mirror of https://github.com/linkerd/linkerd2.git
chore: remove bin/helm-doc (#13482)
* Stop keeping the READMEs in the repo - Removed bin/helm-docs - Removed the helm.yml workflow - Removed bin/helm-docs-diff, not used anywhere - Updated the helm-publish action to use helm-docs from the setup-tools action - Removed the generated charts `README.md` files; people can consult the `values.yaml` files directly, or the generated READMEs at https://artifacthub.io/ - Uptaded the `BUILD.md` file to remove instructions about helm-docs.
This commit is contained in:
parent
f7b35538be
commit
71d15ff6e3
|
@ -5,12 +5,13 @@ runs:
|
|||
steps:
|
||||
- name: Set up Cloud SDK
|
||||
uses: 'google-github-actions/setup-gcloud@e30db14379863a8c79331b04a9969f4c1e225e0b'
|
||||
- uses: linkerd/dev/actions/setup-tools@v44
|
||||
- shell: bash
|
||||
run: |
|
||||
mkdir -p target/helm
|
||||
gsutil cp gs://helm.linkerd.io/edge/index.yaml target/helm/index-pre.yaml
|
||||
bin/helm-bump-edge
|
||||
bin/helm-docs
|
||||
helm-docs
|
||||
bin/helm-build package
|
||||
cp charts/artifacthub-repo-edge.yml target/helm/artifacthub-repo.yml
|
||||
gsutil rsync target/helm gs://helm.linkerd.io/edge
|
||||
|
|
|
@ -1,22 +0,0 @@
|
|||
name: Helm
|
||||
|
||||
on:
|
||||
pull_request:
|
||||
paths:
|
||||
- .github/workflows/helm.yml
|
||||
- bin/helm*
|
||||
- "charts/**"
|
||||
- "**/charts/**"
|
||||
|
||||
permissions:
|
||||
contents: read
|
||||
|
||||
jobs:
|
||||
helm-docs-diff:
|
||||
runs-on: ubuntu-22.04
|
||||
timeout-minutes: 5
|
||||
steps:
|
||||
- uses: linkerd/dev/actions/setup-tools@v44
|
||||
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
|
||||
- run: helm-docs
|
||||
- run: git diff --exit-code -- **/charts/**/README.md
|
29
BUILD.md
29
BUILD.md
|
@ -39,8 +39,6 @@ about testing from source can be found in the [TEST.md](TEST.md) guide.
|
|||
- [Linkerd Helm Chart](#linkerd-helm-chart)
|
||||
- [Extensions Helm charts](#extensions-helm-charts)
|
||||
- [Making changes to the chart templates](#making-changes-to-the-chart-templates)
|
||||
- [Generating Helm charts docs](#generating-helm-charts-docs)
|
||||
- [Using helm-docs](#using-helm-docs)
|
||||
- [Annotating values.yaml](#annotating-valuesyaml)
|
||||
- [Markdown templates](#markdown-templates)
|
||||
|
||||
|
@ -509,30 +507,7 @@ Whenever you make changes to the files under
|
|||
[`bin/helm-build`](bin/helm-build) which will refresh the dependencies and lint
|
||||
the templates.
|
||||
|
||||
### Generating Helm charts docs
|
||||
|
||||
Whenever a new chart is created or updated a README should be generated from
|
||||
the chart's `values.yaml`. This can be done by utilizing the bundled
|
||||
[helm-docs](https://github.com/norwoodj/helm-docs) binary. For adding additional
|
||||
information, such as specific installation instructions a README template is
|
||||
required to be created. Check existing charts for examples.
|
||||
|
||||
#### Using helm-docs
|
||||
|
||||
Example usage:
|
||||
|
||||
```sh
|
||||
bin/helm-docs
|
||||
bin/helm-docs --dry-run #Prints to cli instead
|
||||
bin/helm-docs --chart-search-root=./charts #Sets search root for charts
|
||||
bin/helm-docs --template-files=README.md.gotmpl #Sets the template file used
|
||||
```
|
||||
|
||||
Note:
|
||||
The tool searches through the current directory and sub-directories by default.
|
||||
For additional information checkout their repo above.
|
||||
|
||||
#### Annotating values.yaml
|
||||
### Annotating values.yaml
|
||||
|
||||
To allow helm-docs to properly document the values in `values.yaml` a descriptive
|
||||
comment is required. This can be done in two ways.
|
||||
|
@ -541,7 +516,7 @@ Either comment the value directly above with
|
|||
annotates the value. Another explicit usage is to type out the value name.
|
||||
`# global.MyNiceValue -- I really like this value`
|
||||
|
||||
#### Markdown templates
|
||||
### Markdown templates
|
||||
|
||||
In order to accommodate for extra data that might not have a proper place in the
|
||||
´values.yaml´ file the corresponding ´README.md.gotmpl´ can be modified for each
|
||||
|
|
|
@ -1,61 +0,0 @@
|
|||
#!/usr/bin/env sh
|
||||
|
||||
set -eu
|
||||
|
||||
if command -v helm-docs >/dev/null ; then
|
||||
exec helm-docs "$@"
|
||||
fi
|
||||
|
||||
helmdocsv=1.12.0
|
||||
bindir=$( cd "${0%/*}" && pwd ) # Change to script dir and set bin dir to this
|
||||
targetbin=$( cd "$bindir"/.. && pwd )/target/bin
|
||||
helmdocsbin=$targetbin/helm-docs-$helmdocsv
|
||||
os=''
|
||||
arch=''
|
||||
|
||||
if [ ! -f "$helmdocsbin" ]; then
|
||||
case $(uname | tr '[:upper:]' '[:lower:]') in
|
||||
darwin*)
|
||||
os=darwin
|
||||
arch=x86_64
|
||||
;;
|
||||
linux*)
|
||||
os=linux
|
||||
case $(uname -m) in
|
||||
x86_64) arch=x86_64 ;;
|
||||
amd64) arch=amd64 ;;
|
||||
arm)
|
||||
tmp=$(dpkg --print-architecture)
|
||||
if echo "$tmp" | grep -q arm64; then
|
||||
arch=arm64
|
||||
elif echo "$tmp" | grep -q armv7; then
|
||||
arch=armv7
|
||||
elif echo "$tmp" | grep -q armv6; then
|
||||
arch=armv6
|
||||
fi
|
||||
;;
|
||||
esac
|
||||
;;
|
||||
msys*)
|
||||
os=windows
|
||||
arch=x86_64
|
||||
;;
|
||||
esac
|
||||
|
||||
if [ -z "$os" ]; then
|
||||
echo "Couldn't find a matching binary"
|
||||
exit 126
|
||||
fi
|
||||
helmdocscurl="https://github.com/norwoodj/helm-docs/releases/download/v$helmdocsv/helm-docs_${helmdocsv}_${os}_${arch}.tar.gz"
|
||||
tmp=$(mktemp -d -t helm-docs.XXX)
|
||||
mkdir -p "$targetbin"
|
||||
(
|
||||
cd "$tmp"
|
||||
"$bindir"/scurl -o "./helm-docs.tar.gz" "$helmdocscurl"
|
||||
tar zf "./helm-docs.tar.gz" -x "helm-docs"
|
||||
chmod +x "helm-docs"
|
||||
)
|
||||
mv "$tmp/helm-docs" "$helmdocsbin"
|
||||
fi
|
||||
|
||||
"$helmdocsbin" "$@"
|
|
@ -1,15 +0,0 @@
|
|||
#!/usr/bin/env sh
|
||||
|
||||
set -eu
|
||||
|
||||
bin/helm-docs
|
||||
|
||||
dir_dirty=$(git diff HEAD)
|
||||
if [ -z "$dir_dirty" ]; then
|
||||
echo 'Helm-docs generated readmes match chart readmes.'
|
||||
exit 0
|
||||
else
|
||||
echo 'Helm-docs generated readmes diverge from current chart readmes:'
|
||||
git status
|
||||
exit 64
|
||||
fi
|
|
@ -1,325 +0,0 @@
|
|||
# linkerd-control-plane
|
||||
|
||||
Linkerd gives you observability, reliability, and security
|
||||
for your microservices — with no code change required.
|
||||
|
||||

