From bb06d7569be0fede2f151c1992fb2bd3260f383a Mon Sep 17 00:00:00 2001
From: Martin Taillefer
Date: Tue, 10 Sep 2019 21:04:56 -0700
Subject: [PATCH] Doc updates. (#278)
---
.../v1alpha2/istiocontrolplane_types.pb.go | 18 +-
.../v1alpha2/istiocontrolplane_types.proto | 196 +-
pkg/apis/istio/v1alpha2/v1alpha2.pb.html | 6 +-
pkg/apis/istio/v1alpha2/values/values.pb.html | 35 +-
.../istio/v1alpha2/values/values_types.pb.go | 14 +-
.../istio/v1alpha2/values/values_types.proto | 14 +-
pkg/vfs/assets.gen.go | 1587 +++++------------
7 files changed, 623 insertions(+), 1247 deletions(-)
diff --git a/pkg/apis/istio/v1alpha2/istiocontrolplane_types.pb.go b/pkg/apis/istio/v1alpha2/istiocontrolplane_types.pb.go
index b6151d06e..7253e372f 100644
--- a/pkg/apis/istio/v1alpha2/istiocontrolplane_types.pb.go
+++ b/pkg/apis/istio/v1alpha2/istiocontrolplane_types.pb.go
@@ -42,14 +42,14 @@
//spec:
//```
//
-//2. Default minimal profile install
+//1. Default minimal profile install
//
//```yaml
//spec:
//profile: minimal
//```
//
-//3. Default install with telemetry disabled
+//1. Default install with telemetry disabled
//
//```yaml
//spec:
@@ -57,7 +57,7 @@
//enabled: false
//```
//
-//4. Default install with each feature installed to different namespace and security components in separate namespaces
+//1. Default install with each feature installed to different namespace and security components in separate namespaces
//
//```yaml
//spec:
@@ -83,7 +83,7 @@
//namespace: istio-node-agent
//```
//
-//5. Default install with specialized k8s settings for pilot
+//1. Default install with specialized k8s settings for pilot
//
//```yaml
//spec:
@@ -105,7 +105,7 @@
//successThreshold: 33
//```
//
-//6. Default install with values.yaml customizations for proxy
+//1. Default install with values.yaml customizations for proxy
//
//```yaml
//spec:
@@ -117,7 +117,7 @@
//- global.proxy.dnsRefreshRate: 10s
//```
//
-//7. Default install with modification to container flag in galley
+//1. Default install with modification to container flag in galley
//
//```yaml
//spec:
@@ -260,12 +260,12 @@ type IstioControlPlaneSpec struct {
// Unvalidated overrides for default global values.yaml.
UnvalidatedValues map[string]interface{} `protobuf:"bytes,51,opt,name=unvalidatedValues,proto3" json:"unvalidatedValues,omitempty"`
// Path or name for the profile e.g.
- // minimal (looks in profiles dir for a file called minimal.yaml)
- // /tmp/istio/install/values/custom/custom-install.yaml (local file path)
+ // - minimal (looks in profiles dir for a file called minimal.yaml)
+ // - /tmp/istio/install/values/custom/custom-install.yaml (local file path)
// default profile is used if this field is unset.
Profile string `protobuf:"bytes,100,opt,name=profile,proto3" json:"profile,omitempty"`
// Path for the install package. e.g.
- // /tmp/istio-installer/nightly (local file path)
+ // - /tmp/istio-installer/nightly (local file path)
InstallPackagePath string `protobuf:"bytes,102,opt,name=install_package_path,json=installPackagePath,proto3" json:"install_package_path,omitempty"`
// Root for docker image paths e.g. docker.io/istio-release.
// Releases are published to docker hub under 'istio' project.
