Last active
July 28, 2020 22:08
-
-
Save rsmitty/6d400d866222627cd7f564557f163dd5 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
# Source: cilium/charts/agent/templates/serviceaccount.yaml | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
name: cilium | |
namespace: kube-system | |
--- | |
# Source: cilium/charts/hubble-ui/templates/serviceaccount.yaml | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
name: hubble-ui | |
namespace: kube-system | |
--- | |
# Source: cilium/charts/operator/templates/serviceaccount.yaml | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
name: cilium-operator | |
namespace: kube-system | |
--- | |
# Source: cilium/charts/config/templates/configmap.yaml | |
apiVersion: v1 | |
kind: ConfigMap | |
metadata: | |
name: cilium-config | |
namespace: kube-system | |
data: | |
# Identity allocation mode selects how identities are shared between cilium | |
# nodes by setting how they are stored. The options are "crd" or "kvstore". | |
# - "crd" stores identities in kubernetes as CRDs (custom resource definition). | |
# These can be queried with: | |
# kubectl get ciliumid | |
# - "kvstore" stores identities in a kvstore, etcd or consul, that is | |
# configured below. Cilium versions before 1.6 supported only the kvstore | |
# backend. Upgrades from these older cilium versions should continue using | |
# the kvstore by commenting out the identity-allocation-mode below, or | |
# setting it to "kvstore". | |
identity-allocation-mode: crd | |
# If you want to run cilium in debug mode change this value to true | |
debug: "false" | |
# Enable IPv4 addressing. If enabled, all endpoints are allocated an IPv4 | |
# address. | |
enable-ipv4: "true" | |
# Enable IPv6 addressing. If enabled, all endpoints are allocated an IPv6 | |
# address. | |
enable-ipv6: "false" | |
enable-bpf-clock-probe: "true" | |
# If you want cilium monitor to aggregate tracing for packets, set this level | |
# to "low", "medium", or "maximum". The higher the level, the less packets | |
# that will be seen in monitor output. | |
monitor-aggregation: medium | |
# The monitor aggregation interval governs the typical time between monitor | |
# notification events for each allowed connection. | |
# | |
# Only effective when monitor aggregation is set to "medium" or higher. | |
monitor-aggregation-interval: 5s | |
# The monitor aggregation flags determine which TCP flags which, upon the | |
# first observation, cause monitor notifications to be generated. | |
# | |
# Only effective when monitor aggregation is set to "medium" or higher. | |
monitor-aggregation-flags: all | |
# bpf-policy-map-max specified the maximum number of entries in endpoint | |
# policy map (per endpoint) | |
bpf-policy-map-max: "16384" | |
# Specifies the ratio (0.0-1.0) of total system memory to use for dynamic | |
# sizing of the TCP CT, non-TCP CT, NAT and policy BPF maps. | |
bpf-map-dynamic-size-ratio: "0.0025" | |
# Pre-allocation of map entries allows per-packet latency to be reduced, at | |
# the expense of up-front memory allocation for the entries in the maps. The | |
# default value below will minimize memory usage in the default installation; | |
# users who are sensitive to latency may consider setting this to "true". | |
# | |
# This option was introduced in Cilium 1.4. Cilium 1.3 and earlier ignore | |
# this option and behave as though it is set to "true". | |
# | |
# If this value is modified, then during the next Cilium startup the restore | |
# of existing endpoints and tracking of ongoing connections may be disrupted. | |
# This may lead to policy drops or a change in loadbalancing decisions for a | |
# connection for some time. Endpoints may need to be recreated to restore | |
# connectivity. | |
# | |
# If this option is set to "false" during an upgrade from 1.3 or earlier to | |
# 1.4 or later, then it may cause one-time disruptions during the upgrade. | |
preallocate-bpf-maps: "false" | |
