|
1 |
| -forks: |
2 |
| - kubeaidConfig: https://github.com/xxxxxxxxxx/kubeaid-config |
3 |
| - |
| 1 | +# Git credentials used to authenticate against the Git platform you're using (Github / Gitlab etc.). |
| 2 | +# KubeAid Bootstrap Script will use these credentials to : |
| 3 | +# |
| 4 | +# (1) Clone the KubeAid and KubeAid config repositories. |
| 5 | +# (2) Create and push commits to a branch in the KubeAid config repository. |
| 6 | +# |
| 7 | +# So, make sure the Git password (token) you're using has permissions associated to do the above. |
| 8 | +# |
| 9 | +# Currently, we only support HTTPS authentication. |
4 | 10 | git:
|
5 | 11 | username: xxxxxxxxxx
|
6 | 12 | password: xxxxxxxxxx
|
7 | 13 |
|
| 14 | +forks: |
| 15 | + # KubeAid repository URL (in HTTPs syntax). |
| 16 | + # Defaults to Obmondo's KubeAid repository. |
| 17 | + # kubeaid: https://github.com/Obmondo/KubeAid |
| 18 | + |
| 19 | + # Your KubeAid config repository URL (in HTTPs syntax). |
| 20 | + kubeaidConfig: https://github.com/xxxxxxxxxx/kubeaid-config |
| 21 | + |
| 22 | +# Kubernetes cluster and control-plane specific configurations. |
8 | 23 | cluster:
|
| 24 | + |
| 25 | + # Kubernetes cluster name. |
9 | 26 | name: kubeaid-demo-aws
|
| 27 | + |
| 28 | + # Kubernetes version to use. |
| 29 | + # NOTE : Make sure that the AMI you're using, is targetted towards this Kubernetes version. |
10 | 30 | k8sVersion: v1.31.0
|
11 | 31 |
|
| 32 | + # Kubernetes API server specific configurations. |
| 33 | + # REFER : https://github.com/kubernetes-sigs/cluster-api/blob/main/controlplane/kubeadm/config/crd/bases/controlplane.cluster.x-k8s.io_kubeadmcontrolplanes.yaml. |
| 34 | + # |
| 35 | + # NOTE : Generally, refer to the KubeadmControlPlane CRD instead of the corresponding GoLang |
| 36 | + # source types linked below. |
| 37 | + # There are some configuration options which appear in the corresponding GoLang source type, |
| 38 | + # but not in the CRD. If you set those fields, then they get removed by the Kubeadm |
| 39 | + # control-plane provider. This causes the capi-cluster ArgoCD App to always be in an |
| 40 | + # OutOfSync state, resulting to the KubeAid Bootstrap Script not making any progress! |
| 41 | + # apiServer: |
| 42 | + # |
| 43 | + # extraArgs: {} |
| 44 | + # |
| 45 | + # # REFER : "sigs.k8s.io/cluster-api/bootstrap/kubeadm/api/v1beta1".HostPathMount |
| 46 | + # # |
| 47 | + # # NOTE : If you want a mount to be read-only, then set extraVolume.readOnly to true. |
| 48 | + # # Otherwise, omit setting that field. It gets removed by the Kubeadm control-plane |
| 49 | + # # provider component, which results to the capi-cluster ArgoCD App always being in |
| 50 | + # # OutOfSync state. |
| 51 | + # extraVolumes: [] |
| 52 | + # |
| 53 | + # # REFER : "sigs.k8s.io/cluster-api/bootstrap/kubeadm/api/v1beta1".File |
| 54 | + # files: [] |
| 55 | + |
| 56 | + # Uncomment, if you just want audit-logging to be setup for you! KubeAid Bootstrap Script will set |
| 57 | + # necessary configuration options in cluster.apiServer. |
| 58 | + # enableAuditLogging: True |
| 59 | + |
12 | 60 | cloud:
|
| 61 | + # AWS specific configurations. |
13 | 62 | aws:
|
14 |
| - region: us-east-1 |
| 63 | + region: us-east-1 |
15 | 64 |
|
| 65 | + # AWS SSH Keypair name, which ClusterAPI components (Kubeadm bootstrap and control-plane |
| 66 | + # providers specifically) will use to SSH into the main cluster's master nodes. |
16 | 67 | sshKeyName: kubeaid-demo
|
17 | 68 |
|
18 |
| - bastionEnabled: False |
| 69 | + # bastionEnabled: True |
19 | 70 |
|
20 | 71 | controlPlane:
|
21 |
| - instanceType: t4g.medium |
22 |
| - ami: |
23 |
| - id: ami-xxxxxxxxxxxxxxxxx |
24 |
| - replicas: 1 |
| 72 | + ami: |
| 73 | + id: ami-xxxxxxxxxxxxxxxxx |
| 74 | + instanceType: t4g.medium |
| 75 | + replicas: 1 |
25 | 76 |
|
26 | 77 | nodeGroups:
|
27 | 78 | - name: primary
|
28 | 79 | ami:
|
29 |
| - id: ami-xxxxxxxxxxxxxxxxx |
| 80 | + id: ami-xxxxxxxxxxxxxxxxx |
30 | 81 | instanceType: t4g.medium
|
| 82 | + |
| 83 | + minSize: 0 |
31 | 84 | replicas: 1
|
| 85 | + maxSize: 3 |
| 86 | + |
32 | 87 | rootVolumeSize: 35
|
| 88 | + |
| 89 | + # AWS SSH Keypair name, which ClusterAPI components (Kubeadm bootstrap provider |
| 90 | + # specifically) will use to SSH into each node belonging to this node-group. |
33 | 91 | sshKeyName: kubeaid-demo
|
34 | 92 |
|
35 |
| - # Label should meet one of the following criterias to propagate to Node : |
36 |
| - # |
37 |
| - # (1) Has node-role.kubernetes.io as prefix. |
38 |
| - # (2) Belongs to node-restriction.kubernetes.io domain. |
39 |
| - # (3) Belongs to node.cluster.x-k8s.io domain. |
40 |
| - # |
41 |
| - # REFER : https://cluster-api.sigs.k8s.io/developer/architecture/controllers/metadata-propagation#machine |
42 |
| - labels: |
43 |
| - node.cluster.x-k8s.io/nodegroup: primary |
| 93 | + # A label should meet one of the following criterias to propagate to each of the nodes : |
| 94 | + # |
| 95 | + # (1) Has node-role.kubernetes.io as prefix. |
| 96 | + # (2) Belongs to node-restriction.kubernetes.io domain. |
| 97 | + # (3) Belongs to node.cluster.x-k8s.io domain. |
| 98 | + # |
| 99 | + # REFER : https://cluster-api.sigs.k8s.io/developer/architecture/controllers/metadata-propagation#machine |
| 100 | + labels: |
| 101 | + node.cluster.x-k8s.io/nodegroup: primary |
44 | 102 | node-role.kubernetes.io/bootstrapper: ""
|
45 | 103 |
|
46 |
| - taints: [] |
| 104 | + # taints: [] |
47 | 105 |
|
48 |
| - disasterRecovery: |
49 |
| - veleroBackupsS3BucketName: kubeaid-demo-kubernetes-objects |
| 106 | + disasterRecovery: |
| 107 | + veleroBackupsS3BucketName: kubeaid-demo-kubernetes-objects |
50 | 108 | sealedSecretsBackupS3BucketName: kubeaid-demo-sealed-secrets
|
| 109 | + |
| 110 | +# monitoring: |
| 111 | +# kubePrometheusVersion: v0.14.0 |
0 commit comments