github.com/k8snetworkplumbingwg/sriov-network-operator@v1.2.1-0.20240408194816-2d2e5a45d453/deployment/sriov-network-operator/values.yaml (about) 1 operator: 2 tolerations: 3 - key: "node-role.kubernetes.io/master" 4 operator: "Exists" 5 effect: "NoSchedule" 6 - key: "node-role.kubernetes.io/control-plane" 7 operator: "Exists" 8 effect: "NoSchedule" 9 nodeSelector: {} 10 affinity: 11 nodeAffinity: 12 preferredDuringSchedulingIgnoredDuringExecution: 13 - weight: 1 14 preference: 15 matchExpressions: 16 - key: "node-role.kubernetes.io/master" 17 operator: In 18 values: [""] 19 - weight: 1 20 preference: 21 matchExpressions: 22 - key: "node-role.kubernetes.io/control-plane" 23 operator: In 24 values: [ "" ] 25 nameOverride: "" 26 fullnameOverride: "" 27 resourcePrefix: "openshift.io" 28 cniBinPath: "/opt/cni/bin" 29 clusterType: "kubernetes" 30 admissionControllers: 31 enabled: false 32 certificates: 33 secretNames: 34 operator: "operator-webhook-cert" 35 injector: "network-resources-injector-cert" 36 certManager: 37 # When enabled, makes use of certificates managed by cert-manager. 38 enabled: false 39 # When enabled, certificates are generated via cert-manager and then name will match the name of the secrets 40 # defined above 41 generateSelfSigned: false 42 # If not specified, no secret is created and secrets with the names defined above are expected to exist in the 43 # cluster. In that case, the ca.crt must be base64 encoded twice since it ends up being an env variable. 44 custom: 45 enabled: false 46 # operator: 47 # caCrt: | 48 # -----BEGIN CERTIFICATE----- 49 # MIIMIICLDCCAdKgAwIBAgIBADAKBggqhkjOPQQDAjB9MQswCQYDVQQGEwJCRTEPMA0G 50 # ... 51 # -----END CERTIFICATE----- 52 # tlsCrt: | 53 # -----BEGIN CERTIFICATE----- 54 # MIIMIICLDCCAdKgAwIBAgIBADAKBggqhkjOPQQDAjB9MQswCQYDVQQGEwJCRTEPMA0G 55 # ... 56 # -----END CERTIFICATE----- 57 # tlsKey: | 58 # -----BEGIN EC PRIVATE KEY----- 59 # MHcl4wOuDwKQa+upc8GftXE2C//4mKANBC6It01gUaTIpo= 60 # ... 61 # -----END EC PRIVATE KEY----- 62 # injector: 63 # caCrt: | 64 # -----BEGIN CERTIFICATE----- 65 # MIIMIICLDCCAdKgAwIBAgIBADAKBggqhkjOPQQDAjB9MQswCQYDVQQGEwJCRTEPMA0G 66 # ... 67 # -----END CERTIFICATE----- 68 # tlsCrt: | 69 # -----BEGIN CERTIFICATE----- 70 # MIIMIICLDCCAdKgAwIBAgIBADAKBggqhkjOPQQDAjB9MQswCQYDVQQGEwJCRTEPMA0G 71 # ... 72 # -----END CERTIFICATE----- 73 # tlsKey: | 74 # -----BEGIN EC PRIVATE KEY----- 75 # MHcl4wOuDwKQa+upc8GftXE2C//4mKANBC6It01gUaTIpo= 76 # ... 77 # -----END EC PRIVATE KEY----- 78 79 sriovOperatorConfig: 80 # deploy sriovOperatorConfig CR with the below values 81 deploy: false 82 # node slectors for sriov-network-config-daemon 83 configDaemonNodeSelector: {} 84 # log level for both operator and sriov-network-config-daemon 85 logLevel: 2 86 # disable node draining when configuring SR-IOV, set to true in case of a single node 87 # cluster or any other justifiable reason 88 disableDrain: false 89 # sriov-network-config-daemon configuration mode. either "daemon" or "systemd" 90 configurationMode: daemon 91 92 # Image URIs for sriov-network-operator components 93 images: 94 operator: ghcr.io/k8snetworkplumbingwg/sriov-network-operator 95 sriovConfigDaemon: ghcr.io/k8snetworkplumbingwg/sriov-network-operator-config-daemon 96 sriovCni: ghcr.io/k8snetworkplumbingwg/sriov-cni 97 ibSriovCni: ghcr.io/k8snetworkplumbingwg/ib-sriov-cni 98 ovsCni: quay.io/kubevirt/ovs-cni-plugin 99 sriovDevicePlugin: ghcr.io/k8snetworkplumbingwg/sriov-network-device-plugin 100 resourcesInjector: ghcr.io/k8snetworkplumbingwg/network-resources-injector 101 webhook: ghcr.io/k8snetworkplumbingwg/sriov-network-operator-webhook 102 103 imagePullSecrets: []