|
| 1 | +# Use this config as a template in order to use Instance Principals based aithentication |
| 2 | +# (https://docs.us-phoenix-1.oraclecloud.com/Content/Identity/Tasks/callingservicesfrominstances.htm). |
| 3 | +# Ensure you have setup the following OCI policies and your kubernetes nodes are running within them |
| 4 | +# allow dynamic-group [your dynamic group name] to read instance-family in compartment [your compartment name] |
| 5 | +# allow dynamic-group [your dynamic group name] to use virtual-network-family in compartment [your compartment name] |
| 6 | +# allow dynamic-group [your dynamic group name] to manage load-balancers in compartment [your compartment name] |
| 7 | +useInstancePrincipals: true |
| 8 | + |
| 9 | +# compartment configures Compartment within which the cluster resides. |
| 10 | +compartment: ocid1.compartment.oc1..aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa |
| 11 | + |
| 12 | +# vcn configures the Virtual Cloud Network (VCN) within which the cluster resides. |
| 13 | +vcn: ocid1.vcn.oc1..aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa |
| 14 | + |
| 15 | +loadBalancer: |
| 16 | + # subnet1 configures one of two subnets to which load balancers will be added. |
| 17 | + # OCI load balancers require two subnets to ensure high availability. |
| 18 | + subnet1: ocid1.subnet.oc1.phx.aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa |
| 19 | + |
| 20 | + # subnet2 configures the second of two subnets to which load balancers will be |
| 21 | + # added. OCI load balancers require two subnets to ensure high availability. |
| 22 | + subnet2: ocid1.subnet.oc1.phx.aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa |
| 23 | + |
| 24 | + # SecurityListManagementMode configures how security lists are managed by the CCM. |
| 25 | + # If you choose to have security lists managed by the CCM, ensure you have setup the following additional OCI policy: |
| 26 | + # Allow dynamic-group [your dynamic group name] to manage security-lists in compartment [your compartment name] |
| 27 | + # |
| 28 | + # "All" (default): Manage all required security list rules for load balancer services. |
| 29 | + # "Frontend": Manage only security list rules for ingress to the load |
| 30 | + # balancer. Requires that the user has setup a rule that |
| 31 | + # allows inbound traffic to the appropriate ports for kube |
| 32 | + # proxy health port, node port ranges, and health check port ranges. |
| 33 | + # E.g. 10.82.0.0/16 30000-32000. |
| 34 | + # "None": Disables all security list management. Requires that the |
| 35 | + # user has setup a rule that allows inbound traffic to the |
| 36 | + # appropriate ports for kube proxy health port, node port |
| 37 | + # ranges, and health check port ranges. E.g. 10.82.0.0/16 30000-32000. |
| 38 | + # Additionally requires the user to mange rules to allow |
| 39 | + # inbound traffic to load balancers. |
| 40 | + securityListManagementMode: All |
| 41 | + |
| 42 | + # Optional specification of which security lists to modify per subnet. This does not apply if security list management is off. |
| 43 | + securityLists: |
| 44 | + ocid1.subnet.oc1.phx.aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa: ocid1.securitylist.oc1.iad.aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa |
| 45 | + ocid1.subnet.oc1.phx.bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb: ocid1.securitylist.oc1.iad.aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa |
| 46 | + |
| 47 | +# Optional rate limit controls for accessing OCI API |
| 48 | +rateLimiter: |
| 49 | + rateLimitQPSRead: 20.0 |
| 50 | + rateLimitBucketRead: 5 |
| 51 | + rateLimitQPSWrite: 20.0 |
| 52 | + rateLimitBucketWrite: 5 |
| 53 | + |
0 commit comments