|
1 | 1 | # cilium
|
2 | 2 |
|
3 |
| -  |
| 3 | +  |
4 | 4 |
|
5 | 5 | Cilium is open source software for providing and transparently securing
|
6 | 6 | network connectivity and loadbalancing between application workloads such as
|
@@ -83,7 +83,7 @@ contributors across the globe, there is almost always someone available to help.
|
83 | 83 | | authentication.mutual.spire.install.agent.tolerations | list | `[{"effect":"NoSchedule","key":"node.kubernetes.io/not-ready"},{"effect":"NoSchedule","key":"node-role.kubernetes.io/master"},{"effect":"NoSchedule","key":"node-role.kubernetes.io/control-plane"},{"effect":"NoSchedule","key":"node.cloudprovider.kubernetes.io/uninitialized","value":"true"},{"key":"CriticalAddonsOnly","operator":"Exists"}]` | SPIRE agent tolerations configuration By default it follows the same tolerations as the agent itself to allow the Cilium agent on this node to connect to SPIRE. ref: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/ |
|
84 | 84 | | authentication.mutual.spire.install.enabled | bool | `true` | Enable SPIRE installation. This will only take effect only if authentication.mutual.spire.enabled is true |
|
85 | 85 | | authentication.mutual.spire.install.existingNamespace | bool | `false` | SPIRE namespace already exists. Set to true if Helm should not create, manage, and import the SPIRE namespace. |
|
86 |
| -| authentication.mutual.spire.install.initImage | object | `{"digest":"sha256:9ae97d36d26566ff84e8893c64a6dc4fe8ca6d1144bf5b87b2b85a32def253c7","override":null,"pullPolicy":"IfNotPresent","repository":"docker.io/library/busybox","tag":"1.36.1","useDigest":true}` | init container image of SPIRE agent and server | |
| 86 | +| authentication.mutual.spire.install.initImage | object | `{"digest":"sha256:d75b758a4fea99ffff4db799e16f853bbde8643671b5b72464a8ba94cbe3dbe3","override":null,"pullPolicy":"IfNotPresent","repository":"docker.io/library/busybox","tag":"1.36.1","useDigest":true}` | init container image of SPIRE agent and server | |
87 | 87 | | authentication.mutual.spire.install.namespace | string | `"cilium-spire"` | SPIRE namespace to install into |
|
88 | 88 | | authentication.mutual.spire.install.server.affinity | object | `{}` | SPIRE server affinity configuration |
|
89 | 89 | | authentication.mutual.spire.install.server.annotations | object | `{}` | SPIRE server annotations |
|
@@ -182,7 +182,7 @@ contributors across the globe, there is almost always someone available to help.
|
182 | 182 | | clustermesh.apiserver.extraVolumeMounts | list | `[]` | Additional clustermesh-apiserver volumeMounts. |
|
183 | 183 | | clustermesh.apiserver.extraVolumes | list | `[]` | Additional clustermesh-apiserver volumes. |
|
184 | 184 | | clustermesh.apiserver.healthPort | int | `9880` | TCP port for the clustermesh-apiserver health API. |
|
185 |
| -| clustermesh.apiserver.image | object | `{"digest":"","override":null,"pullPolicy":"IfNotPresent","repository":"vcr.vngcloud.vn/81-vks-public/cilium/clustermesh-apiserver","tag":"v1.16.1","useDigest":false}` | Clustermesh API server image. | |
| 185 | +| clustermesh.apiserver.image | object | `{"digest":"","override":null,"pullPolicy":"IfNotPresent","repository":"vcr.vngcloud.vn/81-vks-public/cilium/clustermesh-apiserver","tag":"v1.16.5","useDigest":false}` | Clustermesh API server image. | |
186 | 186 | | clustermesh.apiserver.kvstoremesh.enabled | bool | `true` | Enable KVStoreMesh. KVStoreMesh caches the information retrieved from the remote clusters in the local etcd instance. |
|
187 | 187 | | clustermesh.apiserver.kvstoremesh.extraArgs | list | `[]` | Additional KVStoreMesh arguments. |
|
188 | 188 | | clustermesh.apiserver.kvstoremesh.extraEnv | list | `[]` | Additional KVStoreMesh environment variables. |
|
@@ -353,7 +353,8 @@ contributors across the globe, there is almost always someone available to help.
