2019-04-01 09:38:33 +00:00
|
|
|
---
|
2017-02-24 09:54:25 +00:00
|
|
|
# Kubernetes configuration dirs and system namespace.
|
|
|
|
# Those are where all the additional config stuff goes
|
2018-04-05 22:54:58 +00:00
|
|
|
# the kubernetes normally puts in /srv/kubernetes.
|
2022-03-02 19:57:13 +00:00
|
|
|
# This puts them in a sane location and namespace.
|
2018-04-05 22:54:58 +00:00
|
|
|
# Editing those values will almost surely break something.
|
2017-02-24 09:54:25 +00:00
|
|
|
kube_config_dir: /etc/kubernetes
|
|
|
|
kube_script_dir: "{{ bin_dir }}/kubernetes-scripts"
|
|
|
|
kube_manifest_dir: "{{ kube_config_dir }}/manifests"
|
|
|
|
|
|
|
|
# This is where all the cert scripts and certs will be located
|
2019-03-20 12:56:57 +00:00
|
|
|
kube_cert_dir: "{{ kube_config_dir }}/ssl"
|
2017-02-24 09:54:25 +00:00
|
|
|
|
|
|
|
# This is where all of the bearer tokens will be stored
|
|
|
|
kube_token_dir: "{{ kube_config_dir }}/tokens"
|
|
|
|
|
2017-11-06 20:01:10 +00:00
|
|
|
kube_api_anonymous_auth: true
|
2017-02-24 09:54:25 +00:00
|
|
|
|
|
|
|
## Change this to use another Kubernetes version, e.g. a current beta release
|
2022-02-18 15:09:28 +00:00
|
|
|
kube_version: v1.23.4
|
2017-02-24 09:54:25 +00:00
|
|
|
|
|
|
|
# Where the binaries will be downloaded.
|
|
|
|
# Note: ensure that you've enough disk space (about 1G)
|
|
|
|
local_release_dir: "/tmp/releases"
|
|
|
|
# Random shifts for retrying failed ops like pushing/downloading
|
|
|
|
retry_stagger: 5
|
|
|
|
|
|
|
|
# This is the group that the cert creation scripts chgrp the
|
2018-04-05 22:54:58 +00:00
|
|
|
# cert files to. Not really changeable...
|
2017-02-24 09:54:25 +00:00
|
|
|
kube_cert_group: kube-cert
|
|
|
|
|
|
|
|
# Cluster Loglevel configuration
|
|
|
|
kube_log_level: 2
|
|
|
|
|
2018-09-03 16:04:50 +00:00
|
|
|
# Directory where credentials will be stored
|
|
|
|
credentials_dir: "{{ inventory_dir }}/credentials"
