github.com/verrazzano/verrazzano@v1.7.0/platform-operator/thirdparty/charts/external-dns/values.yaml (about)

     1  ## Global Docker image parameters
     2  ## Please, note that this will override the image parameters, including dependencies, configured to use the global value
     3  ## Current available global Docker image parameters: imageRegistry and imagePullSecrets
     4  ##
     5  # global:
     6  #   imageRegistry: myRegistryName
     7  #   imagePullSecrets:
     8  #     - myRegistryKeySecretName
     9  
    10  ## Bitnami external-dns image version
    11  ## ref: https://hub.docker.com/r/bitnami/external-dns/tags/
    12  ##
    13  image:
    14    registry: docker.io
    15    repository: bitnami/external-dns
    16    tag: 0.6.0-debian-10-r13
    17    ## Specify a imagePullPolicy
    18    ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
    19    ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images
    20    ##
    21    pullPolicy: IfNotPresent
    22    ## Optionally specify an array of imagePullSecrets.
    23    ## Secrets must be manually created in the namespace.
    24    ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
    25    ##
    26    # pullSecrets:
    27    #   - myRegistryKeySecretName
    28  
    29  ## String to partially override external-dns.fullname template (will maintain the release name)
    30  # nameOverride:
    31  
    32  ## String to fully override external-dns.fullname template
    33  # fullnameOverride:
    34  
    35  ## allows filtering for GLOBAL and PRIVATE zones, defaults to GLOBAL.
    36  #  To target both (GLOBAL and PRIVATE zones), set it to empty string (`--oci-zone-scope ""`).
    37  ociDnsScope:
    38  
    39  ## K8s resources type to be observed for new DNS entries by ExternalDNS
    40  ##
    41  sources:
    42  - service
    43  - ingress
    44  # - crd
    45  
    46  ## DNS provider where the DNS records will be created. Available providers are:
    47  ## - aws, azure, azure-private-dns, cloudflare, coredns, designate, digitalocean, google, infoblox, rfc2136, transip
    48  ##
    49  provider: aws
    50  
    51  ## Flags related to processing sources
    52  ## ref: https://github.com/kubernetes-sigs/external-dns/blob/master/pkg/apis/externaldns/types.go#L272
    53  ##
    54  ## Limit sources of endpoints to a specific namespace (default: all namespaces)
    55  ##
    56  namespace: ""
    57  ## Templated strings that are used to generate DNS names from sources that don't define a hostname themselves
    58  ##
    59  fqdnTemplates: []
    60  ## Combine FQDN template and annotations instead of overwriting
    61  ##
    62  combineFQDNAnnotation: false
    63  ## Ignore hostname annotation when generating DNS names, valid only when fqdn-template is set
    64  ##
    65  ignoreHostnameAnnotation: false
    66  ## Allow external-dns to publish DNS records for ClusterIP services
    67  ##
    68  publishInternalServices: false
    69  ## Allow external-dns to publish host-ip for headless services
    70  ##
    71  publishHostIP: false
    72  ## The service types to take care about (default: all, options: ClusterIP, NodePort, LoadBalancer, ExternalName)
    73  ##
    74  serviceTypeFilter: []
    75  
    76  ## AWS configuration to be set via arguments/env. variables
    77  ##
    78  aws:
    79    ## AWS credentials
    80    ##
    81    credentials:
    82      secretKey: ""
    83      accessKey: ""
    84      ## pre external-dns 0.5.9 home dir should be `/root/.aws`
    85      ##
    86      mountPath: "/.aws"
    87      ## Use an existing secret with key "credentials" defined.
    88      ## This ignores aws.credentials.secretKey, and aws.credentials.accessKey
    89      ##
    90      # secretName:
    91  
    92    ## AWS region
    93    ##
    94    region: "us-east-1"
    95    ## Zone Filter. Available values are: public, private
    96    ##
    97    zoneType: ""
    98    ## AWS Role to assume
    99    ##
   100    assumeRoleArn: ""
   101    ## Maximum number of changes that will be applied in each batch
   102    ##
   103    batchChangeSize: 1000
   104    ## AWS Zone tags
   105    ##
   106    zoneTags: []
   107    ## Enable AWS Prefer CNAME. Available values are: true, false
   108    ##
   109    preferCNAME: ""
   110    ## Enable AWS evaluation of target health. Available values are: true, false
   111    ##
   112    evaluateTargetHealth: ""
   113  ## Azure configuration to be set via arguments/env. variables
   114  ##
   115  azure:
   116    ## When a secret to load azure.json is not specified,
   117    ## the host's /etc/kubernetes/azure.json will be used
   118    ##
   119    ## Deprecated: please use tenantId, subscriptionId, aadClientId and aadClientSecret values instead.
