env:
# These are required for your environment to function correctly, and for us to push feature flags to you
environment: on_prem
onPremCustomerName: <the `customerName` from your license file>
# Leave these values as-is
ginMode: "release"
authIssuer: https://auth.opal.dev/
authProvider: AUTH0
authAudience: https://opal.dev
redisHost: opal-web-redis-master
redisPort: 6379
# This will forward logs from your instance of Opal to us, making it easier for us to debug issues.
# Set this to "false" if you'd like to disable log forwarding.
# Either way, ensure it's a string, not a raw boolean
enableRemoteLogging: "true"
# Fill these in appropriately for the db instance you set up
postgresUser: postgres
postgresPassword: <postgres db password>
postgresDb: opal
postgresHost: <postgres host>
postgresSslMode: "require"
postgresPort: 5432
# Generate secret values for these, and save them somewhere secure.
authTokenEncryptionKey: <a random, secure string>
csrfAuthenticationKey: <a random, secure string>
databaseEncryptionKey: <a random, secure string>
opalApiEncryptionKey: <a random, secure string>
secureCookieHashkey: <a random, secure string>
minioAccessKey: <a random, secure string>
minioSecretKey: <a random, secure string>
minioRootUser: <a random, secure string>
minioRootPassword: <a random, secure string>
# A DNS name you own that you will use to access Opal.
hostname: <hostname for accessing opal>
# Optional. Set this to have pods use an existing service account in your cluster. Otherwise, omit this.
serviceAccount: <existing service account name>
# This configures an SMTP provider for your instance of Opal to use for sending email notifications
# If set to false, Opal uses its default external service for sending emails
smtpEnable: true
smtpServer: <smtp server>
smtpPort: <smtp port>
# You may also enable authentication for your customer SMTP server by setting this to true
# If you do this, set the username + password below, and make sure smtpPort is set to 465
smtpAuthEnable: false
smtpUsername: <username for your SMTP server>
smtpPassword: <password for your SMTP server>
# Set smtpEncryptionEnabled to true to enable SMTP encryption. serverPort 465 uses SMTPS and serverPort uses STARTTLS
smtpEncryptionEnabled: false
image:
# Leave these two as-is to use Opal's image registry directly
repository: proxy.replicated.com/proxy/opal-onprem/179751979675.dkr.ecr.us-east-2.amazonaws.com
useReplicatedPullSecret: true
# If using a private image registry, use the following instead:
# repository: <your private registry's hostname>
# useReplicatedPullSecret: false
# Set these `registry` values to the same as `image.repository` above
redis:
image:
registry: proxy.replicated.com/proxy/opal-onprem/179751979675.dkr.ecr.us-east-2.amazonaws.com
imagePullSecrets:
- replicated-pull-secret
redis-sentinel-event-streaming:
image:
registry: proxy.replicated.com/proxy/opal-onprem/179751979675.dkr.ecr.us-east-2.amazonaws.com
imagePullSecrets:
- replicated-pull-secret
sentinel:
image:
registry: proxy.replicated.com/proxy/opal-onprem/179751979675.dkr.ecr.us-east-2.amazonaws.com
imagePullSecrets:
- replicated-pull-secret
# Setting `enabled` to true will deploy an Ingress resource you can use to route traffic to Opal
# If you disable this, you will need to create your own ingress that routes traffic to the `opal-web` service
ingress:
enabled: true
# Always leave `override=true`
override: true
overrideAnnotations:
# Here, you should fill in annotations that will link your ingress to the load balancer you created in your cloud provider
# For AWS, this will look something like:
# kubernetes.io/ingress.class: alb
# alb.ingress.kubernetes.io/scheme: internet-facing
# alb.ingress.kubernetes.io/certificate-arn: <ACM certificate ARN>
# For GCP, this will look something like
# ingress.gcp.kubernetes.io/pre-shared-cert: opal-replicated
# kubernetes.io/ingress.global-static-ip-name: opal-replicated
# If you need to turn off log-forwarding, set `enabled` to false here, and omit the other fields.
log-forwarder:
enabled: true
customer: <the `customerName` from your license file>
# Leave the rest of these as-is
database:
migrationDirection: up
dataSeedDirection: up
vault:
enabled: false