The following table lists the configurable parameters of the K10 chart and their default values.
Parameter |
Description |
Default |
---|---|---|
|
Whether to enable accept EULA before installation |
|
|
Company name. Required field if EULA is accepted |
|
|
Contact email. Required field if EULA is accepted |
|
|
License string obtained from Kasten |
|
|
Whether to enable RBAC with a specific cluster role and binding for K10 |
|
|
Whether to create a SecurityContextConstraints for K10 ServiceAccounts |
|
|
Sets the SecurityContextConstraints priority |
|
|
Whether the dashboardbff pods may use the node network |
|
|
Whether the executor pods may use the node network |
|
|
Whether the aggregatedapis pods may use the node network |
|
|
Specifies whether a ServiceAccount should be created |
|
|
The name of the ServiceAccount to use. If not set, a name is derived using the release and chart names. |
|
|
Specifies whether the K10 dashboard should be exposed via ingress |
|
|
Optional name of the Ingress object for the K10 dashboard. If not set, the name is formed using the release name. |
|
|
Cluster ingress controller class: |
|
|
FQDN (e.g., |
|
|
URL path for K10 Dashboard (e.g., |
|
|
Specifies the path type for the ingress resource |
|
|
Additional Ingress object annotations |
|
|
Configures a TLS use for |
|
|
Optional TLS secret name |
|
|
Configures the default backend backed by a service for the K10 dashboard Ingress (mutually exclusive setting with |
|
|
The name of a service referenced by the default backend (required if the service-backed default backend is used). |
|
|
The port name of a service referenced by the default backend (mutually exclusive setting with port |
|
|
The port number of a service referenced by the default backend (mutually exclusive setting with port |
|
|
Configures the default backend backed by a resource for the K10 dashboard Ingress (mutually exclusive setting with |
|
|
Optional API group of a resource backing the default backend. |
|
|
The type of a resource being referenced by the default backend (required if the resource default backend is used). |
|
|
The name of a resource being referenced by the default backend (required if the resource default backend is used). |
|
|
Default global size of volumes for K10 persistent services |
|
|
Size of a volume for catalog service |
|
|
Size of a volume for jobs service |
|
|
Size of a volume for logging service |
|
|
Size of a volume for metering service |
|
|
Specified StorageClassName will be used for PVCs |
|
|
Configures custom labels to be set to all Kasten pods |
|
|
Configures custom annotations to be set to all Kasten pods |
|
|
Specify the helm repository for offline (airgapped) installation |
|
|
Provide secret which contains docker config for private repository. Use |
|
|
Provide external prometheus host name |
|
|
Provide external prometheus port number |
|
|
Provide Base URL of external prometheus |
|
|
Enable |
|
|
Enable Google Workload Identity Federation for K10 |
|
|
Identity Provider type for Google Workload Identity Federation for K10 |
|
|
Audience for whom the ID Token from Identity Provider is intended |
|
|
AWS access key ID (required for AWS deployment) |
|
|
AWS access key secret |
|
|
ARN of the AWS IAM role assumed by K10 to perform any AWS operation. |
|
|
The secret that contains AWS access key ID, AWS access key secret and AWS IAM role for AWS |
|
|
Non-default base64 encoded GCP Service Account key |
|
|
Sets Google Project ID other than the one used in the GCP Service Account |
|
|
Azure tenant ID (required for Azure deployment) |
|
|
Azure Service App ID |
|
|
Azure Service APP secret |
|
|
The secret that contains ClientID, ClientSecret and TenantID for Azure |
|
|
Resource Group name that was created for the Kubernetes cluster |
|
|
Subscription ID in your Azure tenant |
|
|
Resource management endpoint for the Azure Stack instance |
|
|
Azure Active Directory login endpoint |
|
|
Azure Active Directory resource ID to obtain AD tokens |
|
|
Microsoft Entra ID login endpoint |
|
|
Microsoft Entra ID resource ID to obtain AD tokens |
|
|
Azure Cloud Environment ID |
|
|
vSphere endpoint for login |
|
|
vSphere username for login |
|
|
vSphere password for login |
|
|
The secret that contains vSphere username, vSphere password and vSphere endpoint |