   120    ##
   121    secretName: ""
   122    ## Azure resource group to use
   123    ##
   124    cloud: ""
   125    ## Azure Cloud to use
   126    ##
   127    resourceGroup: ""
   128    ## Azure tenant ID to use
   129    ##
   130    tenantId: ""
   131    ## Azure subscription ID to use
   132    ##
   133    subscriptionId: ""
   134    ## Azure Application Client ID to use
   135    ##
   136    aadClientId: ""
   137    ## Azure Application Client Secret to use
   138    ##
   139    aadClientSecret: ""
   140    ## If you use Azure MSI, this should be set to true
   141    ##
   142    useManagedIdentityExtension: false
   143  
   144  ## Cloudflare configuration to be set via arguments/env. variables
   145  ##
   146  cloudflare:
   147    ## `CF_API_TOKEN` to set in the environment
   148    ##
   149    apiToken: ""
   150    ## `CF_API_KEY` to set in the environment
   151    ##
   152    apiKey: ""
   153    ## Use an existing secret with keys "cloudflare_api_token" or "cloudflare_api_key" defined.
   154    ## This ignores cloudflare.apiToken, and cloudflare.apiKey
   155    ##
   156    # secretName:
   157    ## `CF_API_EMAIL` to set in the environment
   158    ##
   159    email: ""
   160    ## Enable the proxy feature of Cloudflare
   161    ##
   162    proxied: true
   163  
   164  ## CoreDNS configuration to be set via arguments/env variables
   165  ##
   166  coredns:
   167    ## Comma-separated list of the etcd endpoints
   168    ## Secure (https) endpoints can be used as well, in that case `etcdTLS` section
   169    ## should be filled in accordingly
   170    ##
   171    etcdEndpoints: "http://etcd-extdns:2379"
   172    ## Configuration of the secure communication and client authentication to the etcd cluster
   173    ## If enabled all the values under this key must hold a valid data
   174    ##
   175    etcdTLS:
   176      ## Enable or disable secure communication and client authentication to the etcd cluster
   177      ##
   178      enabled: false
   179      ## Name of the existing secret containing cert files for client communication
   180      ## ref: https://github.com/etcd-io/etcd/blob/master/Documentation/op-guide/security.md
   181      ## ref (secret creation):
   182      ##  https://github.com/bitnami/charts/tree/master/bitnami/etcd#configure-certificates-for-client-communication
   183      ##
   184      secretName: "etcd-client-certs"
   185      ## Location of the mounted certificates inside external-dns pod
   186      ##
   187      mountPath: "/etc/coredns/tls/etcd"
   188      ## CA PEM file used to sign etcd TLS cert, should exist in the secret provided above
   189      ##
   190      caFilename: "ca.crt"
   191      ## Certificate PEM file, should exist in the secret provided above
   192      ## Will be used by external-dns to authenticate against etcd
   193      ##
   194      certFilename: "cert.pem"
   195      ## Private key PEM file, should exist in the secret provided above
   196      ## Will be used by external-dns to authenticate against etcd
   197      ##
   198      keyFilename: "key.pem"
   199  
   200  ## OpenStack Designate provider configuration to be set via arguments/env. variables
   201  ##
   202  designate:
   203    ## Use a custom CA (optional)
   204    ##
   205    customCA:
   206      enabled: false
   207      ## The content of the custom CA file
   208      ##
   209      content: ""
   210      ## Location to mount custom CA
   211      ##
   212      mountPath: "/config/designate"
   213      ## Custom CA filename
   214      ##
   215      filename: "designate-ca.pem"
   216  
   217    ## Use a host path custom CA (optional)
   218    ##  This conflicts setting the above customCA to true and chart rendering will fail if you set customCA to true and specify customCAHostPath
   219    # customCAHostPath: /path/to/cafile
   220  
   221    ## Set Openstack environment variables (optional).  Username and password will be saved in a kubernetes secret.
   222    ## The alternative to this is to export the necessary Openstack environment variables in the extraEnv argument.
   223    # username: "someuser"
   224    # password: "p@55w0rd"
   225    # authUrl: "https://mykeystone.example.net:5000/v3/"
   226    # regionName: "dev"
   227    # userDomainName: "development"
   228    # projectName: "myteamname"
   229  ## DigitalOcean configuration to be set via arguments/env. variables
   230  ##
   231  digitalocean:
   232    ## `DO_TOKEN` to set in the environment
   233    ##
   234    apiToken: ""
   235    ## Use an existing secret with key "digitalocean_api_token" defined.
