values.yaml 2.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293
  1. # helm -n kube-system upgrade --version 1.14.7 --values ~/.local/share/chezmoi/infrastructure/base/cilium/values.yaml cilium cilium/cilium
  2. cni:
  3. # https://github.com/cilium/cilium/pull/14192/files
  4. # make Cilium's CNI conf the only one available by aanm · Pull Request
  5. # #14192 · cilium/cilium
  6. #
  7. # Make Cilium take ownership over the `/etc/cni/net.d` directory on the
  8. # node, renaming all non-Cilium CNI configurations to
  9. # `*.cilium_bak`. This ensures no Pods can be scheduled using other CNI
  10. # plugins during Cilium agent downtime.
  11. #
  12. # Do not rename 00-multus.conf to 00-multus.conf.cilium_bak file in
  13. # /etc/cni/net.d directory.
  14. exclusive: false
  15. # -- Configure prometheus metrics on the configured port at /metrics
  16. prometheus:
  17. enabled: true
  18. operator:
  19. replicas: 1
  20. prometheus:
  21. enabled: true
  22. hubble:
  23. relay:
  24. enabled: true
  25. prometheus:
  26. enabled: true
  27. ui:
  28. enabled: true
  29. kubeProxyReplacement: "true"
  30. # localRedirectPolicy: true
  31. bpf:
  32. # -- Enable native IP masquerade support in eBPF
  33. masquerade: true
  34. # -- Configure explicitly allowed VLAN id's for bpf logic bypass.
  35. # [0] will allow all VLAN id's without any filtering.
  36. # vlanBypass: [0]
  37. # -- Allow cluster external access to ClusterIP services.
  38. #
  39. # Required for access to Kubernetes ClusterIP services from Kubevirt virtual
  40. # machines with interface type masquerade.
  41. lbExternalClusterIP: true
  42. hostLegacyRouting: false
  43. # ipv4:
  44. # enabled: true
  45. # ipv6:
  46. # enabled: true
  47. ipam:
  48. mode: "kubernetes"
  49. # -- Configure socket LB
  50. socketLB:
  51. # -- Enable socket LB
  52. enabled: true
  53. # -- Disable socket lb for non-root ns. This is used to enable Istio routing rules.
  54. hostNamespaceOnly: false
  55. loadBalancer:
  56. mode: hybrid
  57. # serviceTopology: true
  58. ipv4NativeRoutingCIDR: 10.0.0.0/9
  59. tunnelProtocol: ""
  60. routingMode: native
  61. k8sClientRateLimit: {}
  62. cgroup:
  63. autoMount:
  64. enabled: false
  65. hostRoot: /sys/fs/cgroup
  66. # -- Configure external workloads support
  67. externalWorkloads:
  68. # -- Enable support for external workloads, such as VMs (false by default).
  69. #
  70. # Required for cluster-mesh.
  71. enabled: true