Skip to content

Latest commit

 

History

History

core

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 
 
 

NeuVector Helm Chart

Helm chart for NeuVector container security's core services.

CRD

Because the CRD (Custom Resource Definition) policies can be deployed before NeuVector's core product, a new 'crd' helm chart is created. The crd template in the 'core' chart is kept for the backward compatibility. Please set crdwebhook.enabled to false, if you use the new 'crd' chart.

Choosing container runtime

Prior to 5.3 release, the user has to specify the correct container runtime type and its socket path. In 5.3.0 release, the enforcer is able to automatically detect the container runtime at its default socket location. The settings of docker/containerd/crio/k8s/bottlerocket become deprecated. If the container runtime socket is not at the default location, please specify it using 'runtimePath' field. In the meantime, the controller does not require the runtime socket to be mounted any more.

Configuration

The following table lists the configurable parameters of the NeuVector chart and their default values.

Parameter Description Default Notes
openshift If deploying in OpenShift, set this to true false
registry NeuVector container registry docker.io
tag image tag for controller enforcer manager latest
oem OEM release name nil
imagePullSecrets image pull secret nil
rbac NeuVector RBAC Manifests are installed when RBAC is enabled true Required for Rancher Authentication.
psp NeuVector Pod Security Policy when psp policy is enabled false
serviceAccount Service account name for NeuVector components default
leastPrivilege Use least privileged service account false
bootstrapPassword Set password for admin user account if present false Random password generated if aws billing is enabled
autoGenerateCert Automatically generate certificate or not true
internal.certmanager.enabled cert-manager is installed for the internal certificates false
internal.certmanager.secretname Name of the secret to be used for the internal certificates neuvector-internal
internal.autoGenerateCert Automatically generate internal certificate or not true
internal.autoRotateCert Automatically rotate internal certificate or not false
defaultValidityPeriod The default validity period used for certs automatically generated (days) 365
global.cattle.url Set the Rancher Server URL Required for Rancher Authentication. https://<Rancher_URL>/
global.aws.enabled If true, install AWS billing csp adapter false Note: default admin user is disabled when aws market place billing enabled, use secret to create admin-role user to manage NeuVector deployment.
global.aws.accountNumber AWS Account Number nil Follow AWS subscription instruction
global.aws.roleName AWS Role name for billing nil Follow AWS subscription instruction
global.aws.serviceAccount Service account name for csp adapter csp Follow AWS subscription instruction
global.aws.imagePullSecrets Pull secret for csp adapter image nil Follow AWS subscription instruction
global.aws.image.repository csp adapter image repository neuvector/neuvector-csp-adapter Follow AWS subscription instruction
global.aws.image.tag csp adapter image tag latest Follow AWS subscription instruction
global.aws.image.digest csp adapter image digest nil Follow AWS subscription instruction
global.aws.image.imagePullPolicy csp adapter image pull policy IfNotPresent Follow AWS subscription instruction
global.azure.enabled If true, install Azure billing csp adapter false Note: default admin user is disabled when azure market place billing enabled, use secret to create admin-role user to manage NeuVector deployment.
global.azure.serviceAccount Service account name for csp adapter csp Follow Azure subscription instruction
global.azure.imagePullSecrets Pull secret for csp adapter image nil Follow Azure subscription instruction
global.azure.images.neuvector_csp_pod.registry csp adapter image registry susellcforazuremarketplace.azurecr.io Follow Azure subscription instruction
global.azure.images.neuvector_csp_pod.image csp adapter image repository neuvector-billing-azure-by-suse-llc Follow Azure subscription instruction
global.azure.images.neuvector_csp_pod.digest csp adapter image digest nil Follow Azure subscription instruction
global.azure.images.neuvector_csp_pod.imagePullPolicy csp adapter image pull policy IfNotPresent Follow Azure subscription instruction