|
|
Set base64 encoded docker config to use for image pull operations. Alternative to the |
|
|
Use |
|
|
Name of the ConfigMap that contains a certificate for a trusted root certificate authority |
|
|
Cluster name for better logs visibility |
|
|
Sets AWS_REGION for metering service |
|
|
Control license reporting (set to |
|
|
Sets metric report collection period (in seconds) |
|
|
Sets metric report push period (in seconds) |
|
|
Sets K10 promotion ID from marketing campaigns |
|
|
Sets AWS cloud metering license mode |
|
|
Sets AWS managed license mode |
|
|
Sets Red Hat cloud metering license mode |
|
|
Sets AWS managed license config secret |
|
|
Configures an external gateway for K10 API services |
|
|
Standard annotations for the services |
|
|
Domain name for the K10 API services |
|
|
Supported gateway type: |
|
|
ARN for the AWS ACM SSL certificate used in the K10 API server |
|
|
Configures basic authentication for the K10 dashboard |
|
|
A username and password pair separated by a colon character |
|
|
Name of an existing Secret that contains a file generated with htpasswd |
|
|
A list of groups whose members are granted admin level access to K10's dashboard |
|
|
A list of users who are granted admin level access to K10's dashboard |
|
|
Configures token based authentication for the K10 dashboard |
|
|
Configures Open ID Connect based authentication for the K10 dashboard |
|
|
URL for the OIDC Provider |
|
|
URL to the K10 gateway service |
|
|
Space separated OIDC scopes required for userinfo. Example: "profile email" |
|
|
The type of prompt to be used during authentication (none, consent, login or select_account) |
|
|
Client ID given by the OIDC provider for K10 |
|
|
Client secret given by the OIDC provider for K10 |
|
|
The secret that contains the Client ID and Client secret given by the OIDC provider for K10 |
|
|
The claim to be used as the username |
|
|
Prefix that has to be used with the username obtained from the username claim |
|
|
Name of a custom OpenID Connect claim for specifying user groups |
|
|
All groups will be prefixed with this value to prevent conflicts |
|
|
Maximum OIDC session duration |
|
|
Enable OIDC Refresh Token support |
|
|
Enables access to the K10 dashboard by authenticating with the OpenShift OAuth server |
|
|
Name of the service account that represents an OAuth client |
|
|
The token corresponding to the service account |
|
|
The secret that contains the token corresponding to the service account |
|
|
The URL used for accessing K10's dashboard |
|
|
The URL for accessing OpenShift's API server |
|
|
To turn off SSL verification of connections to OpenShift |
|
|
Set this to true to use the CA certificate corresponding to the Service Account |
|
|
Set this to false to disable the OCP CA certificates automatic extraction to the K10 namespace |
|
|
Configures Active Directory/LDAP based authentication for the K10 dashboard |
|
|
To force a restart of the authentication service pod (useful when updating authentication config) |
|
|
The URL used for accessing K10's dashboard |
|
|
Host and optional port of the AD/LDAP server in the form |
|
|
Required if the AD/LDAP host is not using TLS |
|
|
To turn off SSL verification of connections to the AD/LDAP host |
|
|
When set to true, ldap:// is used to connect to the server followed by creation of a TLS session. When set to false, ldaps:// is used. |
|
|
The Distinguished Name(username) used for connecting to the AD/LDAP host |
|
|
The password corresponding to the |
|
|
The name of the secret that contains the password corresponding to the |
|
|
The base Distinguished Name to start the AD/LDAP search from |
|
|
Optional filter to apply when searching the directory |
|
|
Attribute used for comparing user entries when searching the directory |
|
|
AD/LDAP attribute in a user's entry that should map to the user ID field in a token |
|
|
AD/LDAP attribute in a user's entry that should map to the email field in a token |
|
|
AD/LDAP attribute in a user's entry that should map to the name field in a token |
|
|
AD/LDAP attribute in a user's entry that should map to the preferred_username field in a token |
|
|
The base Distinguished Name to start the AD/LDAP group search from |
|
|