# Regular expression matching compatible Istio sidecar istio-proxy | |
# container image names | |
sidecar-istio-proxy-image: "cilium/istio_proxy" | |
# Encapsulation mode for communication between nodes | |
# Possible values: | |
# - disabled | |
# - vxlan (default) | |
# - geneve | |
tunnel: vxlan | |
# Name of the cluster. Only relevant when building a mesh of clusters. | |
cluster-name: default | |
# wait-bpf-mount makes init container wait until bpf filesystem is mounted | |
wait-bpf-mount: "false" | |
masquerade: "true" | |
enable-bpf-masquerade: "true" | |
enable-xt-socket-fallback: "true" | |
install-iptables-rules: "true" | |
auto-direct-node-routes: "false" | |
kube-proxy-replacement: "probe" | |
enable-health-check-nodeport: "true" | |
node-port-bind-protection: "true" | |
enable-auto-protect-node-port-range: "true" | |
enable-session-affinity: "true" | |
k8s-require-ipv4-pod-cidr: "true" | |
k8s-require-ipv6-pod-cidr: "false" | |
enable-endpoint-health-checking: "true" | |
enable-well-known-identities: "false" | |
enable-remote-node-identity: "true" | |
operator-api-serve-addr: "127.0.0.1:9234" | |
# Enable Hubble gRPC service. | |
enable-hubble: "true" | |
# UNIX domain socket for Hubble server to listen to. | |
hubble-socket-path: "/var/run/cilium/hubble.sock" | |
# Address to expose Hubble metrics (e.g. ":7070"). Metrics server will be disabled if this | |
# field is not set. | |
hubble-metrics-server: ":9091" | |
# A space separated list of metrics to enable. See [0] for available metrics. | |
# | |
# https://github.com/cilium/hubble/blob/master/Documentation/metrics.md | |
hubble-metrics: | |
dns | |
drop | |
tcp | |
flow | |
port-distribution | |
icmp | |
http | |
# An additional address for Hubble server to listen to (e.g. ":4244"). | |
hubble-listen-address: ":4244" | |
ipam: "kubernetes" | |
cluster-pool-ipv4-cidr: "10.250.0.0/16" | |
cluster-pool-ipv4-mask-size: "24" | |
disable-cnp-status-updates: "true" | |
--- | |
# Source: cilium/charts/agent/templates/clusterrole.yaml | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
name: cilium | |
rules: | |
- apiGroups: | |
- networking.k8s.io | |
resources: | |
- networkpolicies | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- discovery.k8s.io | |
resources: | |
- endpointslices | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- namespaces | |
- services | |
- nodes | |
- endpoints | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
- nodes | |
verbs: | |
- get | |
- list | |
- watch | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
- nodes/status | |
verbs: | |
- patch | |
- apiGroups: | |
- apiextensions.k8s.io | |
resources: | |
- customresourcedefinitions | |
verbs: | |
- create | |
- get | |
- list | |
- watch | |
- update | |
- apiGroups: | |
- cilium.io | |
resources: | |
- ciliumnetworkpolicies | |
- ciliumnetworkpolicies/status | |
- ciliumclusterwidenetworkpolicies | |
- ciliumclusterwidenetworkpolicies/status | |
- ciliumendpoints | |
- ciliumendpoints/status | |
- ciliumnodes | |
- ciliumnodes/status | |
- ciliumidentities | |
verbs: | |
- '*' | |
--- | |