|
|
|
|
|
2020-09-11 07:30:14 +00:00
|
|
|
## It is possible to activate / deactivate selected authentication methods (oidc, static token auth)
|
2019-04-01 09:38:33 +00:00
|
|
|
# kube_oidc_auth: false
|
|
|
|
# kube_token_auth: false
|
2017-02-27 13:15:50 +00:00
|
|
|
|
|
|
|
|
2017-02-27 12:24:21 +00:00
|
|
|
## Variables for OpenID Connect Configuration https://kubernetes.io/docs/admin/authentication/
|
|
|
|
## To use OpenID you have to deploy additional an OpenID Provider (e.g Dex, Keycloak, ...)
|
2017-02-27 13:15:50 +00:00
|
|
|
|
2017-02-27 12:24:21 +00:00
|
|
|
# kube_oidc_url: https:// ...
|
|
|
|
# kube_oidc_client_id: kubernetes
|
|
|
|
## Optional settings for OIDC
|
2018-09-26 06:35:35 +00:00
|
|
|
# kube_oidc_ca_file: "{{ kube_cert_dir }}/ca.pem"
|
2017-02-27 12:24:21 +00:00
|
|
|
# kube_oidc_username_claim: sub
|
2021-04-21 00:32:10 +00:00
|
|
|
# kube_oidc_username_prefix: 'oidc:'
|
2017-02-27 12:24:21 +00:00
|
|
|
# kube_oidc_groups_claim: groups
|
2021-04-21 00:32:10 +00:00
|
|
|
# kube_oidc_groups_prefix: 'oidc:'
|
2017-02-27 12:24:21 +00:00
|
|
|
|
2020-08-24 13:29:41 +00:00
|
|
|
## Variables to control webhook authn/authz
|
|
|
|
# kube_webhook_token_auth: false
|
|
|
|
# kube_webhook_token_auth_url: https://...
|
|
|
|
# kube_webhook_token_auth_url_skip_tls_verify: false
|
|
|
|
|
|
|
|
## For webhook authorization, authorization_modes must include Webhook
|
|
|
|
# kube_webhook_authorization: false
|
|
|
|
# kube_webhook_authorization_url: https://...
|
|
|
|
# kube_webhook_authorization_url_skip_tls_verify: false
|
2017-02-27 12:24:21 +00:00
|
|
|
|
2020-11-30 14:48:50 +00:00
|
|
|
# Choose network plugin (cilium, calico, weave or flannel. Use cni for generic cni plugin)
|
2017-02-24 09:54:25 +00:00
|
|
|
# Can also be set to 'cloud', which lets the cloud provider setup appropriate routing
|
|
|
|
kube_network_plugin: calico
|
|
|
|
|
2019-02-01 07:48:13 +00:00
|
|
|
# Setting multi_networking to true will install Multus: https://github.com/intel/multus-cni
|
|
|
|
kube_network_plugin_multus: false
|
|
|
|
|
2017-02-24 09:54:25 +00:00
|
|
|
# Kubernetes internal network for services, unused block of space.
|
|
|
|
kube_service_addresses: 10.233.0.0/18
|
|
|
|
|
|
|
|
# internal network. When used, it will assign IP
|
|
|
|
# addresses from this range to individual pods.
|
|
|
|
# This network must be unused in your network infrastructure!
|
|
|
|
kube_pods_subnet: 10.233.64.0/18
|
|
|
|
|
|
|
|
# internal network node size allocation (optional). This is the size allocated
|
2020-09-10 10:49:44 +00:00
|
|
|
# to each node for pod IP address allocation. Note that the number of pods per node is
|
|
|
|
# also limited by the kubelet_max_pods variable which defaults to 110.
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
# Up to 64 nodes and up to 254 or kubelet_max_pods (the lowest of the two) pods per node:
|
|
|
|
# - kube_pods_subnet: 10.233.64.0/18
|
|
|
|
# - kube_network_node_prefix: 24
|
|
|
|
# - kubelet_max_pods: 110
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
# Up to 128 nodes and up to 126 or kubelet_max_pods (the lowest of the two) pods per node:
|
|
|
|
# - kube_pods_subnet: 10.233.64.0/18
|
|
|
|
# - kube_network_node_prefix: 25
|
|
|
|
# - kubelet_max_pods: 110
|
2017-02-24 09:54:25 +00:00
|
|
|
kube_network_node_prefix: 24
|
|
|
|
|
2020-10-26 07:10:53 +00:00
|
|
|
# Configure Dual Stack networking (i.e. both IPv4 and IPv6)
|
|
|
|
enable_dual_stack_networks: false
|
|
|
|
|
|
|
|
# Kubernetes internal network for IPv6 services, unused block of space.
|
|
|
|
# This is only used if enable_dual_stack_networks is set to true
|
|
|
|
# This provides 4096 IPv6 IPs
|
|
|
|
kube_service_addresses_ipv6: fd85:ee78:d8a6:8607::1000/116
|
|
|
|
|
|
|
|
# Internal network. When used, it will assign IPv6 addresses from this range to individual pods.
|
|
|
|
# This network must not already be in your network infrastructure!
|
|
|
|
# This is only used if enable_dual_stack_networks is set to true.
|
|
|
|
# This provides room for 256 nodes with 254 pods per node.
|
|
|
|
kube_pods_subnet_ipv6: fd85:ee78:d8a6:8607::1:0000/112
|
|
|
|
|
|
|
|
# IPv6 subnet size allocated to each for pods.
|
|
|
|
# This is only used if enable_dual_stack_networks is set to true
|
|
|
|
# This provides room for 254 pods per node.
|
|
|
|
kube_network_node_prefix_ipv6: 120
|
|
|
|
|
2017-02-24 09:54:25 +00:00
|
|
|
# The port the API Server will be listening on.
|
|
|
|
kube_apiserver_ip: "{{ kube_service_addresses|ipaddr('net')|ipaddr(1)|ipaddr('address') }}"
|
2019-04-01 09:38:33 +00:00
|
|
|
kube_apiserver_port: 6443 # (https)
|
|
|
|
# kube_apiserver_insecure_port: 8080 # (http)
|
2017-11-06 20:01:10 +00:00
|
|
|
# Set to 0 to disable insecure port - Requires RBAC in authorization_modes and kube_api_anonymous_auth: true
|
2019-04-01 09:38:33 +00:00
|
|
|
kube_apiserver_insecure_port: 0 # (disabled)
