github.com/replicatedcom/ship@v0.50.0/integration/init/istio-1.0.3/expected/.ship/upstream/values-istio-gateways.yaml (about)

     1  # Common settings.
     2  global:
     3    # Include the crd definition when generating the template.
     4    # For 'helm template' and helm install > 2.10 it should be true.
     5    # For helm < 2.9, crds must be installed ahead of time with
     6    # 'kubectl apply -f install/kubernetes/helm/istio/templates/crds.yaml
     7    # and this options must be set off.
     8    crds: false
     9  
    10    # Omit the istio-sidecar-injector configmap when generate a
    11    # standalone gateway. Gateways may be created in namespaces other
    12    # than `istio-system` and we don't want to re-create the injector
    13    # configmap in those.
    14    omitSidecarInjectorConfigMap: true
    15  
    16    # Istio control plane namespace: This specifies where the Istio control
    17    # plane was installed earlier.  Modify this if you installed the control
    18    # plane in a different namespace than istio-system.
    19    istioNamespace: istio-system
    20  
    21    proxy:
    22      # Sets the destination Statsd in envoy (the value of the "--statsdUdpAddress" proxy argument
    23      # would be <host>:<port>).
    24      # Disabled by default.
    25      # The istio-statsd-prom-bridge is deprecated and should not be used moving forward.
    26      envoyStatsd:
    27        # If enabled is set to true, host and port must also be provided. Istio no longer provides a statsd collector.
    28        enabled: false
    29        host: # example: statsd-svc
    30        port: # example: 9125
    31  
    32  
    33  #
    34  # Gateways Configuration
    35  # By default (if enabled) a pair of Ingress and Egress Gateways will be created for the mesh.
    36  # You can add more gateways in addition to the defaults but make sure those are uniquely named
    37  # and that NodePorts are not conflicting.
    38  # Disable specifc gateway by setting the `enabled` to false.
    39  #
    40  gateways:
    41    enabled: true
    42  
    43    custom-gateway:
    44      enabled: true
    45      labels:
    46        app: custom-gateway
    47      replicaCount: 1
    48      autoscaleMin: 1
    49      autoscaleMax: 5
    50      resources: {}
    51        # limits:
    52        #  cpu: 100m
    53        #  memory: 128Mi
    54        #requests:
    55        #  cpu: 1800m
    56        #  memory: 256Mi
    57  
    58      loadBalancerIP: ""
    59      serviceAnnotations: {}
    60      type: LoadBalancer #change to NodePort, ClusterIP or LoadBalancer if need be
    61      # Uncomment the following line to preserve client source ip.
    62      # externalTrafficPolicy: Local
    63  
    64      ports:
    65        ## You can add custom gateway ports
    66      - port: 80
    67        targetPort: 80
    68        name: http2
    69        # nodePort: 31380
    70      - port: 443
    71        name: https
    72        # nodePort: 31390
    73      - port: 31400
    74        name: tcp
    75        # nodePort: 31400
    76      # Pilot and Citadel MTLS ports are enabled in gateway - but will only redirect
    77      # to pilot/citadel if global.meshExpansion settings are enabled.
    78      - port: 15011
    79        targetPort: 15011
    80        name: tcp-pilot-grpc-tls
    81      - port: 8060
    82        targetPort: 8060
    83        name: tcp-citadel-grpc-tls
    84      # Telemetry-related ports are enabled in gateway - but will only redirect if
    85      # the gateway configration for the various components are enabled.
    86      - port: 15030
    87        targetPort: 15030
    88        name: http2-prometheus
    89      - port: 15031
    90        targetPort: 15031
    91        name: http2-grafana
    92      secretVolumes:
    93      - name: customgateway-certs
    94        secretName: istio-customgateway-certs
    95        mountPath: /etc/istio/customgateway-certs
    96      - name: customgateway-ca-certs
    97        secretName: istio-customgateway-ca-certs
    98        mountPath: /etc/istio/customgateway-ca-certs
    99  
   100  # all other components are disabled except the gateways
   101  ingress:
   102    enabled: false
   103  
   104  security:
   105    enabled: false
   106  
   107  sidecarInjectorWebhook:
   108    enabled: false
   109  
   110  galley:
   111    enabled: false
   112  
   113  mixer:
   114    enabled: false
   115  
   116  pilot:
   117    enabled: false
   118  
   119  grafana:
   120    enabled: false
   121  
   122  prometheus:
   123    enabled: false
   124  
   125  servicegraph:
   126    enabled: false
   127  
   128  tracing:
   129    enabled: false
   130  
   131  kiali:
   132    enabled: false
   133  
   134  certmanager:
   135    enabled: false