Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
K
kubernetes-infra-example
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Iterations
Wiki
Requirements
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Locked files
Build
Pipelines
Jobs
Pipeline schedules
Test cases
Artifacts
Deploy
Releases
Package registry
Container registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Code review analytics
Issue analytics
Insights
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
cloud
kubernetes
kubernetes-infra-example
Commits
5003e13c
Commit
5003e13c
authored
10 months ago
by
r0zehnal0vak
Browse files
Options
Downloads
Patches
Plain Diff
update ingress values to match chart version
parent
33bf754e
Branches
update-tasks
Branches containing commit
No related tags found
1 merge request
!17
add versions and values
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
ansible/01-playbook/roles/nginx_ingress/files/values.yaml
+69
-13
69 additions, 13 deletions
ansible/01-playbook/roles/nginx_ingress/files/values.yaml
with
69 additions
and
13 deletions
ansible/01-playbook/roles/nginx_ingress/files/values.yaml
+
69
−
13
View file @
5003e13c
...
...
@@ -26,9 +26,9 @@ controller:
## for backwards compatibility consider setting the full image url via the repository value below
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
## repository:
tag
:
"
v1.1
0.0
"
digest
:
sha256:
42b3f0e5d0846
87
6
b1
791cd3afeb5f1cbbe4259d6f35651dcc1b5c980925379c
digestChroot
:
sha256:
7eb46ff733429e0e46892903c7394aff149ac6d284d92b3946f3baf7ff26a096
tag
:
"
v1.1
1.2
"
digest
:
sha256:
d5f8217feeac48
87
c
b1
ed21f27c2674e58be06bd8f5184cacea2a69abaf78dce
digestChroot
:
sha256:
21b55a2f0213a18b91612a8c0850167e00a8e34391fd595139a708f9c047e7a8
pullPolicy
:
IfNotPresent
runAsNonRoot
:
true
# www-data -> uid 101
...
...
@@ -125,6 +125,8 @@ controller:
# Ingress creation gets rejected if there are multiple default IngressClasses.
# Ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#default-ingress-class
default
:
false
# -- Annotations to be added to the IngressClass resource.
annotations
:
{}
# -- Controller of the IngressClass. An Ingress Controller looks for IngressClasses it should reconcile by this value.
# This value is also being set as the `--controller-class` argument of this Ingress Controller.
# Ref: https://kubernetes.io/docs/concepts/services-networking/ingress/#ingress-class
...
...
@@ -258,11 +260,11 @@ controller:
# - key: app.kubernetes.io/name
# operator: In
# values:
# - ingress-nginx
# -
'{{ include "
ingress-nginx
.name" . }}'
# - key: app.kubernetes.io/instance
# operator: In
# values:
# -
ingress-nginx
# -
'{{ .Release.Name }}'
# - key: app.kubernetes.io/component
# operator: In
# values:
...
...
@@ -277,16 +279,16 @@ controller:
# - key: app.kubernetes.io/name
# operator: In
# values:
# - ingress-nginx
# -
'{{ include "
ingress-nginx
.name" . }}'
# - key: app.kubernetes.io/instance
# operator: In
# values:
# -
ingress-nginx
# -
'{{ .Release.Name }}'
# - key: app.kubernetes.io/component
# operator: In
# values:
# - controller
# topologyKey:
"
kubernetes.io/hostname
"
# topologyKey: kubernetes.io/hostname
# -- Topology spread constraints rely on node labels to identify the topology domain(s) that each Node is in.
## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
...
...
@@ -704,12 +706,12 @@ controller:
name
:
opentelemetry
image
:
registry
:
registry.k8s.io
image
:
ingress-nginx/opentelemetry
image
:
ingress-nginx/opentelemetry
-1.25.3
## for backwards compatibility consider setting the full image url via the repository value below
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
## repository:
tag
:
"
v202
30721-3e2062ee5"
digest
:
sha256:
13bee3f5223883d3ca62fee7309ad02d22ec00ff0d7033e3e9aca7a9f60fd47
2
tag
:
v202
40813-b933310d
digest
:
sha256:
f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f92
2
distroless
:
true
containerSecurityContext
:
runAsNonRoot
:
true
...
...
@@ -802,8 +804,8 @@ controller:
## for backwards compatibility consider setting the full image url via the repository value below
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
## repository:
tag
:
v1.4.
1
digest
:
sha256:
36d05b4077fb8e3d13663702fa337f124675ba8667cbd949c03a8e8ea6fa4366
tag
:
v1.4.
3
digest
:
sha256:
a320a50cc91bd15fd2d6fa6de58bd98c1bd64b9a6f926ce23a600d87043455a3
pullPolicy
:
IfNotPresent
# -- Provide a priority class name to the webhook patching job
##
...
...
@@ -820,6 +822,18 @@ controller:
labels
:
{}
# -- Security context for secret creation & webhook patch pods
securityContext
:
{}
# -- Admission webhook patch job RBAC
rbac
:
# -- Create RBAC or not
create
:
true
# -- Admission webhook patch job service account
serviceAccount
:
# -- Create a service account or not
create
:
true
# -- Custom service account name
name
:
"
"
# -- Auto-mount service account token or not
automountServiceAccountToken
:
true
# Use certmanager to generate webhook certs
certManager
:
enabled
:
false
...
...
@@ -997,7 +1011,49 @@ defaultBackend:
# value: "value"
# effect: "NoSchedule|PreferNoSchedule|NoExecute(1.6 only)"
# -- Affinity and anti-affinity rules for server scheduling to nodes
## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
affinity
:
{}
# # An example of preferred pod anti-affinity, weight is in the range 1-100
# podAntiAffinity:
# preferredDuringSchedulingIgnoredDuringExecution:
# - weight: 100
# podAffinityTerm:
# labelSelector:
# matchExpressions:
# - key: app.kubernetes.io/name
# operator: In
# values:
# - '{{ include "ingress-nginx.name" . }}'
# - key: app.kubernetes.io/instance
# operator: In
# values:
# - '{{ .Release.Name }}'
# - key: app.kubernetes.io/component
# operator: In
# values:
# - default-backend
# topologyKey: kubernetes.io/hostname
# # An example of required pod anti-affinity
# podAntiAffinity:
# requiredDuringSchedulingIgnoredDuringExecution:
# - labelSelector:
# matchExpressions:
# - key: app.kubernetes.io/name
# operator: In
# values:
# - '{{ include "ingress-nginx.name" . }}'
# - key: app.kubernetes.io/instance
# operator: In
# values:
# - '{{ .Release.Name }}'
# - key: app.kubernetes.io/component
# operator: In
# values:
# - default-backend
# topologyKey: kubernetes.io/hostname
# -- Topology spread constraints rely on node labels to identify the topology domain(s) that each Node is in.
# Ref.: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
topologySpreadConstraints
:
[]
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment