kubezero/charts/kubezero-network/values.yaml

96 lines
1.7 KiB
YAML
Raw Normal View History

2021-12-01 12:35:18 +00:00
metallb:
enabled: false
controller:
tolerations:
- key: node-role.kubernetes.io/master
effect: NoSchedule
nodeSelector:
node-role.kubernetes.io/control-plane: ""
ipAddressPools: []
#- name: my-ip-space
# protocol: layer2
# addresses:
# - 192.168.42.0/24
2021-12-01 12:35:18 +00:00
multus:
enabled: false
2022-08-24 15:13:39 +00:00
tag: "v3.9.1"
clusterNetwork: "calico"
defaultNetworks: []
# - "cilium"
readinessindicatorfile: "/etc/cni/net.d/10-calico.conflist"
2021-12-01 12:35:18 +00:00
cilium:
enabled: false
containerRuntime:
integration: crio
# Until we figured out AppArmore on Alpine and Gentoo
securityContext:
privileged: true
2021-12-01 12:35:18 +00:00
cni:
binPath: "/usr/libexec/cni"
2021-12-01 12:35:18 +00:00
#-- Ensure this is false if multus is enabled
exclusive: false
# chainingMode: generic-veth
# Until we switch to Cilium
#bpf:
# hostLegacyRouting: true
# tproxy: false
# enableIPv4Masquerade: false
# enableIdentityMark: false
policyEnforcementMode: "audit"
cluster:
# This should match the second octet of clusterPoolIPv4PodCIDRList
# to prevent IP space overlap and easy tracking
id: 1
name: default
ipam:
operator:
clusterPoolIPv4PodCIDRList:
- 10.1.0.0/16
# Should be handled by multus
nodePort:
enabled: false
# Keep it simple for now
l7Proxy: false
l2NeighDiscovery:
enabled: false
cgroup:
autoMount:
enabled: false
hostRoot: "/sys/fs/cgroup"
2021-12-01 12:35:18 +00:00
tunnel: geneve
prometheus:
enabled: false
port: 9091
operator:
replicas: 1
tolerations:
- key: node-role.kubernetes.io/master
effect: NoSchedule
nodeSelector:
node-role.kubernetes.io/control-plane: ""
2021-12-01 12:35:18 +00:00
hubble:
enabled: false
# Legacy / Testing
calico:
enabled: false