2017-05-12 14:32:37 +00:00
|
|
|
# Valid options: docker (default), rkt, or host
|
|
|
|
kubelet_deployment_type: docker
|
|
|
|
|
2016-10-24 13:11:52 +00:00
|
|
|
# change to 0.0.0.0 to enable insecure access from anywhere (not recommended)
|
|
|
|
kube_apiserver_insecure_bind_address: 127.0.0.1
|
|
|
|
|
2016-07-20 08:57:47 +00:00
|
|
|
# resolv.conf to base dns config
|
|
|
|
kube_resolv_conf: "/etc/resolv.conf"
|
|
|
|
|
2016-07-12 08:20:43 +00:00
|
|
|
kube_proxy_mode: iptables
|
2015-11-27 11:32:31 +00:00
|
|
|
|
2017-02-10 10:16:19 +00:00
|
|
|
# If using the pure iptables proxy, SNAT everything. Note that it breaks any
|
|
|
|
# policy engine.
|
|
|
|
kube_proxy_masquerade_all: false
|
2016-10-03 10:08:41 +00:00
|
|
|
|
2017-04-05 10:47:03 +00:00
|
|
|
# These options reflect limitations of running kubelet in a container.
|
|
|
|
# Modify at your own risk
|
|
|
|
kubelet_enable_cri: false
|
|
|
|
kubelet_cgroups_per_qos: false
|
|
|
|
# Set to empty to avoid cgroup creation
|
|
|
|
kubelet_enforce_node_allocatable: ""
|
|
|
|
|
|
|
|
|
2016-12-23 14:44:44 +00:00
|
|
|
# Limits for kube components and nginx load balancer app
|
|
|
|
kubelet_memory_limit: 512M
|
|
|
|
kubelet_cpu_limit: 100m
|
2017-02-07 14:01:02 +00:00
|
|
|
kubelet_status_update_frequency: 10s
|
2016-12-23 14:44:44 +00:00
|
|
|
kube_proxy_memory_limit: 2000M
|
|
|
|
kube_proxy_cpu_limit: 500m
|
2017-02-27 16:53:43 +00:00
|
|
|
kube_proxy_memory_requests: 64M
|
2016-12-23 14:44:44 +00:00
|
|
|
kube_proxy_cpu_requests: 150m
|
|
|
|
nginx_memory_limit: 512M
|
|
|
|
nginx_cpu_limit: 300m
|
2017-02-27 16:53:43 +00:00
|
|
|
nginx_memory_requests: 32M
|
2017-03-23 09:11:30 +00:00
|
|
|
nginx_cpu_requests: 25m
|
2016-12-23 14:44:44 +00:00
|
|
|
|
2016-03-17 09:22:52 +00:00
|
|
|
# kube_api_runtime_config:
|
|
|
|
# - extensions/v1beta1/daemonsets=true
|
|
|
|
# - extensions/v1beta1/deployments=true
|
2016-09-28 11:05:08 +00:00
|
|
|
|
|
|
|
nginx_image_repo: nginx
|
|
|
|
nginx_image_tag: 1.11.4-alpine
|
2017-01-10 04:54:01 +00:00
|
|
|
|
|
|
|
etcd_config_dir: /etc/ssl/etcd
|
2017-02-03 15:26:30 +00:00
|
|
|
|
|
|
|
# A port range to reserve for services with NodePort visibility.
|
|
|
|
# Inclusive at both ends of the range.
|
|
|
|
kube_apiserver_node_port_range: "30000-32767"
|
2017-02-09 16:25:44 +00:00
|
|
|
|
|
|
|
kubelet_load_modules: false
|
2017-04-14 21:33:04 +00:00
|
|
|
|
|
|
|
##Support custom flags to be passed to kubelet
|
2017-05-12 14:32:37 +00:00
|
|
|
kubelet_custom_flags: []
|