You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: apps.yaml
-1
Original file line number
Diff line number
Diff line change
@@ -303,7 +303,6 @@ appsInfo:
303
303
license: Apache 2.0
304
304
about: Sealed Secrets is a Kubernetes Custom Resource Definition Controller which allows you to store even sensitive information in Git repositories.
305
305
integration: APL uses Sealed Secrets to provide a secure way to store Kubernetes secrets in Git repositories. Sealed Secrets can be used to store secrets in the values repository.
Copy file name to clipboardExpand all lines: values-schema.yaml
-6
Original file line number
Diff line number
Diff line change
@@ -2653,8 +2653,6 @@ properties:
2653
2653
entrypoint:
2654
2654
$ref: '#/definitions/ipV4Address'
2655
2655
description: Optional. A public IP address that will override (loadbalancer) ip used for registering hosts. This allows for access to private clusters.
2656
-
home:
2657
-
$ref: '#/definitions/alerts'
2658
2656
files:
2659
2657
type: object
2660
2658
description: 'Custom values for the workload chart.'
@@ -2809,10 +2807,6 @@ properties:
2809
2807
default: false
2810
2808
description: Set this to true when bringing your own external IDP such as Azure AD. (Expects required `oidc:` fields to be set.)
2811
2809
type: boolean
2812
-
isHomeMonitored:
2813
-
default: false
2814
-
description: Whether this cluster is home monitored (like when under a Premium SLA). Sends criticals home.
2815
-
type: boolean
2816
2810
isMultitenant:
2817
2811
default: true
2818
2812
description: Whether to separate team metrics and logs. Disabling this lets everybody be admin and see everything.
0 commit comments