-
Notifications
You must be signed in to change notification settings - Fork 114
/
Copy pathvalues.yaml
executable file
·241 lines (227 loc) · 6.88 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
---
contiv:
nodeToNodeTransport: "vxlan" # possible values: "vxlan", "srv6", "nooverlay"
useSRv6ForServices: false
useSRv6ForServiceFunctionChaining: false
useDX6ForSrv6NodetoNodeTransport: false
useTAPInterfaces: true
tapInterfaceVersion: 2
tapv2RxRingSize: 256
tapv2TxRingSize: 256
enableGSO: true
vmxnet3RxRingSize: 1024
vmxnet3TxRingSize: 1024
interfaceRxMode: "default"
stealFirstNIC: false
stnVersion: 2
natExternalTraffic: true
mtuSize: 1450
cleanupIdleNATSessions: true
tcpNATSessionTimeout: 180
otherNATSessionTimeout: 5
scanIPNeighbors: true
ipNeighborScanInterval: 1
ipNeighborStaleThreshold: 4
serviceLocalEndpointWeight: 1
disableNATVirtualReassembly: false
enablePacketTrace: false
routeServiceCIDRToVPP: false
crdNodeConfigurationDisabled: true
ipamConfig:
podSubnetCIDR: 10.1.0.0/16
podSubnetOneNodePrefixLen: 24
vppHostSubnetCIDR: 172.30.0.0/16
vppHostSubnetOneNodePrefixLen: 24
nodeInterconnectCIDR: 192.168.16.0/24
vxlanCIDR: 192.168.30.0/24
nodeInterconnectDHCP: false
# defaultGateway: 192.168.16.100
# serviceCIDR: "10.96.0.0/12"
# example of node configuration for VPP interfaces
# nodeConfig:
# - name: "vm1"
# mainInterface:
# interfaceName: "GigabitEthernet0/4/0"
# ip: 192.168.16.101/24
# gateway: 192.168.1.1
# otherInterfaces:
# - interfaceName: "GigabitEthernet0/5/0"
# ip: "1.2.3.4/24"
# - interfaceName: "GigabitEthernet0/6/0"
# ip: "2.3.4.5/24"
# - name: "vm2"
# useDHCPOnMainInt: False
# mainInterface:
# interfaceName: "GigabitEthernet0/9/0"
# useDHCP: True
# gateway: 192.168.1.1
# otherInterfaces:
# - interfaceName: "GigabitEthernet0/7/0"
# ip: "3.4.5.6/24"
# - interfaceName: "GigabitEthernet0/7/0"
# ip: "5.6.7.8/24"
srv6:
servicePolicyBSIDSubnetCIDR: 8fff::/16
servicePodLocalSIDSubnetCIDR: 9300::/16
serviceHostLocalSIDSubnetCIDR: 9300::/16
serviceNodeLocalSIDSubnetCIDR: 9000::/16
nodeToNodePodLocalSIDSubnetCIDR: 9501::/16
nodeToNodeHostLocalSIDSubnetCIDR: 9500::/16
nodeToNodePodPolicySIDSubnetCIDR: 8501::/16
nodeToNodeHostPolicySIDSubnetCIDR: 8500::/16
sfcPolicyBSIDSubnetCIDR: 8eee::/16
sfcServiceFunctionSIDSubnetCIDR: 9600::/16
sfcEndLocalSIDSubnetCIDR: 9310::/16
sfcIDLengthUsedInSidForServiceFunction: 16
logs:
defaultLevel: debug
controller:
enableRetry: true
delayRetry: 1000000000
maxRetryAttempts: 3
enableExpBackoffRetry: true
delayLocalResync: 5000000000
startupResyncDeadline: 30000000000
enablePeriodicHealing: false
periodicHealingInterval: 30000000000
delayAfterErrorHealing: 5000000000
remoteDBProbingInterval: 3000000000
recordEventHistory: true
eventHistoryAgeLimit: 60
permanentlyRecordedInitPeriod: 10
# ETCD server to be used by Contiv
etcd:
image:
repository: quay.io/coreos/etcd
tag: v3.3.24
pullPolicy: IfNotPresent
service:
