HCL Commerce Version 9.1 Helm chart reference
The following complete reference details the provided hcl-commerce-helmchart Helm chart, and the various configuration options that are available for deploying HCL Commerce Version 9.1 on Kubernetes.
It is strongly recommended to not modify the default values.yaml configuration file for your deployment. Instead, create a copy to use as your customized values file, for example, my-values.yaml. This will allow you to maintain your customized values for future deployments and upgrades.
The hcl-commerce-helmchart Helm chart parameters and their default values
The following sections break down the list of Helm Chart parameters into sections for organizational purposes only. For a more detailed breakdown and description of the HCL Commerce features that they correspond or overlap with, see Required Helm Chart configuration for HCL Commerce Version 9.1.
- Base deployment configuration
- Ingress configuration
- Search configuration
HCL Digital Experience integration
Assets tool configuration
LDAP integration
Anthos integration
Approval service configuration
Next.js (Ruby) store configuration
Parameter | Description | Default value |
---|---|---|
license | The HCL Commerce Version 9 license. You must accept the license before you can deploy HCL Commerce. To view the license, browse all of the files under the LICENSES directory. To accept the license, set license to accept. |
not_accepted |
common.vaultTokenSecret | The Kubernetes secret object for vault token. | vault-token-secret |
common.dbType | The database type. Accepted values are:
|
db2 |
common.tenant | The tenant name. The common.tenant value can be your organization name. You can have multiple environments under the same tenant. |
demo |
![]() |
The timezone in ICANN TZ format. For example,
America/Toronto .This parameter can also be set in all HCL Commerce containers as an environment variable, TZ. If this value is not
set, or empty, Warning: Changing the time zone will have impacts
on HCL Commerce business logic, such as marketing web
activities and promotion start and end dates and times. The
values that are set for these site behaviors will not
automatically adjust based on this timezone setting. It is
recommended to keep this value empty if your site is already
being used in a live production environment. |
nil |
common.environmentName | The environment name. The common.environmentName is the name of the environment.
Some examples of environment name are |
qa |
common.environmentType | The environment type. Accepted values are:
The common.environmentType is the specific environment
type. For each environment, an environment type must be specified:
|
auth |
common.imageRepo | The Docker image Registry. | my-docker-registry.io:5000/ |
common.spiUserName | The spiuser user name. For more information, see Setting the spiuser password in your Docker images. |
spiuser |
common.spiUserPwdAes | The spiuser user password, encrypted with
AES by the wc_encrypt utility. The default
plain text password is : You can use the default key to match the sample db2
database Docker container.
For more information, see Setting the spiuser password in your Docker images. |
nil |
common.spiUserPwdBase64 | The Base64 encoded value for
spiuser:password. The
default plain text password is:
This value can be obtained by piping the values through the
Base64 system utility: |
nil |
common.vaultUrl | The Vault v1 API URL. | http://vault-consul.vault.svc.cluster.local:8200/v1 Note: This value assumes that
hcl-commerce-vaultconsul-helmchart
was used to deploy Vault into the vault
namespace. |
common.externalDomain | The external domain use to specify the service external domain name. | .mycompany.com |
common.bindingConfigMap | The name of the ConfigMap which is to be mounted into each
container to expose environment variables. Leave this value blank if
you are not using a ConfigMap to pass configuration to each
application. This is only required if common.configureMode is set to EnvVariables |
nil |
common.configureMode | The default container configuration mode. Accepted values
are:
|
Vault |
common.imagePullSecrets | Whether the image should pull secrets if the Docker Registry requires authentication. | nil |
common.imagePullPolicy | The image pull policy. Accepted values are:
|
IfNotPresent |
common.serviceAccountName | The serviceAccount used for Helm release. | default |
common.localStoreEnabled | The parameter to enable local store specific ingress creation
when deploying a migrated Aurora-based served from the Transaction server. Accepted values are:
|
false |
backwardCompatibility.selector | The pod selector labels defined in the existing deployment. This is required when you deployed HCL Commerce using a different Helm chart previously and want to use this chart to upgrade. | empty map |
