You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

271 lines
10 KiB

  1. ---
  2. # cilium_version: "v1.15.4"
  3. # Log-level
  4. # cilium_debug: false
  5. # cilium_mtu: ""
  6. # cilium_enable_ipv4: true
  7. # cilium_enable_ipv6: false
  8. # Enable l2 announcement from cilium to replace Metallb Ref: https://docs.cilium.io/en/v1.14/network/l2-announcements/
  9. cilium_l2announcements: false
  10. # Cilium agent health port
  11. # cilium_agent_health_port: "9879"
  12. # Identity allocation mode selects how identities are shared between cilium
  13. # nodes by setting how they are stored. The options are "crd" or "kvstore".
  14. # - "crd" stores identities in kubernetes as CRDs (custom resource definition).
  15. # These can be queried with:
  16. # `kubectl get ciliumid`
  17. # - "kvstore" stores identities in an etcd kvstore.
  18. # - In order to support External Workloads, "crd" is required
  19. # - Ref: https://docs.cilium.io/en/stable/gettingstarted/external-workloads/#setting-up-support-for-external-workloads-beta
  20. # - KVStore operations are only required when cilium-operator is running with any of the below options:
  21. # - --synchronize-k8s-services
  22. # - --synchronize-k8s-nodes
  23. # - --identity-allocation-mode=kvstore
  24. # - Ref: https://docs.cilium.io/en/stable/internals/cilium_operator/#kvstore-operations
  25. # cilium_identity_allocation_mode: kvstore
  26. # Etcd SSL dirs
  27. # cilium_cert_dir: /etc/cilium/certs
  28. # kube_etcd_cacert_file: ca.pem
  29. # kube_etcd_cert_file: cert.pem
  30. # kube_etcd_key_file: cert-key.pem
  31. # Limits for apps
  32. # cilium_memory_limit: 500M
  33. # cilium_cpu_limit: 500m
  34. # cilium_memory_requests: 64M
  35. # cilium_cpu_requests: 100m
  36. # Overlay Network Mode
  37. # cilium_tunnel_mode: vxlan
  38. # LoadBalancer Mode (snat/dsr/hybrid) Ref: https://docs.cilium.io/en/stable/network/kubernetes/kubeproxy-free/#dsr-mode
  39. # cilium_loadbalancer_mode: snat
  40. # Optional features
  41. # cilium_enable_prometheus: false
  42. # Enable if you want to make use of hostPort mappings
  43. # cilium_enable_portmap: false
  44. # Monitor aggregation level (none/low/medium/maximum)
  45. # cilium_monitor_aggregation: medium
  46. # The monitor aggregation flags determine which TCP flags which, upon the
  47. # first observation, cause monitor notifications to be generated.
  48. #
  49. # Only effective when monitor aggregation is set to "medium" or higher.
  50. # cilium_monitor_aggregation_flags: "all"
  51. # Kube Proxy Replacement mode (strict/partial)
  52. # cilium_kube_proxy_replacement: partial
  53. # If upgrading from Cilium < 1.5, you may want to override some of these options
  54. # to prevent service disruptions. See also:
  55. # http://docs.cilium.io/en/stable/install/upgrade/#changes-that-may-require-action
  56. # cilium_preallocate_bpf_maps: false
  57. # `cilium_tofqdns_enable_poller` is deprecated in 1.8, removed in 1.9
  58. # cilium_tofqdns_enable_poller: false
  59. # `cilium_enable_legacy_services` is deprecated in 1.6, removed in 1.9
  60. # cilium_enable_legacy_services: false
  61. # Unique ID of the cluster. Must be unique across all connected clusters and
  62. # in the range of 1 and 255. Only relevant when building a mesh of clusters.
  63. # This value is not defined by default
  64. # cilium_cluster_id:
  65. # Deploy cilium even if kube_network_plugin is not cilium.
  66. # This enables to deploy cilium alongside another CNI to replace kube-proxy.
  67. # cilium_deploy_additionally: false
  68. # Auto direct nodes routes can be used to advertise pods routes in your cluster
  69. # without any tunneling (with `cilium_tunnel_mode` sets to `disabled`).
  70. # This works only if you have a L2 connectivity between all your nodes.
  71. # You wil also have to specify the variable `cilium_native_routing_cidr` to
  72. # make this work. Please refer to the cilium documentation for more
  73. # information about this kind of setups.
  74. # cilium_auto_direct_node_routes: false
  75. # Allows to explicitly specify the IPv4 CIDR for native routing.
  76. # When specified, Cilium assumes networking for this CIDR is preconfigured and
  77. # hands traffic destined for that range to the Linux network stack without
  78. # applying any SNAT.
  79. # Generally speaking, specifying a native routing CIDR implies that Cilium can
  80. # depend on the underlying networking stack to route packets to their
  81. # destination. To offer a concrete example, if Cilium is configured to use
  82. # direct routing and the Kubernetes CIDR is included in the native routing CIDR,
  83. # the user must configure the routes to reach pods, either manually or by
  84. # setting the auto-direct-node-routes flag.
  85. # cilium_native_routing_cidr: ""
  86. # Allows to explicitly specify the IPv6 CIDR for native routing.
  87. # cilium_native_routing_cidr_ipv6: ""
  88. # Enable transparent network encryption.
  89. # cilium_encryption_enabled: false
  90. # Encryption method. Can be either ipsec or wireguard.
  91. # Only effective when `cilium_encryption_enabled` is set to true.
  92. # cilium_encryption_type: "ipsec"
  93. # Enable encryption for pure node to node traffic.
  94. # This option is only effective when `cilium_encryption_type` is set to `ipsec`.
  95. # cilium_ipsec_node_encryption: false
  96. # If your kernel or distribution does not support WireGuard, Cilium agent can be configured to fall back on the user-space implementation.
  97. # When this flag is enabled and Cilium detects that the kernel has no native support for WireGuard,
  98. # it will fallback on the wireguard-go user-space implementation of WireGuard.
  99. # This option is only effective when `cilium_encryption_type` is set to `wireguard`.
  100. # cilium_wireguard_userspace_fallback: false
  101. # IP Masquerade Agent
  102. # https://docs.cilium.io/en/stable/concepts/networking/masquerading/
  103. # By default, all packets from a pod destined to an IP address outside of the cilium_native_routing_cidr range are masqueraded
  104. # cilium_ip_masq_agent_enable: false
  105. ### A packet sent from a pod to a destination which belongs to any CIDR from the nonMasqueradeCIDRs is not going to be masqueraded
  106. # cilium_non_masquerade_cidrs:
  107. # - 10.0.0.0/8
  108. # - 172.16.0.0/12
  109. # - 192.168.0.0/16
  110. # - 100.64.0.0/10
  111. # - 192.0.0.0/24
  112. # - 192.0.2.0/24
  113. # - 192.88.99.0/24
  114. # - 198.18.0.0/15
  115. # - 198.51.100.0/24
  116. # - 203.0.113.0/24
  117. # - 240.0.0.0/4
  118. ### Indicates whether to masquerade traffic to the link local prefix.
  119. ### If the masqLinkLocal is not set or set to false, then 169.254.0.0/16 is appended to the non-masquerade CIDRs list.
  120. # cilium_masq_link_local: false
  121. ### A time interval at which the agent attempts to reload config from disk
  122. # cilium_ip_masq_resync_interval: 60s
  123. # Hubble
  124. ### Enable Hubble without install
  125. # cilium_enable_hubble: false
  126. ### Enable Hubble Metrics
  127. # cilium_enable_hubble_metrics: false
  128. ### if cilium_enable_hubble_metrics: true
  129. # cilium_hubble_metrics: {}
  130. # - dns
  131. # - drop
  132. # - tcp
  133. # - flow
  134. # - icmp
  135. # - http
  136. ### Enable Hubble install
  137. # cilium_hubble_install: false
  138. ### Enable auto generate certs if cilium_hubble_install: true
  139. # cilium_hubble_tls_generate: false
  140. # IP address management mode for v1.9+.
  141. # https://docs.cilium.io/en/v1.9/concepts/networking/ipam/
  142. # cilium_ipam_mode: kubernetes
  143. # Extra arguments for the Cilium agent
  144. # cilium_agent_custom_args: []
  145. # For adding and mounting extra volumes to the cilium agent
  146. # cilium_agent_extra_volumes: []
  147. # cilium_agent_extra_volume_mounts: []
  148. # cilium_agent_extra_env_vars: []
  149. # cilium_operator_replicas: 2
  150. # The address at which the cillium operator bind health check api
  151. # cilium_operator_api_serve_addr: "127.0.0.1:9234"
  152. ## A dictionary of extra config variables to add to cilium-config, formatted like:
  153. ## cilium_config_extra_vars:
  154. ## var1: "value1"
  155. ## var2: "value2"
  156. # cilium_config_extra_vars: {}
  157. # For adding and mounting extra volumes to the cilium operator
  158. # cilium_operator_extra_volumes: []
  159. # cilium_operator_extra_volume_mounts: []
  160. # Extra arguments for the Cilium Operator
  161. # cilium_operator_custom_args: []
  162. # Name of the cluster. Only relevant when building a mesh of clusters.
  163. # cilium_cluster_name: default
  164. # Make Cilium take ownership over the `/etc/cni/net.d` directory on the node, renaming all non-Cilium CNI configurations to `*.cilium_bak`.
  165. # This ensures no Pods can be scheduled using other CNI plugins during Cilium agent downtime.
  166. # Available for Cilium v1.10 and up.
  167. # cilium_cni_exclusive: true
  168. # Configure the log file for CNI logging with retention policy of 7 days.
  169. # Disable CNI file logging by setting this field to empty explicitly.
  170. # Available for Cilium v1.12 and up.
  171. # cilium_cni_log_file: "/var/run/cilium/cilium-cni.log"
  172. # -- Configure cgroup related configuration
  173. # -- Enable auto mount of cgroup2 filesystem.
  174. # When `cilium_cgroup_auto_mount` is enabled, cgroup2 filesystem is mounted at
  175. # `cilium_cgroup_host_root` path on the underlying host and inside the cilium agent pod.
  176. # If users disable `cilium_cgroup_auto_mount`, it's expected that users have mounted
  177. # cgroup2 filesystem at the specified `cilium_cgroup_auto_mount` volume, and then the
  178. # volume will be mounted inside the cilium agent pod at the same path.
  179. # Available for Cilium v1.11 and up
  180. # cilium_cgroup_auto_mount: true
  181. # -- Configure cgroup root where cgroup2 filesystem is mounted on the host
  182. # cilium_cgroup_host_root: "/run/cilium/cgroupv2"
  183. # Specifies the ratio (0.0-1.0) of total system memory to use for dynamic
  184. # sizing of the TCP CT, non-TCP CT, NAT and policy BPF maps.
  185. # cilium_bpf_map_dynamic_size_ratio: "0.0"
  186. # -- Enables masquerading of IPv4 traffic leaving the node from endpoints.
  187. # Available for Cilium v1.10 and up
  188. # cilium_enable_ipv4_masquerade: true
  189. # -- Enables masquerading of IPv6 traffic leaving the node from endpoints.
  190. # Available for Cilium v1.10 and up
  191. # cilium_enable_ipv6_masquerade: true
  192. # -- Enable native IP masquerade support in eBPF
  193. # cilium_enable_bpf_masquerade: false
  194. # -- Configure whether direct routing mode should route traffic via
  195. # host stack (true) or directly and more efficiently out of BPF (false) if
  196. # the kernel supports it. The latter has the implication that it will also
  197. # bypass netfilter in the host namespace.
  198. # cilium_enable_host_legacy_routing: true
  199. # -- Enable use of the remote node identity.
  200. # ref: https://docs.cilium.io/en/v1.7/install/upgrade/#configmap-remote-node-identity
  201. # cilium_enable_remote_node_identity: true
  202. # -- Enable the use of well-known identities.
  203. # cilium_enable_well_known_identities: false
  204. # cilium_enable_bpf_clock_probe: true
  205. # -- Whether to enable CNP status updates.
  206. # cilium_disable_cnp_status_updates: true
  207. # A list of extra rules variables to add to clusterrole for cilium operator, formatted like:
  208. # cilium_clusterrole_rules_operator_extra_vars:
  209. # - apiGroups:
  210. # - '""'
  211. # resources:
  212. # - pods
  213. # verbs:
  214. # - delete
  215. # - apiGroups:
  216. # - '""'
  217. # resources:
  218. # - nodes
  219. # verbs:
  220. # - list
  221. # - watch
  222. # resourceNames:
  223. # - toto
  224. # cilium_clusterrole_rules_operator_extra_vars: []