controller.enabled If true, create controller true
controller.prime.enabled NeuVector prime deployment false
controller.image.repository controller image repository neuvector/controller
controller.image.hash controller image hash in the format of sha256:xxxx. If present it overwrites the image tag value.
controller.replicas controller replicas 3
controller.schedulerName kubernetes scheduler name nil
controller.affinity controller affinity rules ... spread controllers to different nodes
controller.topologySpreadConstraints List of constraints to control Pods spread across the cluster nil
controller.tolerations List of node taints to tolerate nil
controller.resources Add resources requests and limits to controller deployment {} see examples in values.yaml
controller.nodeSelector Enable and specify nodeSelector labels {}
controller.disruptionbudget controller PodDisruptionBudget. 0 to disable. Recommended value: 2. 0
controller.priorityClassName controller priorityClassName. Must exist prior to helm deployment. Leave empty to disable. nil
controller.podLabels Specify the pod labels. {}
controller.podAnnotations Specify the pod annotations. {}
controller.env User-defined environment variables for controller. []
controller.ranchersso.enabled If true, enable single sign on for Rancher false Required for Rancher Authentication.
controller.pvc.enabled If true, enable persistence for controller using PVC false Require persistent volume type RWX, and storage 1Gi
controller.pvc.accessModes Access modes for the created PVC. ["ReadWriteMany"]
controller.pvc.existingClaim If false, a new PVC will be created. If a string is provided, an existing PVC with this name will be used. false
controller.pvc.storageClass Storage Class to be used default
controller.pvc.capacity Storage capacity 1Gi
controller.searchRegistries Custom search registries for Admission control nil
controller.azureFileShare.enabled If true, enable the usage of an existing or statically provisioned Azure File Share false
controller.azureFileShare.secretName The name of the secret containing the Azure file share storage account name and key nil
controller.azureFileShare.shareName The name of the Azure file share to use nil
controller.apisvc.type Controller REST API service type nil
controller.apisvc.annotations Add annotations to controller REST API service {}
controller.apisvc.route.enabled If true, create a OpenShift route to expose the Controller REST API service false
controller.apisvc.route.termination Specify TLS termination for OpenShift route for Controller REST API service. Possible passthrough, edge, reencrypt passthrough
controller.apisvc.route.host Set controller REST API service hostname nil
controller.apisvc.route.tls.key Set controller REST API service PEM format key file nil
controller.apisvc.route.tls.certificate Set controller REST API service PEM format certificate file nil
controller.apisvc.route.tls.caCertificate Set controller REST API service CA certificate may be required to establish a certificate chain for validation nil
controller.apisvc.route.tls.destinationCACertificate Set controller REST API service CA certificate to validate the endpoint certificate nil
controller.certificate.secret Replace controller REST API certificate using secret if secret name is specified nil
controller.certificate.keyFile Replace controller REST API certificate key file tls.key
controller.certificate.pemFile Replace controller REST API certificate pem file tls.pem
controller.federation.mastersvc.type Multi-cluster primary cluster service type. If specified, the deployment will be used to manage other clusters. Possible values include NodePort, LoadBalancer and ClusterIP. nil
controller.federation.mastersvc.loadBalancerIP Multi-cluster primary cluster service load balancer IP. If specified, the deployment must also specify controller.federation.mastersvc.type of LoadBalancer. nil
controller.federation.mastersvc.clusterIP Set clusterIP to be used for mastersvc nil
controller.federation.mastersvc.nodePort Define a nodePort for mastersvc nil Must be a valid NodePort (30000-32767)
controller.federation.mastersvc.externalTrafficPolicy Set externalTrafficPolicy to be used for mastersvc nil
controller.federation.mastersvc.internalTrafficPolicy Set internalTrafficPolicy to be used for mastersvc nil
controller.federation.mastersvc.annotations Add annotations to Multi-cluster primary cluster REST API service {}