# Source: cilium/charts/hubble-ui/templates/clusterrole.yaml | |
kind: ClusterRole | |
apiVersion: rbac.authorization.k8s.io/v1 | |
metadata: | |
name: hubble-ui | |
rules: | |
- apiGroups: | |
- networking.k8s.io | |
resources: | |
- networkpolicies | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- componentstatuses | |
- endpoints | |
- namespaces | |
- nodes | |
- pods | |
- services | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- apiextensions.k8s.io | |
resources: | |
- customresourcedefinitions | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- cilium.io | |
resources: | |
- "*" | |
verbs: | |
- get | |
- list | |
- watch | |
--- | |
# Source: cilium/charts/operator/templates/clusterrole.yaml | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
name: cilium-operator | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
# to automatically delete [core|kube]dns pods so that are starting to being | |
# managed by Cilium | |
- pods | |
verbs: | |
- get | |
- list | |
- watch | |
- delete | |
- apiGroups: | |
- discovery.k8s.io | |
resources: | |
- endpointslices | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
# to perform the translation of a CNP that contains `ToGroup` to its endpoints | |
- services | |
- endpoints | |
# to check apiserver connectivity | |
- namespaces | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- cilium.io | |
resources: | |
- ciliumnetworkpolicies | |
- ciliumnetworkpolicies/status | |
- ciliumclusterwidenetworkpolicies | |
- ciliumclusterwidenetworkpolicies/status | |
- ciliumendpoints | |
- ciliumendpoints/status | |
- ciliumnodes | |
- ciliumnodes/status | |
- ciliumidentities | |
- ciliumidentities/status | |
verbs: | |
- '*' | |
- apiGroups: | |
- apiextensions.k8s.io | |
resources: | |
- customresourcedefinitions | |
verbs: | |
- get | |
- list | |
- watch | |
--- | |
# Source: cilium/charts/agent/templates/clusterrolebinding.yaml | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
name: cilium | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: cilium | |
subjects: | |
- kind: ServiceAccount | |
name: cilium | |
namespace: kube-system | |
--- | |
# Source: cilium/charts/hubble-ui/templates/clusterrolebinding.yaml | |
kind: ClusterRoleBinding | |
apiVersion: rbac.authorization.k8s.io/v1 | |
metadata: | |
name: hubble-ui | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: hubble-ui | |
subjects: | |
- kind: ServiceAccount | |
namespace: kube-system | |
name: hubble-ui | |
--- | |
# Source: cilium/charts/operator/templates/clusterrolebinding.yaml | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
name: cilium-operator | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: cilium-operator | |
subjects: | |
- kind: ServiceAccount | |
name: cilium-operator | |
namespace: kube-system | |
--- | |
# Source: cilium/charts/agent/templates/svc.yaml | |
kind: Service | |
apiVersion: v1 | |
metadata: | |
name: hubble-metrics | |
namespace: kube-system | |
annotations: | |
prometheus.io/scrape: 'true' | |
prometheus.io/port: "9091" | |
labels: | |
k8s-app: hubble | |
spec: | |
clusterIP: None | |
type: ClusterIP | |
ports: | |
- name: hubble-metrics | |
port: 9091 | |
protocol: TCP | |
targetPort: hubble-metrics | |
selector: | |
k8s-app: cilium | |
--- | |
# Source: cilium/charts/hubble-relay/templates/service.yaml | |
kind: Service | |
apiVersion: v1 | |
metadata: | |
name: hubble-relay | |
namespace: kube-system | |
labels: | |
k8s-app: hubble-relay | |
spec: | |
type: ClusterIP | |
selector: | |
k8s-app: hubble-relay | |
ports: | |