|
2017-02-24 09:54:25 +00:00
|
|
|
|
2018-01-29 05:15:32 +00:00
|
|
|
# Kube-proxy proxyMode configuration.
|
|
|
|
# Can be ipvs, iptables
|
2018-11-26 23:36:39 +00:00
|
|
|
kube_proxy_mode: ipvs
|
2018-03-13 11:00:05 +00:00
|
|
|
|
2019-09-26 11:21:06 +00:00
|
|
|
# configure arp_ignore and arp_announce to avoid answering ARP queries from kube-ipvs0 interface
|
|
|
|
# must be set to true for MetalLB to work
|
|
|
|
kube_proxy_strict_arp: false
|
|
|
|
|
2019-01-03 08:04:26 +00:00
|
|
|
# A string slice of values which specify the addresses to use for NodePorts.
|
|
|
|
# Values may be valid IP blocks (e.g. 1.2.3.0/24, 1.2.3.4/32).
|
|
|
|
# The default empty string slice ([]) means to use all local addresses.
|
|
|
|
# kube_proxy_nodeport_addresses_cidr is retained for legacy config
|
|
|
|
kube_proxy_nodeport_addresses: >-
|
|
|
|
{%- if kube_proxy_nodeport_addresses_cidr is defined -%}
|
|
|
|
[{{ kube_proxy_nodeport_addresses_cidr }}]
|
|
|
|
{%- else -%}
|
|
|
|
[]
