2016-01-19 14:23:19 +00:00
|
|
|
---
|
2017-03-03 20:30:37 +00:00
|
|
|
# Set to false to only do certificate management
|
|
|
|
etcd_cluster_setup: true
|
2018-04-01 16:58:08 +00:00
|
|
|
etcd_events_cluster_setup: false
|
2017-03-03 20:30:37 +00:00
|
|
|
|
2018-06-18 13:19:12 +00:00
|
|
|
# Set to true to separate k8s events to a different etcd cluster
|
|
|
|
etcd_events_cluster_enabled: false
|
|
|
|
|
2017-06-27 13:12:34 +00:00
|
|
|
etcd_backup_prefix: "/var/backups"
|
2017-02-24 14:58:54 +00:00
|
|
|
etcd_data_dir: "/var/lib/etcd"
|
2020-07-22 06:58:05 +00:00
|
|
|
|
2020-10-23 14:09:57 +00:00
|
|
|
# Number of etcd backups to retain. Set to a value < 0 to retain all backups
|
|
|
|
etcd_backup_retention_count: -1
|
2016-11-09 10:44:41 +00:00
|
|
|
|
2021-02-09 09:53:22 +00:00
|
|
|
force_etcd_cert_refresh: true
|
2016-11-09 10:44:41 +00:00
|
|
|
etcd_config_dir: /etc/ssl/etcd
|
|
|
|
etcd_cert_dir: "{{ etcd_config_dir }}/ssl"
|
2020-12-09 08:48:49 +00:00
|
|
|
etcd_cert_dir_mode: "0700"
|
2017-02-06 12:58:54 +00:00
|
|
|
etcd_cert_group: root
|
2018-01-09 11:37:34 +00:00
|
|
|
# Note: This does not set up DNS entries. It simply adds the following DNS
|
|
|
|
# entries to the certificate
|
|
|
|
etcd_cert_alt_names:
|
2018-03-30 11:29:13 +00:00
|
|
|
- "etcd.kube-system.svc.{{ dns_domain }}"
|
|
|
|
- "etcd.kube-system.svc"
|
|
|
|
- "etcd.kube-system"
|
2018-01-09 11:37:34 +00:00
|
|
|
- "etcd"
|
2018-08-31 12:34:13 +00:00
|
|
|
etcd_cert_alt_ips: []
|
2016-11-09 10:44:41 +00:00
|
|
|
|
|
|
|
etcd_script_dir: "{{ bin_dir }}/etcd-scripts"
|
2016-12-23 14:44:44 +00:00
|
|
|
|
2017-02-07 14:46:02 +00:00
|
|
|
etcd_heartbeat_interval: "250"
|
|
|
|
etcd_election_timeout: "5000"
|
|
|
|
|
2018-03-28 14:30:00 +00:00
|
|
|
# etcd_snapshot_count: "10000"
|
2018-03-26 14:25:51 +00:00
|
|
|
|
2017-07-24 08:25:38 +00:00
|
|
|
etcd_metrics: "basic"
|
|
|
|
|
2021-11-18 07:53:01 +00:00
|
|
|
# Define in inventory to set a separate port for etcd to expose metrics on
|
2020-05-10 19:21:51 +00:00
|
|
|
# etcd_metrics_port: 2381
|
|
|
|
|
2018-04-18 17:16:42 +00:00
|
|
|
## A dictionary of extra environment variables to add to etcd.env, formatted like:
|
|
|
|
## etcd_extra_vars:
|
|
|
|
## ETCD_VAR1: "value1"
|
|
|
|
## ETCD_VAR2: "value2"
|
|
|
|
etcd_extra_vars: {}
|
|
|
|
|
2016-12-23 14:44:44 +00:00
|
|
|
# Limits
|
2017-10-25 09:25:15 +00:00
|
|
|
# Limit memory only if <4GB memory on host. 0=unlimited
|
|
|
|
etcd_memory_limit: "{% if ansible_memtotal_mb < 4096 %}512M{% else %}0{% endif %}"
|
2017-02-07 14:46:02 +00:00
|
|
|
|
2020-09-21 12:42:31 +00:00
|
|
|
# etcd_quota_backend_bytes: "2147483648"
|
2018-08-04 11:56:25 +00:00
|
|
|
|
2017-02-07 14:46:02 +00:00
|
|
|
# Uncomment to set CPU share for etcd
|
2017-08-24 09:09:52 +00:00
|
|
|
# etcd_cpu_limit: 300m
|
2017-02-08 21:41:36 +00:00
|
|
|
|
2017-09-25 11:20:24 +00:00
|
|
|
etcd_blkio_weight: 1000
|
|
|
|
|
2021-04-29 12:20:50 +00:00
|
|
|
etcd_node_cert_hosts: "{{ groups['k8s_cluster'] | union(groups.get('calico_rr', [])) }}"
|
2017-06-14 08:39:38 +00:00
|
|
|
|
2017-08-20 10:55:48 +00:00
|
|
|
etcd_compaction_retention: "8"
|
2017-08-30 13:03:22 +00:00
|
|
|
|
2017-11-07 14:06:16 +00:00
|
|
|
# Force clients like etcdctl to use TLS certs (different than peer security)
|
|
|
|
etcd_secure_client: true
|
2018-01-11 18:07:43 +00:00
|
|
|
|
|
|
|
# Enable peer client cert authentication
|
|
|
|
etcd_peer_client_auth: true
|
2020-02-11 09:38:01 +00:00
|
|
|
|
2021-03-18 23:48:36 +00:00
|
|
|
# Maximum number of snapshot files to retain (0 is unlimited)
|
|
|
|
# etcd_max_snapshots: 5
|
|
|
|
|
|
|
|
# Maximum number of wal files to retain (0 is unlimited)
|
|
|
|
# etcd_max_wals: 5
|
|
|
|
|
2020-02-11 09:38:01 +00:00
|
|
|
# Number of loop retries
|
|
|
|
etcd_retries: 4
|
2020-12-08 02:13:10 +00:00
|
|
|
|
|
|
|
## Support tls cipher suites.
|
|
|
|
# etcd_tls_cipher_suites: {}
|
|
|
|
# - TLS_RSA_WITH_RC4_128_SHA
|
|
|
|
# - TLS_RSA_WITH_3DES_EDE_CBC_SHA
|
|
|
|
# - TLS_RSA_WITH_AES_128_CBC_SHA
|
|
|
|
# - TLS_RSA_WITH_AES_256_CBC_SHA
|
|
|
|
# - TLS_RSA_WITH_AES_128_CBC_SHA256
|
|
|
|
# - TLS_RSA_WITH_AES_128_GCM_SHA256
|
|
|
|
# - TLS_RSA_WITH_AES_256_GCM_SHA384
|
|
|
|
# - TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
|
|
|
|
# - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
|
|
|
|
# - TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
|
|
|
|
# - TLS_ECDHE_RSA_WITH_RC4_128_SHA
|
|
|
|
# - TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
|
|
|
|
# - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
|
|
|
|
# - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
|
|
|
|
# - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
|
|
|
|
# - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
|
|
|
|
# - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
|
|
|
|
# - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
|
|
|
|
# - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
|
|
|
|
# - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
|
|
|
|
# - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305
|
|
|
|
# - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
|
|
|
|
# - TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305
|
|
|
|
# - TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
|