|
||||

|
||||

|
||||
|
||||
**Homepage:** <https://linkerd.io>
|
||||
|
||||
## Quickstart and documentation
|
||||
|
||||
You can run Linkerd on any Kubernetes cluster in a matter of seconds. See the
|
||||
[Linkerd Getting Started Guide][getting-started] for how.
|
||||
|
||||
For more comprehensive documentation, start with the [Linkerd
|
||||
docs][linkerd-docs].
|
||||
|
||||
## Prerequisite: linkerd-crds chart
|
||||
|
||||
Before installing this chart, please install the `linkerd-crds` chart, which
|
||||
creates all the CRDs that the components from the current chart require.
|
||||
|
||||
## Prerequisite: identity certificates
|
||||
|
||||
The identity component of Linkerd requires setting up a trust anchor
|
||||
certificate, and an issuer certificate with its key. These need to be provided
|
||||
to Helm by the user (unlike when using the `linkerd install` CLI which can
|
||||
generate these automatically). You can provide your own, or follow [these
|
||||
instructions](https://linkerd.io/2/tasks/generate-certificates/) to generate new
|
||||
ones.
|
||||
|
||||
Alternatively, both trust anchor and identity issuer certificates may be
|
||||
derived from in-cluster resources. Existing CA (trust anchor) certificates
|
||||
**must** live in a `ConfigMap` resource named `linkerd-identity-trust-roots`.
|
||||
Issuer certificates **must** live in a `Secret` named
|
||||
`linkerd-identity-issuer`. Both resources should exist in the control-plane's
|
||||
install namespace. In order to use an existing CA, Linkerd needs to be
|
||||
installed with `identity.externalCA=true`. To use an existing issuer
|
||||
certificate, Linkerd should be installed with
|
||||
`identity.issuer.scheme=kubernetes.io/tls`.
|
||||
|
||||
A more comprehensive description is in the [automatic certificate rotation
|
||||
guide](https://linkerd.io/2.12/tasks/automatically-rotating-control-plane-tls-credentials/#a-note-on-third-party-cert-management-solutions).
|
||||
|
||||
Note that the provided certificates must be ECDSA certificates.
|
||||
|
||||
## Adding Linkerd's Helm repository
|
||||
|
||||
Included here for completeness-sake, but should have already been added when
|
||||
`linkerd-base` was installed.
|
||||
|
||||
```bash
|
||||
# To add the repo for Linkerd edge releases:
|
||||
helm repo add linkerd https://helm.linkerd.io/edge
|
||||
```
|
||||
|
||||
## Installing the chart
|
||||
|
||||
You must provide the certificates and keys described in the preceding section,
|
||||
and the same expiration date you used to generate the Issuer certificate.
|
||||
|
||||
```bash
|
||||
helm install linkerd-control-plane -n linkerd \
|
||||
--set-file identityTrustAnchorsPEM=ca.crt \
|
||||
--set-file identity.issuer.tls.crtPEM=issuer.crt \
|
||||
--set-file identity.issuer.tls.keyPEM=issuer.key \
|
||||
linkerd/linkerd-control-plane
|
||||
```
|
||||
|
||||
Note that you require to install this chart in the same namespace you installed
|
||||
the `linkerd-base` chart.
|
||||
|
||||
## Setting High-Availability
|
||||
|
||||
Besides the default `values.yaml` file, the chart provides a `values-ha.yaml`
|
||||
file that overrides some default values as to set things up under a
|
||||
high-availability scenario, analogous to the `--ha` option in `linkerd install`.
|
||||
Values such as higher number of replicas, higher memory/cpu limits and
|
||||
affinities are specified in that file.
|
||||
|
||||
You can get ahold of `values-ha.yaml` by fetching the chart files:
|
||||
|
||||
```bash
|
||||
helm fetch --untar linkerd/linkerd-control-plane
|
||||
```
|
||||
|
||||
Then use the `-f` flag to provide the override file, for example:
|
||||
|
||||
```bash
|
||||
helm install linkerd-control-plane -n linkerd \
|
||||
--set-file identityTrustAnchorsPEM=ca.crt \
|
||||
--set-file identity.issuer.tls.crtPEM=issuer.crt \
|
||||
--set-file identity.issuer.tls.keyPEM=issuer.key \
|
||||
-f linkerd2/values-ha.yaml
|
||||
linkerd/linkerd-control-plane
|
||||
```
|
||||
|
||||
## Get involved
|
||||
|
||||
* Check out Linkerd's source code at [GitHub][linkerd2].
|
||||
* Join Linkerd's [user mailing list][linkerd-users], [developer mailing
|
||||
list][linkerd-dev], and [announcements mailing list][linkerd-announce].
|
||||
* Follow [@linkerd][twitter] on Twitter.
|
||||
* Join the [Linkerd Slack][slack].
|
||||
|
||||
[getting-started]: https://linkerd.io/2/getting-started/
|
||||
[linkerd2]: https://github.com/linkerd/linkerd2
|
||||
[linkerd-announce]: https://lists.cncf.io/g/cncf-linkerd-announce
|
||||
[linkerd-dev]: https://lists.cncf.io/g/cncf-linkerd-dev
|
||||
[linkerd-docs]: https://linkerd.io/2/overview/
|
||||
[linkerd-users]: https://lists.cncf.io/g/cncf-linkerd-users
|
||||
[slack]: http://slack.linkerd.io
|
||||
[twitter]: https://twitter.com/linkerd
|
||||
|
||||
## Extensions for Linkerd
|
||||
|
||||
The current chart installs the core Linkerd components, which grant you
|
||||
reliability and security features. Other functionality is available through
|
||||
extensions. Check the corresponding docs for each one of the following
|
||||
extensions:
|
||||
|
||||
* Observability:
|
||||
[Linkerd-viz](https://github.com/linkerd/linkerd2/blob/main/viz/charts/linkerd-viz/README.md)
|
||||
* Multicluster:
|
||||
[Linkerd-multicluster](https://github.com/linkerd/linkerd2/blob/main/multicluster/charts/linkerd-multicluster/README.md)
|
||||
* Tracing:
|
||||
[Linkerd-jaeger](https://github.com/linkerd/linkerd2/blob/main/jaeger/charts/linkerd-jaeger/README.md)
|
||||
|
||||
## Requirements
|
||||
|
||||
Kubernetes: `>=1.22.0-0`
|
||||
|
||||
| Repository | Name | Version |
|
||||
|------------|------|---------|
|
||||
| file://../partials | partials | 0.1.0 |
|
||||
|
||||
## Values
|
||||
|
||||
| Key | Type | Default | Description |
|
||||
|-----|------|---------|-------------|
|
||||
| clusterDomain | string | `"cluster.local"` | Kubernetes DNS Domain name to use |
|
||||
| clusterNetworks | string | `"10.0.0.0/8,100.64.0.0/10,172.16.0.0/12,192.168.0.0/16,fd00::/8"` | The cluster networks for which service discovery is performed. This should include the pod and service networks, but need not include the node network. By default, all IPv4 private networks and all accepted IPv6 ULAs are specified so that resolution works in typical Kubernetes environments. |
|
||||
| cniEnabled | bool | `false` | enabling this omits the NET_ADMIN capability in the PSP and the proxy-init container when injecting the proxy; requires the linkerd-cni plugin to already be installed |
|
||||
| commonLabels | object | `{}` | Labels to apply to all resources |
|
||||
| controlPlaneTracing | bool | `false` | enables control plane tracing |
|
||||
| controlPlaneTracingNamespace | string | `"linkerd-jaeger"` | namespace to send control plane traces to |
|
||||
| controller.podDisruptionBudget | object | `{"maxUnavailable":1}` | sets pod disruption budget parameter for all deployments |
|
||||
| controller.podDisruptionBudget.maxUnavailable | int | `1` | Maximum number of pods that can be unavailable during disruption |
|
||||
| controllerGID | int | `-1` | Optional customisation of the group ID for the control plane components (the group ID will be omitted if lower than 0) |
|
||||
| controllerImage | string | `"cr.l5d.io/linkerd/controller"` | Docker image for the destination and identity components |
|
||||
| controllerImageVersion | string | `""` | Optionally allow a specific container image Tag (or SHA) to be specified for the controllerImage. |
|
||||
| controllerLogFormat | string | `"plain"` | Log format for the control plane components |
|
||||
| controllerLogLevel | string | `"info"` | Log level for the control plane components |
|
||||
| controllerReplicas | int | `1` | Number of replicas for each control plane pod |
|
||||
| controllerUID | int | `2103` | User ID for the control plane components |
|
||||
| debugContainer.image.name | string | `"cr.l5d.io/linkerd/debug"` | Docker image for the debug container |
|
||||
| debugContainer.image.pullPolicy | string | imagePullPolicy | Pull policy for the debug container image |
|
||||
| debugContainer.image.version | string | linkerdVersion | Tag for the debug container image |
|
||||
| deploymentStrategy | object | `{"rollingUpdate":{"maxSurge":"25%","maxUnavailable":"25%"}}` | default kubernetes deployment strategy |
|
||||
| destinationController.livenessProbe.timeoutSeconds | int | `1` | |
|
||||
| destinationController.meshedHttp2ClientProtobuf.keep_alive.interval.seconds | int | `10` | |
|
||||
| destinationController.meshedHttp2ClientProtobuf.keep_alive.timeout.seconds | int | `3` | |
|
||||
| destinationController.meshedHttp2ClientProtobuf.keep_alive.while_idle | bool | `true` | |
|
||||
| destinationController.podAnnotations | object | `{}` | Additional annotations to add to destination pods |
|
||||
| destinationController.readinessProbe.timeoutSeconds | int | `1` | |
|
||||
| disableHeartBeat | bool | `false` | Set to true to not start the heartbeat cronjob |
|
||||
| disableIPv6 | bool | `true` | disables routing IPv6 traffic in addition to IPv4 traffic through the proxy (IPv6 routing only available as of proxy-init v2.3.0 and linkerd-cni v1.4.0) |
|
||||
| egress.globalEgressNetworkNamespace | string | `"linkerd-egress"` | The namespace that is used to store egress configuration that affects all client workloads in the cluster |
|
||||
| enableEndpointSlices | bool | `true` | enables the use of EndpointSlice informers for the destination service; enableEndpointSlices should be set to true only if EndpointSlice K8s feature gate is on |
|
||||
| enableH2Upgrade | bool | `true` | Allow proxies to perform transparent HTTP/2 upgrading |
|
||||
| enablePSP | bool | `false` | Add a PSP resource and bind it to the control plane ServiceAccounts. Note PSP has been deprecated since k8s v1.21 |
|
||||
| enablePodAntiAffinity | bool | `false` | enables pod anti affinity creation on deployments for high availability |
|
||||
| enablePodDisruptionBudget | bool | `false` | enables the creation of pod disruption budgets for control plane components |
|
||||
| enablePprof | bool | `false` | enables the use of pprof endpoints on control plane component's admin servers |
|
||||
| identity.externalCA | bool | `false` | If the linkerd-identity-trust-roots ConfigMap has already been created |
|
||||
| identity.issuer.clockSkewAllowance | string | `"20s"` | Amount of time to allow for clock skew within a Linkerd cluster |
|
||||
| identity.issuer.issuanceLifetime | string | `"24h0m0s"` | Amount of time for which the Identity issuer should certify identity |
|
||||
| identity.issuer.scheme | string | `"linkerd.io/tls"` | |
|
||||
| identity.issuer.tls | object | `{"crtPEM":"","keyPEM":""}` | Which scheme is used for the identity issuer secret format |
|
||||
| identity.issuer.tls.crtPEM | string | `""` | Issuer certificate (ECDSA). It must be provided during install. |
|
||||
| identity.issuer.tls.keyPEM | string | `""` | Key for the issuer certificate (ECDSA). It must be provided during install |
|
||||
| identity.kubeAPI.clientBurst | int | `200` | Burst value over clientQPS |
|
||||
| identity.kubeAPI.clientQPS | int | `100` | Maximum QPS sent to the kube-apiserver before throttling. See [token bucket rate limiter implementation](https://github.com/kubernetes/client-go/blob/v12.0.0/util/flowcontrol/throttle.go) |
|
||||
| identity.livenessProbe.timeoutSeconds | int | `1` | |
|
||||
| identity.podAnnotations | object | `{}` | Additional annotations to add to identity pods |
|
||||
| identity.readinessProbe.timeoutSeconds | int | `1` | |
|
||||
| identity.serviceAccountTokenProjection | bool | `true` | Use [Service Account token Volume projection](https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/#service-account-token-volume-projection) for pod validation instead of the default token |
|
||||
| identityTrustAnchorsPEM | string | `""` | Trust root certificate (ECDSA). It must be provided during install. |
|
||||
| identityTrustDomain | string | clusterDomain | Trust domain used for identity |
|
||||
| imagePullPolicy | string | `"IfNotPresent"` | Docker image pull policy |
|
||||
| imagePullSecrets | list | `[]` | For Private docker registries, authentication is needed. Registry secrets are applied to the respective service accounts |
|
||||
| kubeAPI.clientBurst | int | `200` | Burst value over clientQPS |
|
||||
| kubeAPI.clientQPS | int | `100` | Maximum QPS sent to the kube-apiserver before throttling. See [token bucket rate limiter implementation](https://github.com/kubernetes/client-go/blob/v12.0.0/util/flowcontrol/throttle.go) |
|
||||
| linkerdVersion | string | `"linkerdVersionValue"` | control plane version. See Proxy section for proxy version |
|
||||
| networkValidator.connectAddr | string | `""` | Address to which the network-validator will attempt to connect. This should be an IP that the cluster is expected to be able to reach but a port it should not, e.g., a public IP for public clusters and a private IP for air-gapped clusters with a port like 20001. If empty, defaults to 1.1.1.1:20001 and [fd00::1]:20001 for IPv4 and IPv6 respectively. |
|
||||
| networkValidator.enableSecurityContext | bool | `true` | Include a securityContext in the network-validator pod spec |
|
||||
| networkValidator.listenAddr | string | `""` | Address to which network-validator listens to requests from itself. If empty, defaults to 0.0.0.0:4140 and [::]:4140 for IPv4 and IPv6 respectively. |
|
||||
| networkValidator.logFormat | string | plain | Log format (`plain` or `json`) for network-validator |
|
||||
| networkValidator.logLevel | string | debug | Log level for the network-validator |
|
||||
| networkValidator.timeout | string | `"10s"` | Timeout before network-validator fails to validate the pod's network connectivity |
|
||||
| nodeSelector | object | `{"kubernetes.io/os":"linux"}` | NodeSelector section, See the [K8S documentation](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector) for more information |
|
||||
| podAnnotations | object | `{}` | Additional annotations to add to all pods |
|
||||
| podLabels | object | `{}` | Additional labels to add to all pods |
|
||||
| podMonitor.controller.enabled | bool | `true` | Enables the creation of PodMonitor for the control-plane |
|
||||
| podMonitor.controller.namespaceSelector | string | `"matchNames:\n - {{ .Release.Namespace }}\n - linkerd-viz\n - linkerd-jaeger\n"` | Selector to select which namespaces the Endpoints objects are discovered from |
|
||||
| podMonitor.enabled | bool | `false` | Enables the creation of Prometheus Operator [PodMonitor](https://prometheus-operator.dev/docs/operator/api/#monitoring.coreos.com/v1.PodMonitor) |
|
||||
| podMonitor.labels | object | `{}` | Labels to apply to all pod Monitors |
|
||||
| podMonitor.proxy.enabled | bool | `true` | Enables the creation of PodMonitor for the data-plane |
|
||||
| podMonitor.scrapeInterval | string | `"10s"` | Interval at which metrics should be scraped |
|
||||
| podMonitor.scrapeTimeout | string | `"10s"` | Iimeout after which the scrape is ended |
|
||||
| podMonitor.serviceMirror.enabled | bool | `true` | Enables the creation of PodMonitor for the Service Mirror component |
|
||||
| policyController.image.name | string | `"cr.l5d.io/linkerd/policy-controller"` | Docker image for the policy controller |
|
||||
| policyController.image.pullPolicy | string | imagePullPolicy | Pull policy for the policy controller container image |
|
||||
| policyController.image.version | string | linkerdVersion | Tag for the policy controller container image |
|
||||
| policyController.livenessProbe.timeoutSeconds | int | `1` | |
|
||||
| policyController.logLevel | string | `"info"` | Log level for the policy controller |
|
||||
| policyController.probeNetworks | list | `["0.0.0.0/0","::/0"]` | The networks from which probes are performed. By default, all networks are allowed so that all probes are authorized. |
|
||||
| policyController.readinessProbe.timeoutSeconds | int | `1` | |
|
||||
| policyController.resources | object | `{"cpu":{"limit":"","request":""},"ephemeral-storage":{"limit":"","request":""},"memory":{"limit":"","request":""}}` | policy controller resource requests & limits |
|
||||
| policyController.resources.cpu.limit | string | `""` | Maximum amount of CPU units that the policy controller can use |
|
||||
| policyController.resources.cpu.request | string | `""` | Amount of CPU units that the policy controller requests |
|
||||
| policyController.resources.ephemeral-storage.limit | string | `""` | Maximum amount of ephemeral storage that the policy controller can use |
|
||||
| policyController.resources.ephemeral-storage.request | string | `""` | Amount of ephemeral storage that the policy controller requests |
|
||||
| policyController.resources.memory.limit | string | `""` | Maximum amount of memory that the policy controller can use |
|
||||
| policyController.resources.memory.request | string | `""` | Maximum amount of memory that the policy controller requests |