diff --git a/pkg/apis/istio/v1alpha2/istiocontrolplane_types.proto b/pkg/apis/istio/v1alpha2/istiocontrolplane_types.proto
index e5443ffb7..6fe83fdc7 100644
--- a/pkg/apis/istio/v1alpha2/istiocontrolplane_types.proto
+++ b/pkg/apis/istio/v1alpha2/istiocontrolplane_types.proto
@@ -66,101 +66,101 @@ EXAMPLES
1. Default Istio install
-```yaml
-spec:
-```
-
-2. Default minimal profile install
-
-```yaml
-spec:
- profile: minimal
-```
-
-3. Default install with telemetry disabled
-
-```yaml
-spec:
- telemetry:
- enabled: false
-```
-
-4. Default install with each feature installed to different namespace and security components in separate namespaces
-
-```yaml
-spec:
- traffic_management:
- components:
- namespace: istio-traffic-management
- policy:
- components:
- namespace: istio-policy
- telemetry:
- components:
- namespace: istio-telemetry
- config_management:
- components:
- namespace: istio-config-management
- security:
- components:
- citadel:
- namespace: istio-citadel
- cert_manager:
- namespace: istio-cert-manager
- node_agent:
- namespace: istio-node-agent
-```
-
-5. Default install with specialized k8s settings for pilot
-
-```yaml
-spec:
- traffic_management:
- components:
- pilot:
- k8s:
- resources:
- limits:
- cpu: 444m
- memory: 333Mi
- requests:
- cpu: 222m
- memory: 111Mi
- readinessProbe:
- failureThreshold: 44
- initialDelaySeconds: 11
- periodSeconds: 22
- successThreshold: 33
-```
-
-6. Default install with values.yaml customizations for proxy
-
-```yaml
-spec:
- traffic_management:
- components:
- proxy:
- values:
- - global.proxy.enableCoreDump: true
- - global.proxy.dnsRefreshRate: 10s
-```
-
-7. Default install with modification to container flag in galley
-
-```yaml
-spec:
- configuration_management:
- components:
- galley:
- k8s:
- overlays:
- - apiVersion: extensions/v1beta1
- kind: Deployment
- name: istio-galley
- patches:
- - path: spec.template.spec.containers.[name:galley].command.[--livenessProbeInterval]
- value: --livenessProbeInterval=123s
-```
+ ```yaml
+ spec:
+ ```
+
+1. Default minimal profile install
+
+ ```yaml
+ spec:
+ profile: minimal
+ ```
+
+1. Default install with telemetry disabled
+
+ ```yaml
+ spec:
+ telemetry:
+ enabled: false
+ ```
+
+1. Default install with each feature installed to different namespace and security components in separate namespaces
+
+ ```yaml
+ spec:
+ traffic_management:
+ components:
+ namespace: istio-traffic-management
+ policy:
+ components:
+ namespace: istio-policy
+ telemetry:
+ components:
+ namespace: istio-telemetry
+ config_management:
+ components:
+ namespace: istio-config-management
+ security:
+ components:
+ citadel:
+ namespace: istio-citadel
+ cert_manager:
+ namespace: istio-cert-manager
+ node_agent:
+ namespace: istio-node-agent
+ ```
+
+1. Default install with specialized k8s settings for pilot
+
+ ```yaml
+ spec:
+ traffic_management:
+ components:
+ pilot:
+ k8s:
+ resources:
+ limits:
+ cpu: 444m
+ memory: 333Mi
+ requests:
+ cpu: 222m
+ memory: 111Mi
+ readinessProbe:
+ failureThreshold: 44
+ initialDelaySeconds: 11
+ periodSeconds: 22
+ successThreshold: 33
+ ```
+
+1. Default install with values.yaml customizations for proxy
+
+ ```yaml
+ spec:
+ traffic_management:
+ components:
+ proxy:
+ values:
+ - global.proxy.enableCoreDump: true
+ - global.proxy.dnsRefreshRate: 10s
+ ```
+
+1. Default install with modification to container flag in galley
+
+ ```yaml
+ spec:
+ configuration_management:
+ components:
+ galley:
+ k8s:
+ overlays:
+ - apiVersion: extensions/v1beta1
+ kind: Deployment
+ name: istio-galley
+ patches:
+ - path: spec.template.spec.containers.[name:galley].command.[--livenessProbeInterval]
+ value: --livenessProbeInterval=123s
+ ```
*/
package v1alpha2;
@@ -194,12 +194,12 @@ message IstioControlPlaneSpec {
// Unvalidated overrides for default global values.yaml.
TypeMapStringInterface unvalidatedValues = 51;
// Path or name for the profile e.g.
- // minimal (looks in profiles dir for a file called minimal.yaml)
- // /tmp/istio/install/values/custom/custom-install.yaml (local file path)
+ // - minimal (looks in profiles dir for a file called minimal.yaml)
+ // - /tmp/istio/install/values/custom/custom-install.yaml (local file path)
// default profile is used if this field is unset.
string profile = 100;
// Path for the install package. e.g.
