headlamp values.yaml📜
routes.outbound📜
Type: object
sso:
enabled: false
hosts: []
Description: Outbound routes for external service access (e.g., SSO/Keycloak) Big Bang umbrella chart configures these when SSO is enabled
domain📜
Type: string
"dev.bigbang.mil"
Description: Domain used for BigBang created exposed services
global.imagePullSecrets[0].name📜
Type: string
"private-registry"
openshift📜
Type: bool
false
monitoring📜
Type: object
enabled: false
serviceMonitor:
scheme: ''
tlsConfig: {}
Description: Monitoring toggle, affects servicemonitor and networkPolicies
bbtests.enabled📜
Type: bool
false
bbtests.cypress.artifacts📜
Type: bool
true
bbtests.cypress.envs.cypress_url📜
Type: string
"http://headlamp.headlamp.svc.cluster.local:4466"
bbtests.cypress.resources.requests.cpu📜
Type: string
"1"
bbtests.cypress.resources.requests.memory📜
Type: string
"2Gi"
bbtests.cypress.resources.limits.cpu📜
Type: string
"1"
bbtests.cypress.resources.limits.memory📜
Type: string
"2Gi"
waitJob.enabled📜
Type: bool
true
waitJob.permissions.apiGroups[0]📜
Type: string
"apps"
waitJob.permissions.resources[0]📜
Type: string
"deployments"
waitJob.permissions.verbs[0]📜
Type: string
"get"
waitJob.permissions.verbs[1]📜
Type: string
"list"
waitJob.permissions.verbs[2]📜
Type: string
"watch"
bigbang.rbac.enabled📜
Type: bool
false
Description: Enable BigBang RBAC management
bigbang.rbac.clusterRoles📜
Type: list
- create: true
name: headlamp-readonly
rules:
- apiGroups:
- ''
resources:
- namespaces
- pods
- pods/log
- services
- configmaps
- events
- nodes
- persistentvolumeclaims
- persistentvolumes
verbs:
- get
- list
- watch
- apiGroups:
- apps
resources:
- deployments
- daemonsets
- replicasets
- statefulsets
verbs:
- get
- list
- watch
- apiGroups:
- batch
resources:
- jobs
- cronjobs
verbs:
- get
- list
- watch
- apiGroups:
- networking.k8s.io
resources:
- ingresses
- networkpolicies
verbs:
- get
- list
- watch
Description: ClusterRoles to create Each role defines a set of permissions that can be bound to users, groups, or service accounts
bigbang.rbac.clusterRoleBindings📜
Type: list
- name: headlamp-sa-readonly
roleRef: headlamp-readonly
subjects:
- kind: ServiceAccount
name: dev-sa
namespace: headlamp
Description: ClusterRoleBindings to create Binds ClusterRoles to subjects (Users, Groups, or ServiceAccounts) For Keycloak SSO, use kind: Group with the Keycloak group name
upstream.image.registry📜
Type: string
"registry1.dso.mil"
upstream.image.repository📜
Type: string
"ironbank/opensource/headlamp-k8s/headlamp"
upstream.image.pullPolicy📜
Type: string
"Always"
upstream.image.tag📜
Type: string
"v0.39.0"
upstream.image.pullSecrets[0]📜
Type: string
"private-registry"
upstream.imagePullSecrets[0].name📜
Type: string
"private-registry"
upstream.nameOverride📜
Type: string
"headlamp"
upstream.config.baseURL📜
Type: string
""
upstream.config.oidc.clientID📜
Type: string
""
upstream.securityContext.capabilities.drop[0]📜
Type: string
"ALL"
upstream.service.port📜
Type: int
4466
upstream.clusterRoleBinding.create📜
Type: bool
true
Description: Specified whether a cluster role binding should be created
upstream.clusterRoleBinding.clusterRoleName📜
Type: string
"cluster-admin"
Description: Set name of the Cluster Role with limited permissions from you cluster for example - clusterRoleName: user-ro
upstream.clusterRoleBinding.annotations📜
Type: object
{}
Description: Annotations to add to the cluster role binding