Skip to main content
Version: 0.15

Helm chart parameters

Version: v0.15.0 AppVersion: v0.15.0

Controller for the Botkube Slack app which helps you monitor your Kubernetes cluster, debug deployments and run specific checks on resources in the cluster.

Homepage: https://botkube.io

Maintainers​

NameEmail
Botkube Dev Teamdev-team@botkube.io

Source Code​

Parameters​

KeyTypeDefaultDescription
image.registrystring"ghcr.io"Botkube container image registry.
image.repositorystring"kubeshop/botkube"Botkube container image repository.
image.pullPolicystring"IfNotPresent"Botkube container image pull policy.
image.tagstring"v0.15.0"Botkube container image tag. Default tag is appVersion from Chart.yaml.
podSecurityPolicyobject{"enabled":false}Configures Pod Security Policy to allow Botkube to run in restricted clusters. Ref doc.
securityContextobjectRuns as a Non-Privileged user.Configures security context to manage user Privileges in Pod. Ref doc.
containerSecurityContextobject{"allowPrivilegeEscalation":false,"privileged":false,"readOnlyRootFilesystem":true}Configures container security context. Ref doc.
kubeconfig.enabledboolfalseIf true, enables overriding the Kubernetes auth.
kubeconfig.base64Configstring""A base64 encoded kubeconfig that will be stored in a Secret, mounted to the Pod, and specified in the KUBECONFIG environment variable.
kubeconfig.existingSecretstring""A Secret containing a kubeconfig to use.
sourcesobjectSee the values.yaml file for full object.Map of sources. Source contains configuration for Kubernetes events and sending recommendations. The property name under sources object is an alias for a given configuration. You can define multiple sources configuration with different names. Key name is used as a binding reference.
sources.k8s-recommendation-events.kubernetesobject{"recommendations":{"ingress":{"backendServiceValid":true,"tlsSecretValid":true},"pod":{"labelsSet":true,"noLatestImageTag":true}}}Describes Kubernetes source configuration.
sources.k8s-recommendation-events.kubernetes.recommendationsobject{"ingress":{"backendServiceValid":true,"tlsSecretValid":true},"pod":{"labelsSet":true,"noLatestImageTag":true}}Describes configuration for various recommendation insights.
sources.k8s-recommendation-events.kubernetes.recommendations.podobject{"labelsSet":true,"noLatestImageTag":true}Recommendations for Pod Kubernetes resource.
sources.k8s-recommendation-events.kubernetes.recommendations.pod.noLatestImageTagbooltrueIf true, notifies about Pod containers that use latest tag for images.
sources.k8s-recommendation-events.kubernetes.recommendations.pod.labelsSetbooltrueIf true, notifies about Pod resources created without labels.
sources.k8s-recommendation-events.kubernetes.recommendations.ingressobject{"backendServiceValid":true,"tlsSecretValid":true}Recommendations for Ingress Kubernetes resource.
sources.k8s-recommendation-events.kubernetes.recommendations.ingress.backendServiceValidbooltrueIf true, notifies about Ingress resources with invalid backend service reference.
sources.k8s-recommendation-events.kubernetes.recommendations.ingress.tlsSecretValidbooltrueIf true, notifies about Ingress resources with invalid TLS secret reference.
sources.k8s-all-events.kubernetesobject{"events":["create","delete","error"],"namespaces":{"include":[".*"]},"resources":[{"name":"v1/pods"},{"name":"v1/services"},{"name":"networking.k8s.io/v1/ingresses"},{"name":"v1/nodes"},{"name":"v1/namespaces"},{"name":"v1/persistentvolumes"},{"name":"v1/persistentvolumeclaims"},{"name":"v1/configmaps"},{"name":"rbac.authorization.k8s.io/v1/roles"},{"name":"rbac.authorization.k8s.io/v1/rolebindings"},{"name":"rbac.authorization.k8s.io/v1/clusterrolebindings"},{"name":"rbac.authorization.k8s.io/v1/clusterroles"},{"events":["create","update","delete","error"],"name":"apps/v1/daemonsets","updateSetting":{"fields":["spec.template.spec.containers[*].image","status.numberReady"],"includeDiff":true}},{"events":["create","update","delete","error"],"name":"batch/v1/jobs","updateSetting":{"fields":["spec.template.spec.containers[*].image","status.conditions[*].type"],"includeDiff":true}},{"events":["create","update","delete","error"],"name":"apps/v1/deployments","updateSetting":{"fields":["spec.template.spec.containers[*].image","status.availableReplicas"],"includeDiff":true}},{"events":["create","update","delete","error"],"name":"apps/v1/statefulsets","updateSetting":{"fields":["spec.template.spec.containers[*].image","status.readyReplicas"],"includeDiff":true}}]}Describes Kubernetes source configuration.
sources.k8s-all-events.kubernetes.namespacesobject{"include":[".*"]}Describes namespaces for every Kubernetes resources you want to watch or exclude. These namespaces are applied to every resource specified in the resources list. However, every specified resource can override this by using its own namespaces object.
sources.k8s-all-events.kubernetes.eventslist["create","delete","error"]Describes events for every Kubernetes resources you want to watch or exclude. These events are applied to every resource specified in the resources list. However, every specified resource can override this by using its own events object.
sources.k8s-all-events.kubernetes.resourceslistSee the values.yaml file for full object.Describes the Kubernetes resources you want to watch.
sources.k8s-err-events.kubernetesobject{"events":["error"],"namespaces":{"include":[".*"]},"resources":[{"name":"v1/pods"},{"name":"v1/services"},{"name":"networking.k8s.io/v1/ingresses"},{"name":"v1/nodes"},{"name":"v1/namespaces"},{"name":"v1/persistentvolumes"},{"name":"v1/persistentvolumeclaims"},{"name":"v1/configmaps"},{"name":"rbac.authorization.k8s.io/v1/roles"},{"name":"rbac.authorization.k8s.io/v1/rolebindings"},{"name":"rbac.authorization.k8s.io/v1/clusterrolebindings"},{"name":"rbac.authorization.k8s.io/v1/clusterroles"},{"name":"apps/v1/deployments"},{"name":"apps/v1/statefulsets"},{"name":"apps/v1/daemonsets"},{"name":"batch/v1/jobs"}]}Describes Kubernetes source configuration.
sources.k8s-err-events.kubernetes.namespacesobject{"include":[".*"]}Describes namespaces for every Kubernetes resources you want to watch or exclude. These namespaces are applied to every resource specified in the resources list. However, every specified resource can override this by using its own namespaces object.
sources.k8s-err-events.kubernetes.eventslist["error"]Describes events for every Kubernetes resources you want to watch or exclude. These events are applied to every resource specified in the resources list. However, every specified resource can override this by using its own events object.
sources.k8s-err-events.kubernetes.resourceslistSee the values.yaml file for full object.Describes the Kubernetes resources you want to watch.
filtersobjectSee the values.yaml file for full object.Filter settings for various sources. Currently, all filters are globally enabled or disabled. You can enable or disable filters with @Botkube filters commands.
filters.kubernetes.objectAnnotationCheckerbooltrueIf true, enables support for botkube.io/disable and botkube.io/channel resource annotations.
filters.kubernetes.nodeEventsCheckerbooltrueIf true, filters out Node-related events that are not important.
executorsobjectSee the values.yaml file for full object.Map of executors. Executor contains configuration for running kubectl commands. The property name under executors is an alias for a given configuration. You can define multiple executor configurations with different names. Key name is used as a binding reference.
executors.kubectl-read-only.kubectl.namespaces.includelist[".*"]List of allowed Kubernetes Namespaces for command execution. It can also contain a regex expressions: - ".*" - to specify all Namespaces.
executors.kubectl-read-only.kubectl.namespaces.excludelist[]List of ignored Kubernetes Namespace. It can also contain a regex expressions: - "test-.*" - to specify all Namespaces.
executors.kubectl-read-only.kubectl.enabledboolfalseIf true, enables kubectl commands execution.
executors.kubectl-read-only.kubectl.commands.verbslist["api-resources","api-versions","cluster-info","describe","explain","get","logs","top"]Configures which kubectl methods are allowed.
executors.kubectl-read-only.kubectl.commands.resourceslist["deployments","pods","namespaces","daemonsets","statefulsets","storageclasses","nodes","configmaps","services","ingresses"]Configures which K8s resource are allowed.
executors.kubectl-read-only.kubectl.defaultNamespacestring"default"Configures the default Namespace for executing Botkube kubectl commands. If not set, uses the 'default'.
executors.kubectl-read-only.kubectl.restrictAccessboolfalseIf true, enables commands execution from configured channel only.
existingCommunicationsSecretNamestring""Configures existing Secret with communication settings. It MUST be in the botkube Namespace. To reload Botkube once it changes, add label botkube.io/config-watch: "true".
communicationsobjectSee the values.yaml file for full object.Map of communication groups. Communication group contains settings for multiple communication platforms. The property name under communications object is an alias for a given configuration group. You can define multiple communication groups with different names.