- // /tmp/istio-installer/nightly (local file path)
+ // - /tmp/istio-installer/nightly (local file path)
string install_package_path = 102;
// Root for docker image paths e.g. docker.io/istio-release.
// Releases are published to docker hub under 'istio' project.
diff --git a/pkg/apis/istio/v1alpha2/v1alpha2.pb.html b/pkg/apis/istio/v1alpha2/v1alpha2.pb.html
index 7524a8bbb..98908ab40 100644
--- a/pkg/apis/istio/v1alpha2/v1alpha2.pb.html
+++ b/pkg/apis/istio/v1alpha2/v1alpha2.pb.html
@@ -860,8 +860,8 @@ IstioControlPlaneSpec
string |
Path or name for the profile e.g.
- minimal (looks in profiles dir for a file called minimal.yaml)
- /tmp/istio/install/values/custom/custom-install.yaml (local file path)
+ - minimal (looks in profiles dir for a file called minimal.yaml)
+ - /tmp/istio/install/values/custom/custom-install.yaml (local file path)
default profile is used if this field is unset.
|
@@ -871,7 +871,7 @@ IstioControlPlaneSpec
string |
Path for the install package. e.g.
- /tmp/istio-installer/nightly (local file path)
+ - /tmp/istio-installer/nightly (local file path)
|
diff --git a/pkg/apis/istio/v1alpha2/values/values.pb.html b/pkg/apis/istio/v1alpha2/values/values.pb.html
index e85324ace..ce2e13904 100644
--- a/pkg/apis/istio/v1alpha2/values/values.pb.html
+++ b/pkg/apis/istio/v1alpha2/values/values.pb.html
@@ -398,15 +398,18 @@ EgressGatewayConfig
correspondingly.
See https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
-Examples:
-podAntiAffinityLabelSelector:
+
Examples:
+
+podAntiAffinityLabelSelector:
- key: security
operator: In
values: S1,S2
- topologyKey: “kubernetes.io/hostname”
- This pod anti-affinity rule says that the pod requires not to be scheduled
- onto a node if that node is already running a pod with label having key
- “security” and value “S1”.
+ topologyKey: "kubernetes.io/hostname"
+
+
+This pod anti-affinity rule says that the pod requires not to be scheduled
+onto a node if that node is already running a pod with label having key
+“security” and value “S1”.
@@ -798,19 +801,20 @@ GlobalConfig
endpoints based on the localities of where the traffic originates and where it will terminate.
Please set either failover or distribute configuration but not both.
-localityLbSetting:
+
localityLbSetting:
distribute:
- - from: “us-central1/”
+ - from: "us-central1/*"
to:
- “us-central1/”: 80
- “us-central2/*”: 20
+ "us-central1/*": 80
+ "us-central2/*": 20
-localityLbSetting:
+localityLbSetting:
failover:
- from: us-east
to: eu-west
- from: us-west
- to: us-east
+ to: us-east
+
@@ -855,10 +859,10 @@ GlobalConfig
LoadBalancer gateway service type is currently supported, for a NodePort type gateway service,
it still need to be configured manually).
-meshNetworks:
+
meshNetworks:
network1:
endpoints:
- - fromCidr: “192.168.0.1⁄24”
+ - fromCidr: "192.168.0.1/24"
gateways:
- address: 1.1.1.1
port: 80
@@ -867,7 +871,8 @@ GlobalConfig
- fromRegistry: reg1
gateways:
- registryServiceName: istio-ingressgateway.istio-system.svc.cluster.local
- port: 443
+ port: 443
+
diff --git a/pkg/apis/istio/v1alpha2/values/values_types.pb.go b/pkg/apis/istio/v1alpha2/values/values_types.pb.go
index 51448f318..b5aadcc41 100644
--- a/pkg/apis/istio/v1alpha2/values/values_types.pb.go
+++ b/pkg/apis/istio/v1alpha2/values/values_types.pb.go
@@ -671,14 +671,17 @@ type EgressGatewayConfig struct {
// See https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
//
// Examples:
+ //
+ // ```yaml
// podAntiAffinityLabelSelector:
// - key: security
// operator: In
// values: S1,S2
// topologyKey: "kubernetes.io/hostname"
- // This pod anti-affinity rule says that the pod requires not to be scheduled
- // onto a node if that node is already running a pod with label having key
- // “security” and value “S1”.