controller.federation.mastersvc.route.enabled If true, create a OpenShift route to expose the Multi-cluster primary cluster service false
controller.federation.mastersvc.route.host Set OpenShift route host for primary cluster service nil
controller.federation.mastersvc.route.termination Specify TLS termination for OpenShift route for Multi-cluster primary cluster service. Possible passthrough, edge, reencrypt passthrough
controller.federation.mastersvc.route.tls.key Set PEM format key file for OpenShift route for Multi-cluster primary cluster service nil
controller.federation.mastersvc.route.tls.certificate Set PEM format key certificate file for OpenShift route for Multi-cluster primary cluster service nil
controller.federation.mastersvc.route.tls.caCertificate Set CA certificate may be required to establish a certificate chain for validation for OpenShift route for Multi-cluster primary cluster service nil
controller.federation.mastersvc.route.tls.destinationCACertificate Set CA certificate to validate the endpoint certificate for OpenShift route for Multi-cluster primary cluster service nil
controller.federation.mastersvc.ingress.enabled If true, create ingress for federation master service, must also set ingress host value false enable this if ingress controller is installed
controller.federation.mastersvc.ingress.tls If true, TLS is enabled for controller federation master ingress service false If set, the tls-host used is the one set with controller.federation.mastersvc.ingress.host.
controller.federation.mastersvc.ingress.host Must set this host value if ingress is enabled nil
controller.federation.mastersvc.ingress.ingressClassName To be used instead of the ingress.class annotation if an IngressClass is provisioned ""
controller.federation.mastersvc.ingress.secretName Name of the secret to be used for TLS-encryption nil Secret must be created separately (Let's encrypt, manually)
controller.federation.mastersvc.ingress.path Set ingress path / If set, it might be necessary to set a rewrite rule in annotations.
controller.federation.mastersvc.ingress.annotations Add annotations to ingress to influence behavior nginx.ingress.kubernetes.io/backend-protocol: "HTTPS" see examples in values.yaml
controller.federation.managedsvc.type Multi-cluster managed cluster service type. If specified, the deployment will be managed by the managed clsuter. Possible values include NodePort, LoadBalancer and ClusterIP. nil
controller.federation.managedsvc.loadBalancerIP Multi-cluster primary cluster service load balancer IP. If specified, the deployment must also specify controller.federation.mastersvc.type of LoadBalancer. nil
controller.federation.managedsvc.clusterIP Set clusterIP to be used for managedsvc nil
controller.federation.managedsvc.nodePort Define a nodePort for managedsvc nil Must be a valid NodePort (30000-32767)
controller.federation.managedsvc.externalTrafficPolicy Set externalTrafficPolicy to be used for managedsvc nil
controller.federation.managedsvc.internalTrafficPolicy Set internalTrafficPolicy to be used for managedsvc nil
controller.federation.managedsvc.annotations Add annotations to Multi-cluster managed cluster REST API service {}
controller.federation.managedsvc.route.enabled If true, create a OpenShift route to expose the Multi-cluster managed cluster service false
controller.federation.managedsvc.route.host Set OpenShift route host for manageed service nil
controller.federation.managedsvc.route.termination Specify TLS termination for OpenShift route for Multi-cluster managed cluster service. Possible passthrough, edge, reencrypt passthrough
controller.federation.managedsvc.route.tls.key Set PEM format key file for OpenShift route for Multi-cluster managed cluster service nil
controller.federation.managedsvc.route.tls.certificate Set PEM format certificate file for OpenShift route for Multi-cluster managed cluster service nil
controller.federation.managedsvc.route.tls.caCertificate Set CA certificate may be required to establish a certificate chain for validation for OpenShift route for Multi-cluster managed cluster service nil
controller.federation.managedsvc.route.tls.destinationCACertificate Set CA certificate to validate the endpoint certificate for OpenShift route for Multi-cluster managed cluster service nil
controller.federation.managedsvc.ingress.enabled If true, create ingress for federation managed service, must also set ingress host value false enable this if ingress controller is installed