communications.default-group.slack.enabledboolfalseIf true, enables Slack bot.
communications.default-group.slack.channelsobject{"default":{"bindings":{"executors":["kubectl-read-only"],"sources":["k8s-err-events","k8s-recommendation-events"]},"name":"SLACK_CHANNEL","notification":{"disabled":false}}}Map of configured channels. The property name under channels object is an alias for a given configuration.
communications.default-group.slack.channels.default.namestring"SLACK_CHANNEL"Slack channel name without '#' prefix where you have added Botkube and want to receive notifications in.
communications.default-group.slack.channels.default.notification.disabledboolfalseIf true, the notifications are not sent to the channel. They can be enabled with @Botkube command anytime.
communications.default-group.slack.channels.default.bindings.executorslist["kubectl-read-only"]Executors configuration for a given channel.
communications.default-group.slack.channels.default.bindings.sourceslist["k8s-err-events","k8s-recommendation-events"]Notification sources configuration for a given channel.
communications.default-group.slack.tokenstring""Slack token.
communications.default-group.slack.notification.typestring"short"Configures notification type that are sent. Possible values: short, long.
communications.default-group.socketSlack.enabledboolfalseIf true, enables Slack bot.
communications.default-group.socketSlack.channelsobject{"default":{"bindings":{"executors":["kubectl-read-only"],"sources":["k8s-err-events","k8s-recommendation-events"]},"name":"SLACK_CHANNEL"}}Map of configured channels. The property name under channels object is an alias for a given configuration.
communications.default-group.socketSlack.channels.default.namestring"SLACK_CHANNEL"Slack channel name without '#' prefix where you have added Botkube and want to receive notifications in.
communications.default-group.socketSlack.channels.default.bindings.executorslist["kubectl-read-only"]Executors configuration for a given channel.
communications.default-group.socketSlack.channels.default.bindings.sourceslist["k8s-err-events","k8s-recommendation-events"]Notification sources configuration for a given channel.
communications.default-group.socketSlack.botTokenstring""Slack bot token for your own Slack app. Ref doc.
communications.default-group.socketSlack.appTokenstring""Slack app-level token for your own Slack app. Ref doc.
communications.default-group.socketSlack.notification.typestring"short"Configures notification type that are sent. Possible values: short, long.
communications.default-group.mattermost.enabledboolfalseIf true, enables Mattermost bot.
communications.default-group.mattermost.botNamestring"Botkube"User in Mattermost which belongs the specified Personal Access token.
communications.default-group.mattermost.urlstring"MATTERMOST_SERVER_URL"The URL (including http/https schema) where Mattermost is running. e.g https://example.com:9243
communications.default-group.mattermost.tokenstring"MATTERMOST_TOKEN"Personal Access token generated by Botkube user.
communications.default-group.mattermost.teamstring"MATTERMOST_TEAM"The Mattermost Team name where Botkube is added.
communications.default-group.mattermost.channelsobject{"default":{"bindings":{"executors":["kubectl-read-only"],"sources":["k8s-err-events","k8s-recommendation-events"]},"name":"MATTERMOST_CHANNEL","notification":{"disabled":false}}}Map of configured channels. The property name under channels object is an alias for a given configuration.
communications.default-group.mattermost.channels.default.namestring"MATTERMOST_CHANNEL"The Mattermost channel name for receiving Botkube alerts. The Botkube user needs to be added to it.
communications.default-group.mattermost.channels.default.notification.disabledboolfalseIf true, the notifications are not sent to the channel. They can be enabled with @Botkube command anytime.
communications.default-group.mattermost.channels.default.bindings.executorslist["kubectl-read-only"]Executors configuration for a given channel.
communications.default-group.mattermost.channels.default.bindings.sourceslist["k8s-err-events","k8s-recommendation-events"]Notification sources configuration for a given channel.
communications.default-group.mattermost.notification.typestring"short"Configures notification type that are sent. Possible values: short, long.
communications.default-group.teams.enabledboolfalseIf true, enables MS Teams bot.
communications.default-group.teams.botNamestring"Botkube"The Bot name set while registering Bot to MS Teams.