|
||||
| policyValidator.caBundle | string | `""` | Bundle of CA certificates for proxy injector. If not provided nor injected with cert-manager, then Helm will use the certificate generated for `policyValidator.crtPEM`. If `policyValidator.externalSecret` is set to true, this value, injectCaFrom, or injectCaFromSecret must be set, as no certificate will be generated. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector) for more information. |
|
||||
| policyValidator.crtPEM | string | `""` | Certificate for the policy validator. If not provided and not using an external secret then Helm will generate one. |
|
||||
| policyValidator.externalSecret | bool | `false` | Do not create a secret resource for the policyValidator webhook. If this is set to `true`, the value `policyValidator.caBundle` must be set or the ca bundle must injected with cert-manager ca injector using `policyValidator.injectCaFrom` or `policyValidator.injectCaFromSecret` (see below). |
|
||||
| policyValidator.injectCaFrom | string | `""` | Inject the CA bundle from a cert-manager Certificate. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector/#injecting-ca-data-from-a-certificate-resource) for more information. |
|
||||
| policyValidator.injectCaFromSecret | string | `""` | Inject the CA bundle from a Secret. If set, the `cert-manager.io/inject-ca-from-secret` annotation will be added to the webhook. The Secret must have the CA Bundle stored in the `ca.crt` key and have the `cert-manager.io/allow-direct-injection` annotation set to `true`. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector/#injecting-ca-data-from-a-secret-resource) for more information. |
|
||||
| policyValidator.keyPEM | string | `""` | Certificate key for the policy validator. If not provided and not using an external secret then Helm will generate one. |
|
||||
| policyValidator.namespaceSelector | object | `{"matchExpressions":[{"key":"config.linkerd.io/admission-webhooks","operator":"NotIn","values":["disabled"]}]}` | Namespace selector used by admission webhook |
|
||||
| priorityClassName | string | `""` | Kubernetes priorityClassName for the Linkerd Pods |
|
||||
| profileValidator.caBundle | string | `""` | Bundle of CA certificates for proxy injector. If not provided nor injected with cert-manager, then Helm will use the certificate generated for `profileValidator.crtPEM`. If `profileValidator.externalSecret` is set to true, this value, injectCaFrom, or injectCaFromSecret must be set, as no certificate will be generated. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector) for more information. |
|
||||
| profileValidator.crtPEM | string | `""` | Certificate for the service profile validator. If not provided and not using an external secret then Helm will generate one. |
|
||||
| profileValidator.externalSecret | bool | `false` | Do not create a secret resource for the profileValidator webhook. If this is set to `true`, the value `proxyInjector.caBundle` must be set or the ca bundle must injected with cert-manager ca injector using `proxyInjector.injectCaFrom` or `proxyInjector.injectCaFromSecret` (see below). |
|
||||
| profileValidator.injectCaFrom | string | `""` | Inject the CA bundle from a cert-manager Certificate. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector/#injecting-ca-data-from-a-certificate-resource) for more information. |
|
||||
| profileValidator.injectCaFromSecret | string | `""` | Inject the CA bundle from a Secret. If set, the `cert-manager.io/inject-ca-from-secret` annotation will be added to the webhook. The Secret must have the CA Bundle stored in the `ca.crt` key and have the `cert-manager.io/allow-direct-injection` annotation set to `true`. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector/#injecting-ca-data-from-a-secret-resource) for more information. |
|
||||
| profileValidator.keyPEM | string | `""` | Certificate key for the service profile validator. If not provided and not using an external secret then Helm will generate one. |
|
||||
| profileValidator.namespaceSelector | object | `{"matchExpressions":[{"key":"config.linkerd.io/admission-webhooks","operator":"NotIn","values":["disabled"]}]}` | Namespace selector used by admission webhook |
|
||||
| prometheusUrl | string | `""` | url of external prometheus instance (used for the heartbeat) |
|
||||
| proxy.await | bool | `true` | If set, the application container will not start until the proxy is ready |
|
||||
| proxy.control.streams.idleTimeout | string | `"5m"` | The timeout between consecutive updates from the control plane. |
|
||||
| proxy.control.streams.initialTimeout | string | `"3s"` | The timeout for the first update from the control plane. |
|
||||
| proxy.control.streams.lifetime | string | `"1h"` | The maximum duration for a response stream (i.e. before it will be reinitialized). |
|
||||
| proxy.cores | int | `0` | The `cpu.limit` and `cores` should be kept in sync. The value of `cores` must be an integer and should typically be set by rounding up from the limit. E.g. if cpu.limit is '1500m', cores should be 2. |
|
||||
| proxy.defaultInboundPolicy | string | "all-unauthenticated" | The default allow policy to use when no `Server` selects a pod. One of: "all-authenticated", "all-unauthenticated", "cluster-authenticated", "cluster-unauthenticated", "deny", "audit" |
|
||||
| proxy.disableInboundProtocolDetectTimeout | bool | `false` | When set to true, disables the protocol detection timeout on the inbound side of the proxy by setting it to a very high value |
|
||||
| proxy.disableOutboundProtocolDetectTimeout | bool | `false` | When set to true, disables the protocol detection timeout on the outbound side of the proxy by setting it to a very high value |
|
||||
| proxy.enableExternalProfiles | bool | `false` | Enable service profiles for non-Kubernetes services |
|
||||
| proxy.enableShutdownEndpoint | bool | `false` | Enables the proxy's /shutdown admin endpoint |
|
||||
| proxy.gid | int | `-1` | Optional customisation of the group id under which the proxy runs (the group ID will be omitted if lower than 0) |
|
||||
| proxy.image.name | string | `"cr.l5d.io/linkerd/proxy"` | Docker image for the proxy |
|
||||
| proxy.image.pullPolicy | string | imagePullPolicy | Pull policy for the proxy container image |
|
||||
| proxy.image.version | string | linkerdVersion | Tag for the proxy container image |
|
||||
| proxy.inbound.server.http2.keepAliveInterval | string | `"10s"` | The interval at which PINGs are issued to remote HTTP/2 clients. |
|
||||
| proxy.inbound.server.http2.keepAliveTimeout | string | `"3s"` | The timeout within which keep-alive PINGs must be acknowledged on inbound HTTP/2 connections. |
|
||||
| proxy.inboundConnectTimeout | string | `"100ms"` | Maximum time allowed for the proxy to establish an inbound TCP connection |
|
||||
| proxy.inboundDiscoveryCacheUnusedTimeout | string | `"90s"` | Maximum time allowed before an unused inbound discovery result is evicted from the cache |
|
||||
| proxy.livenessProbe | object | `{"initialDelaySeconds":10,"timeoutSeconds":1}` | LivenessProbe timeout and delay configuration |
|
||||
| proxy.logFormat | string | `"plain"` | Log format (`plain` or `json`) for the proxy |
|
||||
| proxy.logHTTPHeaders | `off` or `insecure` | `"off"` | If set to `off`, will prevent the proxy from logging HTTP headers. If set to `insecure`, HTTP headers may be logged verbatim. Note that setting this to `insecure` is not alone sufficient to log HTTP headers; the proxy logLevel must also be set to debug. |
|
||||
| proxy.logLevel | string | `"warn,linkerd=info,hickory=error"` | Log level for the proxy |
|
||||
| proxy.nativeSidecar | bool | `false` | Enable KEP-753 native sidecars This is an experimental feature. It requires Kubernetes >= 1.29. If enabled, .proxy.waitBeforeExitSeconds should not be used. |
|
||||
| proxy.opaquePorts | string | `"25,587,3306,4444,5432,6379,9300,11211"` | Default set of opaque ports - SMTP (25,587) server-first - MYSQL (3306) server-first - Galera (4444) server-first - PostgreSQL (5432) server-first - Redis (6379) server-first - ElasticSearch (9300) server-first - Memcached (11211) clients do not issue any preamble, which breaks detection |
|
||||
| proxy.outbound.server.http2.keepAliveInterval | string | `"10s"` | The interval at which PINGs are issued to local application HTTP/2 clients. |
|
||||
| proxy.outbound.server.http2.keepAliveTimeout | string | `"3s"` | The timeout within which keep-alive PINGs must be acknowledged on outbound HTTP/2 connections. |
|
||||
| proxy.outboundConnectTimeout | string | `"1000ms"` | Maximum time allowed for the proxy to establish an outbound TCP connection |
|
||||
| proxy.outboundDiscoveryCacheUnusedTimeout | string | `"5s"` | Maximum time allowed before an unused outbound discovery result is evicted from the cache |
|
||||
| proxy.ports.admin | int | `4191` | Admin port for the proxy container |
|
||||
| proxy.ports.control | int | `4190` | Control port for the proxy container |
|
||||
| proxy.ports.inbound | int | `4143` | Inbound port for the proxy container |
|
||||
| proxy.ports.outbound | int | `4140` | Outbound port for the proxy container |
|
||||
| proxy.readinessProbe | object | `{"initialDelaySeconds":2,"timeoutSeconds":1}` | ReadinessProbe timeout and delay configuration |
|
||||
| proxy.requireIdentityOnInboundPorts | string | `""` | |
|
||||
| proxy.resources.cpu.limit | string | `""` | Maximum amount of CPU units that the proxy can use |
|
||||
| proxy.resources.cpu.request | string | `""` | Amount of CPU units that the proxy requests |
|
||||
| proxy.resources.ephemeral-storage.limit | string | `""` | Maximum amount of ephemeral storage that the proxy can use |
|
||||
| proxy.resources.ephemeral-storage.request | string | `""` | Amount of ephemeral storage that the proxy requests |
|
||||
| proxy.resources.memory.limit | string | `""` | Maximum amount of memory that the proxy can use |
|
||||
| proxy.resources.memory.request | string | `""` | Maximum amount of memory that the proxy requests |
|
||||
| proxy.shutdownGracePeriod | string | `""` | Grace period for graceful proxy shutdowns. If this timeout elapses before all open connections have completed, the proxy will terminate forcefully, closing any remaining connections. |
|
||||
| proxy.startupProbe.failureThreshold | int | `120` | |
|
||||
| proxy.startupProbe.initialDelaySeconds | int | `0` | |
|
||||
| proxy.startupProbe.periodSeconds | int | `1` | |
|
||||
| proxy.uid | int | `2102` | User id under which the proxy runs |
|
||||
| proxy.waitBeforeExitSeconds | int | `0` | If set the injected proxy sidecars in the data plane will stay alive for at least the given period before receiving the SIGTERM signal from Kubernetes but no longer than the pod's `terminationGracePeriodSeconds`. See [Lifecycle hooks](https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks) for more info on container lifecycle hooks. |
|
||||
| proxyInit.closeWaitTimeoutSecs | int | `0` | Changes the default value for the nf_conntrack_tcp_timeout_close_wait kernel parameter. If used, runAsRoot needs to be true. |
|
||||
| proxyInit.ignoreInboundPorts | string | `"4567,4568"` | Default set of inbound ports to skip via iptables - Galera (4567,4568) |
|
||||
| proxyInit.ignoreOutboundPorts | string | `"4567,4568"` | Default set of outbound ports to skip via iptables - Galera (4567,4568) |
|
||||
| proxyInit.image.name | string | `"cr.l5d.io/linkerd/proxy-init"` | Docker image for the proxy-init container |
|
||||
| proxyInit.image.pullPolicy | string | imagePullPolicy | Pull policy for the proxy-init container image |
|
||||
| proxyInit.image.version | string | `"v2.4.1"` | Tag for the proxy-init container image |
|
||||
| proxyInit.iptablesMode | string | `"legacy"` | Variant of iptables that will be used to configure routing. Currently, proxy-init can be run either in 'nft' or in 'legacy' mode. The mode will control which utility binary will be called. The host must support whichever mode will be used |
|
||||
| proxyInit.kubeAPIServerPorts | string | `"443,6443"` | Default set of ports to skip via iptables for control plane components so they can communicate with the Kubernetes API Server |
|
||||
| proxyInit.logFormat | string | plain | Log format (`plain` or `json`) for the proxy-init |
|
||||
| proxyInit.logLevel | string | info | Log level for the proxy-init |
|
||||
| proxyInit.privileged | bool | false | Privileged mode allows the container processes to inherit all security capabilities and bypass any security limitations enforced by the kubelet. When used with 'runAsRoot: true', the container will behave exactly as if it was running as root on the host. May escape cgroup limits and see other processes and devices on the host. |
|
||||
| proxyInit.runAsGroup | int | `65534` | This value is used only if runAsRoot is false; otherwise runAsGroup will be 0 |
|
||||
| proxyInit.runAsRoot | bool | `false` | Allow overriding the runAsNonRoot behaviour (<https://github.com/linkerd/linkerd2/issues/7308>) |
|
||||
| proxyInit.runAsUser | int | `65534` | This value is used only if runAsRoot is false; otherwise runAsUser will be 0 |
|
||||
| proxyInit.skipSubnets | string | `""` | Comma-separated list of subnets in valid CIDR format that should be skipped by the proxy |
|
||||
| proxyInit.xtMountPath.mountPath | string | `"/run"` | |
|
||||
| proxyInit.xtMountPath.name | string | `"linkerd-proxy-init-xtables-lock"` | |
|
||||
| proxyInjector.caBundle | string | `""` | Bundle of CA certificates for proxy injector. If not provided nor injected with cert-manager, then Helm will use the certificate generated for `proxyInjector.crtPEM`. If `proxyInjector.externalSecret` is set to true, this value, injectCaFrom, or injectCaFromSecret must be set, as no certificate will be generated. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector) for more information. |
|
||||
| proxyInjector.crtPEM | string | `""` | Certificate for the proxy injector. If not provided and not using an external secret then Helm will generate one. |
|
||||
| proxyInjector.externalSecret | bool | `false` | Do not create a secret resource for the proxyInjector webhook. If this is set to `true`, the value `proxyInjector.caBundle` must be set or the ca bundle must injected with cert-manager ca injector using `proxyInjector.injectCaFrom` or `proxyInjector.injectCaFromSecret` (see below). |
|
||||
| proxyInjector.injectCaFrom | string | `""` | Inject the CA bundle from a cert-manager Certificate. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector/#injecting-ca-data-from-a-certificate-resource) for more information. |
|
||||
| proxyInjector.injectCaFromSecret | string | `""` | Inject the CA bundle from a Secret. If set, the `cert-manager.io/inject-ca-from-secret` annotation will be added to the webhook. The Secret must have the CA Bundle stored in the `ca.crt` key and have the `cert-manager.io/allow-direct-injection` annotation set to `true`. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector/#injecting-ca-data-from-a-secret-resource) for more information. |
|
||||
| proxyInjector.keyPEM | string | `""` | Certificate key for the proxy injector. If not provided and not using an external secret then Helm will generate one. |
|
||||
| proxyInjector.livenessProbe.timeoutSeconds | int | `1` | |
|
||||
| proxyInjector.namespaceSelector | object | `{"matchExpressions":[{"key":"config.linkerd.io/admission-webhooks","operator":"NotIn","values":["disabled"]},{"key":"kubernetes.io/metadata.name","operator":"NotIn","values":["kube-system","cert-manager"]}]}` | Namespace selector used by admission webhook. |
|
||||
| proxyInjector.objectSelector | object | `{"matchExpressions":[{"key":"linkerd.io/control-plane-component","operator":"DoesNotExist"},{"key":"linkerd.io/cni-resource","operator":"DoesNotExist"}]}` | Object selector used by admission webhook. |
|
||||
| proxyInjector.podAnnotations | object | `{}` | Additional annotations to add to proxy-injector pods |
|
||||
| proxyInjector.readinessProbe.timeoutSeconds | int | `1` | |
|
||||
| proxyInjector.timeoutSeconds | int | `10` | Timeout in seconds before the API Server cancels a request to the proxy injector. If timeout is exceeded, the webhookfailurePolicy is used. |
|
||||
| revisionHistoryLimit | int | `10` | Specifies the number of old ReplicaSets to retain to allow rollback. |
|
||||
| runtimeClassName | string | `""` | Runtime Class Name for all the pods |
|
||||
| spValidator | object | `{"livenessProbe":{"timeoutSeconds":1},"readinessProbe":{"timeoutSeconds":1}}` | SP validator configuration |
|
||||
| webhookFailurePolicy | string | `"Ignore"` | Failure policy for the proxy injector |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.14.2](https://github.com/norwoodj/helm-docs/releases/v1.14.2)
|
|
@ -1,73 +0,0 @@
|
|||
# linkerd-crds
|
||||
|
||||
Linkerd gives you observability, reliability, and security
|
||||
for your microservices — with no code change required.
|
||||
|
||||