+ // ```
+ // This pod anti-affinity rule says that the pod requires not to be scheduled
+ // onto a node if that node is already running a pod with label having key
+ // “security” and value “S1”.
PodAntiAffinityLabelSelector *TypeSliceOfMapStringInterface `protobuf:"bytes,12,opt,name=podAntiAffinityLabelSelector,proto3" json:"podAntiAffinityLabelSelector,omitempty"`
// See PodAntiAffinityLabelSelector.
PodAntiAffinityTermLabelSelector *TypeSliceOfMapStringInterface `protobuf:"bytes,13,opt,name=podAntiAffinityTermLabelSelector,proto3" json:"podAntiAffinityTermLabelSelector,omitempty"`
@@ -1160,6 +1163,7 @@ type GlobalConfig struct {
// endpoints based on the localities of where the traffic originates and where it will terminate.
// Please set either failover or distribute configuration but not both.
//
+ // ```yaml
// localityLbSetting:
// distribute:
// - from: "us-central1/*"
@@ -1173,6 +1177,7 @@ type GlobalConfig struct {
// to: eu-west
// - from: us-west
// to: us-east
+ // ```
LocalityLbSetting map[string]string `protobuf:"bytes,15,rep,name=localityLbSetting,proto3" json:"localityLbSetting,omitempty" protobuf_key:"bytes,1,opt,name=key,proto3" protobuf_val:"bytes,2,opt,name=value,proto3"`
// Specifies the Configuration for the legacy kubernetes Ingress.
K8SIngress *KubernetesIngressConfig `protobuf:"bytes,16,opt,name=k8sIngress,proto3" json:"k8sIngress,omitempty"`
@@ -1193,6 +1198,7 @@ type GlobalConfig struct {
// LoadBalancer gateway service type is currently supported, for a NodePort type gateway service,
// it still need to be configured manually).
//
+ // ```yaml
// meshNetworks:
// network1:
// endpoints:
@@ -1206,7 +1212,7 @@ type GlobalConfig struct {
// gateways:
// - registryServiceName: istio-ingressgateway.istio-system.svc.cluster.local
// port: 443
- //
+ // ```
MeshNetworks *TypeMapStringInterface `protobuf:"bytes,19,opt,name=meshNetworks,proto3" json:"meshNetworks,omitempty"`
// Specifies the monitor port number for all Istio control plane components.
MonitoringPort uint32 `protobuf:"varint,20,opt,name=monitoringPort,proto3" json:"monitoringPort,omitempty"`
diff --git a/pkg/apis/istio/v1alpha2/values/values_types.proto b/pkg/apis/istio/v1alpha2/values/values_types.proto
index f83120d62..9479829c5 100644
--- a/pkg/apis/istio/v1alpha2/values/values_types.proto
+++ b/pkg/apis/istio/v1alpha2/values/values_types.proto
@@ -162,14 +162,17 @@ message EgressGatewayConfig {
// See https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
//
// Examples:
+ //
+ // ```yaml
// podAntiAffinityLabelSelector:
// - key: security
// operator: In
// values: S1,S2
// topologyKey: "kubernetes.io/hostname"
- // This pod anti-affinity rule says that the pod requires not to be scheduled
- // onto a node if that node is already running a pod with label having key
- // “security” and value “S1”.
+ // ```
+ // This pod anti-affinity rule says that the pod requires not to be scheduled
+ // onto a node if that node is already running a pod with label having key
+ // “security” and value “S1”.
TypeSliceOfMapStringInterface podAntiAffinityLabelSelector = 12;
// See PodAntiAffinityLabelSelector.
@@ -318,6 +321,7 @@ message GlobalConfig {
// endpoints based on the localities of where the traffic originates and where it will terminate.
// Please set either failover or distribute configuration but not both.
//
+ // ```yaml
// localityLbSetting:
// distribute:
// - from: "us-central1/*"
@@ -331,6 +335,7 @@ message GlobalConfig {
// to: eu-west
// - from: us-west
// to: us-east
+ // ```
map localityLbSetting = 15;
// LocalityLbSetting map[string]interface{} `json:"localityLbSetting"`
@@ -356,6 +361,7 @@ message GlobalConfig {
// LoadBalancer gateway service type is currently supported, for a NodePort type gateway service,
// it still need to be configured manually).
