github.com/verrazzano/verrazzano@v1.7.0/platform-operator/thirdparty/charts/external-dns/values.yaml (about) 1 ## Global Docker image parameters 2 ## Please, note that this will override the image parameters, including dependencies, configured to use the global value 3 ## Current available global Docker image parameters: imageRegistry and imagePullSecrets 4 ## 5 # global: 6 # imageRegistry: myRegistryName 7 # imagePullSecrets: 8 # - myRegistryKeySecretName 9 10 ## Bitnami external-dns image version 11 ## ref: https://hub.docker.com/r/bitnami/external-dns/tags/ 12 ## 13 image: 14 registry: docker.io 15 repository: bitnami/external-dns 16 tag: 0.6.0-debian-10-r13 17 ## Specify a imagePullPolicy 18 ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' 19 ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images 20 ## 21 pullPolicy: IfNotPresent 22 ## Optionally specify an array of imagePullSecrets. 23 ## Secrets must be manually created in the namespace. 24 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ 25 ## 26 # pullSecrets: 27 # - myRegistryKeySecretName 28 29 ## String to partially override external-dns.fullname template (will maintain the release name) 30 # nameOverride: 31 32 ## String to fully override external-dns.fullname template 33 # fullnameOverride: 34 35 ## allows filtering for GLOBAL and PRIVATE zones, defaults to GLOBAL. 36 # To target both (GLOBAL and PRIVATE zones), set it to empty string (`--oci-zone-scope ""`). 37 ociDnsScope: 38 39 ## K8s resources type to be observed for new DNS entries by ExternalDNS 40 ## 41 sources: 42 - service 43 - ingress 44 # - crd 45 46 ## DNS provider where the DNS records will be created. Available providers are: 47 ## - aws, azure, azure-private-dns, cloudflare, coredns, designate, digitalocean, google, infoblox, rfc2136, transip 48 ## 49 provider: aws 50 51 ## Flags related to processing sources 52 ## ref: https://github.com/kubernetes-sigs/external-dns/blob/master/pkg/apis/externaldns/types.go#L272 53 ## 54 ## Limit sources of endpoints to a specific namespace (default: all namespaces) 55 ## 56 namespace: "" 57 ## Templated strings that are used to generate DNS names from sources that don't define a hostname themselves 58 ## 59 fqdnTemplates: [] 60 ## Combine FQDN template and annotations instead of overwriting 61 ## 62 combineFQDNAnnotation: false 63 ## Ignore hostname annotation when generating DNS names, valid only when fqdn-template is set 64 ## 65 ignoreHostnameAnnotation: false 66 ## Allow external-dns to publish DNS records for ClusterIP services 67 ## 68 publishInternalServices: false 69 ## Allow external-dns to publish host-ip for headless services 70 ## 71 publishHostIP: false 72 ## The service types to take care about (default: all, options: ClusterIP, NodePort, LoadBalancer, ExternalName) 73 ## 74 serviceTypeFilter: [] 75 76 ## AWS configuration to be set via arguments/env. variables 77 ## 78 aws: 79 ## AWS credentials 80 ## 81 credentials: 82 secretKey: "" 83 accessKey: "" 84 ## pre external-dns 0.5.9 home dir should be `/root/.aws` 85 ## 86 mountPath: "/.aws" 87 ## Use an existing secret with key "credentials" defined. 88 ## This ignores aws.credentials.secretKey, and aws.credentials.accessKey 89 ## 90 # secretName: 91 92 ## AWS region 93 ## 94 region: "us-east-1" 95 ## Zone Filter. Available values are: public, private 96 ## 97 zoneType: "" 98 ## AWS Role to assume 99 ## 100 assumeRoleArn: "" 101 ## Maximum number of changes that will be applied in each batch 102 ## 103 batchChangeSize: 1000 104 ## AWS Zone tags 105 ## 106 zoneTags: [] 107 ## Enable AWS Prefer CNAME. Available values are: true, false 108 ## 109 preferCNAME: "" 110 ## Enable AWS evaluation of target health. Available values are: true, false 111 ## 112 evaluateTargetHealth: "" 113 ## Azure configuration to be set via arguments/env. variables 114 ## 115 azure: 116 ## When a secret to load azure.json is not specified, 117 ## the host's /etc/kubernetes/azure.json will be used 118 ## 119 ## Deprecated: please use tenantId, subscriptionId, aadClientId and aadClientSecret values instead. 120 ## 121 secretName: "" 122 ## Azure resource group to use 123 ## 124 cloud: "" 125 ## Azure Cloud to use 126 ## 127 resourceGroup: "" 128 ## Azure tenant ID to use 129 ## 130 tenantId: "" 131 ## Azure subscription ID to use 132 ## 133 subscriptionId: "" 134 ## Azure Application Client ID to use 135 ## 136 aadClientId: "" 137 ## Azure Application Client Secret to use 138 ## 139 aadClientSecret: "" 140 ## If you use Azure MSI, this should be set to true 141 ## 142 useManagedIdentityExtension: false 143 144 ## Cloudflare configuration to be set via arguments/env. variables 145 ## 146 cloudflare: 147 ## `CF_API_TOKEN` to set in the environment 148 ## 149 apiToken: "" 150 ## `CF_API_KEY` to set in the environment 151 ## 152 apiKey: "" 153 ## Use an existing secret with keys "cloudflare_api_token" or "cloudflare_api_key" defined. 154 ## This ignores cloudflare.apiToken, and cloudflare.apiKey 155 ## 156 # secretName: 157 ## `CF_API_EMAIL` to set in the environment 158 ## 159 email: "" 160 ## Enable the proxy feature of Cloudflare 161 ## 162 proxied: true 163 164 ## CoreDNS configuration to be set via arguments/env variables 165 ## 166 coredns: 167 ## Comma-separated list of the etcd endpoints 168 ## Secure (https) endpoints can be used as well, in that case `etcdTLS` section 169 ## should be filled in accordingly 170 ## 171 etcdEndpoints: "http://etcd-extdns:2379" 172 ## Configuration of the secure communication and client authentication to the etcd cluster 173 ## If enabled all the values under this key must hold a valid data 174 ## 175 etcdTLS: 176 ## Enable or disable secure communication and client authentication to the etcd cluster 177 ## 178 enabled: false 179 ## Name of the existing secret containing cert files for client communication 180 ## ref: https://github.com/etcd-io/etcd/blob/master/Documentation/op-guide/security.md 181 ## ref (secret creation): 182 ## https://github.com/bitnami/charts/tree/master/bitnami/etcd#configure-certificates-for-client-communication 183 ## 184 secretName: "etcd-client-certs" 185 ## Location of the mounted certificates inside external-dns pod 186 ## 187 mountPath: "/etc/coredns/tls/etcd" 188 ## CA PEM file used to sign etcd TLS cert, should exist in the secret provided above 189 ## 190 caFilename: "ca.crt" 191 ## Certificate PEM file, should exist in the secret provided above 192 ## Will be used by external-dns to authenticate against etcd 193 ## 194 certFilename: "cert.pem" 195 ## Private key PEM file, should exist in the secret provided above 196 ## Will be used by external-dns to authenticate against etcd 197 ## 198 keyFilename: "key.pem" 199 200 ## OpenStack Designate provider configuration to be set via arguments/env. variables 201 ## 202 designate: 203 ## Use a custom CA (optional) 204 ## 205 customCA: 206 enabled: false 207 ## The content of the custom CA file 208 ## 209 content: "" 210 ## Location to mount custom CA 211 ## 212 mountPath: "/config/designate" 213 ## Custom CA filename 214 ## 215 filename: "designate-ca.pem" 216 217 ## Use a host path custom CA (optional) 218 ## This conflicts setting the above customCA to true and chart rendering will fail if you set customCA to true and specify customCAHostPath 219 # customCAHostPath: /path/to/cafile 220 221 ## Set Openstack environment variables (optional). Username and password will be saved in a kubernetes secret. 222 ## The alternative to this is to export the necessary Openstack environment variables in the extraEnv argument. 223 # username: "someuser" 224 # password: "p@55w0rd" 225 # authUrl: "https://mykeystone.example.net:5000/v3/" 226 # regionName: "dev" 227 # userDomainName: "development" 228 # projectName: "myteamname" 229 ## DigitalOcean configuration to be set via arguments/env. variables 230 ## 231 digitalocean: 232 ## `DO_TOKEN` to set in the environment 233 ## 234 apiToken: "" 235 ## Use an existing secret with key "digitalocean_api_token" defined. 