|
|
|
|
{%- endif -%}
|
2018-08-22 13:32:07 +00:00
|
|
|
|
2019-02-07 06:20:11 +00:00
|
|
|
# If non-empty, will use this string as identification instead of the actual hostname
|
2019-04-01 09:38:33 +00:00
|
|
|
# kube_override_hostname: >-
|
|
|
|
# {%- if cloud_provider is defined and cloud_provider in [ 'aws' ] -%}
|
|
|
|
# {%- else -%}
|
|
|
|
# {{ inventory_hostname }}
|
|
|
|
# {%- endif -%}
|
2019-02-07 06:20:11 +00:00
|
|
|
|
2022-02-23 11:04:18 +00:00
|
|
|
## Encrypting Secret Data at Rest
|
2018-03-13 11:00:05 +00:00
|
|
|
kube_encrypt_secret_data: false
|
2018-01-29 05:15:32 +00:00
|
|
|
|
2021-06-28 06:53:25 +00:00
|
|
|
# Graceful Node Shutdown (Kubernetes >= 1.21.0), see https://kubernetes.io/blog/2021/04/21/graceful-node-shutdown-beta/
|
2021-09-22 01:34:00 +00:00
|
|
|
# kubelet_shutdown_grace_period had to be greater than kubelet_shutdown_grace_period_critical_pods to allow
|
|
|
|
# non-critical podsa to also terminate gracefully
|
2021-06-28 06:53:25 +00:00
|
|
|
# kubelet_shutdown_grace_period: 60s
|
|
|
|
# kubelet_shutdown_grace_period_critical_pods: 20s
|
|
|
|
|
2017-02-24 09:54:25 +00:00
|
|
|
# DNS configuration.
|
|
|
|
# Kubernetes cluster name, also will be used as DNS domain
|
|
|
|
cluster_name: cluster.local
|
|
|
|
# Subdomains of DNS domain to be resolved via /etc/resolv.conf for hostnet pods
|
|
|
|
ndots: 2
|
2019-04-01 19:32:34 +00:00
|
|
|
# Can be coredns, coredns_dual, manual or none
|
2018-11-26 23:36:39 +00:00
|
|
|
dns_mode: coredns
|
2018-01-23 13:28:42 +00:00
|
|
|
# Set manual server if using a custom cluster DNS server
|
2019-04-01 09:38:33 +00:00
|
|
|
# manual_dns_server: 10.x.x.x
|
2018-12-11 01:28:03 +00:00
|
|
|
# Enable nodelocal dns cache
|
2019-04-11 07:24:08 +00:00
|
|
|
enable_nodelocaldns: true
|
2021-11-09 17:57:47 +00:00
|
|
|
enable_nodelocaldns_secondary: false
|
2019-01-29 07:39:27 +00:00
|
|
|
nodelocaldns_ip: 169.254.25.10
|
2019-07-09 07:52:01 +00:00
|
|
|
nodelocaldns_health_port: 9254
|
2021-11-09 17:57:47 +00:00
|
|
|
nodelocaldns_second_health_port: 9256
|
2021-06-29 12:28:41 +00:00
|
|
|
nodelocaldns_bind_metrics_host_ip: false
|
2021-11-09 17:57:47 +00:00
|
|
|
nodelocaldns_secondary_skew_seconds: 5
|
2020-03-14 13:26:34 +00:00
|
|
|
# nodelocaldns_external_zones:
|
|
|
|
# - zones:
|
|
|
|
# - example.com
|
|
|
|
# - example.io:1053
|
|
|
|
# nameservers:
|
|
|
|
# - 1.1.1.1
|
|
|
|
# - 2.2.2.2
|
|
|
|
# cache: 5
|
|
|
|
# - zones:
|
|
|
|
# - https://mycompany.local:4453
|
|
|
|
# nameservers:
|
|
|
|
# - 192.168.0.53
|
|
|
|
# cache: 0
|
2019-07-16 07:53:23 +00:00
|
|
|
# Enable k8s_external plugin for CoreDNS
|
|
|
|
enable_coredns_k8s_external: false
|
|
|
|
coredns_k8s_external_zone: k8s_external.local
|
2019-07-31 18:26:15 +00:00
|
|
|
# Enable endpoint_pod_names option for kubernetes plugin
|
|
|
|
enable_coredns_k8s_endpoint_pod_names: false
|
2018-01-23 13:28:42 +00:00
|
|
|
|
2017-02-24 09:54:25 +00:00
|
|
|
# Can be docker_dns, host_resolvconf or none
|
2021-12-09 22:09:06 +00:00
|
|
|
resolvconf_mode: host_resolvconf
|
2017-02-24 09:54:25 +00:00
|
|
|
# Deploy netchecker app to verify DNS resolve as an HTTP service
|
|
|
|
deploy_netchecker: false
|
|
|
|
# Ip address of the kubernetes skydns service
|
|
|
|
skydns_server: "{{ kube_service_addresses|ipaddr('net')|ipaddr(3)|ipaddr('address') }}"
|
2018-03-13 11:00:05 +00:00
|
|
|
skydns_server_secondary: "{{ kube_service_addresses|ipaddr('net')|ipaddr(4)|ipaddr('address') }}"
|
2017-02-24 09:54:25 +00:00
|
|
|
dns_domain: "{{ cluster_name }}"
|
|
|
|
|
2018-08-31 14:05:45 +00:00
|
|
|
## Container runtime
|
2019-06-29 21:09:20 +00:00
|
|
|
## docker for docker, crio for cri-o and containerd for containerd.
|
2021-11-25 14:54:33 +00:00
|
|
|
## Default: containerd
|
|
|
|
container_manager: containerd
|
2018-07-30 22:56:21 +00:00
|
|
|
|
2020-06-22 07:28:39 +00:00
|
|
|
# Additional container runtimes
|
|
|
|
kata_containers_enabled: false
|
|
|
|
|
2019-04-19 13:01:54 +00:00
|
|
|
kubeadm_certificate_key: "{{ lookup('password', credentials_dir + '/kubeadm_certificate_key.creds length=64 chars=hexdigits') | lower }}"