- protocol: TCP | |
port: 80 | |
targetPort: 4245 | |
--- | |
# Source: cilium/charts/hubble-ui/templates/svc.yaml | |
kind: Service | |
apiVersion: v1 | |
metadata: | |
namespace: kube-system | |
name: hubble-ui | |
spec: | |
selector: | |
k8s-app: hubble-ui | |
ports: | |
- name: http | |
port: 80 | |
targetPort: 12000 | |
type: ClusterIP | |
--- | |
# Source: cilium/charts/agent/templates/daemonset.yaml | |
apiVersion: apps/v1 | |
kind: DaemonSet | |
metadata: | |
labels: | |
k8s-app: cilium | |
name: cilium | |
namespace: kube-system | |
spec: | |
selector: | |
matchLabels: | |
k8s-app: cilium | |
template: | |
metadata: | |
annotations: | |
# This annotation plus the CriticalAddonsOnly toleration makes | |
# cilium to be a critical pod in the cluster, which ensures cilium | |
# gets priority scheduling. | |
# https://kubernetes.io/docs/tasks/administer-cluster/guaranteed-scheduling-critical-addon-pods/ | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
labels: | |
k8s-app: cilium | |
spec: | |
affinity: | |
podAntiAffinity: | |
requiredDuringSchedulingIgnoredDuringExecution: | |
- labelSelector: | |
matchExpressions: | |
- key: k8s-app | |
operator: In | |
values: | |
- cilium | |
topologyKey: kubernetes.io/hostname | |
containers: | |
- args: | |
- --config-dir=/tmp/cilium/config-map | |
command: | |
- cilium-agent | |
livenessProbe: | |
httpGet: | |
host: '127.0.0.1' | |
path: /healthz | |
port: 9876 | |
scheme: HTTP | |
httpHeaders: | |
- name: "brief" | |
value: "true" | |
failureThreshold: 10 | |
# The initial delay for the liveness probe is intentionally large to | |
# avoid an endless kill & restart cycle if in the event that the initial | |
# bootstrapping takes longer than expected. | |
initialDelaySeconds: 120 | |
periodSeconds: 30 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
readinessProbe: | |
httpGet: | |
host: '127.0.0.1' | |
path: /healthz | |
port: 9876 | |
scheme: HTTP | |
httpHeaders: | |
- name: "brief" | |
value: "true" | |
failureThreshold: 3 | |
initialDelaySeconds: 5 | |
periodSeconds: 30 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
env: | |
- name: K8S_NODE_NAME | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: spec.nodeName | |
- name: CILIUM_K8S_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CILIUM_FLANNEL_MASTER_DEVICE | |
valueFrom: | |
configMapKeyRef: | |
key: flannel-master-device | |
name: cilium-config | |
optional: true | |
- name: CILIUM_FLANNEL_UNINSTALL_ON_EXIT | |
valueFrom: | |
configMapKeyRef: | |
key: flannel-uninstall-on-exit | |
name: cilium-config | |
optional: true | |
- name: CILIUM_CLUSTERMESH_CONFIG | |
value: /var/lib/cilium/clustermesh/ | |
- name: CILIUM_CNI_CHAINING_MODE | |
valueFrom: | |
configMapKeyRef: | |
key: cni-chaining-mode | |
name: cilium-config | |
optional: true | |
- name: CILIUM_CUSTOM_CNI_CONF | |
valueFrom: | |
configMapKeyRef: | |
key: custom-cni-conf | |
name: cilium-config | |
optional: true | |
image: "docker.io/cilium/cilium:v1.8.2" | |
imagePullPolicy: IfNotPresent | |
lifecycle: | |
postStart: | |
exec: | |
command: | |
- "/cni-install.sh" | |
- "--enable-debug=false" | |
preStop: | |
exec: | |
command: | |
- /cni-uninstall.sh | |
name: cilium-agent | |
ports: | |
- containerPort: 9091 | |
hostPort: 9091 | |
name: hubble-metrics | |
protocol: TCP | |
securityContext: | |
capabilities: | |
add: | |
- NET_ADMIN | |
- SYS_MODULE | |
privileged: true | |
volumeMounts: | |
- mountPath: /sys/fs/bpf | |
name: bpf-maps | |
- mountPath: /var/run/cilium | |
name: cilium-run | |
