global: postgresql: auth: database: keycloak username: keycloak keycloak-database: enabled: true fullnameOverride: yonote-keycloak-db nameOverride: db primary: persistence: size: 512Mi keycloak: name: yonote-keycloak fullnameOverride: yonote-keycloak image: registry: images.updates.yonote.ru repository: yonote-keycloak tag: 19-0.1.1 command: - /bin/sh - -c - /opt/keycloak/bin/kc.sh import --file=/opt/keycloak/data/import/realm-export.json --debug - /opt/keycloak/bin/kc.sh start configMaps: configs: data: KEYCLOAK_ADMIN: root KC_PROXY: edge KC_HOSTNAME_STRICT: "false" KC_HOSTNAME_ADMIN: auth.onprem-test.stands.wilix.dev KC_HOSTNAME: auth.onprem-test.stands.wilix.dev KC_DB: postgres KC_DB_URL: jdbc:postgresql://yonote-keycloak-db:5432/keycloak # KC_DB_URL_DATABASE: keycloak KC_DB_USERNAME: keycloak KC_HOSTNAME_STRICT_HTTPS: "false" KC_HOSTNAME_PATH: "/" envFrom: - configMapRef: name: '{{ template "app.fullname" . }}-configs' - secretRef: name: '{{ template "app.fullname" . }}-secrets' checksums: - secrets.yaml - configmaps.yaml containerPorts: - containerPort: 8080 name: app protocol: TCP resources: limits: cpu: 500m memory: 512Mi requests: cpu: 150m memory: 128Mi service: type: ClusterIP port: 8080 targetPort: 8080 ingress: enabled: true hostname: 'auth.onprem-test.stands.wilix.dev' ingressClassName: traefik path: '/' pathType: Prefix annotations: kubernetes.io/ingress.class: traefik cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev extraTls: - hosts: - "auth.onprem-test.stands.wilix.dev" secretName: "auth.onprem-test.stands.wilix.dev" # livenessProbe: # enabled: true # failureThreshold: 6 # initialDelaySeconds: 60 # periodSeconds: 15 # successThreshold: 1 # timeoutSeconds: 5 # httpGet: # path: / # port: app # readinessProbe: # enabled: true # failureThreshold: 6 # initialDelaySeconds: 60 # periodSeconds: 15 # successThreshold: 1 # timeoutSeconds: 5 # httpGet: # path: / # port: app