|
||||

|
||||
|
||||
**Homepage:** <https://linkerd.io>
|
||||
|
||||
## Quickstart and documentation
|
||||
|
||||
You can run Linkerd on any Kubernetes cluster in a matter of seconds. See the
|
||||
[Linkerd Getting Started Guide][getting-started] for how.
|
||||
|
||||
For more comprehensive documentation, start with the [Linkerd
|
||||
docs][linkerd-docs].
|
||||
|
||||
## Adding Linkerd's Helm repository
|
||||
|
||||
```bash
|
||||
# To add the repo for Linkerd edge releases:
|
||||
helm repo add linkerd https://helm.linkerd.io/edge
|
||||
```
|
||||
|
||||
## Installing the linkerd-crds chart
|
||||
|
||||
This installs the `linkerd-crds` chart, which only persists the CRDs that
|
||||
Linkerd requires.
|
||||
|
||||
After installing this chart, you need then to install the
|
||||
`linkerd-control-plane` chart in the same namespace, which provides all the
|
||||
linkerd core control components.
|
||||
|
||||
```bash
|
||||
helm install linkerd-crds -n linkerd --create-namespace linkerd/linkerd-crds
|
||||
```
|
||||
|
||||
## Get involved
|
||||
|
||||
* Check out Linkerd's source code at [GitHub][linkerd2].
|
||||
* Join Linkerd's [user mailing list][linkerd-users], [developer mailing
|
||||
list][linkerd-dev], and [announcements mailing list][linkerd-announce].
|
||||
* Follow [@linkerd][twitter] on Twitter.
|
||||
* Join the [Linkerd Slack][slack].
|
||||
|
||||
[getting-started]: https://linkerd.io/2/getting-started/
|
||||
[linkerd2]: https://github.com/linkerd/linkerd2
|
||||
[linkerd-announce]: https://lists.cncf.io/g/cncf-linkerd-announce
|
||||
[linkerd-dev]: https://lists.cncf.io/g/cncf-linkerd-dev
|
||||
[linkerd-docs]: https://linkerd.io/2/overview/
|
||||
[linkerd-users]: https://lists.cncf.io/g/cncf-linkerd-users
|
||||
[slack]: http://slack.linkerd.io
|
||||
[twitter]: https://twitter.com/linkerd
|
||||
|
||||
## Requirements
|
||||
|
||||
Kubernetes: `>=1.22.0-0`
|
||||
|
||||
| Repository | Name | Version |
|
||||
|------------|------|---------|
|
||||
| file://../partials | partials | 0.1.0 |
|
||||
|
||||
## Values
|
||||
|
||||
| Key | Type | Default | Description |
|
||||
|-----|------|---------|-------------|
|
||||
| enableHttpRoutes | bool | `true` | |
|
||||
| enableTcpRoutes | bool | `true` | |
|
||||
| enableTlsRoutes | bool | `true` | |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.14.2](https://github.com/norwoodj/helm-docs/releases/v1.14.2)
|
|
@ -1,71 +0,0 @@
|
|||
# linkerd2-cni
|
||||
|
||||
Linkerd is a *service mesh*, designed to give platform-wide observability,
|
||||
reliability, and security without requiring configuration or code changes. The
|
||||
Linkerd [CNI plugin](https://linkerd.io/2/features/cni/) takes care of setting
|
||||
up your pod's network so incoming and outgoing traffic is proxied through the
|
||||
data plane.
|
||||
|
||||

|
||||
|
||||

|
||||
|
||||
## Requirements
|
||||
|
||||
Kubernetes: `>=1.22.0-0`
|
||||
|
||||
| Repository | Name | Version |
|
||||
|------------|------|---------|
|
||||
| file://../partials | partials | 0.1.0 |
|
||||
|
||||
## Values
|
||||
|
||||
| Key | Type | Default | Description |
|
||||
|-----|------|---------|-------------|
|
||||
| commonLabels | object | `{}` | Labels to apply to all resources |
|
||||
| destCNIBinDir | string | `"/opt/cni/bin"` | Directory on the host where the CNI configuration will be placed |
|
||||
| destCNINetDir | string | `"/etc/cni/net.d"` | Directory on the host where the CNI plugin binaries reside |
|
||||
| disableIPv6 | bool | `true` | Disables adding IPv6 rules on top of IPv4 rules |
|
||||
| enablePSP | bool | `false` | Add a PSP resource and bind it to the linkerd-cni ServiceAccounts. Note PSP has been deprecated since k8s v1.21 |
|
||||
| extraInitContainers | list | `[]` | Add additional initContainers to the daemonset |
|
||||
| ignoreInboundPorts | string | `""` | Default set of inbound ports to skip via iptables |
|
||||
| ignoreOutboundPorts | string | `""` | Default set of outbound ports to skip via iptables |
|
||||
| image.name | string | `"cr.l5d.io/linkerd/cni-plugin"` | Docker image for the CNI plugin |
|
||||
| image.pullPolicy | string | `"IfNotPresent"` | Pull policy for the linkerd-cni container |
|
||||
| image.version | string | `"v1.6.0"` | Tag for the CNI container Docker image |
|
||||
| imagePullSecrets | list | `[]` | |
|
||||
| inboundProxyPort | int | `4143` | Inbound port for the proxy container |
|
||||
| iptablesMode | string | `"legacy"` | Variant of iptables that will be used to configure routing. Allowed values are 'nft', 'legacy' and 'plain'. They invoke 'iptables-nft', 'iptables-legacy' and 'iptables' commands respectively. The 'plain' mode is targeted at RHEL, which ships with an nftables-based 'iptables' command. |
|
||||
| logLevel | string | `"info"` | Log level for the CNI plugin |
|
||||
| outboundProxyPort | int | `4140` | Outbound port for the proxy container |
|
||||
| podLabels | object | `{}` | Additional labels to add to all pods |
|
||||
| portsToRedirect | string | `""` | Ports to redirect to proxy |
|
||||
| priorityClassName | string | `""` | Kubernetes priorityClassName for the CNI plugin's Pods |
|
||||
| privileged | bool | `false` | Run the install-cni container in privileged mode |
|
||||
| proxyAdminPort | int | `4191` | Admin port for the proxy container |
|
||||
| proxyControlPort | int | `4190` | Control port for the proxy container |
|
||||
| proxyGID | int | `-1` | Optional customisation of the group id under which the proxy shall be ran (the group ID will be omitted if lower than 0) |
|
||||
| proxyUID | int | `2102` | User id under which the proxy shall be ran |
|
||||
| repairController.enableSecurityContext | bool | `true` | Include a securityContext in the repair-controller container |
|
||||
| repairController.enabled | bool | `false` | Enables the repair-controller container |
|
||||
| repairController.logFormat | string | plain | Log format (`plain` or `json`) for the repair-controller container |
|
||||
| repairController.logLevel | string | info | Log level for the repair-controller container |
|
||||
| repairController.resources.cpu.limit | string | `""` | Maximum amount of CPU units that the repair-controller container can use |
|
||||
| repairController.resources.cpu.request | string | `""` | Amount of CPU units that the repair-controller container requests |
|
||||
| repairController.resources.ephemeral-storage.limit | string | `""` | Maximum amount of ephemeral storage that the repair-controller container can use |
|
||||
| repairController.resources.ephemeral-storage.request | string | `""` | Amount of ephemeral storage that the repair-controller container requests |
|
||||
| repairController.resources.memory.limit | string | `""` | Maximum amount of memory that the repair-controller container can use |
|
||||
| repairController.resources.memory.request | string | `""` | Amount of memory that the repair-controller container requests |
|
||||
| resources | object | `{"cpu":{"limit":"","request":""},"ephemeral-storage":{"limit":"","request":""},"memory":{"limit":"","request":""}}` | Resource requests and limits for linkerd-cni daemonset container |
|
||||
| resources.cpu.limit | string | `""` | Maximum amount of CPU units that the cni container can use |
|
||||
| resources.cpu.request | string | `""` | Amount of CPU units that the cni container requests |
|
||||
| resources.ephemeral-storage.limit | string | `""` | Maximum amount of ephemeral storage that the cni container can use |
|
||||
| resources.ephemeral-storage.request | string | `""` | Amount of ephemeral storage that the cni container requests |
|
||||
| resources.memory.limit | string | `""` | Maximum amount of memory that the cni container can use |
|
||||
| resources.memory.request | string | `""` | Amount of memory that the cni container requests |
|
||||
| revisionHistoryLimit | int | `10` | Specifies the number of old ReplicaSets to retain to allow rollback. |
|
||||
| tolerations[0] | object | `{"operator":"Exists"}` | toleration properties |
|
||||
| useWaitFlag | bool | `false` | Configures the CNI plugin to use the -w flag for the iptables command |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.14.2](https://github.com/norwoodj/helm-docs/releases/v1.14.2)
|
|
@ -1,9 +0,0 @@
|
|||
# partials
|
||||
|
||||
A Helm chart containing Linkerd partial templates,
|
||||
depended by the 'linkerd' and 'patch' charts.
|
||||
|
||||

