-
Notifications
You must be signed in to change notification settings - Fork 989
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
aws-load-balancer-controller: v2.8.2
- Loading branch information
Showing
6 changed files
with
810 additions
and
4 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
apiVersion: v2 | ||
name: aws-load-balancer-controller | ||
description: AWS Load Balancer Controller Helm chart for Kubernetes | ||
version: 1.8.2 | ||
appVersion: v2.8.2 | ||
home: https://github.com/aws/eks-charts | ||
icon: https://raw.githubusercontent.com/aws/eks-charts/master/docs/logo/aws.png | ||
sources: | ||
- https://github.com/aws/eks-charts | ||
maintainers: | ||
- name: kishorj | ||
url: https://github.com/kishorj | ||
email: [email protected] | ||
- name: m00nf1sh | ||
url: https://github.com/m00nf1sh | ||
email: [email protected] | ||
keywords: | ||
- eks | ||
- alb | ||
- load balancer | ||
- ingress | ||
- nlb |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,355 @@ | ||
# Default values for aws-load-balancer-controller. | ||
# This is a YAML-formatted file. | ||
# Declare variables to be passed into your templates. | ||
|
||
replicaCount: 2 | ||
|
||
image: | ||
repository: public.ecr.aws/eks/aws-load-balancer-controller | ||
tag: v2.8.2 | ||
pullPolicy: IfNotPresent | ||
|
||
imagePullSecrets: [] | ||
nameOverride: "" | ||
fullnameOverride: "" | ||
runtimeClassName: "" | ||
|
||
serviceAccount: | ||
# Specifies whether a service account should be created | ||
create: true | ||
# Annotations to add to the service account | ||
annotations: {} | ||
# The name of the service account to use. | ||
# If not set and create is true, a name is generated using the fullname template | ||
name: | ||
# Automount API credentials for a Service Account. | ||
automountServiceAccountToken: true | ||
# List of image pull secrets to add to the Service Account. | ||
imagePullSecrets: | ||
# - name: docker | ||
|
||
rbac: | ||
# Specifies whether rbac resources should be created | ||
create: true | ||
|
||
podSecurityContext: | ||
fsGroup: 65534 | ||
|
||
securityContext: | ||
# capabilities: | ||
# drop: | ||
# - ALL | ||
readOnlyRootFilesystem: true | ||
runAsNonRoot: true | ||
allowPrivilegeEscalation: false | ||
|
||
# Time period for the controller pod to do a graceful shutdown | ||
terminationGracePeriodSeconds: 10 | ||
|
||
resources: | ||
limits: | ||
cpu: 100m | ||
memory: 128Mi | ||
requests: | ||
cpu: 100m | ||
memory: 128Mi | ||
|
||
# priorityClassName specifies the PriorityClass to indicate the importance of controller pods | ||
# ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass | ||
priorityClassName: system-cluster-critical | ||
|
||
nodeSelector: {} | ||
|
||
tolerations: [] | ||
|
||
# affinity specifies a custom affinity for the controller pods | ||
affinity: {} | ||
|
||
# configureDefaultAffinity specifies whether to configure a default affinity for the controller pods to prevent | ||
# co-location on the same node. This will get ignored if you specify a custom affinity configuration. | ||
configureDefaultAffinity: true | ||
|
||
# topologySpreadConstraints is a stable feature of k8s v1.19 which provides the ability to | ||
# control how Pods are spread across your cluster among failure-domains such as regions, zones, | ||
# nodes, and other user-defined topology domains. | ||
# | ||
# more details here: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/ | ||
topologySpreadConstraints: {} | ||
|
||
updateStrategy: | ||
type: RollingUpdate | ||
rollingUpdate: | ||
maxSurge: 1 | ||
maxUnavailable: 1 | ||
|
||
# serviceAnnotations contains annotations to be added to the provisioned webhook service resource | ||
serviceAnnotations: {} | ||
|
||
# deploymentAnnotations contains annotations for the controller deployment | ||
deploymentAnnotations: {} | ||
|
||
podAnnotations: {} | ||
|
||
podLabels: {} | ||
|
||
# additionalLabels -- Labels to add to each object of the chart. | ||
additionalLabels: {} | ||
|
||
# Enable cert-manager | ||
enableCertManager: false | ||
|
||
# The name of the Kubernetes cluster. A non-empty value is required | ||
clusterName: test-cluster | ||
|
||
# cluster contains configurations specific to the kubernetes cluster | ||
cluster: | ||
# Cluster DNS domain (required for requesting TLS certificates) | ||
dnsDomain: cluster.local | ||
|
||
# The ingress class this controller will satisfy. If not specified, controller will match all | ||
# ingresses without ingress class annotation and ingresses of type alb | ||
ingressClass: alb | ||
|
||
# ingressClassParams specify the IngressCLassParams that enforce settings for a set of Ingresses when using with ingress Controller. | ||
ingressClassParams: | ||
create: true | ||
# The name of ingressClassParams resource will be referred in ingressClass | ||
name: | ||