//
+ // ```yaml
// meshNetworks:
// network1:
// endpoints:
@@ -369,7 +375,7 @@ message GlobalConfig {
// gateways:
// - registryServiceName: istio-ingressgateway.istio-system.svc.cluster.local
// port: 443
- //
+ // ```
TypeMapStringInterface meshNetworks = 19;
// Specifies the monitor port number for all Istio control plane components.
diff --git a/pkg/vfs/assets.gen.go b/pkg/vfs/assets.gen.go
index ea8235dce..eadea84fc 100644
--- a/pkg/vfs/assets.gen.go
+++ b/pkg/vfs/assets.gen.go
@@ -39,6 +39,7 @@
// ../../data/charts/gateways/istio-ingress/templates/serviceaccount.yaml
// ../../data/charts/gateways/istio-ingress/templates/sidecar.yaml
// ../../data/charts/gateways/istio-ingress/values.yaml
+// ../../data/charts/global.yaml
// ../../data/charts/istio-cni/Chart.yaml
// ../../data/charts/istio-cni/templates/clusterrole.yaml
// ../../data/charts/istio-cni/templates/clusterrolebinding.yaml
@@ -211,14 +212,10 @@
// ../../data/charts/security/nodeagent/templates/serviceaccount.yaml
// ../../data/charts/security/nodeagent/values.yaml
// ../../data/profiles/default.yaml
-// ../../data/profiles/default.yaml.orig
// ../../data/profiles/demo-auth.yaml
-// ../../data/profiles/demo-auth.yaml.orig
// ../../data/profiles/demo.yaml
-// ../../data/profiles/demo.yaml.orig
// ../../data/profiles/minimal.yaml
// ../../data/profiles/sds.yaml
-// ../../data/profiles/sds.yaml.orig
// DO NOT EDIT!
package vfs
@@ -3788,6 +3785,446 @@ func chartsGatewaysIstioIngressValuesYaml() (*asset, error) {
return a, nil
}
+var _chartsGlobalYaml = []byte(`# Global and common settings for installing Istio.
+
+# This file is configured for a small scale production cluster.
+# Use user-values-medium or custom settings to tune up the CPU and scalling.
+# Additional values overrides can be used.
+
+# Each individual component will use values from this file, with defaults and 'advanced' settings included in
+# its own chart's values.yaml.
+
+# TODO: trim this file to commonly used settings, leave 'advanced' in the individual values.yaml (they can
+# still be overridden by users, but won't show in basic documentation.
+
+# This doesn't match istio defaults, which are more geared towards tests and bookinfo.
+
+global:
+ # Used to locate istio-pilot.
+ # Default is to install pilot in a dedicated namespace, istio-pilot11. You can use multiple namespaces, but
+ # for each 'profile' you need to match the control plane namespace and the value of istioNamespace
+ # It is assumed that istio-system is running either 1.0 or an upgraded version of 1.1, but only security components are
+ # used (citadel generating the secrets).
+ istioNamespace: istio-control
+ configNamespace: istio-control
+
+ # Telemetry namespace, including tracing.
+ telemetryNamespace: istio-telemetry
+
+ prometheusNamespace: istio-telemetry
+
+ policyNamespace: istio-policy
+
+ ## End new settings
+ ## After this line we have the old Istio settings.
+
+ # Default hub for Istio images.
+ # Releases are published to docker hub under 'istio' project.
+ # Daily builds from prow are on gcr.io, and nightly builds from circle on docker.io/istionightly
+ hub: gcr.io/istio-release
+
+ # Default tag for Istio images.
+ tag: master-latest-daily
+
+ # Comma-separated minimum per-scope logging level of messages to output, in the form of :,:
+ # The control plane has different scopes depending on component, but can configure default log level across all components
+ # If empty, default scope and level will be used as configured in code
+ logging:
+ level: "default:info"
+
+ # To output all istio components logs in json format by adding --log_as_json argument to each container argument
+ logAsJson: false
+
+ k8sIngress:
+ enabled: false
+ # Gateway used for k8s Ingress resources. By default it is
+ # using 'istio:ingressgateway' that will be installed by setting
+ # 'gateways.enabled' and 'gateways.istio-ingressgateway.enabled'
+ # flags to true.