hclCache.configMap | The configuration map used for HCL Cache definition. | See the values.yaml file for the default configuration. |
vaultCA.enabled | The parameter to enable Vault Certificate Authority (CA) configuration mode. | true |
metrics.enabled | The parameter to enable metrics for HCL Commerce. | true |
metrics.serviceMonitor.enabled | The parameter to enable service monitor for HCL Commerce. | false |
metrics.serviceMonitor.interval | The interval, in seconds, to allow Prometheus to query HCL Commerce for service monitoring. | 15s |
metrics.serviceMonitor.selector | The labels for Prometheus to match for service monitoring. | See the values.yaml file for the default configuration. |
![]() |
The parameter to add Prometheus scraping annotations to
pods. Accepted values are:
|
false |
![]() |
The parameter to enable JSON logging. When
this parameter is set to true, it will enable
JSON logging for all application servers. Accepted values are true, to enable logging, and false to disable JSON logging. |
false |
![]() |
The parameter to enable IPV6. When disabled,
HCL Commerce applications will add the
|
false |
![]() |
Enable deployment on Red Hat OpenShift. Accepted values are true, and false. |
false |
![]() |
The Security Context Constraints (SCC) that you want to be granted access for the deployment. | privileged |
tsDb | The details of the configuration for the tsDb
deployment. |
See the values.yaml file for the default configuration. |
tsApp | The details of the configuration for the tsApp
deployment. |
See the values.yaml file for the default configuration. |
searchAppMaster | The details of the configuration for the
searchAppMaster deployment. |
See the values.yaml file for the default configuration. |
searchAppRepeater | The details of the configuration for the
searchAppRepeater deployment. |
See the values.yaml file for the default configuration. |
searchAppSlave | The details of the configuration for the
searchAppSlave deployment. |
See the values.yaml file for the default configuration. |
tsWeb | The details of the configuration for the tsWeb
deployment. |
See the values.yaml file for the default configuration. |
toolingWeb | The details of the configuration for the
toolingWeb deployment. |
See the values.yaml file for the default configuration. |
storeWeb | The details of the configuration for the
storeWeb deployment. |
See the values.yaml file for the default configuration. |
crsApp | The details of the configuration for the crsApp
deployment. |
See the values.yaml file for the default configuration. |
xcApp | The details of the configuration for the xcApp
deployment. |
See the values.yaml file for the default configuration. |
nifiApp | The details of the configuration for the nifiApp
deployment. |
See the values.yaml file for the default configuration. |
registryApp | The details of the configuration for the
registryApp deployment. |
See the values.yaml file for the default configuration. |
ingestApp | The details of the configuration for the
ingestApp deployment. |
See the values.yaml file for the default configuration. |
queryApp | The details of the configuration for the
queryApp deployment. |
See the values.yaml file for the default configuration. |
![]() |
The details of the configuration for the tsUtils
deployment. |
See the values.yaml file for the default configuration. |
![]() |
Configuration details for cache application deployment. | See the values.yaml file for the default configuration. |
![]() |
Configuration details for Must-Gather application
deployment. Note: In order to use
Must-Gather application, an Elasticsearch based logging system
(such as ELK or EFK) is required to ingest all of the HCL Commerce application logging messages into
Elasticsearch. The Must-Gather application must be configured to
connect to the Elasticsearch server in order to be able to
retrieve log messages. To learn more about Must-Gather configuration, refer to Environment data in Vault or Starting the Must-Gather Docker container by retrieving parameters from container environment variables. |
See the values.yaml file for the default configuration. |
![]() |
The details of the configuration for the GraphQL application deployment. | See the values.yaml file for the default configuration. |
supportC.image | The Support container Docker image to be used as the Helm initContainer, to control pre-install and post-delete processes. | commerce/supportcontainer |
supportC.tag | The Support container Docker image tag. | v9-latest |
test.image | The Test Docker image for Helm test. | docker.io/centos:latest |
Parameter | Description | Default value |
---|---|---|
![]() |
Enable ingress creation. Accepted values are true, to enable ingress, and false to disable ingress. |
true |
common.dataIngressEnabled | ![]() Accepted values are:
|
false |
![]() |
In an OpenShift Container deployment, the
routes resources will be created directly instead of ingress.