spec: {} | ||
# You always can set specifications in `helm install` command through `--set` or `--set-string` | ||
# If you do want to specify specifications in values.yaml, uncomment the following | ||
# lines, adjust them as necessary, and remove the curly braces after 'spec:'. | ||
# namespaceSelector: | ||
# matchLabels: | ||
# group: | ||
# scheme: | ||
# ipAddressType: | ||
# tags: | ||
|
||
# To use IngressClass resource instead of annotation, before you need to install the IngressClass resource pointing to controller. | ||
# If specified as true, the IngressClass resource will be created. | ||
createIngressClassResource: true | ||
|
||
# The AWS region for the kubernetes cluster. Set to use KIAM or kube2iam for example. | ||
region: | ||
|
||
# The VPC ID for the Kubernetes cluster. Set this manually when your pods are unable to use the metadata service to determine this automatically | ||
vpcId: | ||
|
||
# Custom AWS API Endpoints (serviceID1=URL1,serviceID2=URL2) | ||
awsApiEndpoints: | ||
|
||
# awsApiThrottle specifies custom AWS API throttle settings (serviceID1:operationRegex1=rate:burst,serviceID2:operationRegex2=rate:burst) | ||
# example: --set awsApiThrottle="{Elastic Load Balancing v2:RegisterTargets|DeregisterTargets=4:20,Elastic Load Balancing v2:.*=10:40}" | ||
awsApiThrottle: | ||
|
||
# Maximum retries for AWS APIs (default 10) | ||
awsMaxRetries: | ||
|
||
|
||
|
||
|
||
# If enabled, targetHealth readiness gate will get injected to the pod spec for the matching endpoint pods (default true) | ||
enablePodReadinessGateInject: | ||
|
||
# Enable Shield addon for ALB (default true) | ||
enableShield: | ||
|
||
# Enable WAF addon for ALB (default true) | ||
enableWaf: | ||
|
||
# Enable WAF V2 addon for ALB (default true) | ||
enableWafv2: | ||
|
||
# Maximum number of concurrently running reconcile loops for ingress (default 3) | ||
ingressMaxConcurrentReconciles: | ||
|
||
# Set the controller log level - info(default), debug (default "info") | ||
logLevel: | ||
|
||
# The address the metric endpoint binds to. (default ":8080") | ||
metricsBindAddr: "" | ||
|
||
# The TCP port the Webhook server binds to. (default 9443) | ||
webhookBindPort: | ||
|
||
# webhookTLS specifies TLS cert/key for the webhook | ||
webhookTLS: | ||
caCert: | ||
cert: | ||
key: | ||
|
||
# array of namespace selectors for the webhook | ||
webhookNamespaceSelectors: | ||
- key: elbv2.k8s.aws/pod-readiness-gate-inject | ||
operator: In | ||
values: | ||
- enabled | ||
|
||
# keepTLSSecret specifies whether to reuse existing TLS secret for chart upgrade | ||
keepTLSSecret: true | ||
|
||
# Maximum number of concurrently running reconcile loops for service (default 3) | ||
serviceMaxConcurrentReconciles: | ||
|
||
# Maximum number of concurrently running reconcile loops for targetGroupBinding | ||
targetgroupbindingMaxConcurrentReconciles: | ||
|
||
# Maximum duration of exponential backoff for targetGroupBinding reconcile failures | ||
targetgroupbindingMaxExponentialBackoffDelay: | ||
|
||
# Period at which the controller forces the repopulation of its local object stores. (default 1h0m0s) | ||
syncPeriod: | ||
|
||
# Namespace the controller watches for updates to Kubernetes objects, If empty, all namespaces are watched. | ||
watchNamespace: | ||
|
||
# disableIngressClassAnnotation disables the usage of kubernetes.io/ingress.class annotation, false by default | ||
disableIngressClassAnnotation: | ||
|
||
# disableIngressGroupNameAnnotation disables the usage of alb.ingress.kubernetes.io/group.name annotation, false by default | ||
disableIngressGroupNameAnnotation: | ||
|
||
# tolerateNonExistentBackendService permits rules which specify backend services that don't exist, true by default (When enabled, it will return 503 error if backend service not exist) | ||
tolerateNonExistentBackendService: | ||
|
||
# tolerateNonExistentBackendAction permits rules which specify backend actions that don't exist, true by default (When enabled, it will return 503 error if backend action not exist) | ||
tolerateNonExistentBackendAction: | ||
|
||
# defaultSSLPolicy specifies the default SSL policy to use for TLS/HTTPS listeners | ||
defaultSSLPolicy: | ||
|
||
# Liveness probe configuration for the controller | ||
livenessProbe: | ||
failureThreshold: 2 | ||
httpGet: | ||
path: /healthz | ||
port: 61779 | ||
scheme: HTTP | ||
initialDelaySeconds: 30 | ||
timeoutSeconds: 10 | ||
|
||
# Environment variables to set for aws-load-balancer-controller pod. | ||
# We strongly discourage programming access credentials in the controller environment. You should setup IRSA or | ||
# comparable solutions like kube2iam, kiam etc instead. | ||
env: | ||
# ENV_1: "" | ||
# ENV_2: "" | ||
|
||