+ gatewayName: ingressgateway
+ # enableHttps will add port 443 on the ingress.
+ # It REQUIRES that the certificates are installed in the
+ # expected secrets - enabling this option without certificates
+ # will result in LDS rejection and the ingress will not work.
+ enableHttps: false
+
+ proxy:
+ image: proxyv2
+
+ # cluster domain. Default value is "cluster.local".
+ clusterDomain: "cluster.local"
+
+ # Resources for the sidecar.
+ resources:
+ requests:
+ cpu: 100m
+ memory: 128Mi
+ limits:
+ cpu: 2000m
+ memory: 128Mi
+
+ # Controls number of Proxy worker threads.
+ # If set to 0 (default), then start worker thread for each CPU thread/core.
+ concurrency: 2
+
+ # Configures the access log for each sidecar.
+ # Options:
+ # "" - disables access log
+ # "/dev/stdout" - enables access log
+ accessLogFile: ""
+
+ # Configure how and what fields are displayed in sidecar access log. Setting to
+ # empty string will result in default log format
+ accessLogFormat: ""
+
+ # Configure the access log for sidecar to JSON or TEXT.
+ accessLogEncoding: TEXT
+
+ # Log level for proxy, applies to gateways and sidecars.
+ # Expected values are: trace|debug|info|warning|error|critical|off
+ logLevel: warning
+
+ # Per Component log level for proxy, applies to gateways and sidecars. If a component level is
+ # not set, then the global "logLevel" will be used.
+ componentLogLevel: "misc:error"
+
+ # Configure the DNS refresh rate for Envoy cluster of type STRICT_DNS
+ # This must be given it terms of seconds. For example, 300s is valid but 5m is invalid.
+ dnsRefreshRate: 300s
+
+ #If set to true, istio-proxy container will have privileged securityContext
+ privileged: false
+
+ # If set, newly injected sidecars will have core dumps enabled.
+ enableCoreDump: false
+
+ # Default port for Pilot agent health checks. A value of 0 will disable health checking.
+ statusPort: 15020
+
+ # The initial delay for readiness probes in seconds.
+ readinessInitialDelaySeconds: 1
+
+ # The period between readiness probes.
+ readinessPeriodSeconds: 2
+
+ # The number of successive failed probes before indicating readiness failure.
+ readinessFailureThreshold: 30
+
+ # istio egress capture whitelist
+ # https://istio.io/docs/tasks/traffic-management/egress.html#calling-external-services-directly
+ # example: includeIPRanges: "172.30.0.0/16,172.20.0.0/16"
+ # would only capture egress traffic on those two IP Ranges, all other outbound traffic would
+ # be allowed by the sidecar
+ includeIPRanges: "*"
+ excludeIPRanges: ""
+ excludeOutboundPorts: ""
+
+ # pod internal interfaces
+ kubevirtInterfaces: ""
+
+ # istio ingress capture whitelist
+ # examples:
+ # Redirect no inbound traffic to Envoy: --includeInboundPorts=""
+ # Redirect all inbound traffic to Envoy: --includeInboundPorts="*"
+ # Redirect only selected ports: --includeInboundPorts="80,8080"
+ includeInboundPorts: "*"
+ excludeInboundPorts: ""
+
+ # This controls the 'policy' in the sidecar injector.
+ autoInject: enabled
+
+ # Sets the destination Statsd in envoy (the value of the "--statsdUdpAddress" proxy argument
+ # would be :).
+ # Disabled by default.
+ # The istio-statsd-prom-bridge is deprecated and should not be used moving forward.
+ envoyStatsd:
+ # If enabled is set to true, host and port must also be provided. Istio no longer provides a statsd collector.
+ enabled: false
+ host: # example: statsd-svc.istio-system
+ port: # example: 9125
+
+ # Sets the Envoy Metrics Service address, used to push Envoy metrics to an external collector
+ # via the Metrics Service gRPC API. This contains detailed stats information emitted directly
+ # by Envoy and should not be confused with the the Istio telemetry. The Envoy stats are also
+ # available to scrape via the Envoy admin port at either /stats or /stats/prometheus.
+ #
+ # See https://www.envoyproxy.io/docs/envoy/latest/api-v2/config/metrics/v2/metrics_service.proto
+ # for details about Envoy's Metrics Service API.
+ #
+ # Disabled by default.
