114 lines
2.9 KiB
YAML
114 lines
2.9 KiB
YAML
---
|
|
# Additionally define node addresses as needed
|
|
# k8s_node_ip: "{{ ansible_host }}"
|
|
# k8s_external_ip:
|
|
|
|
# local-path-storage default settings, see templates/shared/local-path-storage.yaml.j2
|
|
# k8s_local_path_image: rancher/local-path-provisioner:master-head
|
|
# k8s_local_path_image_pull_policy: IfNotPresent
|
|
# k8s_local_path_default_class: true
|
|
# k8s_local_path_reclaim_policy: Retain
|
|
# k8s_local_path_bind_mode: WaitForFirstConsumer
|
|
# k8s_local_path_priority_class: system-node-critical
|
|
# k8s_local_path_dir: /opt/local-path-provisioner
|
|
|
|
# cluster issuers
|
|
# k8s_cluster_issuers:
|
|
# - name: letsencrypt-prod
|
|
# url: https://acme-v02.api.letsencrypt.org/directory
|
|
# solvers:
|
|
# - type: http
|
|
# ingress: nginx
|
|
# - type: dns
|
|
# provider: cloudflare
|
|
# tokenref: apiTokenSecretRef
|
|
# secret_name: cloudflare-api-token
|
|
# secret_ley: api-token
|
|
|
|
# cluster secrets
|
|
# k8s_secrets:
|
|
# - name: cloudflare-api-token
|
|
# namespace: cert-manager
|
|
# data: api-token
|
|
# value: ZG9wX3Y...
|
|
|
|
# k8s_kubelet_args
|
|
# - "kube-reserved=cpu=500m,memory=1Gi,ephemeral-storage=2Gi"
|
|
# - "system-reserved=cpu=500m,memory=1Gi,ephemeral-storage=2Gi"
|
|
# - "eviction-hard=memory.available<500Mi,nodefs.available<10%"
|
|
# - "max-pods={{ k8s_pod_limit }}"
|
|
# - "v=2"
|
|
|
|
# Define
|
|
|
|
# Default is assumed false, set by vars/sysetms/
|
|
# k8s_selinux: false
|
|
|
|
# k8s_acme_email
|
|
|
|
# you can pre-generate this ina vault with the token.sh script
|
|
# k8s_cluster_token
|
|
|
|
# stable, latest, testing, ...
|
|
# k8s_channel: stable
|
|
|
|
# k8s_version to deploy a specific version
|
|
# k8s_version: v1.27.7+k3s2
|
|
|
|
# bootstrap | server | agent
|
|
# k8s_node_type: bootstrap
|
|
|
|
# if defined, install manifests from the supplied url, currently this task only supports fetching from a url
|
|
# k8s_manifests:
|
|
# - name: cert-manager
|
|
# url: https://github.com/cert-manager/cert-manager/releases/download/v1.14.5/cert-manager.yaml
|
|
|
|
# k8s_node_taints
|
|
# --node-taint CriticalAddonsOnly=true:NoExecute
|
|
# k8s_node_taints:
|
|
# - name: CriticalAddonsOnly
|
|
# value: true
|
|
# effect: NoExecute
|
|
|
|
# K3S
|
|
|
|
# flannel-backend: 'vxlan', 'host-gw', 'wireguard-native', 'none'
|
|
# k8s_flannel_backend: vxlan
|
|
# k8s_flannel_ipv6_masq: false
|
|
# k8s_flannel_external_ip: false
|
|
|
|
# k8s_disable_network_policy: true
|
|
|
|
# disable builtin services
|
|
# k8s_disable:
|
|
# - traefik
|
|
# - servicelb
|
|
|
|
# RKE2
|
|
|
|
# Default is false, if the host is using network manager, overriden by vars/sysetms/
|
|
# k8s_has_nm: true
|
|
|
|
# canal, cilium, calico, flannel
|
|
# k8s_cni_type: canal
|
|
|
|
# apply cni custom template
|
|
# canal-config.yaml | cilium-config.yaml | calico-config.yaml
|
|
# k8s_cni_custom_template: canal-config.yaml
|
|
|
|
# when using canal enable wg backend
|
|
# k8s_canal_wireguard: true
|
|
|
|
# cilium
|
|
# k8s_cilium_hubble: true
|
|
# k8s_cilium_eni: true
|
|
|
|
# disable builtin services
|
|
# k8s_disable:
|
|
# - rke2-coredns
|
|
# - rke2-ingress-nginx
|
|
# - rke2-metrics-server
|
|
# - rke2-snapshot-controller
|
|
# - rke2-snapshot-controller-crd
|
|
# - rke2-snapshot-validation-webhook
|