+
--api-versions monitoring.coreos.com/v1 \
65
+
--values my-argocd-values.yaml
66
+
```
67
+
68
+
If you use other tools like [Kustomize](https://kubectl.docs.kubernetes.io/references/kustomize/builtins/) or [helmfile](https://helmfile.readthedocs.io/en/latest/#configuration) to render it, there are equivalent options.
description: Upgrade argo-cd to v2.11-2024.7.3-c0941bcb4 with fix - report application event from queue instead of requesting actual state again which potentially means doesn't get same data as in original event
31
-
- kind: fixed
32
-
description: Event reporter selector labeles
30
+
description: Upgrade argo-cd to v2.12-2024.9.9-ba613c5bd with reporting of resources health errors on level with application event
| eventReporter.dnsPolicy | string | `"ClusterFirst"` | Alternative DNS policy for event reporter pods |
664
-
| eventReporter.enabled | bool | `true` | |
665
689
| eventReporter.env | list | `[]` | Environment variables to pass to event reporter |
666
690
| eventReporter.envFrom | list | `[]` (See [values.yaml]) | envFrom to pass to event reporter |
667
691
| eventReporter.extraArgs | list | `[]` | Additional command line arguments to pass to event reporter |
@@ -723,7 +747,6 @@ NAME: my-release
723
747
| eventReporter.terminationGracePeriodSeconds | int | `30` | terminationGracePeriodSeconds for container lifecycle hook |
724
748
| eventReporter.tolerations | list | `[]` (defaults to global.tolerations) | [Tolerations] for use with node taints |
725
749
| eventReporter.topologySpreadConstraints | list | `[]` (defaults to global.topologySpreadConstraints) | Assign custom [TopologySpreadConstraints] rules to the event reporter |
726
-
| eventReporter.version | string | `"v2"` | |
727
750
| eventReporter.volumeMounts | list | `[]` | Additional volumeMounts to the event reporter main container |
728
751
| eventReporter.volumes | list | `[]` | Additional volumes to the event reporter pod |
729
752
| extraObjects | list | `[]` | Array of extra K8s manifests to deploy |
@@ -746,6 +769,8 @@ NAME: my-release
746
769
| global.deploymentAnnotations | object | `{}` | Annotations for the all deployed Deployments |
747
770
| global.deploymentStrategy | object | `{}` | Deployment strategy for the all deployed Deployments |
748
771
| global.domain | string | `"argocd.example.com"` | Default domain used by all components |
772
+
| global.dualStack.ipFamilies | list | `[]` | IP families that should be supported and the order in which they should be applied to ClusterIP as well. Can be IPv4 and/or IPv6. |
773
+
| global.dualStack.ipFamilyPolicy | string | `""` | IP family policy to configure dual-stack see [Configure dual-stack](https://kubernetes.io/docs/concepts/services-networking/dual-stack/#services) |
749
774
| global.env | list | `[]` | Environment variables to pass to all deployed Deployments |
750
775
| global.hostAliases | list | `[]` | Mapping between IP and hostnames that will be injected as entries in the pod's hosts files |
751
776
| global.image.imagePullPolicy | string | `"IfNotPresent"` | If defined, a imagePullPolicy applied to all Argo CD deployments |
@@ -770,7 +795,7 @@ NAME: my-release
770
795
771
796
| Key | Type | Default | Description |
772
797
|-----|------|---------|-------------|
773
-
| configs.clusterCredentials | list | `[]` (See [values.yaml]) | Provide one or multiple [external cluster credentials] |
798
+
| configs.clusterCredentials | object | `{}` (See [values.yaml]) | Provide one or multiple [external cluster credentials] |
774
799
| configs.cm."admin.enabled" | bool | `true` | Enable local admin user |
775
800
| configs.cm."application.instanceLabelKey" | string | Defaults to app.kubernetes.io/instance | The name of tracking label used by Argo CD for resource pruning |
| server.certificate.privateKey.rotationPolicy | string | `"Never"` | Rotation policy of private key when certificate is re-issued. Either: `Never`or `Always` |
1042
1067
| server.certificate.privateKey.size | int | `2048` | Key bit size of the private key. If algorithm is set to `Ed25519`, size is ignored. |
1043
1068
| server.certificate.renewBefore | string | `""` (defaults to 360h = 15d if not specified) | How long before the expiry a certificate should be renewed. |
1044
-
| server.certificate.secretName | string | `"argocd-server-tls"` | The name of the Secret that will be automatically created and managed by this Certificate resource |
1069
+
| server.certificate.secretTemplateAnnotations | object | `{}` | Annotations that allow the certificate to be composed from data residing in existing Kubernetes Resources |
1045
1070
| server.certificate.usages | list | `[]` | Usages for the certificate |
1046
1071
| server.certificateSecret.annotations | object | `{}` | Annotations to be added to argocd-server-tls secret |
1047
1072
| server.certificateSecret.crt | string | `""` | Certificate data |
@@ -1156,6 +1181,7 @@ NAME: my-release
1156
1181