|
|
|
|
|
2017-02-24 09:54:25 +00:00
|
|
|
# K8s image pull policy (imagePullPolicy)
|
|
|
|
k8s_image_pull_policy: IfNotPresent
|
|
|
|
|
2018-08-15 08:41:13 +00:00
|
|
|
# audit log for kubernetes
|
|
|
|
kubernetes_audit: false
|
|
|
|
|
2018-09-16 17:40:20 +00:00
|
|
|
# dynamic kubelet configuration
|
2021-09-07 17:47:16 +00:00
|
|
|
# Note: Feature DynamicKubeletConfig is deprecated in 1.22 and will not move to GA.
|
|
|
|
# It is planned to be removed from Kubernetes in the version 1.23.
|
|
|
|
# Please use alternative ways to update kubelet configuration.
|
2018-09-16 17:40:20 +00:00
|
|
|
dynamic_kubelet_configuration: false
|
|
|
|
|
|
|
|
# define kubelet config dir for dynamic kubelet
|
2019-04-01 09:38:33 +00:00
|
|
|
# kubelet_config_dir:
|
2018-09-16 17:40:20 +00:00
|
|
|
default_kubelet_config_dir: "{{ kube_config_dir }}/dynamic_kubelet_dir"
|
|
|
|
dynamic_kubelet_configuration_dir: "{{ kubelet_config_dir | default(default_kubelet_config_dir) }}"
|
|
|
|
|
2018-08-22 16:16:13 +00:00
|
|
|
# pod security policy (RBAC must be enabled either by having 'RBAC' in authorization_modes or kubeadm enabled)
|
|
|
|
podsecuritypolicy_enabled: false
|
|
|
|
|
2020-04-15 10:18:02 +00:00
|
|
|
# Custom PodSecurityPolicySpec for restricted policy
|
|
|
|
# podsecuritypolicy_restricted_spec: {}
|
|
|
|
|
|
|
|
# Custom PodSecurityPolicySpec for privileged policy
|
|
|
|
# podsecuritypolicy_privileged_spec: {}
|
|
|
|
|
2018-02-16 12:53:35 +00:00
|
|
|
# Make a copy of kubeconfig on the host that runs Ansible in {{ inventory_dir }}/artifacts
|
2017-09-18 12:30:57 +00:00
|
|
|
# kubeconfig_localhost: false
|
2018-02-16 12:53:35 +00:00
|
|
|
# Download kubectl onto the host that runs Ansible in {{ bin_dir }}
|
2017-09-18 12:30:57 +00:00
|
|
|
# kubectl_localhost: false
|
|
|
|
|
2017-07-19 14:57:36 +00:00
|
|
|
# A comma separated list of levels of node allocatable enforcement to be enforced by kubelet.
|
2018-01-17 15:42:27 +00:00
|
|
|
# Acceptable options are 'pods', 'system-reserved', 'kube-reserved' and ''. Default is "".
|
2017-07-19 14:57:36 +00:00
|
|
|
# kubelet_enforce_node_allocatable: pods
|
2017-10-17 10:06:07 +00:00
|
|
|
|
2019-07-31 18:24:15 +00:00
|
|
|
## Optionally reserve resources for OS system daemons.
|
|
|
|
# system_reserved: true
|
|
|
|
## Uncomment to override default values
|
2020-09-22 22:20:09 +00:00
|
|
|
# system_memory_reserved: 512Mi
|
2019-07-31 18:24:15 +00:00
|
|
|
# system_cpu_reserved: 500m
|
|
|
|
## Reservation for master hosts
|
2020-09-22 22:20:09 +00:00
|
|
|
# system_master_memory_reserved: 256Mi
|
2019-07-31 18:24:15 +00:00
|
|
|
# system_master_cpu_reserved: 250m
|
|
|
|
|
2022-01-24 08:13:57 +00:00
|
|
|
## Eviction Thresholds to avoid system OOMs
|
|
|
|
# https://kubernetes.io/docs/tasks/administer-cluster/reserve-compute-resources/#eviction-thresholds
|
|
|
|
# eviction_hard: {}
|
|
|
|
# eviction_hard_control_plane: {}
|
|
|
|
|
2019-07-30 19:00:10 +00:00
|
|
|
# An alternative flexvolume plugin directory
|
|
|
|
# kubelet_flexvolumes_plugins_dir: /usr/libexec/kubernetes/kubelet-plugins/volume/exec
|
|
|
|
|
2017-10-17 10:06:07 +00:00
|
|
|
## Supplementary addresses that can be added in kubernetes ssl keys.
|
2018-01-17 15:42:27 +00:00
|
|
|
## That can be useful for example to setup a keepalived virtual IP
|
2017-10-17 10:06:07 +00:00
|
|
|
# supplementary_addresses_in_ssl_keys: [10.0.0.1, 10.0.0.2, 10.0.0.3]
|
2018-01-18 10:55:23 +00:00
|
|
|
|
|
|
|
## Running on top of openstack vms with cinder enabled may lead to unschedulable pods due to NoVolumeZoneConflict restriction in kube-scheduler.
