|
| 1 | +// Module included in the following assemblies: |
| 2 | +// |
| 3 | +// * microshift_configuring/microshift-using-config-yaml.adoc |
| 4 | + |
| 5 | +:_mod-docs-content-type: REFERENCE |
| 6 | +[id="microshift-config-parameters-table_{context}"] |
| 7 | += Parameters and values for the {microshift-short} config.yaml file |
| 8 | + |
| 9 | +The following table explains {microshift-short} configuration YAML parameters and valid values for each: |
| 10 | + |
| 11 | +.{microshift-short} `config.yaml` parameters |
| 12 | +[cols="3","20%,10%,70%",options="header"] |
| 13 | +|=== |
| 14 | +|Field|Type|Description |
| 15 | + |
| 16 | +|`advertiseAddress` |
| 17 | +|`string` |
| 18 | +|A string that specifies the IP address from which the API server is advertised to members of the cluster. The default value is calculated based on the address of the service network. |
| 19 | + |
| 20 | +|`auditLog.maxFileAge` |
| 21 | +|`number` |
| 22 | +|How long log files are kept before automatic deletion. The default value of `0` in the `maxFileAge` parameter means a log file is never deleted based on age. This value can be configured. |
| 23 | + |
| 24 | +|`auditLog.maxFileSize` |
| 25 | +|`number` |
| 26 | +|By default, when the `audit.log` file reaches the `maxFileSize` limit, the `audit.log` file is rotated and {microshift-short} begins writing to a new `audit.log` file. This value can be configured. |
| 27 | + |
| 28 | +|`auditLog.maxFiles` |
| 29 | +|`number` |
| 30 | +|The total number of log files kept. By default, {microshift-short} retains 10 log files. The oldest is deleted when an excess file is created. This value can be configured. |
| 31 | + |
| 32 | +|`auditLog.profile` |
| 33 | +|`Default`, `WriteRequestBodies`, `AllRequestBodies`, or `None` |
| 34 | +|Logs only metadata for read and write requests; does not log request bodies except for OAuth access token requests. If you do not specify this field, the `Default` profile is used. |
| 35 | + |
| 36 | +|`namedCertificates` |
| 37 | +|`list` |
| 38 | +|Defines externally generated certificates and domain names by using custom certificate authorities. |
| 39 | + |
| 40 | +|`namedCertificates.certPath` |
| 41 | +|`path` |
| 42 | +|The full path to the certificate. |
| 43 | + |
| 44 | +|`namedCertificates.keyPath` |
| 45 | +|`path` |
| 46 | +|The full path to the certificate key. |
| 47 | + |
| 48 | +|`namedCertificates.names` |
| 49 | +|`list` |
| 50 | +|Optional. Add a list of explicit DNS names. Leading wildcards are allowed. If no names are provided, the implicit names are extracted from the certificates. |
| 51 | + |
| 52 | +|`subjectAltNames` |
| 53 | +|Fully qualified domain names (FQDNs), wildcards such as `*.domain.com`, or IP addresses |
| 54 | +|Subject Alternative Names for API server certificates. SANs indicate all of the domain names and IP addresses that are secured by a certificate. |
| 55 | + |
| 56 | +|`debugging.logLevel` |
| 57 | +|`Normal`, `Debug`, `Trace`, or `TraceAll` |
| 58 | +|Log verbosity. Default is `Normal`. |
| 59 | + |
| 60 | +|`dns.baseDomain` |
| 61 | +|`valid domain` |
| 62 | +|Base domain of the cluster. All managed DNS records are subdomains of this base. |
| 63 | + |
| 64 | +|`etcd.memoryLimitMB` |
| 65 | +|`number` |
| 66 | +|By default, `etcd` uses as much memory as needed to handle the load on the system. However, in memory constrained systems, it might be preferred or necessary to limit the amount of memory `etcd` can to use at a given time. |
| 67 | + |
| 68 | +|`ingress.listenAddress` |
| 69 | +|IP address, NIC name, or multiple |
| 70 | +|Value defaults to the entire network of the host. The valid configurable value is a list that can be either a single IP address or NIC name or multiple IP addresses and NIC names. |
| 71 | + |
| 72 | +|`ingress.ports.http` |
| 73 | +|`80` |
| 74 | +|Default port shown. Configurable. Valid value is a single, unique port in the 1-65535 range. The values of the `ports.http` and `ports.https` fields cannot be the same. |