controller.federation.managedsvc.ingress.tls If true, TLS is enabled for controller federation managed ingress service false If set, the tls-host used is the one set with controller.federation.managedsvc.ingress.host.
controller.federation.managedsvc.ingress.host Must set this host value if ingress is enabled nil
controller.federation.managedsvc.ingress.ingressClassName To be used instead of the ingress.class annotation if an IngressClass is provisioned ""
controller.federation.managedsvc.ingress.secretName Name of the secret to be used for TLS-encryption nil Secret must be created separately (Let's encrypt, manually)
controller.federation.managedsvc.ingress.path Set ingress path / If set, it might be necessary to set a rewrite rule in annotations.
controller.federation.managedsvc.ingress.annotations Add annotations to ingress to influence behavior nginx.ingress.kubernetes.io/backend-protocol: "HTTPS" see examples in values.yaml
controller.ingress.enabled If true, create ingress for rest api, must also set ingress host value false enable this if ingress controller is installed
controller.ingress.tls If true, TLS is enabled for controller rest api ingress service false If set, the tls-host used is the one set with controller.ingress.host.
controller.ingress.host Must set this host value if ingress is enabled nil
controller.ingress.ingressClassName To be used instead of the ingress.class annotation if an IngressClass is provisioned ""
controller.ingress.secretName Name of the secret to be used for TLS-encryption nil Secret must be created separately (Let's encrypt, manually)
controller.ingress.path Set ingress path / If set, it might be necessary to set a rewrite rule in annotations.
controller.ingress.annotations Add annotations to ingress to influence behavior nginx.ingress.kubernetes.io/backend-protocol: "HTTPS" see examples in values.yaml
controller.configmap.enabled If true, configure NeuVector global settings using a ConfigMap false
controller.configmap.data NeuVector configuration in YAML format {}
controller.secret.enabled If true, configure NeuVector global settings using secrets false
controller.secret.data NeuVector configuration in key/value pair format {}
controller.internal.certificate.secret Secret name to be used for custom controller internal certificate nil
controller.internal.certificate.keyFile Set PEM format key file for custom controller internal certificate tls.key
controller.internal.certificate.pemFile Set PEM format certificate file for custom controller internal certificate tls.crt
controller.internal.certificate.caFile Set CA certificate file for controller custom internal certificate ca.crt
controller.certupgrader.env User-defined environment variables. []
controller.certupgrader.schedule cert upgrader schedule. Leave empty to disable ``
controller.certupgrader.priorityClassName cert upgrader priorityClassName. Must exist prior to helm deployment. Leave empty to disable. nil
controller.certupgrader.podLabels Specify the pod labels. {}
controller.certupgrader.podAnnotations Specify the pod annotations. {}
controller.certupgrader.nodeSelector Enable and specify nodeSelector labels {}
controller.certupgrader.runAsUser Specify the run as User ID nil
enforcer.enabled If true, create enforcer true
enforcer.image.repository enforcer image repository neuvector/enforcer
enforcer.image.hash enforcer image hash in the format of sha256:xxxx. If present it overwrites the image tag value.
enforcer.updateStrategy.type enforcer update strategy type. RollingUpdate
enforcer.priorityClassName enforcer priorityClassName. Must exist prior to helm deployment. Leave empty to disable. nil
enforcer.podLabels Specify the pod labels. {}
enforcer.podAnnotations Specify the pod annotations. {}
enforcer.env User-defined environment variables for enforcers. []
enforcer.tolerations List of node taints to tolerate - effect: NoSchedule
key: node-role.kubernetes.io/master
other taints can be added after the default
enforcer.resources Add resources requests and limits to enforcer deployment {} see examples in values.yaml
enforcer.internal.certificate.secret Secret name to be used for custom enforcer internal certificate nil
enforcer.internal.certificate.keyFile Set PEM format key file for custom enforcer internal certificate tls.key