|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.14.2](https://github.com/norwoodj/helm-docs/releases/v1.14.2)
|
|
@ -1,151 +0,0 @@
|
|||
# linkerd-jaeger
|
||||
|
||||
The Linkerd-Jaeger extension adds distributed tracing to Linkerd using
|
||||
OpenCensus and Jaeger.
|
||||
|
||||

|
||||
|
||||

|
||||
|
||||
**Homepage:** <https://linkerd.io>
|
||||
|
||||
## Quickstart and documentation
|
||||
|
||||
You can run Linkerd on any Kubernetes cluster in a matter of seconds. See
|
||||
the [Linkerd Getting Started Guide][getting-started] for how.
|
||||
|
||||
For more comprehensive documentation, start with the [Linkerd
|
||||
docs][linkerd-docs].
|
||||
|
||||
## Prerequisite: Linkerd Core Control-Plane
|
||||
|
||||
Before installing the Linkerd Jaeger extension, The core control-plane has to
|
||||
be installed first by following the [Linkerd Install
|
||||
Guide](https://linkerd.io/2/tasks/install/).
|
||||
|
||||
## Adding Linkerd's Helm repository
|
||||
|
||||
```bash
|
||||
# To add the repo for Linkerd edge releases:
|
||||
helm repo add linkerd https://helm.linkerd.io/edge
|
||||
```
|
||||
|
||||
## Installing the Jaeger Extension Chart
|
||||
|
||||
### Helm v3
|
||||
|
||||
```bash
|
||||
helm install linkerd-jaeger -n linkerd-jaeger --create-namespace linkerd/linkerd-jaeger
|
||||
```
|
||||
|
||||
## Get involved
|
||||
|
||||
* Check out Linkerd's source code at [GitHub][linkerd2].
|
||||
* Join Linkerd's [user mailing list][linkerd-users], [developer mailing
|
||||
list][linkerd-dev], and [announcements mailing list][linkerd-announce].
|
||||
* Follow [@linkerd][twitter] on Twitter.
|
||||
* Join the [Linkerd Slack][slack].
|
||||
|
||||
[getting-started]: https://linkerd.io/2/getting-started/
|
||||
[linkerd2]: https://github.com/linkerd/linkerd2
|
||||
[linkerd-announce]: https://lists.cncf.io/g/cncf-linkerd-announce
|
||||
[linkerd-dev]: https://lists.cncf.io/g/cncf-linkerd-dev
|
||||
[linkerd-docs]: https://linkerd.io/2/overview/
|
||||
[linkerd-users]: https://lists.cncf.io/g/cncf-linkerd-users
|
||||
[slack]: http://slack.linkerd.io
|
||||
[twitter]: https://twitter.com/linkerd
|
||||
|
||||
## Requirements
|
||||
|
||||
Kubernetes: `>=1.22.0-0`
|
||||
|
||||
| Repository | Name | Version |
|
||||
|------------|------|---------|
|
||||
| file://../../../charts/partials | partials | 0.1.0 |
|
||||
|
||||
## Values
|
||||
|
||||
| Key | Type | Default | Description |
|
||||
|-----|------|---------|-------------|
|
||||
| clusterDomain | string | `"cluster.local"` | Kubernetes DNS Domain name to use |
|
||||
| collector.GID | string | `nil` | GID for the collector resource |
|
||||
| collector.UID | string | `nil` | UID for the collector resource |
|
||||
| collector.command | string | `"/otelcol-contrib"` | |
|
||||
| collector.config | object | see `value.yaml` for actual configuration | OpenTelemetry Collector config, See the [Configuration docs](https://opentelemetry.io/docs/collector/configuration/) for more information |
|
||||
| collector.enabled | bool | `true` | Set to false to exclude collector installation |
|
||||
| collector.env | list | `[]` | Collector Deployment env |
|
||||
| collector.image.name | string | `"otel/opentelemetry-collector-contrib"` | |
|
||||
| collector.image.pullPolicy | string | `""` | |
|
||||
| collector.image.version | string | `"0.83.0"` | |
|
||||
| collector.nodeSelector | object | `{"kubernetes.io/os":"linux"}` | NodeSelector section, See the [K8S documentation](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector) for more information |
|
||||
| collector.replicas | int | `1` | Number of replicas of the collector component |
|
||||
| collector.resources.cpu.limit | string | `nil` | Maximum amount of CPU units that the collector container can use |
|
||||
| collector.resources.cpu.request | string | `nil` | Amount of CPU units that the collector container requests |
|
||||
| collector.resources.ephemeral-storage.limit | string | `""` | Maximum amount of ephemeral storage that the collector container can use |
|
||||
| collector.resources.ephemeral-storage.request | string | `""` | Amount of ephemeral storage that the collector container requests |
|
||||
| collector.resources.memory.limit | string | `nil` | Maximum amount of memory that collector container can use |
|
||||
| collector.resources.memory.request | string | `nil` | Amount of memory that the collector container requests |
|
||||
| collector.tolerations | string | `nil` | Tolerations section, See the [K8S documentation](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) for more information |
|
||||
| commonLabels | object | `{}` | Labels to apply to all resources |
|
||||
| createNamespaceMetadataJob | bool | `true` | Creates a Job that adds necessary metadata to the extension's namespace during install; disable if lack of privileges require doing this manually |
|
||||
| defaultGID | int | `2103` | Default GID for all the jaeger components |
|
||||
| defaultUID | int | `2103` | Default UID for all the jaeger components |
|
||||
| enablePSP | bool | `false` | Create Roles and RoleBindings to associate this extension's ServiceAccounts to the control plane PSP resource. This requires that `enabledPSP` is set to true on the control plane install. Note PSP has been deprecated since k8s v1.21 |
|
||||
| enablePodAntiAffinity | bool | `false` | Enables Pod Anti Affinity logic to balance the placement of replicas across hosts and zones for High Availability. Enable this only when you have multiple replicas of components. |
|
||||
| imagePullSecrets | list | `[]` | For Private docker registries, authentication is needed. Registry secrets are applied to the respective service accounts |
|
||||
| jaeger.GID | string | `nil` | GID for the jaeger resource |
|
||||
| jaeger.UID | string | `nil` | UID for the jaeger resource |
|
||||
| jaeger.args | list | `["--query.base-path=/jaeger"]` | CLI arguments for Jaeger, See [Jaeger AIO Memory CLI reference](https://www.jaegertracing.io/docs/1.24/cli/#jaeger-all-in-one-memory) |
|
||||
| jaeger.enabled | bool | `true` | Set to false to exclude all-in-one Jaeger installation |
|
||||
| jaeger.image.name | string | `"jaegertracing/all-in-one"` | |
|
||||
| jaeger.image.pullPolicy | string | `""` | |
|
||||
| jaeger.image.version | float | `1.31` | |
|
||||
| jaeger.nodeSelector | object | `{"kubernetes.io/os":"linux"}` | NodeSelector section, See the [K8S documentation](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector) for more information |
|
||||
| jaeger.resources.cpu.limit | string | `nil` | Maximum amount of CPU units that the jaeger container can use |
|
||||
| jaeger.resources.cpu.request | string | `nil` | Amount of CPU units that the jaeger container requests |
|
||||
| jaeger.resources.ephemeral-storage.limit | string | `""` | Maximum amount of ephemeral storage that the jaeger container can use |
|
||||
| jaeger.resources.ephemeral-storage.request | string | `""` | Amount of ephemeral storage that the jaeger container requests |
|
||||
| jaeger.resources.memory.limit | string | `nil` | Maximum amount of memory that jaeger container can use |
|
||||
| jaeger.resources.memory.request | string | `nil` | Amount of memory that the jaeger container requests |
|
||||
| jaeger.tolerations | string | `nil` | Tolerations section, See the [K8S documentation](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) for more information |
|
||||
| linkerdNamespace | string | `"linkerd"` | Namespace of the Linkerd core control-plane install |
|
||||
| linkerdVersion | string | `"linkerdVersionValue"` | |
|
||||
| namespaceMetadata.image.name | string | `"extension-init"` | Docker image name for the namespace-metadata instance |
|
||||
| namespaceMetadata.image.pullPolicy | string | imagePullPolicy | Pull policy for the namespace-metadata instance |
|
||||
| namespaceMetadata.image.registry | string | `"cr.l5d.io/linkerd"` | Docker registry for the namespace-metadata instance |
|
||||
| namespaceMetadata.image.tag | string | `"v0.1.1"` | Docker image tag for the namespace-metadata instance |
|
||||
| namespaceMetadata.nodeSelector | object | `{"kubernetes.io/os":"linux"}` | NodeSelector section, See the [K8S documentation](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector) for more information |
|
||||
| namespaceMetadata.tolerations | string | `nil` | Tolerations section, See the [K8S documentation](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) for more information |
|
||||
| nodeSelector | object | `{"kubernetes.io/os":"linux"}` | Default nodeSelector section, See the [K8S documentation](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector) for more information |
|
||||
| podLabels | object | `{}` | Additional labels to add to all pods |
|
||||
| revisionHistoryLimit | int | `10` | Specifies the number of old ReplicaSets to retain to allow rollback. |
|
||||
| tolerations | string | `nil` | Default tolerations section, See the [K8S documentation](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) for more information |
|
||||
| webhook.GID | string | `nil` | GID for the webhook resource |
|
||||
| webhook.UID | string | `nil` | UID for the webhook resource |
|
||||
| webhook.caBundle | string | `""` | Bundle of CA certificates for webhook. If not provided nor injected with cert-manager, then Helm will use the certificate generated for `webhook.crtPEM`. If `webhook.externalSecret` is set to true, this value, injectCaFrom, or injectCaFromSecret must be set, as no certificate will be generated. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector) for more information. |
|
||||
| webhook.collectorSvcAccount | string | `"collector"` | service account associated with the collector instance |
|
||||
| webhook.collectorSvcAddr | string | `"collector.linkerd-jaeger:55678"` | collector service address for the proxies to send trace data. Points by default to the linkerd-jaeger collector |
|
||||
| webhook.collectorTraceProtocol | string | `"opencensus"` | protocol proxies should use to send trace data. Can be `opencensus` (default) or `opentelemetry` |
|
||||
| webhook.collectorTraceSvcName | string | `"linkerd-proxy"` | name of the service proxies should use for exported traces |
|
||||
| webhook.crtPEM | string | `""` | Certificate for the webhook. If not provided and not using an external secret then Helm will generate one. |
|
||||
| webhook.externalSecret | bool | `false` | Do not create a secret resource for the webhook. If this is set to `true`, the value `webhook.caBundle` must be set or the ca bundle must injected with cert-manager ca injector using `webhook.injectCaFrom` or `webhook.injectCaFromSecret` (see below). |
|
||||
| webhook.failurePolicy | string | `"Ignore"` | |
|
||||
| webhook.image.name | string | `"cr.l5d.io/linkerd/jaeger-webhook"` | |
|
||||
| webhook.image.pullPolicy | string | `""` | |
|
||||
| webhook.image.version | string | `"linkerdVersionValue"` | |
|
||||
| webhook.injectCaFrom | string | `""` | Inject the CA bundle from a cert-manager Certificate. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector/#injecting-ca-data-from-a-certificate-resource) for more information. |
|
||||
| webhook.injectCaFromSecret | string | `""` | Inject the CA bundle from a Secret. If set, the `cert-manager.io/inject-ca-from-secret` annotation will be added to the webhook. The Secret must have the CA Bundle stored in the `ca.crt` key and have the `cert-manager.io/allow-direct-injection` annotation set to `true`. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector/#injecting-ca-data-from-a-secret-resource) for more information. |
|
||||
| webhook.keyPEM | string | `""` | Certificate key for the webhook. If not provided and not using an external secret then Helm will generate one. |
|
||||
| webhook.logLevel | string | `"info"` | |
|
||||
| webhook.namespaceSelector | object | `{"matchExpressions":[{"key":"kubernetes.io/metadata.name","operator":"NotIn","values":["kube-system"]}]}` | Namespace selector used by admission webhook. |
|
||||
| webhook.nodeSelector | object | `{"kubernetes.io/os":"linux"}` | NodeSelector section, See the [K8S documentation](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector) for more information |
|
||||
| webhook.objectSelector | string | `nil` | |
|
||||
| webhook.replicas | int | `1` | Number of replicas of the jaeger-injector component |
|
||||
| webhook.resources.cpu.limit | string | `nil` | Maximum amount of CPU units that the jaeger-injector container can use |
|
||||
| webhook.resources.cpu.request | string | `nil` | Amount of CPU units that the jaeger-injector container requests |
|
||||
| webhook.resources.memory.limit | string | `nil` | Maximum amount of memory that jaeger-injector container can use |
|
||||
| webhook.resources.memory.request | string | `nil` | Amount of memory that the jaeger-injector container requests |
|
||||
| webhook.tolerations | string | `nil` | Tolerations section, See the [K8S documentation](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) for more information |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.14.2](https://github.com/norwoodj/helm-docs/releases/v1.14.2)
|
|
@ -1,53 +0,0 @@
|
|||
# linkerd-multicluster-link
|
||||
|
||||
A helm chart containing the resources to enable mirroring
|
||||
of services from a remote cluster.
|
||||
|
||||
Warning: The purpose of this chart is just to support the `linkerd
|
||||
multicluster link` CLI command, which also produces the
|
||||
`cluster-credentials` secret and the Link CR, which are not found in this
|
||||
chart. Therefore this chart is not a replacement for that command, and
|
||||
shouldn't be used as-is unless you really know what you're doing ;-)
|
||||
|
||||