| server.service.externalIPs | list | `[]` | Server service external IPs |
1157
1182
| server.service.externalTrafficPolicy | string | `"Cluster"` | Denotes if this Service desires to route external traffic to node-local or cluster-wide endpoints |
1158
1183
| server.service.labels | object | `{}` | Server service labels |
1184
+
| server.service.loadBalancerClass | string | `""` | The class of the load balancer implementation |
1159
1185
| server.service.loadBalancerIP | string | `""` | LoadBalancer will get created with the IP specified in this field |
1160
1186
| server.service.loadBalancerSourceRanges | list | `[]` | Source IP ranges to allow access to service from |
1161
1187
| server.service.nodePortHttp | int | `30080` | Server service http port for NodePort service type (only if `server.service.type` is set to "NodePort") |
@@ -1420,7 +1446,7 @@ If you want to use an existing Redis (eg. a managed service from a cloud provide
1420
1446
1421
1447
| Key | Type | Default | Description |
1422
1448
|-----|------|---------|-------------|
1423
-
| externalRedis.existingSecret | string | `""` | The name of an existing secret with Redis credentials (must contain key `redis-password`). When it's set, the `externalRedis.password` parameter is ignored |
1449
+
| externalRedis.existingSecret | string | `""` | The name of an existing secret with Redis (must contain key `redis-password`) and Sentinel credentials. When it's set, the `externalRedis.password` parameter is ignored |
| externalRedis.port | int | `6379` | External Redis server port |
@@ -1474,7 +1500,6 @@ If you use an External Redis (See Option 3 above), this Job is not deployed.
1474
1500
| applicationSet.certificate.privateKey.rotationPolicy | string | `"Never"` | Rotation policy of private key when certificate is re-issued. Either: `Never`or `Always` |
1475
1501
| applicationSet.certificate.privateKey.size | int | `2048` | Key bit size of the private key. If algorithm is set to `Ed25519`, size is ignored. |
1476
1502
| applicationSet.certificate.renewBefore | string | `""` (defaults to 360h = 15d if not specified) | How long before the expiry a certificate should be renewed. |
1477
-
| applicationSet.certificate.secretName | string | `"argocd-applicationset-controller-tls"` | The name of the Secret that will be automatically created and managed by this Certificate resource |
1478
1503
| applicationSet.containerPorts.metrics | int | `8080` | Metrics container port |
1479
1504
| applicationSet.containerPorts.probe | int | `8081` | Probe container port |
1480
1505
| applicationSet.containerPorts.webhook | int | `7000` | Webhook container port |
@@ -1591,6 +1616,12 @@ If you use an External Redis (See Option 3 above), this Job is not deployed.
1591
1616
| notifications.image.tag | string | `""` (defaults to global.image.tag) | Tag to use for the notifications controller |
1592
1617
| notifications.imagePullSecrets | list | `[]` (defaults to global.imagePullSecrets) | Secrets with credentials to pull images from a private registry |
1593
1618
| notifications.initContainers | list | `[]` | Init containers to add to the notifications controller pod |
| notifications.livenessProbe.failureThreshold | int | `3` | Minimum consecutive failures for the [probe] to be considered failed after having succeeded |
1621
+
| notifications.livenessProbe.initialDelaySeconds | int | `10` | Number of seconds after the container has started before [probe] is initiated |
1622
+
| notifications.livenessProbe.periodSeconds | int | `10` | How often (in seconds) to perform the [probe] |
1623
+
| notifications.livenessProbe.successThreshold | int | `1` | Minimum consecutive successes for the [probe] to be considered successful after having failed |
1624
+
| notifications.livenessProbe.timeoutSeconds | int | `1` | Number of seconds after which the [probe] times out |
1594
1625
| notifications.logFormat | string | `""` (defaults to global.logging.format) | Notifications controller log format. Either `text` or `json` |
| notifications.readinessProbe.failureThreshold | int | `3` | Minimum consecutive failures for the [probe] to be considered failed after having succeeded |
1655
+
| notifications.readinessProbe.initialDelaySeconds | int | `10` | Number of seconds after the container has started before [probe] is initiated |
1656
+
| notifications.readinessProbe.periodSeconds | int | `10` | How often (in seconds) to perform the [probe] |
1657
+
| notifications.readinessProbe.successThreshold | int | `1` | Minimum consecutive successes for the [probe] to be considered successful after having failed |
1658
+
| notifications.readinessProbe.timeoutSeconds | int | `1` | Number of seconds after which the [probe] times out |
1622
1659
| notifications.resources | object | `{}` | Resource limits and requests for the notifications controller |
1623
1660
| notifications.secret.annotations | object | `{}` | key:value pairs of annotations to be added to the secret |
0 commit comments