enforcer.internal.certificate.pemFile Set PEM format certificate file for custom enforcer internal certificate tls.crt
enforcer.internal.certificate.caFile Set CA certificate file for enforcer custom internal certificate ca.crt
manager.enabled If true, create manager true
manager.image.repository manager image repository neuvector/manager
manager.image.hash manager image hash in the format of sha256:xxxx. If present it overwrites the image tag value.
manager.priorityClassName manager priorityClassName. Must exist prior to helm deployment. Leave empty to disable. nil
manager.podLabels Specify the pod labels. {}
manager.podAnnotations Specify the pod annotations. {}
manager.env.ssl If false, manager will listen on HTTP access instead of HTTPS true
manager.env.envs Other environment variables. The following variables are accepted. []
CUSTOM_LOGIN_LOGO SVG file encoded in based64, the logo is displayed as a 300 x 80 pixels icon.
CUSTOM_EULA_POLICY HTML or TEXT encoded in base64.
CUSTOM_PAGE_HEADER_CONTENT max. 120 characters, base64 encoded.
CUSTOM_PAGE_HEADER_COLOR use color name (yellow) or value (#ffff00)
CUSTOM_PAGE_FOOTER_CONTENT max. 120 characters, base64 encoded.
CUSTOM_PAGE_FOOTER_COLOR use color name (yellow) or value (#ffff00)
manager.svc.type set manager service type for native Kubernetes NodePort;
if it is OpenShift platform or ingress is enabled, then default is ClusterIP
set to LoadBalancer if using cloud providers, such as Azure, Amazon, Google
manager.svc.loadBalancerIP if manager service type is LoadBalancer, this is used to specify the load balancer's IP nil
manager.svc.annotations Add annotations to manager service {} see examples in values.yaml
manager.route.enabled If true, create a OpenShift route to expose the management console service true
manager.route.host Set OpenShift route host for management console service nil
manager.route.termination Specify TLS termination for OpenShift route for management console service. Possible passthrough, edge, reencrypt passthrough
manager.route.tls.key Set PEM format key file for OpenShift route for management console service nil
manager.route.tls.certificate Set PEM format certificate file for OpenShift route for management console service nil
manager.route.tls.caCertificate Set CA certificate may be required to establish a certificate chain for validation for OpenShift route for management console service nil
manager.route.tls.destinationCACertificate Set controller REST API service CA certificate to validate the endpoint certificate for OpenShift route for management console service nil
manager.certificate.secret Replace manager UI certificate using secret if secret name is specified nil
manager.certificate.keyFile Replace manager UI certificate key file tls.key
manager.certificate.pemFile Replace manager UI certificate pem file tls.pem
manager.ingress.enabled If true, create ingress, must also set ingress host value false enable this if ingress controller is installed
manager.ingress.host Must set this host value if ingress is enabled nil
manager.ingress.ingressClassName To be used instead of the ingress.class annotation if an IngressClass is provisioned ""
manager.ingress.path Set ingress path / If set, it might be necessary to set a rewrite rule in annotations. Currently only supports /
manager.ingress.annotations Add annotations to ingress to influence behavior nginx.ingress.kubernetes.io/backend-protocol: "HTTPS" see examples in values.yaml
manager.ingress.tls If true, TLS is enabled for manager ingress service false If set, the tls-host used is the one set with manager.ingress.host.
manager.ingress.secretName Name of the secret to be used for TLS-encryption nil Secret must be created separately (Let's encrypt, manually)
manager.resources Add resources requests and limits to manager deployment {} see examples in values.yaml
manager.affinity manager affinity rules {}
manager.topologySpreadConstraints List of constraints to control Pods spread across the cluster nil
manager.tolerations List of node taints to tolerate nil
manager.nodeSelector Enable and specify nodeSelector labels {}
manager.runAsUser Specify the run as User ID nil
manager.probes.enabled enabled startup, liveness and readiness probes 1
manager.probes.timeout timeout for startup, liveness and readiness probes 1
manager.probes.periodSeconds periodSeconds for startup, liveness and readiness probes 10
manager.probes.startupFailureThreshold failure threshold for startup probe 30