- mountPath: /host/opt/cni/bin | |
name: cni-path | |
- mountPath: /host/etc/cni/net.d | |
name: etc-cni-netd | |
- mountPath: /var/lib/cilium/clustermesh | |
name: clustermesh-secrets | |
readOnly: true | |
- mountPath: /tmp/cilium/config-map | |
name: cilium-config-path | |
readOnly: true | |
# Needed to be able to load kernel modules | |
- mountPath: /lib/modules | |
name: lib-modules | |
readOnly: true | |
- mountPath: /run/xtables.lock | |
name: xtables-lock | |
hostNetwork: true | |
initContainers: | |
- command: | |
- /init-container.sh | |
env: | |
- name: CILIUM_ALL_STATE | |
valueFrom: | |
configMapKeyRef: | |
key: clean-cilium-state | |
name: cilium-config | |
optional: true | |
- name: CILIUM_BPF_STATE | |
valueFrom: | |
configMapKeyRef: | |
key: clean-cilium-bpf-state | |
name: cilium-config | |
optional: true | |
- name: CILIUM_WAIT_BPF_MOUNT | |
valueFrom: | |
configMapKeyRef: | |
key: wait-bpf-mount | |
name: cilium-config | |
optional: true | |
image: "docker.io/cilium/cilium:v1.8.2" | |
imagePullPolicy: IfNotPresent | |
name: clean-cilium-state | |
securityContext: | |
capabilities: | |
add: | |
- NET_ADMIN | |
privileged: true | |
volumeMounts: | |
- mountPath: /sys/fs/bpf | |
name: bpf-maps | |
mountPropagation: HostToContainer | |
- mountPath: /var/run/cilium | |
name: cilium-run | |
resources: | |
requests: | |
cpu: 100m | |
memory: 100Mi | |
restartPolicy: Always | |
priorityClassName: system-node-critical | |
serviceAccount: cilium | |
serviceAccountName: cilium | |
terminationGracePeriodSeconds: 1 | |
tolerations: | |
- operator: Exists | |
volumes: | |
# To keep state between restarts / upgrades | |
- hostPath: | |
path: /var/run/cilium | |
type: DirectoryOrCreate | |
name: cilium-run | |
# To keep state between restarts / upgrades for bpf maps | |
- hostPath: | |
path: /sys/fs/bpf | |
type: DirectoryOrCreate | |
name: bpf-maps | |
# To install cilium cni plugin in the host | |
- hostPath: | |
path: /opt/cni/bin | |
type: DirectoryOrCreate | |
name: cni-path | |
# To install cilium cni configuration in the host | |
- hostPath: | |
path: /etc/cni/net.d | |
type: DirectoryOrCreate | |
name: etc-cni-netd | |
# To be able to load kernel modules | |
- hostPath: | |
path: /lib/modules | |
name: lib-modules | |
# To access iptables concurrently with other processes (e.g. kube-proxy) | |
- hostPath: | |
path: /run/xtables.lock | |
type: FileOrCreate | |
name: xtables-lock | |
# To read the clustermesh configuration | |
- name: clustermesh-secrets | |
secret: | |
defaultMode: 420 | |
optional: true | |
secretName: cilium-clustermesh | |
# To read the configuration from the config map | |
- configMap: | |
name: cilium-config | |
name: cilium-config-path | |
updateStrategy: | |
rollingUpdate: | |
maxUnavailable: 2 | |
type: RollingUpdate | |
--- | |
# Source: cilium/charts/hubble-relay/templates/deployment.yaml | |
apiVersion: apps/v1 | |
kind: Deployment | |
metadata: | |
name: hubble-relay | |
namespace: kube-system | |
labels: | |
k8s-app: hubble-relay | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
k8s-app: hubble-relay | |
template: | |
metadata: | |
labels: | |
k8s-app: hubble-relay | |
spec: | |
affinity: | |
podAffinity: | |
requiredDuringSchedulingIgnoredDuringExecution: | |
- labelSelector: | |
matchExpressions: | |
- key: "k8s-app" | |
operator: In | |
values: | |
- cilium | |
topologyKey: "kubernetes.io/hostname" | |
containers: | |
- name: hubble-relay | |
image: "docker.io/cilium/hubble-relay:v1.8.2" | |
imagePullPolicy: IfNotPresent | |
command: | |
