Controller for the BotKube Slack app which helps you monitor your Kubernetes cluster, debug deployments and run specific checks on resources in the cluster.
Homepage: https://www.botkube.io
Name | Url | |
---|---|---|
PrasadG193 | prasad.ghangal@gmail.com | |
ssudake21 | sanket@infracloud.io |
AWS has introduced IAM Role for Service Accounts in order to provide fine grained access. This is useful if you are looking to run BotKube inside an EKS cluster. For more details visit https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html.
Annotate the BotKube Service Account as shown in the example below and add the necessary Trust Relationship to the corresponding BotKube role to get this working
serviceAccount:
annotations:
eks.amazonaws.com/role-arn: "<role_arn_to_assume>"
Key | Type | Default | Description |
---|---|---|---|
affinity | object | {} | |
communications.discord.botid | string | "DISCORD_BOT_ID" | |
communications.discord.channel | string | "DISCORD_CHANNEL_ID" | |
communications.discord.enabled | bool | false | |
communications.discord.notiftype | string | "short" | |
communications.discord.token | string | "DISCORD_TOKEN" | |
communications.elasticsearch.awsSigning.awsRegion | string | "us-east-1" | |
communications.elasticsearch.awsSigning.enabled | bool | false | |
communications.elasticsearch.awsSigning.roleArn | string | "" | |
communications.elasticsearch.enabled | bool | false | |
communications.elasticsearch.index.name | string | "botkube" | |
communications.elasticsearch.index.replicas | int | 0 | |
communications.elasticsearch.index.shards | int | 1 | |
communications.elasticsearch.index.type | string | "botkube-event" | |
communications.elasticsearch.password | string | "ELASTICSEARCH_PASSWORD" | |
communications.elasticsearch.server | string | "ELASTICSEARCH_ADDRESS" | |
communications.elasticsearch.skipTLSVerify | bool | false | |
communications.elasticsearch.username | string | "ELASTICSEARCH_USERNAME" | |
communications.existingSecretName | string | "" | |
communications.mattermost.botName | string | "BotKube" | |
communications.mattermost.channel | string | "MATTERMOST_CHANNEL" | |
communications.mattermost.enabled | bool | false | |
communications.mattermost.notiftype | string | "short" | |
communications.mattermost.team | string | "MATTERMOST_TEAM" | |
communications.mattermost.token | string | "MATTERMOST_TOKEN" | |
communications.mattermost.url | string | "MATTERMOST_SERVER_URL" | |
communications.slack.channel | string | "SLACK_CHANNEL" | |
communications.slack.enabled | bool | false | |
communications.slack.notiftype | string | "short" | |
communications.slack.token | string | "SLACK_API_TOKEN" | |
communications.teams.appID | string | "APPLICATION_ID" | |
communications.teams.appPassword | string | "APPLICATION_PASSWORD" | |
communications.teams.enabled | bool | false | |
communications.teams.notiftype | string | "short" | |
communications.teams.port | int | 3978 | |
communications.webhook.enabled | bool | false | |
communications.webhook.url | string | "WEBHOOK_URL" | |
config.recommendations | bool | true | about the best practices for the created resource |
config.resources | list | [] | |
config.settings.clustername | string | "not-configured" | |
config.settings.configwatcher | bool | true | |
config.settings.kubectl.commands.resources | list | [] | |
config.settings.kubectl.commands.verbs | list | [] | |
config.settings.kubectl.defaultNamespace | string | "default" | |
config.settings.kubectl.enabled | bool | false | |
config.settings.kubectl.restrictAccess | bool | false | |
config.settings.upgradeNotifier | bool | true | |
config.ssl.enabled | bool | false | |
containerSecurityContext.allowPrivilegeEscalation | bool | false | |
containerSecurityContext.privileged | bool | false | |
containerSecurityContext.readOnlyRootFilesystem | bool | true | |
extraAnnotations | object | {} | |
fullnameOverride | string | "" | |
image.pullPolicy | string | "IfNotPresent" | |
image.registry | string | "ghcr.io" | |
image.repository | string | "infracloudio/botkube" | |
image.tag | string | "v0.12.4" | |
ingress.annotations.“kubernetes.io/ingress.class” | string | "nginx" | |
ingress.create | bool | false | |
ingress.host | string | "HOST" | |
ingress.tls.enabled | bool | false | |
ingress.tls.secretName | string | "" | |
ingress.urlPath | string | "/" | |
logLevel | string | "info" | |
nameOverride | string | "" | |
nodeSelector | object | {} | |
podSecurityPolicy.enabled | bool | false | |
priorityClassName | string | "" | |
rbac.create | bool | true | |
rbac.rules | list | [] | |
replicaCount | int | 1 | |
resources | object | {} | |
securityContext | object | {"runAsGroup":101,"runAsUser":101} | set to run as a Non-Privileged user by default |
service.name | string | "metrics" | |
service.port | int | 2112 | |
service.targetPort | int | 2112 | |
serviceAccount.annotations | object | {} | If not set and create is true, a name is generated using the fullname template annotations for the service account |
serviceAccount.create | bool | true | |
serviceMonitor.enabled | bool | false | |
serviceMonitor.interval | string | "10s" | |
serviceMonitor.labels | object | {} | |
serviceMonitor.path | string | "/metrics" | |
serviceMonitor.port | string | "metrics" | |
tolerations | list | [] | |
extraObjects | list | [] | Extra Kubernetes resources to create. Helm templating is allowed as it is evaluated before creating the resources. |
extraEnv | list | [] | Extra environment variables to pass to the BotKube container. For the syntax, see the environment variable API document. |
extraVolumeMounts | list | [] | Extra volume mounts to pass to the BotKube container. For the syntax, see the Volumes API document. |
extraVolumes | list | [] | Extra volumes to pass to the BotKube container. Mount it later with extraVolumeMounts. For the syntax, see the mount Volumes API document. |