kubezero/charts/kubezero-addons
Stefan Reimer a49b139e54 feat: latest 1.23 cluster upgrade config 2022-09-14 19:08:14 +02:00
..
charts/aws-node-termination-handler feat: nth version bump 2022-06-01 10:11:31 +02:00
templates feat: latest 1.23 cluster upgrade config 2022-09-14 19:08:14 +02:00
Chart.yaml feat: latest 1.23 cluster upgrade config 2022-09-14 19:08:14 +02:00
README.md feat: bootstrap / upgrade reorg as part of 1.23 2022-09-11 13:54:56 +02:00
README.md.gotmpl feat: latest 1.23 cluster upgrade config 2022-09-14 19:08:14 +02:00
nth.patch feat: update aws-node-termination handler chart, first version of forseti 2022-01-28 17:22:12 +01:00
update.sh feat: nth version bump 2022-06-01 10:11:31 +02:00
values.yaml feat: latest 1.23 cluster upgrade config 2022-09-14 19:08:14 +02:00

README.md

kubezero-addons

Version: 0.6.1 Type: application AppVersion: v1.23.10

KubeZero umbrella chart for various optional cluster addons

Homepage: https://kubezero.com

Maintainers

Name Email Url
Stefan Reimer stefan@zero-downtime.net

Requirements

Kubernetes: >= 1.20.0

Repository Name Version
aws-node-termination-handler 0.18.5
https://kubernetes-sigs.github.io/external-dns/ external-dns 1.11.0
https://kubernetes.github.io/autoscaler cluster-autoscaler 9.21.0

MetalLB

device-plugins

AWS Neuron

Device plugin for AWS Neuron - Inf1 instances

Values

Key Type Default Description
aws-node-termination-handler.deleteLocalData bool true
aws-node-termination-handler.emitKubernetesEvents bool true
aws-node-termination-handler.enableProbesServer bool true
aws-node-termination-handler.enablePrometheusServer bool false
aws-node-termination-handler.enableSpotInterruptionDraining bool false
aws-node-termination-handler.enableSqsTerminationDraining bool true
aws-node-termination-handler.enabled bool false
aws-node-termination-handler.extraEnv[0] object {"name":"AWS_ROLE_ARN","value":""} "arn:aws:iam::${AWS::AccountId}:role/${AWS::Region}.${ClusterName}.awsNth"
aws-node-termination-handler.extraEnv[1].name string "AWS_WEB_IDENTITY_TOKEN_FILE"
aws-node-termination-handler.extraEnv[1].value string "/var/run/secrets/sts.amazonaws.com/serviceaccount/token"
aws-node-termination-handler.extraEnv[2].name string "AWS_STS_REGIONAL_ENDPOINTS"
aws-node-termination-handler.extraEnv[2].value string "regional"
aws-node-termination-handler.fullnameOverride string "aws-node-termination-handler"
aws-node-termination-handler.ignoreDaemonSets bool true
aws-node-termination-handler.jsonLogging bool true
aws-node-termination-handler.managedAsgTag string "aws-node-termination-handler/managed" "aws-node-termination-handler/${ClusterName}"
aws-node-termination-handler.metadataTries int 0
aws-node-termination-handler.nodeSelector."node-role.kubernetes.io/control-plane" string ""
aws-node-termination-handler.podMonitor.create bool false
aws-node-termination-handler.queueURL string "" https://sqs.${AWS::Region}.amazonaws.com/${AWS::AccountId}/${ClusterName}_Nth
aws-node-termination-handler.rbac.pspEnabled bool false
aws-node-termination-handler.taintNode bool true
aws-node-termination-handler.tolerations[0].effect string "NoSchedule"
aws-node-termination-handler.tolerations[0].key string "node-role.kubernetes.io/master"
aws-node-termination-handler.useProviderId bool true
awsNeuron.enabled bool false
awsNeuron.image.name string "public.ecr.aws/neuron/neuron-device-plugin"
awsNeuron.image.tag string "1.9.3.0"
cluster-autoscaler.autoDiscovery.clusterName string ""
cluster-autoscaler.awsRegion string "us-west-2"
cluster-autoscaler.enabled bool false
cluster-autoscaler.nodeSelector."node-role.kubernetes.io/control-plane" string ""
cluster-autoscaler.podDisruptionBudget bool false
cluster-autoscaler.prometheusRule.enabled bool false
cluster-autoscaler.serviceMonitor.enabled bool false
cluster-autoscaler.serviceMonitor.interval string "30s"
cluster-autoscaler.tolerations[0].effect string "NoSchedule"
cluster-autoscaler.tolerations[0].key string "node-role.kubernetes.io/master"
clusterBackup.enabled bool false
clusterBackup.extraEnv list []
clusterBackup.image.name string "public.ecr.aws/zero-downtime/kubezero-admin"
clusterBackup.password string "" /etc/cloudbender/clusterBackup.passphrase
clusterBackup.repository string "" s3:https://s3.amazonaws.com/${CFN[ConfigBucket]}/k8s/${CLUSTERNAME}/clusterBackup
external-dns.enabled bool false
external-dns.env[0] object {"name":"AWS_ROLE_ARN","value":""} "arn:aws:iam::${AWS::AccountId}:role/${AWS::Region}.${ClusterName}.externalDNS"
external-dns.env[1].name string "AWS_WEB_IDENTITY_TOKEN_FILE"
external-dns.env[1].value string "/var/run/secrets/sts.amazonaws.com/serviceaccount/token"
external-dns.env[2].name string "AWS_STS_REGIONAL_ENDPOINTS"
external-dns.env[2].value string "regional"
external-dns.extraVolumeMounts[0].mountPath string "/var/run/secrets/sts.amazonaws.com/serviceaccount/"
external-dns.extraVolumeMounts[0].name string "aws-token"
external-dns.extraVolumeMounts[0].readOnly bool true
external-dns.extraVolumes[0].name string "aws-token"
external-dns.extraVolumes[0].projected.sources[0].serviceAccountToken.audience string "sts.amazonaws.com"
external-dns.extraVolumes[0].projected.sources[0].serviceAccountToken.expirationSeconds int 86400
external-dns.extraVolumes[0].projected.sources[0].serviceAccountToken.path string "token"
external-dns.interval string "3m"
external-dns.nodeSelector."node-role.kubernetes.io/control-plane" string ""
external-dns.provider string "inmemory"
external-dns.sources[0] string "service"
external-dns.tolerations[0].effect string "NoSchedule"
external-dns.tolerations[0].key string "node-role.kubernetes.io/master"
external-dns.triggerLoopOnEvent bool true
forseti.aws.iamRoleArn string "" "arn:aws:iam::${AWS::AccountId}:role/${AWS::Region}.${ClusterName}.kubezeroForseti"
forseti.aws.region string ""
forseti.enabled bool false
forseti.image.name string "public.ecr.aws/zero-downtime/forseti"
forseti.image.tag string "v0.1.2"
fuseDevicePlugin.enabled bool false