   236    ## This ignores digitalocean.apiToken
   237    ##
   238    # secretName:
   239  
   240  ## Google configuration to be set via arguments/env. variables
   241  ##
   242  google:
   243    ## Google Project to use
   244    ##
   245    project: ""
   246    ## Google Application Credentials
   247    ##
   248    serviceAccountSecret: ""
   249    serviceAccountSecretKey: "credentials.json"
   250    serviceAccountKey: ""
   251  
   252  ## Infoblox configuration to be set via arguments/env. variables
   253  ##
   254  infoblox:
   255    ## Required keys
   256    ##
   257    wapiUsername: "admin"
   258    wapiPassword: ""
   259    gridHost: ""
   260    ## Optional keys
   261    ##
   262    domainFilter: ""
   263    noSslVerify: false
   264    wapiPort: ""
   265    wapiVersion: ""
   266    wapiConnectionPoolSize: ""
   267    wapiHttpTimeout: ""
   268  
   269  ## RFC 2136 configuration to be set via arguments/env. variables
   270  ##
   271  rfc2136:
   272    host: ""
   273    port: 53
   274    zone: ""
   275    tsigSecret: ""
   276    tsigSecretAlg: hmac-sha256
   277    tsigKeyname: externaldns-key
   278    tsigAxfr: true
   279  
   280  ## PowerDNS configuration to be set via arguments/env. variables
   281  ##
   282  pdns:
   283    apiUrl: ""
   284    apiPort: "8081"
   285    apiKey: ""
   286  
   287  ## TransIP configuration to be set via arguments/env. variables
   288  ##
   289  transip:
   290    ## Account name to be used
   291    ##
   292    account: ""
   293    ##
   294    ## API key that is authorised for the account
   295    apiKey: ""
   296  
   297  ## Limit possible target zones by domain suffixes (optional)
   298  ##
   299  domainFilters: []
   300  ## Limit possible target zones by zone id (optional)
   301  ##
   302  zoneIdFilters: []
   303  ## Filter sources managed by external-dns via annotation using label selector semantics (optional)
   304  ##
   305  annotationFilter: ""
   306  ## When enabled, prints DNS record changes rather than actually performing them
   307  ##
   308  dryRun: false
   309  ## When enabled, triggers run loop on create/update/delete events (optional, in addition of regular interval)
   310  ##
   311  triggerLoopOnEvent: false
   312  ## Adjust the interval for DNS updates
   313  ##
   314  interval: "1m"
   315  ## Verbosity of the ExternalDNS logs. Available values are:
   316  ## - panic, debug, info, warn, error, fatal
   317  ##
   318  logLevel: info
   319  ## Formats of the ExternalDNS logs. Available values are:
   320  ## - text, json
   321  ##
   322  logFormat: text
   323  ## Modify how DNS records are sychronized between sources and providers (options: sync, upsert-only)
   324  ##
   325  policy: upsert-only
   326  ## Registry Type. Available types are: txt, noop
   327  ## ref: https://github.com/kubernetes-sigs/external-dns/blob/master/docs/proposal/registry.md
   328  ##
   329  registry: "txt"
   330  ## TXT Registry Identifier
   331  ##
   332  txtOwnerId: ""
   333  ## Prefix to create a TXT record with a name following the pattern prefix.<CNAME record>
   334  ##
   335  # txtPrefix: ""
   336  ## Load balancer service to be used; ie: custom-istio-namespace/custom-istio-ingressgateway.
   337  ## Omit to use the default (istio-system/istio-ingressgateway)
   338  ##
   339  istioIngressGateways: []
   340  
   341  ## Extra Arguments to passed to external-dns
   342  ##
   343  extraArgs: {}
   344  ## Extra env. variable to set on external-dns container.
   345  ##
   346  ## extraEnv:
   347  ## - name: VARNAME1
   348  ##   value: value1
   349  ## - name: VARNAME2
   350  ##   valueFrom:
   351  ##     secretKeyRef:
   352  ##       name: existing-secret
   353  ##       key: varname2-key
   354  extraEnv: []
   355  
   356  ## Replica count
   357  ##
   358  replicas: 1
   359  
   360  ## Affinity for pod assignment (this value is evaluated as a template)
   361  ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
   362  ##
   363  affinity: {}
   364  ## Node labels for pod assignment (this value is evaluated as a template)
   365  ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector
   366  ##
   367  nodeSelector: {}
   368  ## Tolerations for pod assignment (this value is evaluated as a template)
   369  ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#taints-and-tolerations-beta-feature
   370  ##
   371  tolerations: []
   372  ## Annotations for external-dns pods
   373  ##
   374  podAnnotations: {}
   375  ## Additional labels for the pod(s).