# Specifies if aws-load-balancer-controller should be started in hostNetwork mode. | ||
# | ||
# This is required if using a custom CNI where the managed control plane nodes are unable to initiate | ||
# network connections to the pods, for example using Calico CNI plugin on EKS. This is not required or | ||
# recommended if using the Amazon VPC CNI plugin. | ||
hostNetwork: false | ||
|
||
# Specifies the dnsPolicy that should be used for pods in the deployment | ||
# | ||
# This may need to be used to be changed given certain conditions. For instance, if one uses the cilium CNI | ||
# with certain settings, one may need to set `hostNetwork: true` and webhooks won't work unless `dnsPolicy` | ||
# is set to `ClusterFirstWithHostNet`. See https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-s-dns-policy | ||
dnsPolicy: | ||
|
||
# extraVolumeMounts are the additional volume mounts. This enables setting up IRSA on non-EKS Kubernetes cluster | ||
extraVolumeMounts: | ||
- name: aws-iam-token | ||
mountPath: /var/run/secrets/eks.amazonaws.com/serviceaccount | ||
readOnly: true | ||
|
||
# extraVolumes for the extraVolumeMounts. Useful to mount a projected service account token for example. | ||
extraVolumes: | ||
- name: aws-iam-token | ||
projected: | ||
defaultMode: 420 | ||
sources: | ||
- serviceAccountToken: | ||
audience: sts.amazonaws.com | ||
expirationSeconds: 86400 | ||
path: token | ||
|
||
# defaultTags are the tags to apply to all AWS resources managed by this controller | ||
defaultTags: | ||
default_tag1: value1 | ||
default_tag2: value2 | ||
|
||
# podDisruptionBudget specifies the disruption budget for the controller pods. | ||
# Disruption budget will be configured only when the replicaCount is greater than 1 | ||
podDisruptionBudget: | ||
maxUnavailable: 1 | ||
|
||
# externalManagedTags is the list of tag keys on AWS resources that will be managed externally | ||
externalManagedTags: [] | ||
|
||
# enableEndpointSlices enables k8s EndpointSlices for IP targets instead of Endpoints (default false) | ||
enableEndpointSlices: | ||
|
||
# enableBackendSecurityGroup enables shared security group for backend traffic (default true) | ||
enableBackendSecurityGroup: | ||
|
||
# backendSecurityGroup specifies backend security group id (default controller auto create backend security group) | ||
backendSecurityGroup: | ||
|
||
# disableRestrictedSecurityGroupRules specifies whether to disable creating port-range restricted security group rules for traffic | ||
disableRestrictedSecurityGroupRules: | ||
|
||
# controllerConfig specifies controller configuration | ||
controllerConfig: | ||
# featureGates set of key: value pairs that describe AWS load balance controller features | ||
featureGates: {} | ||
# ServiceTypeLoadBalancerOnly: true | ||
# EndpointsFailOpen: true | ||
|
||
# objectSelector for webhook | ||
objectSelector: | ||
matchExpressions: | ||
# - key: <key> | ||
# operator: <operator> | ||
# values: | ||
# - <value> | ||
matchLabels: | ||
# key: value | ||
|
||
serviceMonitor: | ||
# Specifies whether a service monitor should be created | ||
enabled: false | ||
# Labels to add to the service account | ||
additionalLabels: {} | ||
# Prometheus scrape interval | ||
interval: 1m | ||
# Namespace to create the service monitor in | ||
namespace: | ||
|
||
# clusterSecretsPermissions lets you configure RBAC permissions for secret resources | ||
# Access to secrets resource is required only if you use the OIDC feature, and instead of | ||
# enabling access to all secrets, we recommend configuring namespaced role/rolebinding. | ||
# This option is for backwards compatibility only, and will potentially be deprecated in future. | ||
clusterSecretsPermissions: | ||
# allowAllSecrets allows the controller to access all secrets in the cluster. | ||
# This is to get backwards compatible behavior, but *NOT* recommended for security reasons | ||
allowAllSecrets: false | ||
|
||
# ingressClassConfig contains configurations specific to the ingress class | ||
ingressClassConfig: | ||
default: false | ||
|
||
# enableServiceMutatorWebhook allows you enable the webhook which makes this controller the default for all new services of type LoadBalancer | ||
# should deprecate this in favor of serviceMutatorWebhook.enabled | ||
enableServiceMutatorWebhook: true | ||
|
||
# serviceMutatorWebhook contains configurations specific to the service mutator webhook | ||
serviceMutatorWebhookConfig: | ||
# whether or not to fail the service creation if the webhook fails | ||
failurePolicy: Fail | ||
# limit webhook to only mutate services matching the objectSelector | ||
objectSelector: | ||
matchExpressions: [] | ||
# - key: <key> | ||
# operator: <operator> | ||
# values: | ||
# - <value> | ||
matchLabels: {} | ||
# key: value | ||
# which operations trigger the webhook | ||
operations: | ||
- CREATE | ||
# - UPDATE |
Oops, something went wrong.