2021-09-02 17:08:08 +00:00
|
|
|
# kubezero-addons
|
|
|
|
|
2022-02-01 10:17:11 +00:00
|
|
|
![Version: 0.4.1](https://img.shields.io/badge/Version-0.4.1-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square)
|
2021-09-02 17:08:08 +00:00
|
|
|
|
|
|
|
KubeZero umbrella chart for various optional cluster addons
|
|
|
|
|
|
|
|
**Homepage:** <https://kubezero.com>
|
|
|
|
|
|
|
|
## Maintainers
|
|
|
|
|
|
|
|
| Name | Email | Url |
|
|
|
|
| ---- | ------ | --- |
|
2021-12-01 15:43:42 +00:00
|
|
|
| Stefan Reimer | stefan@zero-downtime.net | |
|
2021-09-02 17:08:08 +00:00
|
|
|
|
|
|
|
## Requirements
|
|
|
|
|
2021-12-01 15:43:42 +00:00
|
|
|
Kubernetes: `>= 1.20.0`
|
2021-09-02 17:08:08 +00:00
|
|
|
|
|
|
|
| Repository | Name | Version |
|
|
|
|
|------------|------|---------|
|
2021-12-01 15:43:42 +00:00
|
|
|
| | aws-node-termination-handler | 0.16.0 |
|
2021-09-02 17:08:08 +00:00
|
|
|
|
2021-09-02 17:36:11 +00:00
|
|
|
# MetalLB
|
|
|
|
|
|
|
|
# device-plugins
|
|
|
|
|
|
|
|
# k8s-ecr-login-renew
|
|
|
|
|
|
|
|
## IAM setup
|
|
|
|
- Create IAM user for ECR read-only access and attach the following managed policy: `AmazonEC2ContainerRegistryReadOnly`
|
|
|
|
- create AWS credentials for the IAM users
|
|
|
|
|
|
|
|
## Kubernetes secret
|
|
|
|
Create secret with the IAM user credential for ecr-renew to use, using the credentials from the previous step:
|
|
|
|
`kubectl create secret -n kube-system generic ecr-renew-cred --from-literal=AWS_REGION=<AWS_REGION> --from-literal=AWS_ACCESS_KEY_ID=<AWS_SECRET_ID> --from-literal=AWS_SECRET_ACCESS_KEY=<AWS_SECRET_KEY>`
|
|
|
|
|
|
|
|
## Resources
|
|
|
|
- https://github.com/nabsul/k8s-ecr-login-renew
|
|
|
|
|
2021-09-02 17:08:08 +00:00
|
|
|
## Values
|
|
|
|
|
|
|
|
| Key | Type | Default | Description |
|
|
|
|
|-----|------|---------|-------------|
|
2021-12-01 15:43:42 +00:00
|
|
|
| aws-node-termination-handler.deleteLocalData | bool | `true` | |
|
2022-02-01 10:17:11 +00:00
|
|
|
| aws-node-termination-handler.emitKubernetesEvents | bool | `true` | |
|
|
|
|
| aws-node-termination-handler.enableProbesServer | bool | `true` | |
|
2021-12-01 15:43:42 +00:00
|
|
|
| aws-node-termination-handler.enablePrometheusServer | bool | `false` | |
|
|
|
|
| aws-node-termination-handler.enableSqsTerminationDraining | bool | `true` | |
|
|
|
|
| aws-node-termination-handler.enabled | bool | `false` | |
|
2022-02-01 10:17:11 +00:00
|
|
|
| aws-node-termination-handler.extraEnv[0] | object | `{"name":"AWS_ROLE_ARN","value":""}` | "arn:aws:iam::${AWS::AccountId}:role/${AWS::Region}.${ClusterName}.awsNth" |
|
|
|
|
| aws-node-termination-handler.extraEnv[1].name | string | `"AWS_WEB_IDENTITY_TOKEN_FILE"` | |
|
|
|
|
| aws-node-termination-handler.extraEnv[1].value | string | `"/var/run/secrets/sts.amazonaws.com/serviceaccount/token"` | |
|
|
|
|
| aws-node-termination-handler.extraEnv[2].name | string | `"AWS_STS_REGIONAL_ENDPOINTS"` | |
|
|
|
|
| aws-node-termination-handler.extraEnv[2].value | string | `"regional"` | |
|
2021-12-01 15:43:42 +00:00
|
|
|
| aws-node-termination-handler.fullnameOverride | string | `"aws-node-termination-handler"` | |
|
2021-12-17 10:58:08 +00:00
|
|
|
| aws-node-termination-handler.ignoreDaemonSets | bool | `true` | |
|
2021-12-01 15:43:42 +00:00
|
|
|
| aws-node-termination-handler.jsonLogging | bool | `true` | |
|
2021-12-17 10:58:08 +00:00
|
|
|
| aws-node-termination-handler.managedAsgTag | string | `"aws-node-termination-handler/managed"` | "aws-node-termination-handler/${ClusterName}" |
|
2021-12-01 15:43:42 +00:00
|
|
|
| aws-node-termination-handler.metadataTries | int | `0` | |
|
|
|
|
| aws-node-termination-handler.nodeSelector."node-role.kubernetes.io/control-plane" | string | `""` | |
|
|
|
|
| aws-node-termination-handler.podMonitor.create | bool | `false` | |
|
|
|
|
| aws-node-termination-handler.queueURL | string | `""` | https://sqs.${AWS::Region}.amazonaws.com/${AWS::AccountId}/${ClusterName}_Nth |
|
|
|
|
| aws-node-termination-handler.rbac.pspEnabled | bool | `false` | |
|
|
|
|
| aws-node-termination-handler.taintNode | bool | `true` | |
|
|
|
|
| aws-node-termination-handler.tolerations[0].effect | string | `"NoSchedule"` | |
|
|
|
|
| aws-node-termination-handler.tolerations[0].key | string | `"node-role.kubernetes.io/master"` | |
|
|
|
|
| clusterBackup.enabled | bool | `false` | |
|
2021-12-17 10:58:08 +00:00
|
|
|
| clusterBackup.extraEnv | list | `[]` | |
|
2021-12-01 15:43:42 +00:00
|
|
|
| clusterBackup.image.name | string | `"public.ecr.aws/zero-downtime/kubezero-admin"` | |
|
2022-02-01 10:17:11 +00:00
|
|
|
| clusterBackup.image.tag | string | `"v1.21.9"` | |
|
2021-12-01 15:43:42 +00:00
|
|
|
| clusterBackup.password | string | `""` | |
|
|
|
|
| clusterBackup.repository | string | `""` | |
|
2022-02-01 10:17:11 +00:00
|
|
|
| forseti.aws.iamRoleArn | string | `""` | "arn:aws:iam::${AWS::AccountId}:role/${AWS::Region}.${ClusterName}.kubezeroForseti" |
|
|
|
|
| forseti.aws.region | string | `""` | |
|
|
|
|
| forseti.enabled | bool | `false` | |
|
|
|
|
| forseti.image.name | string | `"public.ecr.aws/zero-downtime/forseti"` | |
|
|
|
|
| forseti.image.tag | string | `"v0.1.2"` | |
|
2021-09-02 17:36:11 +00:00
|
|
|
| fuseDevicePlugin.enabled | bool | `false` | |
|
|
|
|
| k8sEcrLoginRenew.enabled | bool | `false` | |
|