- "hubble-relay" | |
args: | |
- "serve" | |
- "--peer-service=unix:///var/run/cilium/hubble.sock" | |
- "--listen-address=:4245" | |
ports: | |
- name: grpc | |
containerPort: 4245 | |
readinessProbe: | |
tcpSocket: | |
port: grpc | |
livenessProbe: | |
tcpSocket: | |
port: grpc | |
volumeMounts: | |
- mountPath: /var/run/cilium | |
name: hubble-sock-dir | |
readOnly: true | |
restartPolicy: Always | |
terminationGracePeriodSeconds: 0 | |
tolerations: | |
- operator: Exists | |
volumes: | |
- hostPath: | |
path: /var/run/cilium | |
type: Directory | |
name: hubble-sock-dir | |
--- | |
# Source: cilium/charts/hubble-ui/templates/deployment.yaml | |
kind: Deployment | |
apiVersion: apps/v1 | |
metadata: | |
namespace: kube-system | |
name: hubble-ui | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
k8s-app: hubble-ui | |
template: | |
metadata: | |
labels: | |
k8s-app: hubble-ui | |
spec: | |
securityContext: | |
runAsUser: 1001 | |
serviceAccountName: hubble-ui | |
containers: | |
- name: hubble-ui | |
image: "quay.io/cilium/hubble-ui:v0.6.1" | |
imagePullPolicy: IfNotPresent | |
env: | |
- name: NODE_ENV | |
value: "production" | |
- name: LOG_LEVEL | |
value: "info" | |
- name: HUBBLE | |
value: "true" | |
- name: HUBBLE_SERVICE | |
value: "hubble-relay" | |
- name: HUBBLE_PORT | |
value: "80" | |
ports: | |
- containerPort: 12000 | |
name: http | |
resources: | |
{} | |
--- | |
# Source: cilium/charts/operator/templates/deployment.yaml | |
apiVersion: apps/v1 | |
kind: Deployment | |
metadata: | |
labels: | |
io.cilium/app: operator | |
name: cilium-operator | |
name: cilium-operator | |
namespace: kube-system | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
io.cilium/app: operator | |
name: cilium-operator | |
strategy: | |
rollingUpdate: | |
maxSurge: 1 | |
maxUnavailable: 1 | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
labels: | |
io.cilium/app: operator | |
name: cilium-operator | |
spec: | |
containers: | |
- args: | |
- --config-dir=/tmp/cilium/config-map | |
- --debug=$(CILIUM_DEBUG) | |
command: | |
- cilium-operator-generic | |
env: | |
- name: K8S_NODE_NAME | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: spec.nodeName | |
- name: CILIUM_K8S_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
- name: CILIUM_DEBUG | |
valueFrom: | |
configMapKeyRef: | |
key: debug | |
name: cilium-config | |
optional: true | |
- name: AWS_ACCESS_KEY_ID | |
valueFrom: | |
secretKeyRef: | |
key: AWS_ACCESS_KEY_ID | |
name: cilium-aws | |
optional: true | |
- name: AWS_SECRET_ACCESS_KEY | |
valueFrom: | |
secretKeyRef: | |
key: AWS_SECRET_ACCESS_KEY | |
name: cilium-aws | |
optional: true | |
- name: AWS_DEFAULT_REGION | |
valueFrom: | |
secretKeyRef: | |
key: AWS_DEFAULT_REGION | |
name: cilium-aws | |
optional: true | |
image: "docker.io/cilium/operator-generic:v1.8.2" | |
imagePullPolicy: IfNotPresent | |
name: cilium-operator | |
livenessProbe: | |
httpGet: | |
host: '127.0.0.1' | |
path: /healthz | |
port: 9234 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
periodSeconds: 10 | |
timeoutSeconds: 3 | |
volumeMounts: | |
- mountPath: /tmp/cilium/config-map | |
name: cilium-config-path | |
readOnly: true | |
hostNetwork: true | |
restartPolicy: Always | |
priorityClassName: system-cluster-critical | |
serviceAccount: cilium-operator | |
serviceAccountName: cilium-operator | |
volumes: | |
# To read the configuration from the config map | |
- configMap: | |
name: cilium-config | |
name: cilium-config-path |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment