stable/aws-vpc-cni/values.yaml (157 lines of code) (raw):

# Default values for aws-vpc-cni. # This is a YAML-formatted file. # Declare variables to be passed into your templates. # This default name override is to maintain backwards compatability with # existing naming nameOverride: aws-node init: image: tag: v1.19.4 domain: amazonaws.com region: us-west-2 endpoint: ecr account: "602401143452" pullPolicy: Always # Set to use custom image override: # override: "repo/org/image:tag" env: DISABLE_TCP_EARLY_DEMUX: "false" ENABLE_IPv6: "false" securityContext: privileged: true resources: {} nodeAgent: enabled: true image: tag: v1.2.1 domain: amazonaws.com region: us-west-2 endpoint: ecr account: "602401143452" pullPolicy: Always # Set to use custom image override: # override: "repo/org/image:tag" securityContext: capabilities: add: - "NET_ADMIN" privileged: true enableCloudWatchLogs: "false" enablePolicyEventLogs: "false" networkPolicyAgentLogFileLocation: "/var/log/aws-routed-eni/network-policy-agent.log" enableIpv6: "false" metricsBindAddr: "8162" healthProbeBindAddr: "8163" conntrackCacheCleanupPeriod: 300 resources: {} image: tag: v1.19.4 domain: amazonaws.com region: us-west-2 endpoint: ecr account: "602401143452" pullPolicy: Always # Set to use custom image override: # override: "repo/org/image:tag" # The CNI supports a number of environment variable settings # See https://github.com/aws/amazon-vpc-cni-k8s#cni-configuration-variables env: ADDITIONAL_ENI_TAGS: "{}" AWS_VPC_CNI_NODE_PORT_SUPPORT: "true" AWS_VPC_ENI_MTU: "9001" AWS_VPC_K8S_CNI_CUSTOM_NETWORK_CFG: "false" AWS_VPC_K8S_CNI_EXTERNALSNAT: "false" AWS_VPC_K8S_CNI_LOG_FILE: "/host/var/log/aws-routed-eni/ipamd.log" AWS_VPC_K8S_CNI_LOGLEVEL: DEBUG AWS_VPC_K8S_CNI_RANDOMIZESNAT: "prng" AWS_VPC_K8S_CNI_VETHPREFIX: eni AWS_VPC_K8S_PLUGIN_LOG_FILE: "/var/log/aws-routed-eni/plugin.log" AWS_VPC_K8S_PLUGIN_LOG_LEVEL: DEBUG DISABLE_INTROSPECTION: "false" DISABLE_METRICS: "false" ENABLE_POD_ENI: "false" ENABLE_PREFIX_DELEGATION: "false" WARM_ENI_TARGET: "1" WARM_PREFIX_TARGET: "1" DISABLE_NETWORK_RESOURCE_PROVISIONING: "false" ENABLE_IPv4: "true" ENABLE_IPv6: "false" ENABLE_SUBNET_DISCOVERY: "true" VPC_CNI_VERSION: "v1.19.4" NETWORK_POLICY_ENFORCING_MODE: "standard" # Add env from configMap or from secrets # - name: ENV_VAR1 # valueFrom: # configMapKeyRef: # name: example-config # key: ENV_VAR1 # - name: ENV_VAR2 # valueFrom: # configMapKeyRef: # name: example-config # key: ENV_VAR2 # - name: SECRET_VAR1 # valueFrom: # secretKeyRef: # name: example-secret # key: SECRET_VAR1 extraEnv: [] # this flag enables you to use the match label that was present in the original daemonset deployed by EKS # You can then annotate and label the original aws-node resources and 'adopt' them into a helm release originalMatchLabels: false # Settings for aws-vpc-cni ConfigMap # - Network Policy settings enableNetworkPolicy: "false" # - Windows settings enableWindowsIpam: "false" # - Windows Prefix Delegation settings enableWindowsPrefixDelegation: "false" warmWindowsPrefixTarget: 0 warmWindowsIPTarget: 1 minimumWindowsIPTarget: 3 # - Security Groups for Pods settings branchENICooldown: 60 cniConfig: enabled: false fileContents: "" imagePullSecrets: [] fullnameOverride: "aws-node" priorityClassName: system-node-critical podSecurityContext: {} podAnnotations: {} podLabels: {} securityContext: capabilities: add: - "NET_ADMIN" - "NET_RAW" serviceAccount: # Specifies whether a service account should be created create: true # The name of the service account to use. # If not set and create is true, a name is generated using the fullname template name: annotations: {} # To set annotations - serviceAccount.annotations."eks\.amazonaws\.com/role-arn"=arn:aws:iam::<AWS_ACCOUNT_ID>:<IAM_ROLE_NAME> livenessProbe: exec: command: - /app/grpc-health-probe - '-addr=:50051' - '-connect-timeout=5s' - '-rpc-timeout=5s' initialDelaySeconds: 60 livenessProbeTimeoutSeconds: 10 readinessProbe: exec: command: - /app/grpc-health-probe - '-addr=:50051' - '-connect-timeout=5s' - '-rpc-timeout=5s' initialDelaySeconds: 1 readinessProbeTimeoutSeconds: 10 resources: requests: cpu: 25m updateStrategy: type: RollingUpdate rollingUpdate: maxUnavailable: "10%" nodeSelector: {} tolerations: - operator: Exists affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchExpressions: - key: "kubernetes.io/os" operator: In values: - linux - key: "kubernetes.io/arch" operator: In values: - amd64 - arm64 - key: "eks.amazonaws.com/compute-type" operator: NotIn values: - fargate - hybrid - auto eniConfig: # Specifies whether ENIConfigs should be created create: false region: us-west-2 subnets: # Key identifies the AZ # Value contains the subnet ID and security group IDs within that AZ # us-west-2a: # id: subnet-123 # securityGroups: # - sg-123 # us-west-2b: # id: subnet-456 # securityGroups: # - sg-456 # us-west-2c: # id: subnet-789 # securityGroups: # - sg-789 podMonitor: # Create Prometheus podMonitor create: false # Annotations to add to the Prometheus podMonitor annotations: {} # Labels to add to the Prometheus podMonitor labels: {} # The interval to scrape metrics. interval: 30s # The timeout before a metrics scrape fails. scrapeTimeout: 30s # relabelings to apply to the podMonitor relabelings: []