github.com/replicatedcom/ship@v0.50.0/integration/init/istio/expected/.ship/upstream/values-istio-gateways.yaml (about)

     1  # Common settings.
     2  global:
     3    # Include the crd definition when generating the template.
     4    # For 'helm template' and helm install > 2.10 it should be true.
     5    # For helm < 2.9, crds must be installed ahead of time with
     6    # 'kubectl apply -f install/kubernetes/helm/istio/templates/crds.yaml
     7    # and this options must be set off.
     8    crds: false
     9  
    10    # Omit the istio-sidecar-injector configmap when generate a
    11    # standalone gateway. Gateways may be created in namespaces other
    12    # than `istio-system` and we don't want to re-create the injector
    13    # configmap in those.
    14    omitSidecarInjectorConfigMap: true
    15  
    16    # Istio control plane namespace: This specifies where the Istio control
    17    # plane was installed earlier.  Modify this if you installed the control
    18    # plane in a different namespace than istio-system.
    19    istioNamespace: istio-system
    20  
    21    proxy:
    22      # Sets the destination Statsd in envoy (the value of the "--statsdUdpAddress" proxy argument
    23      # would be <host>:<port>).
    24      # Disabled by default.
    25      # The istio-statsd-prom-bridge is deprecated and should not be used moving forward.
    26      envoyStatsd:
    27        # If enabled is set to true, host and port must also be provided. Istio no longer provides a statsd collector.
    28        enabled: false
    29        host: # example: statsd-svc
    30        port: # example: 9125
    31  
    32  
    33  #
    34  # Gateways Configuration
    35  # By default (if enabled) a pair of Ingress and Egress Gateways will be created for the mesh.
    36  # You can add more gateways in addition to the defaults but make sure those are uniquely named
    37  # and that NodePorts are not conflicting.
    38  # Disable specifc gateway by setting the `enabled` to false.
    39  #
    40  gateways:
    41    enabled: true
    42  
    43    custom-gateway:
    44      enabled: true
    45      labels:
    46        app: custom-gateway
    47      replicaCount: 1
    48      autoscaleMin: 1
    49      autoscaleMax: 5
    50      resources: {}
    51        # limits:
    52        #  cpu: 100m
    53        #  memory: 128Mi
    54        #requests:
    55        #  cpu: 1800m
    56        #  memory: 256Mi
    57  
    58      loadBalancerIP: ""
    59      serviceAnnotations: {}
    60      type: LoadBalancer #change to NodePort, ClusterIP or LoadBalancer if need be
    61  
    62      ports:
    63        ## You can add custom gateway ports
    64      - port: 80
    65        targetPort: 80
    66        name: http2
    67        # nodePort: 31380
    68      - port: 443
    69        name: https
    70        # nodePort: 31390
    71      - port: 31400
    72        name: tcp
    73        # nodePort: 31400
    74      # Pilot and Citadel MTLS ports are enabled in gateway - but will only redirect
    75      # to pilot/citadel if global.meshExpansion settings are enabled.
    76      - port: 15011
    77        targetPort: 15011
    78        name: tcp-pilot-grpc-tls
    79      - port: 8060
    80        targetPort: 8060
    81        name: tcp-citadel-grpc-tls
    82      # Addon ports for kiali are enabled in gateway - but will only redirect if
    83      # the gateway configuration for the various components are enabled.
    84      - port: 15029
    85      - targetPort: 15029
    86      # Telemetry-related ports are enabled in gateway - but will only redirect if
    87      # the gateway configuration for the various components are enabled.
    88      - port: 15030
    89        targetPort: 15030
    90        name: http2-prometheus
    91      - port: 15031
    92        targetPort: 15031
    93        name: http2-grafana
    94      - port: 15032
    95        targetPort: 15032
    96        name: http2-tracing
    97      secretVolumes:
    98      - name: customgateway-certs
    99        secretName: istio-customgateway-certs
   100        mountPath: /etc/istio/customgateway-certs
   101      - name: customgateway-ca-certs
   102        secretName: istio-customgateway-ca-certs
   103        mountPath: /etc/istio/customgateway-ca-certs
   104  
   105  # all other components are disabled except the gateways
   106  ingress:
   107    enabled: false
   108  
   109  security:
   110    enabled: false
   111  
   112  sidecarInjectorWebhook:
   113    enabled: false
   114  
   115  galley:
   116    enabled: false
   117  
   118  mixer:
   119    enabled: false
   120  
   121  pilot:
   122    enabled: false
   123  
   124  grafana:
   125    enabled: false
   126  
   127  prometheus:
   128    enabled: false
   129  
   130  servicegraph:
   131    enabled: false
   132  
   133  tracing:
   134    enabled: false
   135  
   136  kiali:
   137    enabled: false
   138  
   139  certmanager:
   140    enabled: false