|
||||
|
||||

|
||||
|
||||
## Requirements
|
||||
|
||||
Kubernetes: `>=1.22.0-0`
|
||||
|
||||
| Repository | Name | Version |
|
||||
|------------|------|---------|
|
||||
| file://../../../charts/partials | partials | 0.1.0 |
|
||||
|
||||
## Values
|
||||
|
||||
| Key | Type | Default | Description |
|
||||
|-----|------|---------|-------------|
|
||||
| commonLabels | object | `{}` | Labels to apply to all resources |
|
||||
| controllerImage | string | `"cr.l5d.io/linkerd/controller"` | Docker image for the Service mirror component (uses the Linkerd controller image) |
|
||||
| controllerImageVersion | string | `"linkerdVersionValue"` | Tag for the Service Mirror container Docker image |
|
||||
| enableHeadlessServices | bool | `false` | Toggle support for mirroring headless services |
|
||||
| enableNamespaceCreation | bool | `false` | Toggle support for creating namespaces for mirror services when necessary |
|
||||
| enablePSP | bool | `false` | Create RoleBindings to associate ServiceAccount of target cluster Service Mirror to the control plane PSP resource. This requires that `enabledPSP` is set to true on the extension and control plane install. Note PSP has been deprecated since k8s v1.21 |
|
||||
| enablePodAntiAffinity | bool | `false` | Enables Pod Anti Affinity logic to balance the placement of replicas across hosts and zones for High Availability. Enable this only when you have multiple replicas of components. |
|
||||
| gateway.enabled | bool | `true` | Controls whether link will create a probe service for the gateway |
|
||||
| gateway.probe.port | int | `4191` | The port used for liveliness probing |
|
||||
| imagePullSecrets | list | `[]` | For Private docker registries, authentication is needed. Registry secrets are applied to the respective service accounts |
|
||||
| logFormat | string | `"plain"` | Log format (`plain` or `json`) |
|
||||
| logLevel | string | `"info"` | Log level for the Multicluster components |
|
||||
| nodeSelector | object | `{}` | Node selectors for the Service mirror pod |
|
||||
| podAnnotations | object | `{}` | Additional annotations to add to all pods |
|
||||
| podLabels | object | `{}` | Additional labels to add to all pods |
|
||||
| replicas | int | `1` | Number of service mirror replicas to run |
|
||||
| resources | object | `{}` | Resources for the Service mirror container |
|
||||
| revisionHistoryLimit | int | `10` | Specifies the number of old ReplicaSets to retain to allow rollback. |
|
||||
| serviceMirrorGID | int | `2103` | Group id under which the Service Mirror shall be ran |
|
||||
| serviceMirrorRetryLimit | int | `3` | Number of times update from the remote cluster is allowed to be requeued (retried) |
|
||||
| serviceMirrorUID | int | `2103` | User id under which the Service Mirror shall be ran |
|
||||
| targetClusterName | string | `""` | Name of the target cluster that's going to be linked |
|
||||
| tolerations | object | `{}` | Tolerations for the Service mirror pod |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.14.2](https://github.com/norwoodj/helm-docs/releases/v1.14.2)
|
|
@ -1,123 +0,0 @@
|
|||
# linkerd-multicluster
|
||||
|
||||
The Linkerd-Multicluster extension contains resources to support multicluster
|
||||
linking to remote clusters
|
||||
|
||||

|
||||
|
||||

|
||||
|
||||
**Homepage:** <https://linkerd.io>
|
||||
|
||||
## Quickstart and documentation
|
||||
|
||||
You can run Linkerd on any Kubernetes cluster in a matter of seconds. See the
|
||||
[Linkerd Getting Started Guide][getting-started] for how.
|
||||
|
||||
For more comprehensive documentation, start with the [Linkerd
|
||||
docs][linkerd-docs].
|
||||
|
||||
## Prerequisite: Linkerd Core Control-Plane
|
||||
|
||||
Before installing the Linkerd Multicluster extension, The core control-plane has
|
||||
to be installed first by following the [Linkerd Install
|
||||
Guide](https://linkerd.io/2/tasks/install/).
|
||||
|
||||
## Adding Linkerd's Helm repository
|
||||
|
||||
```bash
|
||||
# To add the repo for Linkerd edge releases:
|
||||
helm repo add linkerd https://helm.linkerd.io/edge
|
||||
```
|
||||
|
||||
## Installing the Multicluster Extension Chart
|
||||
|
||||
```bash
|
||||
helm install linkerd-multicluster -n linkerd-multicluster --create-namespace linkerd/linkerd-multicluster
|
||||
```
|
||||
|
||||
## Get involved
|
||||
|
||||
* Check out Linkerd's source code at [GitHub][linkerd2].
|
||||
* Join Linkerd's [user mailing list][linkerd-users], [developer mailing
|
||||
list][linkerd-dev], and [announcements mailing list][linkerd-announce].
|
||||
* Follow [@linkerd][twitter] on Twitter.
|
||||
* Join the [Linkerd Slack][slack].
|
||||
|
||||
[getting-started]: https://linkerd.io/2/getting-started/
|
||||
[linkerd2]: https://github.com/linkerd/linkerd2
|
||||
[linkerd-announce]: https://lists.cncf.io/g/cncf-linkerd-announce
|
||||
[linkerd-dev]: https://lists.cncf.io/g/cncf-linkerd-dev
|
||||
[linkerd-docs]: https://linkerd.io/2/overview/
|
||||
[linkerd-users]: https://lists.cncf.io/g/cncf-linkerd-users
|
||||
[slack]: http://slack.linkerd.io
|
||||
[twitter]: https://twitter.com/linkerd
|
||||
|
||||
## Requirements
|
||||
|
||||
Kubernetes: `>=1.22.0-0`
|
||||
|
||||
| Repository | Name | Version |
|
||||
|------------|------|---------|
|
||||
| file://../../../charts/partials | partials | 0.1.0 |
|
||||
|
||||
## Values
|
||||
|
||||
| Key | Type | Default | Description |
|
||||
|-----|------|---------|-------------|
|
||||
| commonLabels | object | `{}` | Labels to apply to all resources |
|
||||
| createNamespaceMetadataJob | bool | `true` | Creates a Job that adds necessary metadata to the extension's namespace during install; disable if lack of privileges require doing this manually |
|
||||
| enablePSP | bool | `false` | Create Roles and RoleBindings to associate this extension's ServiceAccounts to the control plane PSP resource. This requires that `enabledPSP` is set to true on the control plane install. Note PSP has been deprecated since k8s v1.21 |
|
||||
| enablePodAntiAffinity | bool | `false` | Enables Pod Anti Affinity logic to balance the placement of replicas across hosts and zones for High Availability. Enable this only when you have multiple replicas of components. |
|
||||
| gateway.GID | int | `2103` | Group id under which the gateway shall be ran |
|
||||
| gateway.UID | int | `2103` | User id under which the gateway shall be ran |
|
||||
| gateway.deploymentAnnotations | object | `{}` | Annotations to add to the gateway deployment |
|
||||
| gateway.enabled | bool | `true` | If the gateway component should be installed |
|
||||
| gateway.loadBalancerClass | string | `""` | Set loadBalancerClass on gateway service |
|
||||
| gateway.loadBalancerIP | string | `""` | Set loadBalancerIP on gateway service |
|
||||
| gateway.loadBalancerSourceRanges | list | `[]` | Set loadBalancerSourceRanges on gateway service |
|
||||
| gateway.name | string | `"linkerd-gateway"` | The name of the gateway that will be installed |
|
||||
| gateway.nodeSelector | object | `{}` | Node selectors for the gateway pod |
|
||||
| gateway.pauseImage | string | `"gcr.io/google_containers/pause:3.2"` | The pause container to use |
|
||||
| gateway.port | int | `4143` | The port on which all the gateway will accept incoming traffic |
|
||||
| gateway.probe.path | string | `"/ready"` | The path that will be used by remote clusters for determining whether the gateway is alive |
|
||||
| gateway.probe.port | int | `4191` | The port used for liveliness probing |
|
||||
| gateway.probe.seconds | int | `3` | The interval (in seconds) between liveness probes |
|
||||
| gateway.replicas | int | `1` | Number of replicas for the gateway pod |
|
||||
| gateway.serviceAnnotations | object | `{}` | Annotations to add to the gateway service |
|
||||
| gateway.serviceExternalTrafficPolicy | string | `""` | Set externalTrafficPolicy on gateway service |
|
||||
| gateway.serviceType | string | `"LoadBalancer"` | Service Type of gateway Service |
|
||||
| gateway.terminationGracePeriodSeconds | string | `""` | Set terminationGracePeriodSeconds on gateway deployment |
|
||||
| gateway.tolerations | list | `[]` | Tolerations for the gateway pod |
|
||||
| identityTrustDomain | string | `"cluster.local"` | Identity Trust Domain of the certificate authority |
|
||||
| imagePullPolicy | string | `"IfNotPresent"` | Docker imagePullPolicy for all multicluster components |
|
||||
| imagePullSecrets | list | `[]` | For Private docker registries, authentication is needed. Registry secrets are applied to the respective service accounts |
|
||||
| linkerdNamespace | string | `"linkerd"` | Namespace of linkerd installation |
|
||||
| linkerdVersion | string | `"linkerdVersionValue"` | Control plane version |
|
||||
| localServiceMirror.GID | int | `2103` | Group id under which the Service Mirror shall be ran |
|
||||
| localServiceMirror.UID | int | `2103` | User id under which the Service Mirror shall be ran |
|
||||
| localServiceMirror.enablePprof | bool | `false` | enables the use of pprof endpoints on control plane component's admin servers |
|
||||
| localServiceMirror.federatedServiceSelector | string | `"mirror.linkerd.io/federated=member"` | Label selector for federated service members in the local cluster. |
|
||||
| localServiceMirror.image.name | string | `"cr.l5d.io/linkerd/controller"` | Docker image for the Service mirror component (uses the Linkerd controller image) |
|
||||
| localServiceMirror.image.pullPolicy | string | imagePullPolicy | Pull policy for the Service mirror container image |
|
||||
| localServiceMirror.image.version | string | linkerdVersion | Tag for the Service mirror container image |
|
||||
| localServiceMirror.logFormat | string | `"plain"` | Log format (`plain` or `json`) |
|
||||
| localServiceMirror.logLevel | string | `"info"` | Log level for the Multicluster components |
|
||||
| localServiceMirror.replicas | int | `1` | Number of local service mirror replicas to run |
|
||||
| localServiceMirror.resources | object | `{}` | Resources for the Service mirror container |
|
||||
| localServiceMirror.serviceMirrorRetryLimit | int | `3` | Number of times local service mirror updates are allowed to be requeued (retried) |
|
||||
| namespaceMetadata.image.name | string | `"extension-init"` | Docker image name for the namespace-metadata instance |
|
||||
| namespaceMetadata.image.pullPolicy | string | imagePullPolicy | Pull policy for the namespace-metadata instance |
|
||||
| namespaceMetadata.image.registry | string | `"cr.l5d.io/linkerd"` | Docker registry for the namespace-metadata instance |
|
||||
| namespaceMetadata.image.tag | string | `"v0.1.1"` | Docker image tag for the namespace-metadata instance |
|
||||
| namespaceMetadata.nodeSelector | object | `{}` | Node selectors for the namespace-metadata instance |
|
||||
| namespaceMetadata.tolerations | list | `[]` | Tolerations for the namespace-metadata instance |
|
||||
| podAnnotations | object | `{}` | Additional annotations to add to all pods |
|
||||
| podLabels | object | `{}` | Additional labels to add to all pods |
|
||||
| proxyOutboundPort | int | `4140` | The port on which the proxy accepts outbound traffic |
|
||||
| remoteMirrorServiceAccount | bool | `true` | If the remote mirror service account should be installed |
|
||||
| remoteMirrorServiceAccountName | string | `"linkerd-service-mirror-remote-access-default"` | The name of the service account used to allow remote clusters to mirror local services |
|
||||
| revisionHistoryLimit | int | `10` | Specifies the number of old ReplicaSets to retain to allow rollback. |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.14.2](https://github.com/norwoodj/helm-docs/releases/v1.14.2)
|
|
@ -1,222 +0,0 @@
|
|||
# linkerd-viz
|
||||
|
||||
The Linkerd-Viz extension contains observability and visualization
|
||||
components for Linkerd.
|
||||
|
||||

