You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

95 lines
2.8 KiB

  1. ---
  2. # Set to false to only do certificate management
  3. etcd_cluster_setup: true
  4. etcd_events_cluster_setup: false
  5. # Set to true to separate k8s events to a different etcd cluster
  6. etcd_events_cluster_enabled: false
  7. etcd_backup_prefix: "/var/backups"
  8. etcd_data_dir: "/var/lib/etcd"
  9. # Number of etcd backups to retain. Set to a value < 0 to retain all backups
  10. etcd_backup_retention_count: -1
  11. etcd_config_dir: /etc/ssl/etcd
  12. etcd_cert_dir: "{{ etcd_config_dir }}/ssl"
  13. etcd_cert_dir_mode: "0700"
  14. etcd_cert_group: root
  15. # Note: This does not set up DNS entries. It simply adds the following DNS
  16. # entries to the certificate
  17. etcd_cert_alt_names:
  18. - "etcd.kube-system.svc.{{ dns_domain }}"
  19. - "etcd.kube-system.svc"
  20. - "etcd.kube-system"
  21. - "etcd"
  22. etcd_cert_alt_ips: []
  23. etcd_script_dir: "{{ bin_dir }}/etcd-scripts"
  24. etcd_heartbeat_interval: "250"
  25. etcd_election_timeout: "5000"
  26. # etcd_snapshot_count: "10000"
  27. etcd_metrics: "basic"
  28. # Uncomment to set a separate port for etcd to expose metrics on
  29. # etcd_metrics_port: 2381
  30. ## A dictionary of extra environment variables to add to etcd.env, formatted like:
  31. ## etcd_extra_vars:
  32. ## ETCD_VAR1: "value1"
  33. ## ETCD_VAR2: "value2"
  34. etcd_extra_vars: {}
  35. # Limits
  36. # Limit memory only if <4GB memory on host. 0=unlimited
  37. etcd_memory_limit: "{% if ansible_memtotal_mb < 4096 %}512M{% else %}0{% endif %}"
  38. # etcd_quota_backend_bytes: "2147483648"
  39. # Uncomment to set CPU share for etcd
  40. # etcd_cpu_limit: 300m
  41. etcd_blkio_weight: 1000
  42. etcd_node_cert_hosts: "{{ groups['k8s-cluster'] | union(groups.get('calico-rr', [])) | union(groups.get('vault', [])) }}"
  43. etcd_compaction_retention: "8"
  44. # Force clients like etcdctl to use TLS certs (different than peer security)
  45. etcd_secure_client: true
  46. # Enable peer client cert authentication
  47. etcd_peer_client_auth: true
  48. # Number of loop retries
  49. etcd_retries: 4
  50. ## Support tls cipher suites.
  51. # etcd_tls_cipher_suites: {}
  52. # - TLS_RSA_WITH_RC4_128_SHA
  53. # - TLS_RSA_WITH_3DES_EDE_CBC_SHA
  54. # - TLS_RSA_WITH_AES_128_CBC_SHA
  55. # - TLS_RSA_WITH_AES_256_CBC_SHA
  56. # - TLS_RSA_WITH_AES_128_CBC_SHA256
  57. # - TLS_RSA_WITH_AES_128_GCM_SHA256
  58. # - TLS_RSA_WITH_AES_256_GCM_SHA384
  59. # - TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
  60. # - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
  61. # - TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
  62. # - TLS_ECDHE_RSA_WITH_RC4_128_SHA
  63. # - TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
  64. # - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
  65. # - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
  66. # - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
  67. # - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
  68. # - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  69. # - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
  70. # - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
  71. # - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
  72. # - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305
  73. # - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
  74. # - TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305
  75. # - TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256