Optional filter to apply when searching the directory for groups |
|
|
The AD/LDAP attribute that represents a group's name in the directory |
|
|
List of field pairs that are used to match a user to a group. |
|
|
Attribute in the user's entry that must match with the |
|
|
Attribute in the group's entry that must match with the |
|
|
A list of groups whose members are allowed access to K10's dashboard |
|
|
Custom security context for K10 service containers |
|
|
User ID K10 service containers run as |
|
|
Group ID K10 service containers run as |
|
|
FSGroup that owns K10 service container volumes |
|
|
Whether to enable writing K10 audit event logs to stdout (standard output) |
|
|
Directory path for saving audit logs in a cloud object store |
|
|
Whether to enable sending K10 audit event logs to AWS S3 |
|
|
Enable Kanister sidecar injection for workload pods |
|
|
Set of labels to select namespaces in which sidecar injection is enabled for workloads |
|
|
Set of labels to filter workload objects in which the sidecar is injected |
|
|
Port number on which the mutating webhook server accepts request |
|
|
Specifies whether to disable SSL verification for gateway pods |
|
|
Specifies whether to expose Admin port for gateway service |
|
|
Resource requests and limits for gateway pod |
|
|
Specifies the gateway services external port |
|
|
Specifies resource requests and limits for generic backup sidecar and all temporary Kasten worker Pods. Superseded by ActionPodSpec |
|
|
Choose whether to enable the multi-cluster system components and capabilities |
|
|
Choose whether to setup cluster as a multi-cluster primary |
|
|
Primary cluster name |
|
|
Primary cluster dashboard URL |
|
|
(optional) Set Prometheus image registry. |
|
|
(optional) Set Prometheus image repository. |
|
|
(optional) Whether to create Prometheus RBAC configuration. Warning - this action will allow prometheus to scrape pods in all k8s namespaces |
|
|
DEPRECATED: (optional) Enable Prometheus |
|
|
DEPRECATED: (optional) Set true to create ServiceAccount for |
|
|
DEPRECATED: (optional) Enable Prometheus |
|
|
DEPRECATED: (optional) Enable Prometheus |
|
|
DEPRECATED: (optional) Set true to create ServiceAccount for |
|
|
DEPRECATED: (optional) Enable Prometheus |
|
|
DEPRECATED: (optional) Set true to create ServiceAccount for |
|
|
DEPRECATED: (optional) Enable Prometheus ScrapeCAdvisor |
|
|
(optional) If false, K10's Prometheus server will not be created, reducing the dashboard's functionality. |
|
|
(optional) Set security context |
|
|
(optional) Enable security context |
|
|
(optional) Set security context |
|
|
(optional) Set security context |
|
|
(optional) K10 Prometheus data retention |
|
|
DEPRECATED: (optional) The number of Prometheus server pods that can be created above the desired amount of pods during an update |
|
|
DEPRECATED: (optional) The number of Prometheus server pods that can be unavailable during the upgrade process |
|
|
DEPRECATED: (optional) Change default deployment strategy for Prometheus server |
|
|
DEPRECATED: (optional) If true, K10 Prometheus server will create a Persistent Volume Claim |
|
|
(optional) K10 Prometheus server data Persistent Volume size |
|
|
(optional) StorageClassName used to create Prometheus PVC. Setting this option overwrites global StorageClass value |
|
|
DEPRECATED: (optional) Prometheus configmap name to override default generated name |
|
|
(optional) Prometheus deployment name to override default generated name |
|
|
(optional) K10 Prometheus external url path at which the server can be accessed |
|
|
(optional) K10 Prometheus prefix slug at which the server can be accessed |
|
|
DEPRECATED: (optional) Set true to create ServiceAccount for Prometheus server service |
|
|
(optional) If false Grafana will not be available |
|
|
Overwriting the default K10 container resource requests and limits |
varies depending on the container |
|
Specifies whether the K10 dashboard should be exposed via route |
|
|
FQDN (e.g., |
|
|
URL path for K10 Dashboard (e.g., |
|
|
Additional Route object annotations |
|
|
Additional Route object labels |
|
|
Configures a TLS use for |
|
|
Specifies behavior for insecure scheme traffic |
|
|
Specifies the TLS termination of the route |
|
|
Specifies the resolver used for service discovery in the API gateway ( |
