Advanced Helm Options

Version: v0.12.4 AppVersion: v0.12.4

Controller for the BotKube Slack app which helps you monitor your Kubernetes cluster, debug deployments and run specific checks on resources in the cluster.

Homepage: https://www.botkube.io

Maintainers

NameEmailUrl
PrasadG193prasad.ghangal@gmail.com
ssudake21sanket@infracloud.io

Source Code

Now Supports AWS IRSA on EKS

AWS has introduced IAM Role for Service Accounts in order to provide fine grained access. This is useful if you are looking to run BotKube inside an EKS cluster. For more details visit https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html.

Annotate the BotKube Service Account as shown in the example below and add the necessary Trust Relationship to the corresponding BotKube role to get this working

serviceAccount:
  annotations:
    eks.amazonaws.com/role-arn: "<role_arn_to_assume>"

Values

KeyTypeDefaultDescription
affinityobject{}
communications.discord.botidstring"DISCORD_BOT_ID"
communications.discord.channelstring"DISCORD_CHANNEL_ID"
communications.discord.enabledboolfalse
communications.discord.notiftypestring"short"
communications.discord.tokenstring"DISCORD_TOKEN"
communications.elasticsearch.awsSigning.awsRegionstring"us-east-1"
communications.elasticsearch.awsSigning.enabledboolfalse
communications.elasticsearch.awsSigning.roleArnstring""
communications.elasticsearch.enabledboolfalse
communications.elasticsearch.index.namestring"botkube"
communications.elasticsearch.index.replicasint0
communications.elasticsearch.index.shardsint1
communications.elasticsearch.index.typestring"botkube-event"
communications.elasticsearch.passwordstring"ELASTICSEARCH_PASSWORD"
communications.elasticsearch.serverstring"ELASTICSEARCH_ADDRESS"
communications.elasticsearch.skipTLSVerifyboolfalse
communications.elasticsearch.usernamestring"ELASTICSEARCH_USERNAME"
communications.existingSecretNamestring""
communications.mattermost.botNamestring"BotKube"
communications.mattermost.channelstring"MATTERMOST_CHANNEL"
communications.mattermost.enabledboolfalse
communications.mattermost.notiftypestring"short"
communications.mattermost.teamstring"MATTERMOST_TEAM"
communications.mattermost.tokenstring"MATTERMOST_TOKEN"
communications.mattermost.urlstring"MATTERMOST_SERVER_URL"
communications.slack.channelstring"SLACK_CHANNEL"
communications.slack.enabledboolfalse
communications.slack.notiftypestring"short"
communications.slack.tokenstring"SLACK_API_TOKEN"
communications.teams.appIDstring"APPLICATION_ID"
communications.teams.appPasswordstring"APPLICATION_PASSWORD"
communications.teams.enabledboolfalse
communications.teams.notiftypestring"short"
communications.teams.portint3978
communications.webhook.enabledboolfalse
communications.webhook.urlstring"WEBHOOK_URL"
config.recommendationsbooltrueabout the best practices for the created resource
config.resourceslist[]
config.settings.clusternamestring"not-configured"
config.settings.configwatcherbooltrue
config.settings.kubectl.commands.resourceslist[]
config.settings.kubectl.commands.verbslist[]
config.settings.kubectl.defaultNamespacestring"default"
config.settings.kubectl.enabledboolfalse
config.settings.kubectl.restrictAccessboolfalse
config.settings.upgradeNotifierbooltrue
config.ssl.enabledboolfalse
containerSecurityContext.allowPrivilegeEscalationboolfalse
containerSecurityContext.privilegedboolfalse
containerSecurityContext.readOnlyRootFilesystembooltrue
extraAnnotationsobject{}
extraEnvstringnil
fullnameOverridestring""
image.pullPolicystring"IfNotPresent"
image.registrystring"ghcr.io"
image.repositorystring"infracloudio/botkube"
image.tagstring"v0.12.4"
ingress.annotations.“kubernetes.io/ingress.class”string"nginx"
ingress.createboolfalse
ingress.hoststring"HOST"
ingress.tls.enabledboolfalse
ingress.tls.secretNamestring""
ingress.urlPathstring"/"
logLevelstring"info"
nameOverridestring""
nodeSelectorobject{}
podSecurityPolicy.enabledboolfalse
priorityClassNamestring""
rbac.createbooltrue
rbac.ruleslist[]
replicaCountint1
resourcesobject{}
securityContextobject{"runAsGroup":101,"runAsUser":101}set to run as a Non-Privileged user by default
service.namestring"metrics"
service.portint2112
service.targetPortint2112
serviceAccount.annotationsobject{}If not set and create is true, a name is generated using the fullname template annotations for the service account
serviceAccount.createbooltrue
serviceMonitor.enabledboolfalse
serviceMonitor.intervalstring"10s"
serviceMonitor.labelsobject{}
serviceMonitor.pathstring"/metrics"
serviceMonitor.portstring"metrics"
tolerationslist[]
extraObjectslist[]Extra Kubernetes resources to create. Helm templating is allowed as it is evaluated before creating the resources.