chat-web deployment settings
values.yaml file
Use provided values.yaml file as reference only, for custom configuration values (probes, AutoScaling, etc) contact HighSide Support.
Tip: use separate values.yaml files if deployment settings differ between environments (e.g., values-sandbox.yaml and values-prod.yaml)
Key
Description
Default
env
Environment name
highside
replicaCount
Number of replicas in K8s for chat-web
1
image.repository
Image repository
quay.io/highside/chatweb
image.pullPolicy
Image pull Policy
Always
image.tag
Image tag (a.k.a version)
v6.0.9
imagePullSecrets.name
Registry image pull secret name
Provided by HighSide Support
serviceAccount.create
Create service account in K8s
false
serviceAccount.annotations
Service account annotations
{}
serviceAccount.name
Service account name
""
container.port
Port number for chat-web container
5000
podAnnotations
Pod annotations
{}
podSecurityContext
Pod security context
{}
securityContext
Security context
{}
service.type
Service type for chat-web in K8s
ClusterIP
service.port
Port number for chat-web service
80
resources.limits.cpu
CPU units for resources.limits
200m
resources.limits.memory
Memory units for resources.limits
256Mi
resources.requests.cpu
CPU units for pod requests
100m
resources.requests.memory
Memory units for pod requests
128Mi
nodeSelector
Pod node selector
{}
tolerations
Pod tolerations
[]
affinity
Pod affinity
{}
enableProbes
Enable container probes
false
autoscaling.enabled
Enable or disable Horizontal Pod AutoScaler for chat-web
false
autoscaling.minReplicas
Minimum number of replicas if AutoScaling is enabled
1
autoscaling.maxReplicas
Maximum number of replicas if AutoScaling is enabled
10
ingress.enabled
Enable Ingress object for chat-web
false
ingress.annotations
Ingress object annotations
{}
ingress.ingressClassName
Set only if K8s >= v1.18 & NGINX chart >= v4.0.1
nginx
ingress.tls
Ingress object TLS configuration
[]
ingress.hosts
Ingress object accepted hostnames
[]
appConf
App Config section start
{}
appConf.ENV_VAR
Env var with its value: See 6.4.2. for env vars detail
ENV_VAR.default
secrets.yaml file
All key-value pairs stored in this file will be processed by Helm chart templates and stored securely as K8s secrets.
Then, each will get mounted in chat-web pod(s) either as a file (certificates and other required files) or as an en
Key
Description
Default
secrets
Secrets section start
{}
secrets.ENV_VAR
Env var with its value: See 6.4.2. for env vars detail
ENV_VAR.default
secrets.google_lookup_json
Google API credentials json file content (sensitive)
not set
secrets.highside_voip_cert
VOIP certificate for push notifications (sensitive)
not set
secrets.mysql-ca-certs
MySQL CA certificate file content (sensitive)
not set
secrets.redis-ca-certs
Redis CA certificate file content (sensitive)
not set
Last updated