|
|
Specifies the number of executor-svc Pods used to process Kasten jobs |
3 |
|
Specifies the number of threads per executor-svc Pod used to process Kasten jobs |
8 |
|
Per action limit of concurrent manifest data snapshots, based on workload (ex. Namespace, Deployment, StatefulSet, VirtualMachine) |
5 |
|
Cluster-wide limit of concurrent CSI VolumeSnapshot creation requests |
|
|
Cluster-wide limit of concurrent non-CSI snapshot creation requests |
|
|
Per action limit of concurrent volume export operations |
|
|
Cluster-wide limit of concurrent volume export operations |
|
|
Cluster-wide limit of concurrent Generic Volume Backup operations |
|
|
Cluster-wide limit of concurrent ImageStream container image backup (i.e. copy from) and restore (i.e. copy to) operations |
|
|
Per action limit of concurrent manifest data restores, based on workload (ex. Namespace, Deployment, StatefulSet, VirtualMachine) |
3 |
|
Per action limit of concurrent CSI volume provisioning requests when restoring from VolumeSnapshots |
3 |
|
Per action limit of concurrent volume restore operations from an exported backup |
3 |
|
Cluster-wide limit of concurrent volume restore operations from exported backups |
|
|
Specifies the domain name of the cluster |
|
|
Specifies the timeout (in minutes) for Blueprint backup actions |
|
|
Specifies the timeout (in minutes) for Blueprint restore actions |
|
|
Specifies the timeout (in minutes) for Blueprint delete actions |
|
|
Specifies the timeout (in minutes) for Blueprint backupPrehook and backupPosthook actions |
|
|
Specifies the timeout (in minutes) for temporary worker Pods used to validate backup repository existence |
|
|
Specifies the timeout (in minutes) for temporary worker Pods used to collect repository statistics |
|
|
Specifies the timeout (in minutes) for temporary worker Pods used for shareable volume restore operations |
|
|
Specifies the timeout (in minutes) for all other temporary worker Pods used during Veeam Kasten operations |
|
|
Specifies the timeout (in minutes) for completing execution of any child job, after which the parent job will be canceled. If no value is set, a default of 10 hours will be used |
|
|
Duration of a session token generated by AWS for an IAM role. The minimum value is 15 minutes and the maximum value is the maximum duration setting for that IAM role. For documentation about how to view and edit the maximum session duration for an IAM role see https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session. The value accepts a number along with a single character |
|
|
Specifies the AWS EFS backup vault name |
|
|
Specifies the timeout for VMWare operations |
|
|
Specifies the AWS CMK key ID for encrypting K10 Primary Key |
|
|
Sets garbage collection period (in seconds) |
|
|
Sets maximum actions to keep |
|
|
Enables action collectors |
|
|
Defines the time duration within which the VMs must be unfrozen while backing them up. To know more about format go doc can be followed |
|
|
Specifies a list of applications to be excluded from the dashboard & compliance considerations. Format should be a YAML array |
|
|
Enables a sidecar container for temporary worker Pods used to push Pod performance metrics to Prometheus |
|
|
Specifies the period after which metrics for an individual worker Pod are removed from Prometheus |
|
|
Specifies the frequency for pushing metrics into Prometheus |
|
|
Specifies resource requests and limits for the temporary worker Pod metric sidecar |
|
|
Forces any Pod created by a Blueprint to run as root user |
|
|
Specifies the default priority class name for all K10 deployments and ephemeral pods |
|
|
Overrides the default priority class name for the specified deployment |
|
|
Set the percentage increase for the ephemeral Persistent Volume Claim's storage request, e.g. PVC size = (file raw size) * (1 + |
|
|
Specifies how many files can be uploaded in parallel to the data store |
|
|
Specifies how many files can be downloaded in parallel from the data store |
|
|
Enables K10 Quick Disaster Recovery |
|
|
Specifies whether K10 should be run in the FIPS mode of operation |
|
|
Specifies whether K10 should use |
|
|
Max CPU which might be setup in |
|
|
Max memory which might be setup in |
|
|
The name of |
|
|
The namespace of |
|