cve.adapter.enabled If true, create registry adapter true
cve.adapter.image.repository registry adapter image repository neuvector/registry-adapter
cve.adapter.image.tag registry adapter image tag
cve.adapter.image.hash registry adapter image hash in the format of sha256:xxxx. If present it overwrites the image tag value.
cve.adapter.priorityClassName registry adapter priorityClassName. Must exist prior to helm deployment. Leave empty to disable. nil
cve.adapter.podLabels Specify the pod labels. {}
cve.adapter.podAnnotations Specify the pod annotations. {}
cve.adapter.env User-defined environment variables for adapter. []
cve.adapter.svc.type set registry adapter service type for native Kubernetes NodePort;
if it is OpenShift platform or ingress is enabled, then default is ClusterIP
set to LoadBalancer if using cloud providers, such as Azure, Amazon, Google
cve.adapter.svc.loadBalancerIP if registry adapter service type is LoadBalancer, this is used to specify the load balancer's IP nil
cve.adapter.svc.annotations Add annotations to registry adapter service {} see examples in values.yaml
cve.adapter.harbor.protocol Harbor registry request protocol [http https] https
cve.adapter.harbor.secretName Harbor registry adapter's basic authentication secret
cve.adapter.route.enabled If true, create a OpenShift route to expose the management console service true
cve.adapter.route.host Set OpenShift route host for management console service nil
cve.adapter.route.termination Specify TLS termination for OpenShift route for management console service. Possible passthrough, edge, reencrypt passthrough
cve.adapter.route.tls.key Set PEM format key file for OpenShift route for management console service nil
cve.adapter.route.tls.certificate Set PEM format certificate file for OpenShift route for management console service nil
cve.adapter.route.tls.caCertificate Set CA certificate may be required to establish a certificate chain for validation for OpenShift route for management console service nil
cve.adapter.route.tls.destinationCACertificate Set controller REST API service CA certificate to validate the endpoint certificate for OpenShift route for management console service nil
cve.adapter.certificate.secret Replace registry adapter certificate using secret if secret name is specified nil
cve.adapter.certificate.keyFile Replace registry adapter certificate key file tls.key
cve.adapter.certificate.pemFile Replace registry adapter certificate crt file tls.crt
cve.adapter.ingress.enabled If true, create ingress, must also set ingress host value false enable this if ingress controller is installed
cve.adapter.ingress.host Must set this host value if ingress is enabled nil
cve.adapter.ingress.ingressClassName To be used instead of the ingress.class annotation if an IngressClass is provisioned ""
cve.adapter.ingress.path Set ingress path / If set, it might be necessary to set a rewrite rule in annotations. Currently only supports /
cve.adapter.ingress.annotations Add annotations to ingress to influence behavior nginx.ingress.kubernetes.io/backend-protocol: "HTTPS" see examples in values.yaml
cve.adapter.ingress.tls If true, TLS is enabled for registry adapter ingress service false If set, the tls-host used is the one set with cve.adapter.ingress.host.
cve.adapter.ingress.secretName Name of the secret to be used for TLS-encryption nil Secret must be created separately (Let's encrypt, manually)
cve.adapter.resources Add resources requests and limits to registry adapter deployment {} see examples in values.yaml
cve.adapter.affinity registry adapter affinity rules {}
cve.adapter.tolerations List of node taints to tolerate nil
cve.adapter.nodeSelector Enable and specify nodeSelector labels {}
cve.adapter.runAsUser Specify the run as User ID nil
cve.adapter.internal.certificate.secret Secret name to be used for custom registry adapter internal certificate nil
cve.adapter.internal.certificate.keyFile Set PEM format key file for custom registry adapter internal certificate tls.key
cve.adapter.internal.certificate.pemFile Set PEM format certificate file for custom registry adapter internal certificate tls.crt
cve.adapter.internal.certificate.caFile Set CA certificate file for registry adapter custom internal certificate ca.crt
cve.updater.enabled If true, create cve updater true
cve.updater.secure If true, API server's certificate is validated false