|
||||
|
||||

|
||||
|
||||
**Homepage:** <https://linkerd.io>
|
||||
|
||||
## Quickstart and documentation
|
||||
|
||||
You can run Linkerd on any Kubernetes cluster in a matter of seconds. See the
|
||||
[Linkerd Getting Started Guide][getting-started] for how.
|
||||
|
||||
For more comprehensive documentation, start with the [Linkerd
|
||||
docs][linkerd-docs].
|
||||
|
||||
## Prerequisite: Linkerd Core Control-Plane
|
||||
|
||||
Before installing the Linkerd Viz extension, The core control-plane has to
|
||||
be installed first by following the [Linkerd Install
|
||||
Guide](https://linkerd.io/2/tasks/install/).
|
||||
|
||||
## Adding Linkerd's Helm repository
|
||||
|
||||
```bash
|
||||
# To add the repo for Linkerd edge releases:
|
||||
helm repo add linkerd https://helm.linkerd.io/edge
|
||||
```
|
||||
|
||||
## Installing the Viz Extension Chart
|
||||
|
||||
```bash
|
||||
helm install linkerd-viz -n linkerd-viz --create-namespace linkerd/linkerd-viz
|
||||
```
|
||||
|
||||
## Get involved
|
||||
|
||||
* Check out Linkerd's source code at [GitHub][linkerd2].
|
||||
* Join Linkerd's [user mailing list][linkerd-users], [developer mailing
|
||||
list][linkerd-dev], and [announcements mailing list][linkerd-announce].
|
||||
* Follow [@linkerd][twitter] on Twitter.
|
||||
* Join the [Linkerd Slack][slack].
|
||||
|
||||
[getting-started]: https://linkerd.io/2/getting-started/
|
||||
[linkerd2]: https://github.com/linkerd/linkerd2
|
||||
[linkerd-announce]: https://lists.cncf.io/g/cncf-linkerd-announce
|
||||
[linkerd-dev]: https://lists.cncf.io/g/cncf-linkerd-dev
|
||||
[linkerd-docs]: https://linkerd.io/2/overview/
|
||||
[linkerd-users]: https://lists.cncf.io/g/cncf-linkerd-users
|
||||
[slack]: http://slack.linkerd.io
|
||||
[twitter]: https://twitter.com/linkerd
|
||||
|
||||
## Requirements
|
||||
|
||||
Kubernetes: `>=1.22.0-0`
|
||||
|
||||
| Repository | Name | Version |
|
||||
|------------|------|---------|
|
||||
| file://../../../charts/partials | partials | 0.1.0 |
|
||||
|
||||
## Values
|
||||
|
||||
| Key | Type | Default | Description |
|
||||
|-----|------|---------|-------------|
|
||||
| clusterDomain | string | `"cluster.local"` | Kubernetes DNS Domain name to use |
|
||||
| commonLabels | object | `{}` | Labels to apply to all resources |
|
||||
| createNamespaceMetadataJob | bool | `true` | Creates a Job that adds necessary metadata to the extension's namespace during install; disable if lack of privileges require doing this manually |
|
||||
| dashboard.GID | string | `nil` | GID for the dashboard resource |
|
||||
| dashboard.UID | string | `nil` | UID for the dashboard resource |
|
||||
| dashboard.enforcedHostRegexp | string | `""` | Host header validation regex for the dashboard. See the [Linkerd documentation](https://linkerd.io/2/tasks/exposing-dashboard) for more information |
|
||||
| dashboard.image.name | string | `"web"` | Docker image name for the web instance |
|
||||
| dashboard.image.pullPolicy | string | defaultImagePullPolicy | Pull policy for the web component |
|
||||
| dashboard.image.registry | string | defaultRegistry | Docker registry for the web instance |
|
||||
| dashboard.image.tag | string | linkerdVersion | Docker image tag for the web instance |
|
||||
| dashboard.logFormat | string | defaultLogFormat | log format of the dashboard component |
|
||||
| dashboard.logLevel | string | defaultLogLevel | log level of the dashboard component |
|
||||
| dashboard.proxy | string | `nil` | |
|
||||
| dashboard.replicas | int | `1` | Number of replicas of dashboard |
|
||||
| dashboard.resources.cpu.limit | string | `nil` | Maximum amount of CPU units that the web container can use |
|
||||
| dashboard.resources.cpu.request | string | `nil` | Amount of CPU units that the web container requests |
|
||||
| dashboard.resources.ephemeral-storage.limit | string | `""` | Maximum amount of ephemeral storage that the web container can use |
|
||||
| dashboard.resources.ephemeral-storage.request | string | `""` | Amount of ephemeral storage that the web container requests |
|
||||
| dashboard.resources.memory.limit | string | `nil` | Maximum amount of memory that web container can use |
|
||||
| dashboard.resources.memory.request | string | `nil` | Amount of memory that the web container requests |
|
||||
| dashboard.restrictPrivileges | bool | `false` | Restrict the Linkerd Dashboard's default privileges to disallow Tap and Check |
|
||||
| dashboard.service | object | `{"annotations":{},"labels":{}}` | dashboard service configuration |
|
||||
| dashboard.service.annotations | object | `{}` | Additional annotations to add to dashboard service |
|
||||
| dashboard.service.labels | object | `{}` | Additional labels to add to dashboard service |
|
||||
| defaultGID | int | `2103` | GID for all the viz components |
|
||||
| defaultImagePullPolicy | string | `"IfNotPresent"` | Docker imagePullPolicy for all viz components |
|
||||
| defaultLogFormat | string | `"plain"` | Log format (`plain` or `json`) for all the viz components. |
|
||||
| defaultLogLevel | string | `"info"` | Log level for all the viz components |
|
||||
| defaultRegistry | string | `"cr.l5d.io/linkerd"` | Docker registry for all viz components |
|
||||
| defaultUID | int | `2103` | UID for all the viz components |
|
||||
| enablePSP | bool | `false` | Create Roles and RoleBindings to associate this extension's ServiceAccounts to the control plane PSP resource. This requires that `enabledPSP` is set to true on the control plane install. Note PSP has been deprecated since k8s v1.21 |
|
||||
| enablePodAntiAffinity | bool | `false` | Enables Pod Anti Affinity logic to balance the placement of replicas across hosts and zones for High Availability. Enable this only when you have multiple replicas of components. |
|
||||
| enablePodDisruptionBudget | bool | `false` | enables the creation of pod disruption budgets for tap, tap-injector, web and metrics-api components |
|
||||
| grafana.externalUrl | string | `nil` | url of a Grafana instance hosted off-cluster. Cannot be set if grafana.url is set. The reverse proxy will not be used for this URL. |
|
||||
| grafana.uidPrefix | string | `nil` | prefix for Grafana dashboard UID's, used when grafana.externalUrl is set. |
|
||||
| grafana.url | string | `nil` | url of an in-cluster Grafana instance with reverse proxy configured, used by the Linkerd viz web dashboard to provide direct links to specific Grafana dashboards. Cannot be set if grafana.externalUrl is set. See the [Linkerd documentation](https://linkerd.io/2/tasks/grafana) for more information |
|
||||
| identityTrustDomain | string | clusterDomain | Trust domain used for identity |
|
||||
| imagePullSecrets | list | `[]` | For Private docker registries, authentication is needed. Registry secrets are applied to the respective service accounts |
|
||||
| jaegerUrl | string | `""` | url of external jaeger instance Set this to `jaeger.linkerd-jaeger.svc.<clusterDomain>:16686` if you plan to use jaeger extension |
|
||||
| linkerdNamespace | string | `"linkerd"` | Namespace of the Linkerd core control-plane install |
|
||||
| linkerdVersion | string | `"linkerdVersionValue"` | control plane version. See Proxy section for proxy version |
|
||||
| metricsAPI.GID | string | `nil` | GID for the metrics-api resource |
|
||||
| metricsAPI.UID | string | `nil` | UID for the metrics-api resource |
|
||||
| metricsAPI.image.name | string | `"metrics-api"` | Docker image name for the metrics-api component |
|
||||
| metricsAPI.image.pullPolicy | string | defaultImagePullPolicy | Pull policy for the metrics-api component |
|
||||
| metricsAPI.image.registry | string | defaultRegistry | Docker registry for the metrics-api component |
|
||||
| metricsAPI.image.tag | string | linkerdVersion | Docker image tag for the metrics-api component |
|
||||
| metricsAPI.logFormat | string | defaultLogFormat | log format of the metrics-api component |
|
||||
| metricsAPI.logLevel | string | defaultLogLevel | log level of the metrics-api component |
|
||||
| metricsAPI.nodeSelector | object | `{"kubernetes.io/os":"linux"}` | NodeSelector section, See the [K8S documentation](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector) for more information |
|
||||
| metricsAPI.proxy | string | `nil` | |
|
||||
| metricsAPI.replicas | int | `1` | Number of replicas of the metrics-api component |
|
||||
| metricsAPI.resources.cpu.limit | string | `nil` | Maximum amount of CPU units that the metrics-api container can use |
|
||||
| metricsAPI.resources.cpu.request | string | `nil` | Amount of CPU units that the metrics-api container requests |
|
||||
| metricsAPI.resources.ephemeral-storage.limit | string | `""` | Maximum amount of ephemeral storage that the metrics-api container can use |
|
||||
| metricsAPI.resources.ephemeral-storage.request | string | `""` | Amount of ephemeral storage that the metrics-api container requests |
|
||||
| metricsAPI.resources.memory.limit | string | `nil` | Maximum amount of memory that metrics-api container can use |
|
||||
| metricsAPI.resources.memory.request | string | `nil` | Amount of memory that the metrics-api container requests |
|
||||
| metricsAPI.service | object | `{"annotations":{}}` | metrics-api service configuration |
|
||||
| metricsAPI.service.annotations | object | `{}` | Additional annotations to add to metrics-api service |
|
||||
| metricsAPI.tolerations | string | `nil` | Tolerations section, See the [K8S documentation](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) for more information |
|
||||
| namespaceMetadata.image.name | string | `"extension-init"` | Docker image name for the namespace-metadata instance |
|
||||
| namespaceMetadata.image.pullPolicy | string | defaultImagePullPolicy | Pull policy for the namespace-metadata instance |
|
||||
| namespaceMetadata.image.registry | string | defaultRegistry | Docker registry for the namespace-metadata instance |
|
||||
| namespaceMetadata.image.tag | string | `"v0.1.1"` | Docker image tag for the namespace-metadata instance |
|
||||
| namespaceMetadata.nodeSelector | object | `{"kubernetes.io/os":"linux"}` | NodeSelector section, See the [K8S documentation](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector) for more information |
|
||||
| namespaceMetadata.tolerations | string | `nil` | Tolerations section, See the [K8S documentation](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) for more information |
|
||||
| nodeSelector | object | `{"kubernetes.io/os":"linux"}` | Default nodeSelector section, See the [K8S documentation](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector) for more information |
|
||||
| podLabels | object | `{}` | Additional labels to add to all pods |
|
||||
| prometheus.alertRelabelConfigs | string | `nil` | Alert relabeling is applied to alerts before they are sent to the Alertmanager. |
|
||||
| prometheus.alertmanagers | string | `nil` | Alertmanager instances the Prometheus server sends alerts to configured via the static_configs parameter. |
|
||||
| prometheus.args | object | `{"config.file":"/etc/prometheus/prometheus.yml","storage.tsdb.path":"/data","storage.tsdb.retention.time":"6h"}` | Command line options for Prometheus binary |
|
||||
| prometheus.enabled | bool | `true` | toggle field to enable or disable prometheus |
|
||||
| prometheus.globalConfig | object | `{"evaluation_interval":"10s","scrape_interval":"10s","scrape_timeout":"10s"}` | The global configuration specifies parameters that are valid in all other configuration contexts. |