|
353 | 353 | | envoy.extraVolumes | list | `[]` | Additional envoy volumes. |
|
354 | 354 | | envoy.healthPort | int | `9878` | TCP port for the health API. |
|
355 | 355 | | envoy.idleTimeoutDurationSeconds | int | `60` | Set Envoy upstream HTTP idle connection timeout seconds. Does not apply to connections with pending requests. Default 60s |
|
356 |
| -| envoy.image | object | `{"digest":"sha256:bd5ff8c66716080028f414ec1cb4f7dc66f40d2fb5a009fff187f4a9b90b566b","override":null,"pullPolicy":"IfNotPresent","repository":"vcr.vngcloud.vn/81-vks-public/cilium/cilium-envoy","tag":"v1.29.7-39a2a56bbd5b3a591f69dbca51d3e30ef97e0e51","useDigest":true}` | Envoy container image. | |
| 356 | +| envoy.image | object | `{"digest":"sha256:709c08ade3d17d52da4ca2af33f431360ec26268d288d9a6cd1d98acc9a1dced","override":null,"pullPolicy":"IfNotPresent","repository":"vcr.vngcloud.vn/81-vks-public/cilium/cilium-envoy","tag":"v1.30.8-1733837904-eaae5aca0fb988583e5617170a65ac5aa51c0aa8","useDigest":true}` | Envoy container image. | |
| 357 | +| envoy.initialFetchTimeoutSeconds | int | `30` | Time in seconds after which the initial fetch on an xDS stream is considered timed out | |
357 | 358 | | envoy.livenessProbe.failureThreshold | int | `10` | failure threshold of liveness probe |
|
358 | 359 | | envoy.livenessProbe.periodSeconds | int | `30` | interval between checks of the liveness probe |
|
359 | 360 | | envoy.log.format | string | `"[%Y-%m-%d %T.%e][%t][%l][%n] [%g:%#] %v"` | The format string to use for laying out the log message metadata of Envoy. |
|
@@ -484,7 +485,7 @@ contributors across the globe, there is almost always someone available to help.
|
484 | 485 | | hubble.relay.extraVolumes | list | `[]` | Additional hubble-relay volumes. |
|
485 | 486 | | hubble.relay.gops.enabled | bool | `true` | Enable gops for hubble-relay |
|
486 | 487 | | hubble.relay.gops.port | int | `9893` | Configure gops listen port for hubble-relay |
|
487 |
| -| hubble.relay.image | object | `{"digest":"","override":null,"pullPolicy":"IfNotPresent","repository":"vcr.vngcloud.vn/81-vks-public/cilium/hubble-relay","tag":"v1.16.1","useDigest":false}` | Hubble-relay container image. | |
| 488 | +| hubble.relay.image | object | `{"digest":"","override":null,"pullPolicy":"IfNotPresent","repository":"vcr.vngcloud.vn/81-vks-public/cilium/hubble-relay","tag":"v1.16.5","useDigest":false}` | Hubble-relay container image. | |
488 | 489 | | hubble.relay.listenHost | string | `""` | Host to listen to. Specify an empty string to bind to all the interfaces. |
|
489 | 490 | | hubble.relay.listenPort | string | `"4245"` | Port to listen to. |
|
490 | 491 | | hubble.relay.nodeSelector | object | `{"kubernetes.io/os":"linux"}` | Node labels for pod assignment ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#nodeselector |
|
@@ -532,10 +533,10 @@ contributors across the globe, there is almost always someone available to help.
