# Description of Keys in `config` and `cluster.spec` This list is not complete, but aims to document any keys that are less than self-explanatory. ## spec ### api This object configures how we expose the API: * `dns` will allow direct access to master instances, and configure DNS to point directly to the master nodes. * `loadBalancer` will configure a load balancer (ELB) in front of the master nodes, and configure DNS to point to the ELB. DNS example: ```yaml spec: api: dns: {} ``` When configuring a LoadBalancer, you can also choose to have a public ELB or an internal (VPC only) ELB. The `type` field should be `Public` or `Internal`. Additionally, you can increase idle timeout of the load balancer by setting its `idleTimeoutSeconds`. The default idle timeout is 5 minutes, with a maximum of 3600 seconds (60 minutes) being allowed by AWS. For more information see [configuring idle timeouts](http://docs.aws.amazon.com/elasticloadbalancing/latest/classic/config-idle-timeout.html). ```yaml spec: api: loadBalancer: type: Public idleTimeoutSeconds: 300 ``` ### sshAccess This array configures the CIDRs that are able to ssh into nodes. On AWS this is manifested as inbound security group rules on the `nodes` and `master` security groups. Use this key to restrict cluster access to an office ip address range, for example. ```yaml spec: sshAccess: - 12.34.56.78/32 ``` ### apiAccess This array configures the CIDRs that are able to access the kubernetes API. On AWS this is manifested as inbound security group rules on the ELB or master security groups. Use this key to restrict cluster access to an office ip address range, for example. ```yaml spec: apiAccess: - 12.34.56.78/32 ``` ### cluster.spec Subnet Keys #### id ID of a subnet to share in an existing VPC. #### egress The resource identifier (ID) of something in your existing VPC that you would like to use as "egress" to the outside world. This feature was originally envisioned to allow re-use of NAT Gateways. In this case, the usage is as follows. Although NAT gateways are "public"-facing resources, in the Cluster spec, you must specify them in the private subnet section. One way to think about this is that you are specifying "egress", which is the default route out from this private subnet. ``` spec: subnets: - cidr: 10.20.64.0/21 name: us-east-1a egress: nat-987654321 type: Private zone: us-east-1a - cidr: 10.20.32.0/21 name: utility-us-east-1a id: subnet-12345 type: Utility zone: us-east-1a ``` ### kubeAPIServer This block contains configuration for the `kube-apiserver`. #### oidc flags for Open ID Connect Tokens Read more about this here: https://kubernetes.io/docs/admin/authentication/#openid-connect-tokens ```yaml spec: kubeAPIServer: oidcIssuerURL: https://your-oidc-provider.svc.cluster.local oidcClientID: kubernetes oidcUsernameClaim: sub oidcGroupsClaim: user_roles oidcCAFile: /etc/kubernetes/ssl/kc-ca.pem ``` #### runtimeConfig Keys and values here are translated into `--runtime-config` values for `kube-apiserver`, separated by commas. Use this to enable alpha features, for example: ```yaml spec: kubeAPIServer: runtimeConfig: batch/v2alpha1: "true" apps/v1alpha1: "true" ``` Will result in the flag `--runtime-config=batch/v2alpha1=true,apps/v1alpha1=true`. Note that `kube-apiserver` accepts `true` as a value for switch-like flags. ### networkID On AWS, this is the id of the VPC the cluster is created in. If creating a cluster from scratch, this field doesn't need to be specified at create time; `kops` will create a `VPC` for you. ```yaml spec: networkID: vpc-abcdefg1 ```