Specify the CA certificate to allow the HAProxy proxy to trust the certificate of HCL Commerce servers. The CA certificate is the one that you specified in Vault deployment. |
nil |
![]() |
The API version to use for Ingress.
|
nil |
![]() |
The parameter to specify whether ingress for the Marketplace Approval service is enabled or disabled. | true |
![]() |
The ingress controller
type. Accepted values are:
Note:
|
nginx |
![]() |
The Ambassador ID list for the Emissary listener that is listening on HTTP and HTTPS ports. Leave this value empty if you are only using the default Ambassador ID. If you are using different Ambassador IDs that are defined in the ingress configuration for different components, then you must add them here to create listeners for different Emissaries. | nil |
ingressSecret.autoCreate | The parameter specifies if the Helm
per-install is used to generate an ingress certification
secret. This is a convenient way to generate the self-signed certificate for a testing environment. |
true |
ingressSecret.replaceExist | The parameter to specify if the existing ingress certification secret needs to be replaced when deployed. | true |
![]() |
The parameter to specify whether
ingress is enabled for the Manage Approval page
used for the Marketplace approval service. Accepted values
are: This is disabled (false) by
default.
|
false |
The following are all search-related configurations, excluding search server and ingress configurations.
Parameter | Description | Default value |
---|---|---|
common.searchEngine | The Search solution. Accepted values are:
|
elastic |
![]() |
The parameter to enable an
Elasticsearch-based search solution index build on
deployment. Accepted values are true to enable the index build job, or false to disable the index build job. |
See the values.yaml file for the default configuration. |
![]() |
The parameter to enable the push-to-live
index connector portion within the index build job. Accepted values are true to enable the push-to-live index connector, or false to disable the push-to-live index connector. |
See the values.yaml file for the default configuration. |
![]() |
The maximum duration, in seconds, for
the job to complete before it is canceled due to timeout. This value must take into account the number of stores that are indexed, the data set size, and the index build complexity of each store. If the value is not sufficiently set with a generous margin, then the job can be unintentionally canceled before it otherwise would have completed successfully. |
See the values.yaml file for the default configuration. |
![]() |
The maximum duration, in seconds, for each individual index run to be canceled before timeout. | See the values.yaml file for the default configuration. |
![]() |
The interval, in seconds, for the index build job to wait in between each readiness check for each required search component. | See the values.yaml file for the default configuration. |
![]() |
The maximum time, in seconds, to wait for the Transaction server to be ready. | See the values.yaml file for the default configuration. |
![]() |
The maximum time, in seconds, to wait for the NiFi application to be ready. | See the values.yaml file for the default configuration. |
![]() |
The maximum time, in seconds, to wait for the ingest application to be ready. | See the values.yaml file for the default configuration. |
![]() |
The maximum number of retries for each index build run, in the event that the index build job fails. | See the values.yaml file for the default configuration. |
![]() |
A list of store IDs, separated by commas, to run the index builds against. | See the values.yaml file for the default configuration. |
![]() |
The parameter to enable price
calculation for B2B stores. Accepted values are true to enable price calculation, and false to disable price calculation. |
See the values.yaml file for the default configuration. |
![]() |
A list of store IDs, separated by commas, to run price calculation against. | See the values.yaml file for the default configuration. |
Parameter | Description | Default value |
---|---|---|
![]() |
Enable or disable HCL Digital Experience (DX) configurations for HCL Commerce. | false |
![]() |
The DX auth environment namespace. This must be
in the same cluster as Commerce. |
nil |
![]() |
The DX live environment namespace. This must be
in the same cluster as Commerce. |
nil |
![]() |
The auth DX routing
(load balancer) service name. Accepted values are
haproxy or ambassador
based on the DX version. You can obtain the service name with
kubectl get service . |
nil |
![]() |
The live DX routing
(load balancer) service name. Accepted values are
haproxy or ambassador
based on the DX version. You can obtain the service name with
kubectl get service . |
nil |
Parameter | Description | Default value |
---|---|---|
![]() |
Create a PersistentVolumeClaim (PVC) for the
Assets Tool.