|
532 | 533 | | hubble.relay.updateStrategy | object | `{"rollingUpdate":{"maxUnavailable":1},"type":"RollingUpdate"}` | hubble-relay update strategy |
|
533 | 534 | | hubble.skipUnknownCGroupIDs | bool | `true` | Skip Hubble events with unknown cgroup ids |
|
534 | 535 | | hubble.socketPath | string | `"/var/run/cilium/hubble.sock"` | Unix domain socket path to listen to when Hubble is enabled. |
|
535 |
| -| hubble.tls | object | `{"auto":{"certManagerIssuerRef":{},"certValidityDuration":1095,"enabled":true,"method":"helm","schedule":"0 0 1 */4 *"},"enabled":true,"server":{"cert":"","existingSecret":"","extraDnsNames":[],"extraIpAddresses":[],"key":""}}` | TLS configuration for Hubble | |
536 |
| -| hubble.tls.auto | object | `{"certManagerIssuerRef":{},"certValidityDuration":1095,"enabled":true,"method":"helm","schedule":"0 0 1 */4 *"}` | Configure automatic TLS certificates generation. | |
| 536 | +| hubble.tls | object | `{"auto":{"certManagerIssuerRef":{},"certValidityDuration":365,"enabled":true,"method":"helm","schedule":"0 0 1 */4 *"},"enabled":true,"server":{"cert":"","existingSecret":"","extraDnsNames":[],"extraIpAddresses":[],"key":""}}` | TLS configuration for Hubble | |
| 537 | +| hubble.tls.auto | object | `{"certManagerIssuerRef":{},"certValidityDuration":365,"enabled":true,"method":"helm","schedule":"0 0 1 */4 *"}` | Configure automatic TLS certificates generation. | |
537 | 538 | | hubble.tls.auto.certManagerIssuerRef | object | `{}` | certmanager issuer used when hubble.tls.auto.method=certmanager. |
|
538 |
| -| hubble.tls.auto.certValidityDuration | int | `1095` | Generated certificates validity duration in days. | |
| 539 | +| hubble.tls.auto.certValidityDuration | int | `365` | Generated certificates validity duration in days. Defaults to 365 days (1 year) because MacOS does not accept self-signed certificates with expirations > 825 days. | |
539 | 540 | | hubble.tls.auto.enabled | bool | `true` | Auto-generate certificates. When set to true, automatically generate a CA and certificates to enable mTLS between Hubble server and Hubble Relay instances. If set to false, the certs for Hubble server need to be provided by setting appropriate values below. |
|
540 | 541 | | hubble.tls.auto.method | string | `"helm"` | Set the method to auto-generate certificates. Supported values: - helm: This method uses Helm to generate all certificates. - cronJob: This method uses a Kubernetes CronJob the generate any certificates not provided by the user at installation time. - certmanager: This method use cert-manager to generate & rotate certificates. |
|
541 | 542 | | hubble.tls.auto.schedule | string | `"0 0 1 */4 *"` | Schedule for certificates regeneration (regardless of their expiration date). Only used if method is "cronJob". If nil, then no recurring job will be created. Instead, only the one-shot job is deployed to generate the certificates at installation time. Defaults to midnight of the first day of every fourth month. For syntax, see https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/#schedule-syntax |
|
@@ -590,7 +591,7 @@ contributors across the globe, there is almost always someone available to help.
|
590 | 591 | | hubble.ui.updateStrategy | object | `{"rollingUpdate":{"maxUnavailable":1},"type":"RollingUpdate"}` | hubble-ui update strategy. |
|
591 | 592 | | identityAllocationMode | string | `"crd"` | Method to use for identity allocation (`crd` or `kvstore`). |
|
592 | 593 | | identityChangeGracePeriod | string | `"5s"` | Time to wait before using new identity on endpoint identity change. |
|
593 |
| -| image | object | `{"digest":"","override":null,"pullPolicy":"IfNotPresent","repository":"vcr.vngcloud.vn/81-vks-public/cilium/cilium","tag":"v1.16.1","useDigest":false}` | Agent container image. | |
| 594 | +| image | object | `{"digest":"","override":null,"pullPolicy":"IfNotPresent","repository":"vcr.vngcloud.vn/81-vks-public/cilium/cilium","tag":"v1.16.5","useDigest":false}` | Agent container image. | |
594 | 595 | | imagePullSecrets | list | `[]` | Configure image pull secrets for pulling container images |
|
595 | 596 | | ingressController.default | bool | `false` | Set cilium ingress controller to be the default ingress controller This will let cilium ingress controller route entries without ingress class set |
|
596 | 597 | | ingressController.defaultSecretName | string | `nil` | Default secret name for ingresses without .spec.tls[].secretName set. |
|
@@ -717,7 +718,7 @@ contributors across the globe, there is almost always someone available to help.