| 75 | + |
| 76 | +|`ingress.ports.https` |
| 77 | +|`443` |
| 78 | +|Default port shown. Configurable. Valid value is a single, unique port in the 1-65535 range. The values of the `ports.http` and `ports.https` fields cannot be the same. |
| 79 | + |
| 80 | +|`ingress.routeAdmissionPolicy. |
| 81 | + namespaceOwnership` |
| 82 | +|`Strict` or `InterNamespaceAllowed` |
| 83 | +|Describes how hostname claims across namespaces are handled. By default, allows routes to claim different paths of the same hostname across namespaces. Specifying `Strict` prevents routes in different namespaces from claiming the same hostname. If the value is deleted in a customized {microshift-short} `config.yaml`, the `InterNamespaceAllowed` value is automatically set. |
| 84 | + |
| 85 | +|`ingress.status` |
| 86 | +|`Managed` or `Removed` |
| 87 | +|Router status. Default is `Managed`. |
| 88 | + |
| 89 | +|`kubelet` |
| 90 | +|See the {microshift-short} low-latency instructions |
| 91 | +|Parameter for passthrough configuration of the kubelet node agent. Used for low-latency configuration. Default value is null. |
| 92 | + |
| 93 | +|`manifests` |
| 94 | +|`list of paths` |
| 95 | +|The locations on the file system to scan for `kustomization` files to use to load manifests. Set to a list of paths to scan only those paths. Set to an empty list to disable loading manifests. The entries in the list can be glob patterns to match multiple subdirectories. Default values are `/usr/lib/microshift/manifests`, `/usr/lib/microshift/manifests.d/`, `/etc/microshift/manifests`, and `/etc/microshift/manifests.d/`. |
| 96 | + |
| 97 | +|`network.clusterNetwork` |
| 98 | +|IP address block |
| 99 | +|A block of IP addresses from which pod IP addresses are allocated. IPv4 is the default. Dual-stack entries are supported. The first entry in this field is immutable after {microshift-short} starts. Default range is `10.42.0.0/16`. |
| 100 | + |
| 101 | +|`network.serviceNetwork` |
| 102 | +|IP address block |
| 103 | +|A block of virtual IP addresses for Kubernetes services. IP address pool for services. IPv4 is the default. Dual-stack entries are supported. The first entry in this field is immutable after {microshift-short} starts. Default range is `10.43.0.0/16`. |
| 104 | + |
| 105 | +|`network.serviceNodePortRange` |
| 106 | +|`range` |
| 107 | +|The port range allowed for Kubernetes services of type `NodePort`. If not specified, the default range of 30000-32767 is used. Services without a `NodePort` specified are automatically allocated one from this range. This parameter can be updated after {microshift-short} starts. |
| 108 | + |
| 109 | +|`node.hostnameOverride` |
| 110 | +|`string` |
| 111 | +|The name of the node. The default value is the hostname. If non-empty, this string is used to identify the node instead of the hostname. This value is immutable after {microshift-short} starts. |
| 112 | + |
| 113 | +|`node.nodeIP` |
| 114 | +|IPv4 address |
| 115 | +|The IPv4 address of the node. The default value is the IP address of the default route. |
| 116 | + |
| 117 | +|`nodeIPv6` |
| 118 | +|IPv6 address |
| 119 | +|The IPv6 address for the node for dual-stack configurations. Cannot be configured in single stack for either IPv4 or IPv6. Default is an empty value or null. |
| 120 | + |
| 121 | +|`storage.driver` |
| 122 | +|`none` or `lvms` |
| 123 | +|Default value is empty. An empty value or null field defaults to LVMS deployment. |
| 124 | + |
| 125 | +|`storage.optionalCsiComponents` |
| 126 | +|`array` |
| 127 | +|Default value is null or an empty array. A null or empty array defaults to deploying `snapshot-controller` and `snapshot-webhook`. Expected values are `csi-snapshot-controller`, `csi-snapshot-webhook`, or `none`. An entry of `none` is mutually exclusive with all other values. |
| 128 | +|=== |
0 commit comments