global: postgresql: auth: database: keycloak username: keycloak keycloak-database: enabled: true fullnameOverride: yonote-keycloak-db nameOverride: db primary: persistence: size: 512Mi keycloak: name: yonote-keycloak fullnameOverride: yonote-keycloak image: registry: images.updates.yonote.ru repository: yonote-keycloak tag: latest command: - /bin/sh - -c - | "/opt/keycloak/bin/kc.sh" "start" configMaps: configs: data: KEYCLOAK_ADMIN: root KC_PROXY: edge KC_HOSTNAME_STRICT: "false" KC_HOSTNAME_ADMIN: auth.example.com/admin KC_HOSTNAME: auth.example.com KC_DB: postgres KC_DB_URL: jdbc:postgresql://yonote-keycloak-db:5432/keycloak KC_DB_URL_DATABASE: keycloak KC_DB_USERNAME: keycloak KC_HOSTNAME_STRICT_HTTPS: "false" KC_HOSTNAME_PATH: "/" envFrom: - configMapRef: name: '{{ template "app.fullname" . }}-configs' - secretRef: name: '{{ template "app.fullname" . }}-secrets' checksums: - secrets.yaml - configmaps.yaml containerPorts: - containerPort: 8080 name: app protocol: TCP resources: limits: cpu: 500m memory: 512Mi requests: cpu: 150m memory: 128Mi service: service: type: ClusterIP port: 8080 targetPort: 8080 ingress: enabled: true ingressClassName: nginx pathType: ImplementationSpecific hostname: auth.example.com path: / tls: false livenessProbe: enabled: true failureThreshold: 6 initialDelaySeconds: 60 periodSeconds: 15 successThreshold: 1 timeoutSeconds: 5 httpGet: path: / port: app readinessProbe: enabled: true failureThreshold: 6 initialDelaySeconds: 60 periodSeconds: 15 successThreshold: 1 timeoutSeconds: 5 httpGet: path: / port: app