|
717 | 718 | | operator.hostNetwork | bool | `true` | HostNetwork setting |
|
718 | 719 | | operator.identityGCInterval | string | `"15m0s"` | Interval for identity garbage collection. |
|
719 | 720 | | operator.identityHeartbeatTimeout | string | `"30m0s"` | Timeout for identity heartbeats. |
|
720 |
| -| operator.image | object | `{"alibabacloudDigest":"","awsDigest":"","azureDigest":"","genericDigest":"","override":null,"pullPolicy":"IfNotPresent","repository":"vcr.vngcloud.vn/81-vks-public/cilium/operator","suffix":"","tag":"v1.16.1","useDigest":false}` | cilium-operator image. | |
| 721 | +| operator.image | object | `{"alibabacloudDigest":"","awsDigest":"","azureDigest":"","genericDigest":"","override":null,"pullPolicy":"IfNotPresent","repository":"vcr.vngcloud.vn/81-vks-public/cilium/operator","suffix":"","tag":"v1.16.5","useDigest":false}` | cilium-operator image. | |
721 | 722 | | operator.nodeGCInterval | string | `"5m0s"` | Interval for cilium node garbage collection. |
|
722 | 723 | | operator.nodeSelector | object | `{"kubernetes.io/os":"linux"}` | Node labels for cilium-operator pod assignment ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#nodeselector |
|
723 | 724 | | operator.podAnnotations | object | `{}` | Annotations to be added to cilium-operator pods |
|
@@ -767,7 +768,7 @@ contributors across the globe, there is almost always someone available to help.
|
767 | 768 | | preflight.extraEnv | list | `[]` | Additional preflight environment variables. |
|
768 | 769 | | preflight.extraVolumeMounts | list | `[]` | Additional preflight volumeMounts. |
|
769 | 770 | | preflight.extraVolumes | list | `[]` | Additional preflight volumes. |
|
770 |
| -| preflight.image | object | `{"digest":"","override":null,"pullPolicy":"IfNotPresent","repository":"vcr.vngcloud.vn/81-vks-public/cilium/cilium","tag":"v1.16.1","useDigest":false}` | Cilium pre-flight image. | |
| 771 | +| preflight.image | object | `{"digest":"","override":null,"pullPolicy":"IfNotPresent","repository":"vcr.vngcloud.vn/81-vks-public/cilium/cilium","tag":"v1.16.5","useDigest":false}` | Cilium pre-flight image. | |
771 | 772 | | preflight.nodeSelector | object | `{"kubernetes.io/os":"linux"}` | Node labels for preflight pod assignment ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#nodeselector |
|
772 | 773 | | preflight.podAnnotations | object | `{}` | Annotations to be added to preflight pods |
|
773 | 774 | | preflight.podDisruptionBudget.enabled | bool | `false` | enable PodDisruptionBudget ref: https://kubernetes.io/docs/concepts/workloads/pods/disruptions/ |
|
@@ -816,7 +817,7 @@ contributors across the globe, there is almost always someone available to help.
|
816 | 817 | | serviceAccounts.clustermeshcertgen | object | `{"annotations":{},"automount":true,"create":true,"name":"clustermesh-apiserver-generate-certs"}` | Clustermeshcertgen is used if clustermesh.apiserver.tls.auto.method=cronJob |
|
817 | 818 | | serviceAccounts.hubblecertgen | object | `{"annotations":{},"automount":true,"create":true,"name":"hubble-generate-certs"}` | Hubblecertgen is used if hubble.tls.auto.method=cronJob |
|
818 | 819 | | serviceAccounts.nodeinit.enabled | bool | `false` | Enabled is temporary until https://github.com/cilium/cilium-cli/issues/1396 is implemented. Cilium CLI doesn't create the SAs for node-init, thus the workaround. Helm is not affected by this issue. Name and automount can be configured, if enabled is set to true. Otherwise, they are ignored. Enabled can be removed once the issue is fixed. Cilium-nodeinit DS must also be fixed. |
|
819 |
| -| serviceNoBackendResponse | string | `"reject"` | Configure what the response should be to traffic for a service without backends. "reject" only works on kernels >= 5.10, on lower kernels we fallback to "drop". Possible values: - reject (default) - drop | |
| 820 | +| serviceNoBackendResponse | string | `"reject"` | Configure what the response should be to traffic for a service without backends. Possible values: - reject (default) - drop | |
820 | 821 | | sleepAfterInit | bool | `false` | Do not run Cilium agent when running with clean mode. Useful to completely uninstall Cilium as it will stop Cilium from starting and create artifacts in the node. |
|
821 | 822 | | socketLB | object | `{"enabled":false}` | Configure socket LB |
|
822 | 823 | | socketLB.enabled | bool | `false` | Enable socket LB |
|
|
0 commit comments