236 ## This ignores digitalocean.apiToken 237 ## 238 # secretName: 239 240 ## Google configuration to be set via arguments/env. variables 241 ## 242 google: 243 ## Google Project to use 244 ## 245 project: "" 246 ## Google Application Credentials 247 ## 248 serviceAccountSecret: "" 249 serviceAccountSecretKey: "credentials.json" 250 serviceAccountKey: "" 251 252 ## Infoblox configuration to be set via arguments/env. variables 253 ## 254 infoblox: 255 ## Required keys 256 ## 257 wapiUsername: "admin" 258 wapiPassword: "" 259 gridHost: "" 260 ## Optional keys 261 ## 262 domainFilter: "" 263 noSslVerify: false 264 wapiPort: "" 265 wapiVersion: "" 266 wapiConnectionPoolSize: "" 267 wapiHttpTimeout: "" 268 269 ## RFC 2136 configuration to be set via arguments/env. variables 270 ## 271 rfc2136: 272 host: "" 273 port: 53 274 zone: "" 275 tsigSecret: "" 276 tsigSecretAlg: hmac-sha256 277 tsigKeyname: externaldns-key 278 tsigAxfr: true 279 280 ## PowerDNS configuration to be set via arguments/env. variables 281 ## 282 pdns: 283 apiUrl: "" 284 apiPort: "8081" 285 apiKey: "" 286 287 ## TransIP configuration to be set via arguments/env. variables 288 ## 289 transip: 290 ## Account name to be used 291 ## 292 account: "" 293 ## 294 ## API key that is authorised for the account 295 apiKey: "" 296 297 ## Limit possible target zones by domain suffixes (optional) 298 ## 299 domainFilters: [] 300 ## Limit possible target zones by zone id (optional) 301 ## 302 zoneIdFilters: [] 303 ## Filter sources managed by external-dns via annotation using label selector semantics (optional) 304 ## 305 annotationFilter: "" 306 ## When enabled, prints DNS record changes rather than actually performing them 307 ## 308 dryRun: false 309 ## When enabled, triggers run loop on create/update/delete events (optional, in addition of regular interval) 310 ## 311 triggerLoopOnEvent: false 312 ## Adjust the interval for DNS updates 313 ## 314 interval: "1m" 315 ## Verbosity of the ExternalDNS logs. Available values are: 316 ## - panic, debug, info, warn, error, fatal 317 ## 318 logLevel: info 319 ## Formats of the ExternalDNS logs. Available values are: 320 ## - text, json 321 ## 322 logFormat: text 323 ## Modify how DNS records are sychronized between sources and providers (options: sync, upsert-only) 324 ## 325 policy: upsert-only 326 ## Registry Type. Available types are: txt, noop 327 ## ref: https://github.com/kubernetes-sigs/external-dns/blob/master/docs/proposal/registry.md 328 ## 329 registry: "txt" 330 ## TXT Registry Identifier 331 ## 332 txtOwnerId: "" 333 ## Prefix to create a TXT record with a name following the pattern prefix.<CNAME record> 334 ## 335 # txtPrefix: "" 336 ## Load balancer service to be used; ie: custom-istio-namespace/custom-istio-ingressgateway. 337 ## Omit to use the default (istio-system/istio-ingressgateway) 338 ## 339 istioIngressGateways: [] 340 341 ## Extra Arguments to passed to external-dns 342 ## 343 extraArgs: {} 344 ## Extra env. variable to set on external-dns container. 345 ## 346 ## extraEnv: 347 ## - name: VARNAME1 348 ## value: value1 349 ## - name: VARNAME2 350 ## valueFrom: 351 ## secretKeyRef: 352 ## name: existing-secret 353 ## key: varname2-key 354 extraEnv: [] 355 356 ## Replica count 357 ## 358 replicas: 1 359 360 ## Affinity for pod assignment (this value is evaluated as a template) 361 ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity 362 ## 363 affinity: {} 364 ## Node labels for pod assignment (this value is evaluated as a template) 365 ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector 366 ## 367 nodeSelector: {} 368 ## Tolerations for pod assignment (this value is evaluated as a template) 369 ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#taints-and-tolerations-beta-feature 370 ## 371 tolerations: [] 372 ## Annotations for external-dns pods 373 ## 374 podAnnotations: {} 375 ## Additional labels for the pod(s). 