   376  ##
   377  podLabels: {}
   378  ## Pod priority class name
   379  ##
   380  priorityClassName: ""
   381  
   382  ## Options for the source type "crd"
   383  ##
   384  crd:
   385    ## Install and use the integrated DNSEndpoint CRD
   386    create: false
   387    ## Change these to use an external DNSEndpoint CRD (E.g. from kubefed)
   388    apiversion: ""
   389    kind: ""
   390  
   391  ## Kubernetes svc configutarion
   392  ##
   393  service:
   394    ## Kubernetes svc type
   395    ##
   396    type: ClusterIP
   397    port: 7979
   398    ## Specify the nodePort value for the LoadBalancer and NodePort service types for the client port
   399    ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport
   400    ##
   401    # nodePort:
   402    ## Static clusterIP or None for headless services
   403    ##
   404    # clusterIP: ""
   405    ## External IP list to use with ClusterIP service type
   406    ##
   407    externalIPs: []
   408    ## Use loadBalancerIP to request a specific static IP,
   409    ## otherwise leave blank
   410    ##
   411    # loadBalancerIP:
   412    ## Address that are allowed when svc is LoadBalancer
   413    ##
   414    loadBalancerSourceRanges: []
   415    ## Provide any additional annotations which may be required. This can be used to
   416    ## set the LoadBalancer service type to internal only.
   417    ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer
   418    ##
   419    annotations: {}
   420  
   421  ## RBAC parameteres
   422  ## https://kubernetes.io/docs/reference/access-authn-authz/rbac/
   423  ##
   424  rbac:
   425    create: true
   426    ## Service Account for pods
   427    ## https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/
   428    ##
   429    serviceAccountName: default
   430    ## Annotations for the Service Account
   431    ##
   432    serviceAccountAnnotations: {}
   433    ## RBAC API version
   434    ##
   435    apiVersion: v1
   436    ## Podsecuritypolicy
   437    ##
   438    pspEnabled: false
   439  
   440  ## Kubernetes Security Context
   441  ## https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
   442  ##
   443  securityContext: {}
   444    # allowPrivilegeEscalation: false
   445    # readOnlyRootFilesystem: true
   446    # capabilities:
   447    #   drop: ["ALL"]
   448  podSecurityContext:
   449    fsGroup: 1001
   450    runAsUser: 1001
   451    # runAsNonRoot: true
   452  
   453  ## Configure resource requests and limits
   454  ## ref: http://kubernetes.io/docs/user-guide/compute-resources/
   455  ##
   456  resources: {}
   457  #  limits:
   458  #    cpu: 50m
   459  #    memory: 50Mi
   460  #  requests:
   461  #    memory: 50Mi
   462  #    cpu: 10m
   463  
   464  ## Liveness Probe. The block is directly forwarded into the deployment, so you can use whatever livenessProbe configuration you want.
   465  ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/
   466  ##
   467  livenessProbe:
   468    httpGet:
   469      path: /healthz
   470      port: http
   471    initialDelaySeconds: 10
   472    periodSeconds: 10
   473    timeoutSeconds: 5
   474    failureThreshold: 2
   475    successThreshold: 1
   476  ## Readiness Probe. The block is directly forwarded into the deployment, so you can use whatever readinessProbe configuration you want.
   477  ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/
   478  ##
   479  readinessProbe:
   480    httpGet:
   481      path: /healthz
   482      port: http
   483    initialDelaySeconds: 5
   484    periodSeconds: 10
   485    timeoutSeconds: 5
   486    failureThreshold: 6
   487    successThreshold: 1
   488  
   489  ## Configure extra volumes
   490  extraVolumes: []
   491  
   492  ## Configure extra volumeMounts
   493  extraVolumeMounts: []
   494  
   495  ## Prometheus Exporter / Metrics
   496  ##
   497  metrics:
   498    enabled: false
   499    ## Metrics exporter pod Annotation and Labels
   500    ##
   501    # podAnnotations:
   502    #   prometheus.io/scrape: "true"
   503    #   prometheus.io/port: "7979"
   504  
   505    ## Prometheus Operator ServiceMonitor configuration
   506    ##
   507    serviceMonitor:
   508      enabled: false
   509      ## Namespace in which Prometheus is running
   510      ##
   511      # namespace: monitoring
   512  
   513      ## Interval at which metrics should be scraped.
   514      ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint
   515      ##
   516      # interval: 10s
   517  
   518      ## Timeout after which the scrape is ended
   519      ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint
   520      ##
   521      # scrapeTimeout: 10s
   522  
   523      ## ServiceMonitor selector labels
   524      ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration
   525      ##
   526      # selector:
   527      #   prometheus: my-prometheus