+ envoyMetricsService:
+ enabled: false
+ host: # example: metrics-service.istio-system
+ port: # example: 15000
+
+ # Specify which tracer to use. One of: lightstep, zipkin, datadog
+ tracer: "zipkin"
+
+ proxy_init:
+ # Base name for the proxy_init container, used to configure iptables.
+ image: proxy_init
+
+ # imagePullPolicy is applied to istio control plane components.
+ # local tests require IfNotPresent, to avoid uploading to dockerhub.
+ # TODO: Switch to Always as default, and override in the local tests.
+ imagePullPolicy: Always
+
+ # controlPlaneMtls enabled. Will result in delays starting the pods while secrets are
+ # propagated, not recommended for tests.
+ controlPlaneSecurityEnabled: true
+
+ # disablePolicyChecks disables mixer policy checks.
+ # if mixer.policy.enabled==true then disablePolicyChecks has affect.
+ # Will set the value with same name in istio config map - pilot needs to be restarted to take effect.
+ disablePolicyChecks: true
+
+ # policyCheckFailOpen allows traffic in cases when the mixer policy service cannot be reached.
+ # Default is false which means the traffic is denied when the client is unable to connect to Mixer.
+ policyCheckFailOpen: false
+
+ # EnableTracing sets the value with same name in istio config map, requires pilot restart to take effect.
+ enableTracing: true
+
+ # Configuration for each of the supported tracers
+ tracer:
+ # Configuration for envoy to send trace data to LightStep.
+ # Disabled by default.
+ # address: the : of the satellite pool
+ # accessToken: required for sending data to the pool
+ # secure: specifies whether data should be sent with TLS
+ # cacertPath: the path to the file containing the cacert to use when verifying TLS. If secure is true, this is
+ # required. If a value is specified then a secret called "lightstep.cacert" must be created in the destination
+ # namespace with the key matching the base of the provided cacertPath and the value being the cacert itself.
+ #
+ lightstep:
+ address: "" # example: lightstep-satellite:443
+ accessToken: "" # example: abcdefg1234567
+ secure: true # example: true|false
+ cacertPath: "" # example: /etc/lightstep/cacert.pem
+ zipkin:
+ # Host:Port for reporting trace data in zipkin format. If not specified, will default to
+ # zipkin service (port 9411) in the same namespace as the other istio components.
+ address: ""
+ datadog:
+ # Host:Port for submitting traces to the Datadog agent.
+ address: "$(HOST_IP):8126"
+
+ # Default mtls policy. If true, mtls between services will be enabled by default.
+ mtls:
+ # Default setting for service-to-service mtls. Can be set explicitly using
+ # destination rules or service annotations.
+ enabled: false
+
+ # ImagePullSecrets for all ServiceAccount, list of secrets in the same namespace
+ # to use for pulling any images in pods that reference this ServiceAccount.
+ # For components that don't use ServiceAccounts (i.e. grafana, servicegraph, tracing)
+ # ImagePullSecrets will be added to the corresponding Deployment(StatefulSet) objects.
+ # Must be set for any clustser configured with private docker registry.
+ imagePullSecrets:
+ # - private-registry-key
+
+ # Specify pod scheduling arch(amd64, ppc64le, s390x) and weight as follows:
+ # 0 - Never scheduled
+ # 1 - Least preferred
+ # 2 - No preference
+ # 3 - Most preferred
+ arch:
+ amd64: 2
+ s390x: 2
+ ppc64le: 2
+
+ # Whether to restrict the applications namespace the controller manages;
+ # If not set, controller watches all namespaces
+ oneNamespace: false
+
+ # Default node selector to be applied to all deployments so that all pods can be
+ # constrained to run a particular nodes. Each component can overwrite these default
+ # values by adding its node selector block in the relevant section below and setting
+ # the desired values.
+ defaultNodeSelector: {}
+
+ # Whether to perform server-side validation of configuration.
+ configValidation: true
+
+ # Custom DNS config for the pod to resolve names of services in other
+ # clusters. Use this to add additional search domains, and other settings.
+ # see
+ # https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#dns-config
+ # This does not apply to gateway pods as they typically need a different
+ # set of DNS settings than the normal application pods (e.g., in
+ # multicluster scenarios).
+ # NOTE: If using templates, follow the pattern in the commented example below.