cve.updater.cacert If set, use this ca file to validate API server's certificate /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
cve.updater.image.registry cve updater image registry to overwrite global registry
cve.updater.image.repository cve updater image repository neuvector/updater
cve.updater.image.tag image tag for cve updater latest
cve.updater.image.hash cve updateer image hash in the format of sha256:xxxx. If present it overwrites the image tag value.
cve.updater.priorityClassName cve updater priorityClassName. Must exist prior to helm deployment. Leave empty to disable. nil
cve.updater.resources Add resources requests and limits to updater cronjob {} see examples in values.yaml
cve.updater.podLabels Specify the pod labels. {}
cve.updater.podAnnotations Specify the pod annotations. {}
cve.updater.schedule cronjob cve updater schedule 0 0 * * *
cve.updater.nodeSelector Enable and specify nodeSelector labels {}
cve.updater.runAsUser Specify the run as User ID nil
cve.scanner.enabled If true, cve scanners will be deployed true
cve.scanner.image.registry cve scanner image registry to overwrite global registry
cve.scanner.image.repository cve scanner image repository neuvector/scanner
cve.scanner.image.tag cve scanner image tag latest
cve.scanner.image.hash cve scanner image hash in the format of sha256:xxxx. If present it overwrites the image tag value.
cve.scanner.priorityClassName cve scanner priorityClassName. Must exist prior to helm deployment. Leave empty to disable. nil
cve.scanner.podLabels Specify the pod labels. {}
cve.scanner.podAnnotations Specify the pod annotations. {}
cve.scanner.env User-defined environment variables for scanner. []
cve.scanner.replicas external scanner replicas 3
cve.scanner.dockerPath the remote docker socket if CI/CD integration need scan images before they are pushed to the registry nil
cve.scanner.resources Add resources requests and limits to scanner deployment {} see examples in values.yaml
cve.scanner.affinity scanner affinity rules {}
cve.scanner.topologySpreadConstraints List of constraints to control Pods spread across the cluster nil
cve.scanner.tolerations List of node taints to tolerate nil
cve.scanner.nodeSelector Enable and specify nodeSelector labels {}
cve.scanner.runAsUser Specify the run as User ID nil
cve.scanner.internal.certificate.secret Secret name to be used for custom scanner internal certificate nil
cve.scanner.internal.certificate.keyFile Set PEM format key file for custom scanner internal certificate tls.key
cve.scanner.internal.certificate.pemFile Set PEM format certificate file for custom scanner internal certificate tls.crt
cve.scanner.internal.certificate.caFile Set CA certificate file for scanner custom internal certificate ca.crt
runtimePath container runtime socket path, if it's not at the default location. ``
docker.path docker path /var/run/docker.sock Deprecated in 5.3.0
containerd.enabled Set to true, if the container runtime is containerd false Deprecated in 5.3.0. Prior to 5.3.0, for k3s and rke clusters, set k3s.enabled to true instead
containerd.path If containerd is enabled, this local containerd socket path will be used /var/run/containerd/containerd.sock Deprecated in 5.3.0.
crio.enabled Set to true, if the container runtime is cri-o false Deprecated in 5.3.0.
crio.path If cri-o is enabled, this local cri-o socket path will be used /var/run/crio/crio.sock Deprecated in 5.3.0.
k3s.enabled Set to true for k3s or rke2 false Deprecated in 5.3.0.
k3s.runtimePath If k3s is enabled, this local containerd socket path will be used /run/k3s/containerd/containerd.sock Deprecated in 5.3.0.
bottlerocket.enabled Set to true if using AWS bottlerocket false Deprecated in 5.3.0.
bottlerocket.runtimePath If bottlerocket is enabled, this local containerd socket path will be used /run/dockershim.sock Deprecated in 5.3.0.
admissionwebhook.type admission webhook type ClusterIP
crdwebhooksvc.enabled Enable crd service true
crdwebhook.enabled Create crd resources true
crdwebhook.type crd webhook type ClusterIP

Specify each parameter using the --set key=value[,key=value] argument to helm install. For example,

$ helm install my-release --namespace neuvector ./neuvector-helm/ --set manager.env.ssl=off

Alternatively, a YAML file that specifies the values for the above parameters can be provided while installing the chart. For example,

$ helm install my-release --namespace neuvector ./neuvector-helm/ -f values.yaml