Switched to k3os and removed cilium
This commit is contained in:
@@ -1,117 +0,0 @@
|
||||
upgradeCompatibility: '1.10'
|
||||
|
||||
debug:
|
||||
# -- Enable debug logging
|
||||
enabled: false
|
||||
# verbose:
|
||||
|
||||
# gke:
|
||||
# enabled: true
|
||||
|
||||
ipam:
|
||||
# -- Configure IP Address Management mode.
|
||||
# ref: https://docs.cilium.io/en/stable/concepts/networking/ipam/
|
||||
mode: kubernetes
|
||||
|
||||
# -- Configure the encapsulation configuration for communication between nodes.
|
||||
# Possible values:
|
||||
# - disabled (native routing works, however I feel that geneve is more stable, but I may be wrong)
|
||||
# - vxlan
|
||||
# - geneve
|
||||
tunnel: geneve
|
||||
|
||||
# -- Specify the IPv4 CIDR for native routing (ie to avoid IP masquerade for).
|
||||
# This value corresponds to the configured cluster-cidr.
|
||||
nativeRoutingCIDR: 10.0.0.0/8
|
||||
|
||||
# When enabled, causes legacy routing
|
||||
# endpointRoutes:
|
||||
# -- Enable use of per endpoint routes instead of routing via
|
||||
# the cilium_host interface.
|
||||
# enabled: false
|
||||
|
||||
# -- Enable installation of PodCIDR routes between worker
|
||||
# nodes if worker nodes share a common L2 network segment.
|
||||
autoDirectNodeRoutes: false
|
||||
|
||||
bpf:
|
||||
# -- Allow cluster external access to ClusterIP services.
|
||||
lbExternalClusterIP: false
|
||||
|
||||
# -- Enable native IP masquerade support in eBPF
|
||||
masquerade: true
|
||||
|
||||
endpointHealthChecking:
|
||||
# -- Enable connectivity health checking between virtual endpoints.
|
||||
enabled: true
|
||||
|
||||
# -- Configure ClusterIP service handling in the host namespace (the node).
|
||||
hostServices:
|
||||
# -- Enable host reachable services.
|
||||
enabled: true
|
||||
|
||||
# -- Supported list of protocols to apply ClusterIP translation to.
|
||||
protocols: tcp,udp
|
||||
|
||||
externalIPs:
|
||||
# -- Enable ExternalIPs service support.
|
||||
enabled: true
|
||||
|
||||
hostPort:
|
||||
# -- Enable hostPort service support.
|
||||
enabled: true
|
||||
|
||||
# -- Configure N-S k8s service loadbalancing
|
||||
nodePort:
|
||||
# -- Enable the Cilium NodePort service implementation.
|
||||
enabled: true
|
||||
|
||||
# -- Enable connectivity health checking.
|
||||
healthChecking: true
|
||||
|
||||
ipv4:
|
||||
# -- Enable IPv4 support.
|
||||
enabled: true
|
||||
|
||||
ipv6:
|
||||
# -- Enable IPv6 support.
|
||||
enabled: false
|
||||
|
||||
# -- Configure Kubernetes specific configuration
|
||||
k8s:
|
||||
# -- requireIPv4PodCIDR enables waiting for Kubernetes to provide the PodCIDR
|
||||
# range via the Kubernetes node resource
|
||||
requireIPv4PodCIDR: true
|
||||
|
||||
# -- Configure the kube-proxy replacement in Cilium BPF datapath
|
||||
# Valid options are "disabled", "probe", "partial", "strict".
|
||||
# ref: https://docs.cilium.io/en/stable/gettingstarted/kubeproxy-free/
|
||||
kubeProxyReplacement: strict
|
||||
|
||||
# -- Enables masquerading of IPv4 traffic leaving the node from endpoints.
|
||||
enableIPv4Masquerade: true
|
||||
|
||||
monitor:
|
||||
# -- Enable the cilium-monitor sidecar.
|
||||
enabled: false
|
||||
|
||||
# -- Configure service load balancing
|
||||
loadBalancer:
|
||||
# -- standalone enables the standalone L4LB which does not connect to
|
||||
# kube-apiserver.
|
||||
# standalone: false
|
||||
|
||||
# -- algorithm is the name of the load balancing algorithm for backend
|
||||
# selection e.g. random or maglev
|
||||
algorithm: maglev
|
||||
|
||||
# dsr mode did probably caused packet drops, so falling back to snat
|
||||
mode: snat
|
||||
|
||||
# -- The agent can be put into one of the three policy enforcement modes:
|
||||
# default, always and never.
|
||||
# ref: https://docs.cilium.io/en/stable/policy/intro/#policy-enforcement-modes
|
||||
policyEnforcementMode: never
|
||||
|
||||
# -- Enables the enforcement of host policies in the eBPF datapath.
|
||||
hostFirewall: false
|
Reference in New Issue
Block a user