forked from kiali/kiali-operator
-
Notifications
You must be signed in to change notification settings - Fork 0
/
main.yml
240 lines (223 loc) · 5.8 KB
/
main.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
# Defaults for all user-facing Kiali settings. These are documented in kiali_cr.yaml.
#
# Note that these are under the main dictionary group "kiali_defaults".
# The actual vars used by the role are found in the vars/ directory.
# These defaults (the dictionaries under "kiali_defaults") are merged into the vars such that the values
# below (e.g. deployment, server, etc.) are merged in rather than completely replaced by user-supplied values.
#
# If new groups are added to these defaults, you must remember to add the merge code to vars/main.yml.
kiali_defaults:
installation_tag: ""
istio_component_namespaces: {}
istio_namespace: ""
version: "default"
additional_display_details:
- title: "API Documentation"
annotation: "kiali.io/api-spec"
icon_annotation: "kiali.io/api-type"
api:
namespaces:
exclude:
- "istio-operator"
- "kube.*"
- "openshift.*"
- "ibm.*"
- "kiali-operator"
#label_selector:
auth:
openid:
api_proxy: ""
api_proxy_ca_data: ""
authentication_timeout: 300
authorization_endpoint: ""
client_id: ""
disable_rbac: false
http_proxy: ""
https_proxy: ""
insecure_skip_verify_tls: false
issuer_uri: ""
scopes: ["openid", "profile", "email"]
username_claim: "sub"
openshift:
client_id_prefix: "kiali"
strategy: ""
deployment:
accessible_namespaces: ["^((?!(istio-operator|kube.*|openshift.*|ibm.*|kiali-operator)).)*$"]
#additional_service_yaml:
affinity:
node: {}
pod: {}
pod_anti: {}
custom_dashboards:
excludes: ['']
includes: ['*']
hpa:
api_version: "autoscaling/v2beta2"
spec: {}
image_name: ""
image_pull_policy: "IfNotPresent"
image_pull_secrets: []
image_version: ""
ingress_enabled: true
logger:
log_format: "text"
log_level: "info"
sampler_rate: "1"
time_field_format: "2006-01-02T15:04:05Z07:00"
namespace: ""
node_selector: {}
#override_ingress_yaml:
pod_annotations: {}
pod_labels: {}
priority_class_name: ""
replicas: 1
resources: {}
secret_name: "kiali"
service_annotations: {}
#service_type: "NodePort"
tolerations: []
version_label: ""
view_only_mode: false
extensions:
iter_8:
enabled: false
external_services:
custom_dashboards:
discovery_enabled: "auto"
discovery_auto_threshold: 10
enabled: true
is_core_component: false
namespace_label: ""
prometheus:
auth:
ca_file: ""
insecure_skip_verify: false
password: ""
token: ""
type: "none"
use_kiali_token: false
username: ""
url: ""
grafana:
auth:
ca_file: ""
insecure_skip_verify: false
password: ""
token: ""
type: "none"
use_kiali_token: false
username: ""
is_core_component: false
dashboards:
- name: "Istio Service Dashboard"
variables:
namespace: "var-namespace"
service: "var-service"
- name: "Istio Workload Dashboard"
variables:
namespace: "var-namespace"
workload: "var-workload"
enabled: true
in_cluster_url: ""
url: ""
istio:
component_status:
enabled: true
components:
- app_label: "istiod"
is_core: true
namespace: ""
- app_label: "istio-ingressgateway"
is_core: true
namespace: ""
- app_label: "istio-egressgateway"
is_core: false
namespace: ""
config_map_name: "istio"
envoy_admin_local_port: 15000
istio_identity_domain: "svc.cluster.local"
istio_injection_annotation: "sidecar.istio.io/inject"
istio_sidecar_annotation: "sidecar.istio.io/status"
url_service_version: ""
prometheus:
auth:
ca_file: ""
insecure_skip_verify: false
password: ""
token: ""
type: "none"
use_kiali_token: false
username: ""
cache_duration: 7
cache_enabled: true
cache_expiration: 300
url: ""
tracing:
auth:
ca_file: ""
insecure_skip_verify: false
password: ""
token: ""
type: "none"
use_kiali_token: false
username: ""
is_core_component: false
enabled: true
in_cluster_url: ""
namespace_selector: true
url: ""
whitelist_istio_system: ["jaeger-query", "istio-ingressgateway"]
health_config:
rate: []
identity: {}
#cert_file:
#private_key_file:
istio_labels:
app_label_name: "app"
injection_label_name: "istio-injection"
version_label_name: "version"
kiali_feature_flags:
istio_injection_action: true
kubernetes_config:
burst: 200
cache_duration: 300
cache_enabled: true
cache_istio_types:
- "DestinationRule"
- "Gateway"
- "ServiceEntry"
- "VirtualService"
- "Sidecar"
- "PeerAuthentication"
- "RequestAuthentication"
- "AuthorizationPolicy"
cache_namespaces:
- ".*"
cache_token_namespace_duration: 10
excluded_workloads:
- "CronJob"
- "DeploymentConfig"
- "Job"
- "ReplicationController"
qps: 175
login_token:
expiration_seconds: 86400
signing_key: ""
server:
address: ""
audit_log: true
cors_allow_all: false
gzip_enabled: true
metrics_enabled: true
metrics_port: 9090
port: 20001
web_fqdn: ""
web_history_mode: ""
web_port: ""
web_root: ""
web_schema: ""
# These variables are outside of the kiali_defaults. Their values will be
# auto-detected by the role and are not meant to be set by the user.
# However, for debugging purposes you can change these.
is_k8s: false
is_openshift: false