kubezero/charts/kubezero-addons
Stefan Reimer 9fc02ba9e5 feat: migrate device-plugins and k8s-ecr-login-renew into kubezero-addons 2021-09-02 19:36:11 +02:00
..
templates feat: migrate device-plugins and k8s-ecr-login-renew into kubezero-addons 2021-09-02 19:36:11 +02:00
Chart.yaml feat: migrate device-plugins and k8s-ecr-login-renew into kubezero-addons 2021-09-02 19:36:11 +02:00
README.md feat: migrate device-plugins and k8s-ecr-login-renew into kubezero-addons 2021-09-02 19:36:11 +02:00
README.md.gotmpl feat: migrate device-plugins and k8s-ecr-login-renew into kubezero-addons 2021-09-02 19:36:11 +02:00
values.yaml feat: migrate device-plugins and k8s-ecr-login-renew into kubezero-addons 2021-09-02 19:36:11 +02:00

README.md

kubezero-addons

Version: 0.1.0 Type: application

KubeZero umbrella chart for various optional cluster addons

Homepage: https://kubezero.com

Maintainers

Name Email Url
Quarky9

Requirements

Kubernetes: >= 1.18.0

Repository Name Version
https://metallb.github.io/metallb metallb 0.10.2

MetalLB

device-plugins

k8s-ecr-login-renew

IAM setup

  • Create IAM user for ECR read-only access and attach the following managed policy: AmazonEC2ContainerRegistryReadOnly
  • create AWS credentials for the IAM users

Kubernetes secret

Create secret with the IAM user credential for ecr-renew to use, using the credentials from the previous step:
kubectl create secret -n kube-system generic ecr-renew-cred --from-literal=AWS_REGION=<AWS_REGION> --from-literal=AWS_ACCESS_KEY_ID=<AWS_SECRET_ID> --from-literal=AWS_SECRET_ACCESS_KEY=<AWS_SECRET_KEY>

Resources

Values

Key Type Default Description
fuseDevicePlugin.enabled bool false
k8sEcrLoginRenew.enabled bool false
metallb.configInline object {}
metallb.controller.nodeSelector."node-role.kubernetes.io/master" string ""
metallb.controller.tolerations[0].effect string "NoSchedule"
metallb.controller.tolerations[0].key string "node-role.kubernetes.io/master"
metallb.enabled bool false
metallb.psp.create bool false