communications.default-group.teams.appIDstring"APPLICATION_ID"The Botkube application ID generated while registering Bot to MS Teams.
communications.default-group.teams.appPasswordstring"APPLICATION_PASSWORD"The Botkube application password generated while registering Bot to MS Teams.
communications.default-group.teams.bindings.executorslist["kubectl-read-only"]Executor bindings apply to all MS Teams channels where Botkube has access to.
communications.default-group.teams.bindings.sourceslist["k8s-err-events","k8s-recommendation-events"]Source bindings apply to all channels which have notification turned on with @Botkube notifier start command.
communications.default-group.teams.messagePathstring"/bots/teams"The path in endpoint URL provided while registering Botkube to MS Teams.
communications.default-group.teams.portint3978The Service port for bot endpoint on Botkube container.
communications.default-group.discord.enabledboolfalseIf true, enables Discord bot.
communications.default-group.discord.tokenstring"DISCORD_TOKEN"Botkube Bot Token.
communications.default-group.discord.botIDstring"DISCORD_BOT_ID"Botkube Application Client ID.
communications.default-group.discord.channelsobject{"default":{"bindings":{"executors":["kubectl-read-only"],"sources":["k8s-err-events","k8s-recommendation-events"]},"id":"DISCORD_CHANNEL_ID","notification":{"disabled":false}}}Map of configured channels. The property name under channels object is an alias for a given configuration.
communications.default-group.discord.channels.default.idstring"DISCORD_CHANNEL_ID"Discord channel ID for receiving Botkube alerts. The Botkube user needs to be added to it.
communications.default-group.discord.channels.default.notification.disabledboolfalseIf true, the notifications are not sent to the channel. They can be enabled with @Botkube command anytime.
communications.default-group.discord.channels.default.bindings.executorslist["kubectl-read-only"]Executors configuration for a given channel.
communications.default-group.discord.channels.default.bindings.sourceslist["k8s-err-events","k8s-recommendation-events"]Notification sources configuration for a given channel.
communications.default-group.discord.notification.typestring"short"Configures notification type that are sent. Possible values: short, long.
communications.default-group.elasticsearch.enabledboolfalseIf true, enables Elasticsearch.
communications.default-group.elasticsearch.awsSigning.enabledboolfalseIf true, enables awsSigning using IAM for Elasticsearch hosted on AWS. Make sure AWS environment variables are set. Ref doc.
communications.default-group.elasticsearch.awsSigning.awsRegionstring"us-east-1"AWS region where Elasticsearch is deployed.
communications.default-group.elasticsearch.awsSigning.roleArnstring""AWS IAM Role arn to assume for credentials, use this only if you don't want to use the EC2 instance role or not running on AWS instance.
communications.default-group.elasticsearch.serverstring"ELASTICSEARCH_ADDRESS"The server URL, e.g https://example.com:9243
communications.default-group.elasticsearch.usernamestring"ELASTICSEARCH_USERNAME"Basic Auth username.
communications.default-group.elasticsearch.passwordstring"ELASTICSEARCH_PASSWORD"Basic Auth password.
communications.default-group.elasticsearch.skipTLSVerifyboolfalseIf true, skips the verification of TLS certificate of the Elastic nodes. It's useful for clusters with self-signed certificates.
communications.default-group.elasticsearch.indicesobject{"default":{"bindings":{"sources":["k8s-err-events","k8s-recommendation-events"]},"name":"botkube","replicas":0,"shards":1,"type":"botkube-event"}}Map of configured indices. The indices property name is an alias for a given configuration.
communications.default-group.elasticsearch.indices.default.namestring"botkube"Configures Elasticsearch index settings.
communications.default-group.elasticsearch.indices.default.bindings.sourceslist["k8s-err-events","k8s-recommendation-events"]Notification sources configuration for a given index.
communications.default-group.webhook.enabledboolfalseIf true, enables Webhook.
communications.default-group.webhook.urlstring"WEBHOOK_URL"The Webhook URL, e.g.: https://example.com:80
communications.default-group.webhook.bindings.sourceslist["k8s-err-events","k8s-recommendation-events"]Notification sources configuration for the webhook.
settings.clusterNamestring"not-configured"Cluster name to differentiate incoming messages.
settings.lifecycleServerobject{"enabled":true,"port":2113}Server configuration which exposes functionality related to the app lifecycle.
settings.upgradeNotifierbooltrueIf true, notifies about new Botkube releases.
settings.log.levelstring"info"Sets one of the log levels. Allowed values: info, warn, debug, error, fatal, panic.
settings.log.disableColorsboolfalseIf true, disable ANSI colors in logging.
settings.systemConfigMapobject{"name":"botkube-system"}Botkube's system ConfigMap where internal data is stored.
settings.persistentConfigobject{"runtime":{"configMap":{"annotations":{},"name":"botkube-runtime-config"},"fileName":"_runtime_state.yaml"},"startup":{"configMap":{"annotations":{},"name":"botkube-startup-config"},"fileName":"_startup_state.yaml"}}Persistent config contains ConfigMap where persisted configuration is stored. The persistent configuration is evaluated from both chart upgrade and Botkube commands used in runtime.
ssl.enabledboolfalseIf true, specify cert path in config.ssl.cert property or K8s Secret in config.ssl.existingSecretName.
ssl.existingSecretNamestring""Using existing SSL Secret. It MUST be in botkube Namespace.
ssl.certstring""SSL Certificate file e.g certs/my-cert.crt.
serviceobject{"name":"metrics","port":2112,"targetPort":2112}Configures Service settings for ServiceMonitor CR.
ingressobject{"annotations":{"kubernetes.io/ingress.class":"nginx"},"create":false,"host":"HOST","tls":{"enabled":false,"secretName":""}}Configures Ingress settings that exposes MS Teams endpoint. Ref doc.
serviceMonitorobject{"enabled":false,"interval":"10s","labels":{},"path":"/metrics","port":"metrics"}Configures ServiceMonitor settings. Ref doc.
deployment.annotationsobject{}Extra annotations to pass to the Botkube Deployment.
extraAnnotationsobject{}Extra annotations to pass to the Botkube Pod.
extraLabelsobject{}Extra labels to pass to the Botkube Pod.
priorityClassNamestring""Priority class name for the Botkube Pod.
nameOverridestring""Fully override "botkube.name" template.
fullnameOverridestring""Fully override "botkube.fullname" template.
resourcesobject{}The Botkube Pod resource request and limits. We usually recommend not to specify default resources and to leave this as a conscious choice for the user. This also increases chances charts run on environments with little resources, such as Minikube. Ref docs
extraEnvlist[]Extra environment variables to pass to the Botkube container. Ref docs.
extraVolumeslist[]Extra volumes to pass to the Botkube container. Mount it later with extraVolumeMounts. Ref docs.
extraVolumeMountslist[]Extra volume mounts to pass to the Botkube container. Ref docs.
nodeSelectorobject{}Node labels for Botkube Pod assignment. Ref doc.
tolerationslist[]Tolerations for Botkube Pod assignment. Ref doc.
affinityobject{}Affinity for Botkube Pod assignment. Ref doc.
rbacobject{"create":true,"rules":[{"apiGroups":["*"],"resources":["*"],"verbs":["get","watch","list"]}]}Role Based Access for Botkube Pod. Ref doc.
serviceAccount.createbooltrueIf true, a ServiceAccount is automatically created.
serviceAccount.namestring""The name of the service account to use. If not set, a name is generated using the fullname template.
serviceAccount.annotationsobject{}Extra annotations for the ServiceAccount.
extraObjectslist[]Extra Kubernetes resources to create. Helm templating is allowed as it is evaluated before creating the resources.
analytics.disableboolfalseIf true, sending anonymous analytics is disabled. To learn what date we collect, see Privacy Policy.
configWatcher.enabledbooltrueIf true, restarts the Botkube Pod on config changes.
configWatcher.tmpDirstring"/tmp/watched-cfg/"Directory, where watched configuration resources are stored.
configWatcher.initialSyncTimeoutint0Timeout for the initial Config Watcher sync. If set to 0, waiting for Config Watcher sync will be skipped. In a result, configuration changes may not reload Botkube app during the first few seconds after Botkube startup.
configWatcher.image.registrystring"ghcr.io"Config watcher image registry.
configWatcher.image.repositorystring"kubeshop/k8s-sidecar"Config watcher image repository.
configWatcher.image.tagstring"ignore-initial-events"Config watcher image tag.
configWatcher.image.pullPolicystring"IfNotPresent"Config watcher image pull policy.

AWS IRSA on EKS support​

AWS has introduced IAM Role for Service Accounts in order to provide fine-grained access. This is useful if you are looking to run Botkube inside an EKS cluster. For more details visit https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html.

Annotate the Botkube Service Account as shown in the example below and add the necessary Trust Relationship to the corresponding Botkube role to get this working.

serviceAccount:
annotations:
eks.amazonaws.com/role-arn: "{role_arn_to_assume}"