Helm Values Reference
The Kestrel Operator is configured through Helm values. Below is a complete reference of all available configuration options.Quick Configuration Examples
Basic Cilium Setup
Istio Service Mesh Setup
Safe-Apply Enabled
Complete Values Reference
Image Configuration
image.repository
- Type: string
- Default:
ghcr.io/kestrelai/kestrel-operator - Description: Container image repository
image.tag
- Type: string
- Default:
latest - Description: Container image tag
image.pullPolicy
- Type: string
- Default:
IfNotPresent - Description: Image pull policy
Authentication
auth.token (Required)
- Type: string
- Default:
"" - Description: JWT token for operator authentication
- Example:
"eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9..."
Generate this token through the Kestrel AI Dashboard. The token automatically renews every 24 hours.
Server Connection
server.host
- Type: string
- Default:
grpc.platform.usekestrel.ai - Description: Kestrel AI platform gRPC endpoint
server.port
- Type: integer
- Default:
443 - Description: gRPC server port
Cilium Integration
operator.cilium.disableFlows
- Type: boolean
- Default:
false - Description: Disable Cilium flow collection entirely
true when:
- Using Istio for flow collection instead
- Cluster doesn’t have Cilium installed
- Only want resource inventory management
operator.cilium.hubble.tls.forceDisable
- Type: boolean
- Default:
false - Description: Force disable TLS for Hubble connections
By default, the operator attempts to use TLS when connecting to Hubble Relay. Only disable if your Hubble setup doesn’t support TLS.
Istio Integration
operator.istio.enabled
- Type: boolean
- Default:
false - Description: Enable Istio Access Log Service (ALS) for L7 flow collection
operator.istio.alsPort
- Type: integer
- Default:
8080 - Description: Port for the ALS gRPC server
When enabling Istio, you must also configure Istio’s mesh configuration to define the Kestrel Operator as an extension provider. See the Istio mesh configuration section below.
Istio Mesh Configuration
The operator’s Helm chart automatically creates theTelemetry resources, but you must register the extension providers in Istio’s mesh configuration.
Required extension providers:
--set flags:
kubectl patch:
extensionProviders block into the existing mesh: YAML, keeping all other settings intact. Then restart Istiod:
Namespace Sidecar Injection
Application namespaces must have Istio sidecar injection enabled for L7 flow collection to work. Label each namespace before deploying workloads:istio-proxy container:
istio-proxy in the container list.
Safe-Apply Configuration
operator.safeApply.enabled
- Type: boolean
- Default:
false - Description: Grant RBAC permissions for applying approved YAML changes
- Create network policies
- Update existing resources
- Delete resources (with approval)