376 ## 377 podLabels: {} 378 ## Pod priority class name 379 ## 380 priorityClassName: "" 381 382 ## Options for the source type "crd" 383 ## 384 crd: 385 ## Install and use the integrated DNSEndpoint CRD 386 create: false 387 ## Change these to use an external DNSEndpoint CRD (E.g. from kubefed) 388 apiversion: "" 389 kind: "" 390 391 ## Kubernetes svc configutarion 392 ## 393 service: 394 ## Kubernetes svc type 395 ## 396 type: ClusterIP 397 port: 7979 398 ## Specify the nodePort value for the LoadBalancer and NodePort service types for the client port 399 ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport 400 ## 401 # nodePort: 402 ## Static clusterIP or None for headless services 403 ## 404 # clusterIP: "" 405 ## External IP list to use with ClusterIP service type 406 ## 407 externalIPs: [] 408 ## Use loadBalancerIP to request a specific static IP, 409 ## otherwise leave blank 410 ## 411 # loadBalancerIP: 412 ## Address that are allowed when svc is LoadBalancer 413 ## 414 loadBalancerSourceRanges: [] 415 ## Provide any additional annotations which may be required. This can be used to 416 ## set the LoadBalancer service type to internal only. 417 ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer 418 ## 419 annotations: {} 420 421 ## RBAC parameteres 422 ## https://kubernetes.io/docs/reference/access-authn-authz/rbac/ 423 ## 424 rbac: 425 create: true 426 ## Service Account for pods 427 ## https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ 428 ## 429 serviceAccountName: default 430 ## Annotations for the Service Account 431 ## 432 serviceAccountAnnotations: {} 433 ## RBAC API version 434 ## 435 apiVersion: v1 436 ## Podsecuritypolicy 437 ## 438 pspEnabled: false 439 440 ## Kubernetes Security Context 441 ## https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ 442 ## 443 securityContext: {} 444 # allowPrivilegeEscalation: false 445 # readOnlyRootFilesystem: true 446 # capabilities: 447 # drop: ["ALL"] 448 podSecurityContext: 449 fsGroup: 1001 450 runAsUser: 1001 451 # runAsNonRoot: true 452 453 ## Configure resource requests and limits 454 ## ref: http://kubernetes.io/docs/user-guide/compute-resources/ 455 ## 456 resources: {} 457 # limits: 458 # cpu: 50m 459 # memory: 50Mi 460 # requests: 461 # memory: 50Mi 462 # cpu: 10m 463 464 ## Liveness Probe. The block is directly forwarded into the deployment, so you can use whatever livenessProbe configuration you want. 465 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/ 466 ## 467 livenessProbe: 468 httpGet: 469 path: /healthz 470 port: http 471 initialDelaySeconds: 10 472 periodSeconds: 10 473 timeoutSeconds: 5 474 failureThreshold: 2 475 successThreshold: 1 476 ## Readiness Probe. The block is directly forwarded into the deployment, so you can use whatever readinessProbe configuration you want. 477 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/ 478 ## 479 readinessProbe: 480 httpGet: 481 path: /healthz 482 port: http 483 initialDelaySeconds: 5 484 periodSeconds: 10 485 timeoutSeconds: 5 486 failureThreshold: 6 487 successThreshold: 1 488 489 ## Configure extra volumes 490 extraVolumes: [] 491 492 ## Configure extra volumeMounts 493 extraVolumeMounts: [] 494 495 ## Prometheus Exporter / Metrics 496 ## 497 metrics: 498 enabled: false 499 ## Metrics exporter pod Annotation and Labels 500 ## 501 # podAnnotations: 502 # prometheus.io/scrape: "true" 503 # prometheus.io/port: "7979" 504 505 ## Prometheus Operator ServiceMonitor configuration 506 ## 507 serviceMonitor: 508 enabled: false 509 ## Namespace in which Prometheus is running 510 ## 511 # namespace: monitoring 512 513 ## Interval at which metrics should be scraped. 514 ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint 515 ## 516 # interval: 10s 517 518 ## Timeout after which the scrape is ended 519 ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint 520 ## 521 # scrapeTimeout: 10s 522 523 ## ServiceMonitor selector labels 524 ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration 525 ## 526 # selector: 527 # prometheus: my-prometheus