|
false |
![]() |
The storage class name that is used by
the PVC for the Assets Tool. This resource provider must support the
ReadWriteMany access mode. |
This defaults to the default storage class for the cluster. |
![]() |
The storage size that is assigned to the persistent volume. | 5Gi |
![]() |
The access mode of the PVC. This is
required to be |
ReadWriteMany |
![]() |
If there is already an existing PVC for the Assets Tool in the authoring environment, you can assign it with this parameter. | nil |
![]() |
If there is already an existing PVC for the Assets Tool in the live environment, you can assign it with this parameter. | nil |

Parameter | Description | Default value |
---|---|---|
![]() |
Specifies if LDAP is enabled for the
authoring environment. Accepted values are:
Note: By default, Vault is the
default configuration method. There is no parameter required
to specify this method of LDAP
configuration. |
false |
![]() |
You can use the
vmm.properties file to define LDAP
configuration for a Kubernetes deployment by including a copy of it
within a custom Transaction server Docker container. To use this configuration method, set this value to true, and then follow the instructions for Integrating HCL Commerce Kubernetes deployments with LDAP. Accepted values are:
|
false |
![]() |
You can use the
ldap-vmm-auth.properties configuration file
to define LDAP configuration for a Kubernetes deployment. To use this configuration method, set this value to true, and then follow the instructions for Integrating HCL Commerce Kubernetes deployments with LDAP. Accepted values are:
|
false |
![]() |
Specifies if LDAP is enabled for the live
environment. Accepted values are:
Note: By default, Vault is the
default configuration method. There is no parameter required
to specify this method of LDAP
configuration. |
false |
![]() |
You can use the
vmm.properties file to define LDAP
configuration for a Kubernetes deployment by including a copy of it
within a custom Transaction server Docker container. To use this configuration method, set this value to true, and then follow the instructions for Integrating HCL Commerce Kubernetes deployments with LDAP. Accepted values are:
|
false |
![]() |
You can use the
ldap-vmm-auth.properties configuration file
to define LDAP configuration for a Kubernetes deployment. To use this configuration method, set this value to true, and then follow the instructions for Integrating HCL Commerce Kubernetes deployments with LDAP. Accepted values are:
|
false |

Parameter | Description | Default value |
---|---|---|
![]() |
Introduced in HCL Commerce9.1.11.0, Google Anthos is supported by the
HCL Commerce Helm Chart. Enable this feature for
deployment when Google Anthos is used. This disables the istio
sidecar injection for pre-install,
pre-delete,
create-index,
nifi, and ingest to
avoid failures. Note: You can still use older
versions of HCL Commerce with Google Anthos by
manually updating the HCL Commerce Helm
Chart. |
false |

Parameter | Description | Default value |
---|---|---|
![]() |
Introduced in HCL Commerce
9.1.12.0, the Approval service is used for approvals within a
Marketplace. The Approval service application requires a
separately deployed PostgresSQL that must be running before the
service is started. The PostgreSQL database URL is passed to the
Approval service using the Helm Chart where there is a
bootConfig section under
approvalApp . |
See the values.yaml file for the default configuration. |


Parameter | Description | Default value |
---|---|---|
![]() |
![]() |
See the values.yaml file for the default configuration. |