|
||||
| prometheus.image.name | string | `"prometheus"` | Docker image name for the prometheus instance |
|
||||
| prometheus.image.pullPolicy | string | defaultImagePullPolicy | Pull policy for the prometheus instance |
|
||||
| prometheus.image.registry | string | `"prom"` | Docker registry for the prometheus instance |
|
||||
| prometheus.image.tag | string | `"v2.48.1"` | Docker image tag for the prometheus instance |
|
||||
| prometheus.logFormat | string | defaultLogLevel | log format (plain, json) of the prometheus instance |
|
||||
| prometheus.logLevel | string | defaultLogLevel | log level of the prometheus instance |
|
||||
| prometheus.metricRelabelConfigs | string | `nil` | A metricRelabelConfigs section allows to drop high cardinality metrics. *NOTE:* Please use with caution. Some metrics are needed for linkerd-viz to function properly. |
|
||||
| prometheus.nodeSelector | object | `{"kubernetes.io/os":"linux"}` | NodeSelector section, See the [K8S documentation](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector) for more information |
|
||||
| prometheus.podAnnotations | object | `{}` | annotations for the prometheus pod |
|
||||
| prometheus.proxy | string | `nil` | |
|
||||
| prometheus.remoteWrite | string | `nil` | Allows transparently sending samples to an endpoint. Mostly used for long term storage. |
|
||||
| prometheus.resources | object | `{"cpu":{"limit":null,"request":null},"ephemeral-storage":{"limit":"","request":""},"memory":{"limit":null,"request":null}}` | Prometheus data volume size. size: |
|
||||
| prometheus.resources.cpu.limit | string | `nil` | Maximum amount of CPU units that the prometheus container can use |
|
||||
| prometheus.resources.cpu.request | string | `nil` | Amount of CPU units that the prometheus container requests |
|
||||
| prometheus.resources.ephemeral-storage.limit | string | `""` | Maximum amount of ephemeral storage that the prometheus container can use |
|
||||
| prometheus.resources.ephemeral-storage.request | string | `""` | Amount of ephemeral storage that the prometheus container requests |
|
||||
| prometheus.resources.memory.limit | string | `nil` | Maximum amount of memory that prometheus container can use |
|
||||
| prometheus.resources.memory.request | string | `nil` | Amount of memory that the prometheus container requests |
|
||||
| prometheus.ruleConfigMapMounts | string | `nil` | Alerting/recording rule ConfigMap mounts (sub-path names must end in ´_rules.yml´ or ´_rules.yaml´) |
|
||||
| prometheus.scrapeConfigs | string | `nil` | A scrapeConfigs section specifies a set of targets and parameters describing how to scrape them. |
|
||||
| prometheus.sidecarContainers | string | `nil` | A sidecarContainers section specifies a list of secondary containers to run in the prometheus pod e.g. to export data to non-prometheus systems |
|
||||
| prometheus.tolerations | string | `nil` | Tolerations section, See the [K8S documentation](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) for more information |
|
||||
| prometheusCredsSecret | string | `""` | Name of the prometheus credentials secret. If this is set, the metrics-api will use basic auth to connect to prometheus and load the user and password from the "user" and "password" keys respectively in the given secret. The secret must be in the same namespace and must exist before the metrics-api is deployed. |
|
||||
| prometheusUrl | string | `""` | url of external prometheus instance |
|
||||
| revisionHistoryLimit | int | `10` | Specifies the number of old ReplicaSets to retain to allow rollback. |
|
||||
| tap.GID | string | `nil` | GID for the tap component |
|
||||
| tap.UID | string | `nil` | UID for the tap component |
|
||||
| tap.caBundle | string | `""` | Bundle of CA certificates for tap. If not provided nor injected with cert-manager, then Helm will use the certificate generated for `tap.crtPEM`. If `tap.externalSecret` is set to true, this value, injectCaFrom, or injectCaFromSecret must be set, as no certificate will be generated. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector) for more information. |
|
||||
| tap.crtPEM | string | `""` | Certificate for the Tap component. If not provided and not using an external secret then Helm will generate one. |
|
||||
| tap.externalSecret | bool | `false` | Do not create a secret resource for the Tap component. If this is set to `true`, the value `tap.caBundle` must be set or the ca bundle must injected with cert-manager ca injector using `tap.injectCaFrom` or `tap.injectCaFromSecret` (see below). |
|
||||
| tap.ignoreHeaders | list | `[]` | List of headers that will be ignored for Linkerd Tap |
|
||||
| tap.image.name | string | `"tap"` | Docker image name for the tap instance |
|
||||
| tap.image.pullPolicy | string | defaultImagePullPolicy | Pull policy for the tap component |
|
||||
| tap.image.registry | string | defaultRegistry | Docker registry for the tap instance |
|
||||
| tap.image.tag | string | linkerdVersion | Docker image tag for the tap instance |
|
||||
| tap.injectCaFrom | string | `""` | Inject the CA bundle from a cert-manager Certificate. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector/#injecting-ca-data-from-a-certificate-resource) for more information. |
|
||||
| tap.injectCaFromSecret | string | `""` | Inject the CA bundle from a Secret. If set, the `cert-manager.io/inject-ca-from-secret` annotation will be added to the webhook. The Secret must have the CA Bundle stored in the `ca.crt` key and have the `cert-manager.io/allow-direct-injection` annotation set to `true`. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector/#injecting-ca-data-from-a-secret-resource) for more information. |
|
||||
| tap.keyPEM | string | `""` | Certificate key for Tap component. If not provided and not using an external secret then Helm will generate one. |
|
||||
| tap.logFormat | string | defaultLogFormat | log format of the tap component |
|
||||
| tap.logLevel | string | defaultLogLevel | log level of the tap component |
|
||||
| tap.proxy | string | `nil` | |
|
||||
| tap.replicas | int | `1` | Number of tap component replicas |
|
||||
| tap.resources.cpu.limit | string | `nil` | Maximum amount of CPU units that the tap container can use |
|
||||
| tap.resources.cpu.request | string | `nil` | Amount of CPU units that the tap container requests |
|
||||
| tap.resources.ephemeral-storage.limit | string | `""` | Maximum amount of ephemeral storage that the tap container can use |
|
||||
| tap.resources.ephemeral-storage.request | string | `""` | Amount of ephemeral storage that the tap container requests |
|
||||
| tap.resources.memory.limit | string | `nil` | Maximum amount of memory that tap container can use |
|
||||
| tap.resources.memory.request | string | `nil` | Amount of memory that the tap container requests |
|
||||
| tap.service | object | `{"annotations":{}}` | tap service configuration |
|
||||
| tap.service.annotations | object | `{}` | Additional annotations to add to tap service |
|
||||
| tapInjector.GID | string | `nil` | GID for the tapInjector resource |
|
||||
| tapInjector.UID | string | `nil` | UID for the tapInjector resource |
|
||||
| tapInjector.caBundle | string | `""` | Bundle of CA certificates for the tapInjector. If not provided nor injected with cert-manager, then Helm will use the certificate generated for `tapInjector.crtPEM`. If `tapInjector.externalSecret` is set to true, this value, injectCaFrom, or injectCaFromSecret must be set, as no certificate will be generated. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector) for more information. |
|
||||
| tapInjector.crtPEM | string | `""` | Certificate for the tapInjector. If not provided and not using an external secret then Helm will generate one. |
|
||||
| tapInjector.externalSecret | bool | `false` | Do not create a secret resource for the tapInjector webhook. If this is set to `true`, the value `tapInjector.caBundle` must be set or the ca bundle must injected with cert-manager ca injector using `tapInjector.injectCaFrom` or `tapInjector.injectCaFromSecret` (see below). |
|
||||
| tapInjector.failurePolicy | string | `"Ignore"` | |
|
||||
| tapInjector.image.name | string | `"tap"` | Docker image name for the tapInjector instance |
|
||||
| tapInjector.image.pullPolicy | string | defaultImagePullPolicy | Pull policy for the tapInjector component |
|
||||
| tapInjector.image.registry | string | defaultRegistry | Docker registry for the tapInjector instance |
|
||||
| tapInjector.image.tag | string | linkerdVersion | Docker image tag for the tapInjector instance |
|
||||
| tapInjector.injectCaFrom | string | `""` | Inject the CA bundle from a cert-manager Certificate. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector/#injecting-ca-data-from-a-certificate-resource) for more information. |
|
||||
| tapInjector.injectCaFromSecret | string | `""` | Inject the CA bundle from a Secret. If set, the `cert-manager.io/inject-ca-from-secret` annotation will be added to the webhook. The Secret must have the CA Bundle stored in the `ca.crt` key and have the `cert-manager.io/allow-direct-injection` annotation set to `true`. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector/#injecting-ca-data-from-a-secret-resource) for more information. |
|
||||
| tapInjector.keyPEM | string | `""` | Certificate key for the tapInjector. If not provided and not using an external secret then Helm will generate one. |
|
||||
| tapInjector.logFormat | string | defaultLogFormat | log format of the tapInjector component |
|
||||
| tapInjector.logLevel | string | defaultLogLevel | log level of the tapInjector |
|
||||
| tapInjector.namespaceSelector | object | `{"matchExpressions":[{"key":"kubernetes.io/metadata.name","operator":"NotIn","values":["kube-system"]}]}` | Namespace selector used by admission webhook. |
|
||||
| tapInjector.objectSelector | string | `nil` | |
|
||||
| tapInjector.proxy | string | `nil` | |
|
||||
| tapInjector.replicas | int | `1` | Number of replicas of tapInjector |
|
||||
| tapInjector.resources.cpu.limit | string | `nil` | Maximum amount of CPU units that the tapInjector container can use |
|
||||
| tapInjector.resources.cpu.request | string | `nil` | Amount of CPU units that the tapInjector container requests |
|
||||
| tapInjector.resources.ephemeral-storage.limit | string | `""` | Maximum amount of ephemeral storage that the tapInjector container can use |
|
||||
| tapInjector.resources.ephemeral-storage.request | string | `""` | Amount of ephemeral storage that the tapInjector container requests |
|
||||
| tapInjector.resources.memory.limit | string | `nil` | Maximum amount of memory that tapInjector container can use |
|
||||
| tapInjector.resources.memory.request | string | `nil` | Amount of memory that the tapInjector container requests |
|
||||
| tapInjector.service | object | `{"annotations":{}}` | tap service configuration |
|
||||
| tapInjector.service.annotations | object | `{}` | Additional annotations to add to tapInjector service |
|
||||
| tolerations | string | `nil` | Default tolerations section, See the [K8S documentation](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) for more information |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.14.2](https://github.com/norwoodj/helm-docs/releases/v1.14.2)
|
Loading…
Reference in New Issue