11externalHostname : " "
2- etcd :
3- enabled : true
4- image : quay.io/coreos/etcd
5- tag : v3.5.4
6- resources :
7- requests :
8- cpu : 500m
9- memory : 2Gi
10- limits :
11- # cpu: 1
12- memory : 20Gi
13- volumeSize : 8Gi
14- profiling :
15- enabled : false
16- kcp :
17- enabled : true
18- image : ghcr.io/kcp-dev/kcp
19- # set this to override the image tag used for kcp (determined by chart appVersion by default).
20- tag : " "
21- pullPolicy : IfNotPresent
22- v : " 3"
23- logicalClusterAdminFlag : true
24- externalLogicalClusterAdminFlag : true
25- # enabled "batteries" (see kcp start --help for available batteries).
26- batteries :
27- - workspace-types
28- resources :
29- requests :
30- memory : 512Mi
31- cpu : 100m
32- limits :
33- # cpu: 1
34- memory : 20Gi
35- volumeClassName : " "
36- etcd :
37- # set this if you are using external or embedded etcds.
38- serverAddress : " "
39- clientCertificate :
40- # set this to a cert-manager Issuer that knows how to
41- # issue client certificates for your external etcd if
42- # you are not using the etcd provided by this chart.
43- issuer : " "
44- commonName : root
45- volumeSize : 1Gi
46- extraFlags : []
47- profiling :
48- enabled : false
49- port : 6060
50- tokenAuth :
51- enabled : false
52- fileName : auth-token.csv
53- config : |
54- user-1-token,user-1,1111-1111-1111-1111,"team-1"
55- admin-token,admin,5555-5555-5555-5555,"system:kcp:admin"
56- system-token,system,6666-6666-6666-6666,"system:masters"
57- hostAliases :
58- enabled : false
59- homeWorkspaces :
60- enabled : false
61- securityContext :
62- # this matches the group id as set in the kcp Dockerfile.
63- fsGroup : 65532
64- seccompProfile :
65- type : RuntimeDefault
662kcpFrontProxy :
673 enabled : true
684 image : ghcr.io/kcp-dev/kcp
@@ -140,32 +76,6 @@ kcpFrontProxy:
14076 # - name: example-vw-serving-cert
14177 # mountPath: /etc/example-vw-serving-cert
14278 extraFlags : []
143- cache :
144- enabled : false
145- image : ghcr.io/kcp-dev/kcp
146- pullPolicy : Always
147- service :
148- annotations : {}
149- type : ClusterIP
150- profiling :
151- enabled : false
152- port : 6060
153- resources :
154- requests :
155- cpu : 100m
156- memory : 128Mi
157- limits :
158- # cpu: 1
159- memory : 1Gi
160- hostAliases :
161- enabled : false
162- securityContext :
163- seccompProfile :
164- type : RuntimeDefault
165- externalCache :
166- enabled : false
167- cacheInternalHostname : " "
168-
16979oidc :
17080 enabled : false
17181 caSecretName : " "
@@ -176,25 +86,8 @@ oidc:
17686 # certs in the tls.crt chain. As you cannot say "use this Secret, but the
17787 # second cert in the tls.crt key", it's easier to mount the CA cert secret.
17888 caSecretKeyName : " tls.crt"
179- audit :
180- enabled : false
181- volumeSize : 1Gi
182- volumeClassName : " "
183- policy :
184- dir : /etc/kcp/audit
185- fileName : audit-policy.yml
186- config : |
187- # Log all requests at the Metadata level.
188- apiVersion: audit.k8s.io/v1
189- kind: Policy
190- rules:
191- - level: Metadata
192- log :
193- maxAge : " 10"
194- maxSize : " 250"
195- maxBackup : " 1"
196- dir : /var/audit
19789certificates :
90+ name : certs
19891 kcp :
19992 pki : true
20093 certs : true
0 commit comments