|
2018-11-28 08:15:25 +00:00
|
|
|
## See https://github.com/kubernetes-sigs/kubespray/issues/2141
|
2018-01-18 10:55:23 +00:00
|
|
|
## Set this variable to true to get rid of this issue
|
2018-01-23 13:14:00 +00:00
|
|
|
volume_cross_zone_attachment: false
|
2020-04-01 07:53:27 +00:00
|
|
|
## Add Persistent Volumes Storage Class for corresponding cloud provider (supported: in-tree OpenStack, Cinder CSI,
|
|
|
|
## AWS EBS CSI, Azure Disk CSI, GCP Persistent Disk CSI)
|
2018-08-31 14:05:45 +00:00
|
|
|
persistent_volumes_enabled: false
|
2018-09-13 09:52:09 +00:00
|
|
|
|
|
|
|
## Container Engine Acceleration
|
2018-11-05 23:22:16 +00:00
|
|
|
## Enable container acceleration feature, for example use gpu acceleration in containers
|
2018-09-13 09:52:09 +00:00
|
|
|
# nvidia_accelerator_enabled: true
|
|
|
|
## Nvidia GPU driver install. Install will by done by a (init) pod running as a daemonset.
|
|
|
|
## Important: if you use Ubuntu then you should set in all.yml 'docker_storage_options: -s overlay2'
|
2019-09-25 11:04:00 +00:00
|
|
|
## Array with nvida_gpu_nodes, leave empty or comment if you don't want to install drivers.
|
2018-09-13 09:52:09 +00:00
|
|
|
## Labels and taints won't be set to nodes if they are not in the array.
|
|
|
|
# nvidia_gpu_nodes:
|
|
|
|
# - kube-gpu-001
|
|
|
|
# nvidia_driver_version: "384.111"
|
|
|
|
## flavor can be tesla or gtx
|
|
|
|
# nvidia_gpu_flavor: gtx
|
2019-02-14 11:51:38 +00:00
|
|
|
## NVIDIA driver installer images. Change them if you have trouble accessing gcr.io.
|
|
|
|
# nvidia_driver_install_centos_container: atzedevries/nvidia-centos-driver-installer:2
|
2019-02-25 06:22:48 +00:00
|
|
|
# nvidia_driver_install_ubuntu_container: gcr.io/google-containers/ubuntu-nvidia-driver-installer@sha256:7df76a0f0a17294e86f691c81de6bbb7c04a1b4b3d4ea4e7e2cccdc42e1f6d63
|
2019-02-14 11:51:38 +00:00
|
|
|
## NVIDIA GPU device plugin image.
|
|
|
|
# nvidia_gpu_device_plugin_container: "k8s.gcr.io/nvidia-gpu-device-plugin@sha256:0842734032018be107fa2490c98156992911e3e1f2a21e059ff0105b07dd8e9e"
|
2020-06-16 11:10:05 +00:00
|
|
|
|
|
|
|
## Support tls min version, Possible values: VersionTLS10, VersionTLS11, VersionTLS12, VersionTLS13.
|
|
|
|
# tls_min_version: ""
|
|
|
|
|
|
|
|
## Support tls cipher suites.
|
|
|
|
# tls_cipher_suites: {}
|
|
|
|
# - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
|
|
|
|
# - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
|
|
|
|
# - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
|
|
|
|
# - TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
|
|
|
|
# - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
|
|
|
|
# - TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305
|
|
|
|
# - TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
|
|
|
|
# - TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
|
|
|
|
# - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
|
|
|
|
# - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
|
|
|
|
# - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
|
|
|
|
# - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
|
|
|
|
# - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
|
|
|
|
# - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305
|
|
|
|
# - TLS_ECDHE_RSA_WITH_RC4_128_SHA
|
|
|
|
# - TLS_RSA_WITH_3DES_EDE_CBC_SHA
|
|
|
|
# - TLS_RSA_WITH_AES_128_CBC_SHA
|
|
|
|
# - TLS_RSA_WITH_AES_128_CBC_SHA256
|
|
|
|
# - TLS_RSA_WITH_AES_128_GCM_SHA256
|
|
|
|
# - TLS_RSA_WITH_AES_256_CBC_SHA
|
|
|
|
# - TLS_RSA_WITH_AES_256_GCM_SHA384
|
|
|
|
# - TLS_RSA_WITH_RC4_128_SHA
|
2020-06-24 15:15:17 +00:00
|
|
|
|
|
|
|
## Amount of time to retain events. (default 1h0m0s)
|
|
|
|
event_ttl_duration: "1h0m0s"
|
2021-03-22 18:22:48 +00:00
|
|
|
|
|
|
|
## Automatically renew K8S control plane certificates on first Monday of each month
|
|
|
|
auto_renew_certificates: false
|
2021-04-12 16:47:45 +00:00
|
|
|
# First Monday of each month
|
|
|
|
# auto_renew_certificates_systemd_calendar: "Mon *-*-1,2,3,4,5,6,7 03:{{ groups['kube_control_plane'].index(inventory_hostname) }}0:00"
|