1
1
---
2
- cilium_min_version_required : " 1.10 "
2
+ cilium_min_version_required : " 1.15 "
3
3
# Log-level
4
4
cilium_debug : false
5
5
6
- cilium_mtu : " "
6
+ cilium_mtu : " 0 "
7
7
cilium_enable_ipv4 : " {{ ipv4_stack }}"
8
8
cilium_enable_ipv6 : " {{ ipv6_stack }}"
9
9
10
10
# Enable l2 announcement from cilium to replace Metallb Ref: https://docs.cilium.io/en/v1.14/network/l2-announcements/
11
11
cilium_l2announcements : false
12
12
13
13
# Cilium agent health port
14
- cilium_agent_health_port : " {%- if cilium_version is version('1.11.6', '>=') -%} 9879{%- else -%}9876{%- endif -%} "
14
+ cilium_agent_health_port : " 9879"
15
15
16
16
# Identity allocation mode selects how identities are shared between cilium
17
17
# nodes by setting how they are stored. The options are "crd" or "kvstore".
@@ -26,7 +26,7 @@ cilium_agent_health_port: "{%- if cilium_version is version('1.11.6', '>=') -%}9
26
26
# - --synchronize-k8s-nodes
27
27
# - --identity-allocation-mode=kvstore
28
28
# - Ref: https://docs.cilium.io/en/stable/internals/cilium_operator/#kvstore-operations
29
- cilium_identity_allocation_mode : kvstore
29
+ cilium_identity_allocation_mode : crd
30
30
31
31
# Etcd SSL dirs
32
32
cilium_cert_dir : /etc/cilium/certs
@@ -55,20 +55,20 @@ cilium_enable_prometheus: false
55
55
cilium_enable_portmap : false
56
56
# Monitor aggregation level (none/low/medium/maximum)
57
57
cilium_monitor_aggregation : medium
58
- # Kube Proxy Replacement mode (strict/partial)
59
- cilium_kube_proxy_replacement : partial
58
+ # Kube Proxy Replacement mode (true/false)
59
+ cilium_kube_proxy_replacement : false
60
+
61
+ # If not defined `cilium_dns_proxy_enable_transparent_mode`, it will following the Cilium behavior.
62
+ # When Cilium is configured to replace kube-proxy, it automatically enables dnsProxy, which will conflict with nodelocaldns.
63
+ # You can set `false` avoid conflict with nodelocaldns.
64
+ # https://github.com/cilium/cilium/issues/33144
65
+ # cilium_dns_proxy_enable_transparent_mode:
60
66
61
67
# If upgrading from Cilium < 1.5, you may want to override some of these options
62
68
# to prevent service disruptions. See also:
63
69
# http://docs.cilium.io/en/stable/install/upgrade/#changes-that-may-require-action
64
70
cilium_preallocate_bpf_maps : false
65
71
66
- # `cilium_tofqdns_enable_poller` is deprecated in 1.8, removed in 1.9
67
- cilium_tofqdns_enable_poller : false
68
-
69
- # `cilium_enable_legacy_services` is deprecated in 1.6, removed in 1.9
70
- cilium_enable_legacy_services : false
71
-
72
72
# Auto direct nodes routes can be used to advertise pods routes in your cluster
73
73
# without any tunelling (with `cilium_tunnel_mode` sets to `disabled`).
74
74
# This works only if you have a L2 connectivity between all your nodes.
@@ -100,8 +100,8 @@ cilium_encryption_enabled: false
100
100
cilium_encryption_type : " ipsec"
101
101
102
102
# Enable encryption for pure node to node traffic.
103
- # This option is only effective when `cilium_encryption_type` is set to `ipsec `.
104
- cilium_ipsec_node_encryption : false
103
+ # This option is only effective when `cilium_encryption_type` is set to `wireguard `.
104
+ cilium_encryption_node_encryption : false
105
105
106
106
# If your kernel or distribution does not support WireGuard, Cilium agent can be configured to fall back on the user-space implementation.
107
107
# When this flag is enabled and Cilium detects that the kernel has no native support for WireGuard,
@@ -115,6 +115,7 @@ cilium_wireguard_userspace_fallback: false
115
115
# In case they select the Pod at egress, then the bandwidth enforcement will be disabled for those Pods.
116
116
# Bandwidth Manager requires a v5.1.x or more recent Linux kernel.
117
117
cilium_enable_bandwidth_manager : false
118
+ cilium_enable_bandwidth_manager_bbr : false
118
119
119
120
# IP Masquerade Agent
120
121
# https://docs.cilium.io/en/stable/concepts/networking/masquerading/
@@ -137,6 +138,7 @@ cilium_non_masquerade_cidrs:
137
138
# ## Indicates whether to masquerade traffic to the link local prefix.
138
139
# ## If the masqLinkLocal is not set or set to false, then 169.254.0.0/16 is appended to the non-masquerade CIDRs list.
139
140
cilium_masq_link_local : false
141
+ cilium_masq_link_local_ipv6 : false
140
142
# ## A time interval at which the agent attempts to reload config from disk
141
143
cilium_ip_masq_resync_interval : 60s
142
144
@@ -145,10 +147,10 @@ cilium_ip_masq_resync_interval: 60s
145
147
cilium_enable_hubble : false
146
148
# ## Enable Hubble-ui
147
149
cilium_enable_hubble_ui : " {{ cilium_enable_hubble }}"
148
- # ## Enable Hubble Metrics
150
+ # ## Enable Hubble Metrics (deprecated)
149
151
cilium_enable_hubble_metrics : false
150
152
# ## if cilium_enable_hubble_metrics: true
151
- cilium_hubble_metrics : {}
153
+ cilium_hubble_metrics : []
152
154
# - dns
153
155
# - drop
154
156
# - tcp
@@ -160,12 +162,25 @@ cilium_hubble_install: false
160
162
# ## Enable auto generate certs if cilium_hubble_install: true
161
163
cilium_hubble_tls_generate : false
162
164
165
+ cilium_hubble_export_file_max_backups : " 5"
166
+ cilium_hubble_export_file_max_size_mb : " 10"
167
+
168
+ cilium_hubble_export_dynamic_enabled : false
169
+ cilium_hubble_export_dynamic_config_content :
170
+ - name : all
171
+ fieldMask : []
172
+ includeFilters : []
173
+ excludeFilters : []
174
+ filePath : " /var/run/cilium/hubble/events.log"
175
+
163
176
# ## Capacity of Hubble events buffer. The provided value must be one less than an integer power of two and no larger than 65535
164
177
# ## (ie: 1, 3, ..., 2047, 4095, ..., 65535) (default 4095)
165
178
# cilium_hubble_event_buffer_capacity: 4095
166
179
# ## Buffer size of the channel to receive monitor events.
167
180
# cilium_hubble_event_queue_size: 50
168
181
182
+ cilium_gateway_api_enabled : false
183
+
169
184
# The default IP address management mode is "Cluster Scope".
170
185
# https://docs.cilium.io/en/stable/concepts/networking/ipam/
171
186
cilium_ipam_mode : cluster-pool
@@ -190,7 +205,8 @@ cilium_ipam_mode: cluster-pool
190
205
191
206
192
207
# Extra arguments for the Cilium agent
193
- cilium_agent_custom_args : []
208
+ cilium_agent_custom_args : [] # deprecated
209
+ cilium_agent_extra_args : []
194
210
195
211
# For adding and mounting extra volumes to the cilium agent
196
212
cilium_agent_extra_volumes : []
@@ -214,13 +230,19 @@ cilium_operator_extra_volumes: []
214
230
cilium_operator_extra_volume_mounts : []
215
231
216
232
# Extra arguments for the Cilium Operator
217
- cilium_operator_custom_args : []
233
+ cilium_operator_custom_args : [] # deprecated
234
+ cilium_operator_extra_args : []
218
235
219
236
# Tolerations of the cilium operator
220
237
cilium_operator_tolerations :
221
238
- operator : " Exists"
222
239
240
+ # Unique ID of the cluster. Must be unique across all connected
241
+ # clusters and in the range of 1 to 255. Only required for Cluster Mesh,
242
+ # may be 0 if Cluster Mesh is not used.
243
+ cilium_cluster_id : 0
223
244
# Name of the cluster. Only relevant when building a mesh of clusters.
245
+ # The "default" name cannot be used if the Cluster ID is different from 0.
224
246
cilium_cluster_name : default
225
247
226
248
# Make Cilium take ownership over the `/etc/cni/net.d` directory on the node, renaming all non-Cilium CNI configurations to `*.cilium_bak`.
@@ -263,7 +285,7 @@ cilium_enable_bpf_masquerade: false
263
285
# host stack (true) or directly and more efficiently out of BPF (false) if
264
286
# the kernel supports it. The latter has the implication that it will also
265
287
# bypass netfilter in the host namespace.
266
- cilium_enable_host_legacy_routing : true
288
+ cilium_enable_host_legacy_routing : false
267
289
268
290
# -- Enable use of the remote node identity.
269
291
# ref: https://docs.cilium.io/en/v1.7/install/upgrade/#configmap-remote-node-identity
@@ -307,9 +329,9 @@ cilium_rolling_restart_wait_retries_count: 30
307
329
cilium_rolling_restart_wait_retries_delay_seconds : 10
308
330
309
331
# Cilium changed the default metrics exporter ports in 1.12
310
- cilium_agent_scrape_port : " {{ cilium_version is version('1.12', '>=') | ternary(' 9962', '9090') }} "
311
- cilium_operator_scrape_port : " {{ cilium_version is version('1.12', '>=') | ternary(' 9963', '6942') }} "
312
- cilium_hubble_scrape_port : " {{ cilium_version is version('1.12', '>=') | ternary(' 9965', '9091') }} "
332
+ cilium_agent_scrape_port : " 9962"
333
+ cilium_operator_scrape_port : " 9963"
334
+ cilium_hubble_scrape_port : " 9965"
313
335
314
336
# Cilium certgen args for generate certificate for hubble mTLS
315
337
cilium_certgen_args :
@@ -328,26 +350,5 @@ cilium_certgen_args:
328
350
hubble-relay-client-cert-secret-name : hubble-relay-client-certs
329
351
hubble-relay-server-cert-generate : false
330
352
331
- # A list of extra rules variables to add to clusterrole for cilium operator, formatted like:
332
- # cilium_clusterrole_rules_operator_extra_vars:
333
- # - apiGroups:
334
- # - '""'
335
- # resources:
336
- # - pods
337
- # verbs:
338
- # - delete
339
- # - apiGroups:
340
- # - '""'
341
- # resources:
342
- # - nodes
343
- # verbs:
344
- # - list
345
- # - watch
346
- # resourceNames:
347
- # - toto
348
- cilium_clusterrole_rules_operator_extra_vars : []
349
353
cilium_enable_host_firewall : false
350
354
cilium_policy_audit_mode : false
351
-
352
- cilium_hubble_export_file_max_backups : " 5"
353
- cilium_hubble_export_file_max_size_mb : " 10"
0 commit comments