# nodePort where contiv-etcd can be reached on any node.
nodePort: 32379
# if set to true <NodeIP>:<nodeport> will be used to access service,
# <localhost>:<nodeport> if set to false
useNodeIP: true
enableLivenessProbe: true
livenessProbeInitialDelaySeconds: 20
probePeriodSeconds: 3
dataDir: /var/etcd
usePersistentVolume: false
persistentVolumeSize: 2Gi
useExternalInstance: false
externalInstance:
secretName: my-etcd-secrets
endpoints:
- 127.0.0.1:31379
# if secureTransport is enabled, secrets need to point to proper certificates
secureTransport: false
secrets:
# if mountFromHost is true, certificates must be present in the mountDir on each host.
# if mountFromHost is false, certificates must be present in the current directory, and will be distributed to each host via k8s secret feature.
mountFromHost: true
mountDir: /var/contiv/etcd-secrets
# names of individual files in the 'secrets.location' folder
caCert: ca.pem
serverCert: server.pem
serverKey: server-key.pem
clientCert: client.pem
clientKey: client-key.pem
updateStrategy: RollingUpdate
cpuRequest: 100m
cpuLimit: 0
cipherSuites:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
vswitch:
image:
repository: contivvpp/vswitch
# tag: latest
pullPolicy: IfNotPresent
enableLivenessReadinessProbes: true
readinessProbeInitialDelaySeconds: 15
livenessProbeInitialDelaySeconds: 60
probePeriodSeconds: 3
probeTimeoutSeconds: 2
probeFailureThreshold: 3
defineMemoryLimits: true
hugePages2miLimit: 512Mi
memoryLimit: 512Mi
updateStrategy: RollingUpdate
cpuRequest: 250m
cpuLimit: 0
enableCoreDumps: true
coreDumpsDir: /var/contiv/dumps
useSocketVPPConnection: true
enableInterfaceStats: false
httpPort: 9999
grpcPort: 9111
cni:
image:
repository: contivvpp/cni
# tag: latest
pullPolicy: IfNotPresent
ksr:
image:
repository: contivvpp/ksr
# tag: latest
pullPolicy: IfNotPresent
updateStrategy: RollingUpdate
enableLivenessReadinessProbes: true
readinessProbeInitialDelaySeconds: 10
livenessProbeInitialDelaySeconds: 30
probePeriodSeconds: 3
probeTimeoutSeconds: 2
probeFailureThreshold: 3
cpuRequest: 100m
cpuLimit: 0
httpPort: 9191
crd:
image:
repository: contivvpp/crd
# tag: latest
pullPolicy: IfNotPresent
disableNetctlREST: true
updateStrategy: RollingUpdate
validateInterval: 5 # in minutes, 0 to disable
validateState: SB # select one of the: "internal", "SB", "NB"
enableLivenessReadinessProbes: true
readinessProbeInitialDelaySeconds: 10
livenessProbeInitialDelaySeconds: 30
probePeriodSeconds: 3
probeTimeoutSeconds: 2
probeFailureThreshold: 3
cpuRequest: 100m
cpuLimit: 0
httpPort: 9090
# GoVPP configuration
# It contains time intervals used for VPP health probing (in nanoseconds).
# After a health check probe is not received within the health-check-reply-timeout
# period health-check-threshold times, VPP is considered to be dead by the contiv-agent.
govpp:
healthCheckProbeInterval: 3000000000
healthCheckReplyTimeout: 500000000
healthCheckThreshold: 3
replyTimeout: 3000000000
http:
enableBasicAuth: false
enableServerCert: false
# if mountFromHost is true, certificates must be present in the mountDir on each host.
# if mountFromHost is false, certificates must be present in the current directory, and will be distributed to each host via k8s secret feature.
mountFromHost: false
mountDir: /var/certs
serverCert: server.crt
serverKey: server.key
# credentials to be used by basic-auth, format <username>:<password>
basicAuth: user:pass
telemetry:
pollingInterval: 30000000000
disabled: true
init:
image:
repository: busybox
tag: 1.29.3
bolt:
debug: false
dataDir: /var/bolt
k8sVersion:
post_1_9: true