+ #podDNSSearchNamespaces:
+ #- global
+ #- "[[ valueOrDefault .DeploymentMeta.Namespace \"default\" ]].global"
+
+ # If set to true, the pilot and citadel mtls will be exposed on the
+ # ingress gateway
+ meshExpansion:
+ enabled: false
+ # If set to true, the pilot and citadel mtls and the plain text pilot ports
+ # will be exposed on an internal gateway
+ useILB: false
+
+ multiCluster:
+ # Set to true to connect two kubernetes clusters via their respective
+ # ingressgateway services when pods in each cluster cannot directly
+ # talk to one another. All clusters should be using Istio mTLS and must
+ # have a shared root CA for this model to work.
+ enabled: false
+
+ # A minimal set of requested resources to applied to all deployments so that
+ # Horizontal Pod Autoscaler will be able to function (if set).
+ # Each component can overwrite these default values by adding its own resources
+ # block in the relevant section below and setting the desired resources values.
+ defaultResources:
+ requests:
+ cpu: 10m
+ # memory: 128Mi
+ # limits:
+ # cpu: 100m
+ # memory: 128Mi
+
+ # enable pod distruption budget for the control plane, which is used to
+ # ensure Istio control plane components are gradually upgraded or recovered.
+ defaultPodDisruptionBudget:
+ enabled: true
+ # The values aren't mutable due to a current PodDisruptionBudget limitation
+ # minAvailable: 1
+
+ # Kubernetes >=v1.11.0 will create two PriorityClass, including system-cluster-critical and
+ # system-node-critical, it is better to configure this in order to make sure your Istio pods
+ # will not be killed because of low priority class.
+ # Refer to https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass
+ # for more detail.
+ priorityClassName: ""
+
+ # Use the Mesh Control Protocol (MCP) for configuring Mixer and
+ # Pilot. Requires galley (`+"`"+`--set galley.enabled=true`+"`"+`).
+ useMCP: true
+
+ # The trust domain corresponds to the trust root of a system
+ # Refer to https://github.com/spiffe/spiffe/blob/master/standards/SPIFFE-ID.md#21-trust-domain
+ # Indicate the domain used in SPIFFE identity URL
+ # The default depends on the environment.
+ # kubernetes: cluster.local
+ # else: default dns domain
+ trustDomain: ""
+
+ # Set the default behavior of the sidecar for handling outbound traffic from the application:
+ # ALLOW_ANY - outbound traffic to unknown destinations will be allowed, in case there are no
+ # services or ServiceEntries for the destination port
+ # REGISTRY_ONLY - restrict outbound traffic to services defined in the service registry as well
+ # as those defined through ServiceEntries
+ # ALLOW_ANY is the default in 1.1. This means each pod will be able to make outbound requests
+ # to services outside of the mesh without any ServiceEntry.
+ # REGISTRY_ONLY was the default in 1.0. If this behavior is desired, set the value below to REGISTRY_ONLY.
+ outboundTrafficPolicy:
+ mode: ALLOW_ANY
+
+ # The namespace where globally shared configurations should be present.
+ # DestinationRules that apply to the entire mesh (e.g., enabling mTLS),
+ # default Sidecar configs, etc. should be added to this namespace.
+ # configRootNamespace: istio-config
+
+ # set the default set of namespaces to which services, service entries, virtual services, destination
+ # rules should be exported to. Currently only one value can be provided in this list. This value
+ # should be one of the following two options:
+ # * implies these objects are visible to all namespaces, enabling any sidecar to talk to any other sidecar.
+ # . implies these objects are visible to only to sidecars in the same namespace, or if imported as a Sidecar.egress.host
+ #defaultConfigVisibilitySettings:
+ #- '*'
+
+ sds:
+ # SDS enabled. IF set to true, mTLS certificates for the sidecars will be
+ # distributed through the SecretDiscoveryService instead of using K8S secrets to mount the certificates.
+ enabled: false
+ udsPath: ""
+ useTrustworthyJwt: false
+ useNormalJwt: false
+
+ # Configure the mesh networks to be used by the Split Horizon EDS.
+ #
+ # The following example defines two networks with different endpoints association methods.
+ # For `+"`"+`network1`+"`"+` all endpoints that their IP belongs to the provided CIDR range will be
+ # mapped to network1. The gateway for this network example is specified by its public IP
+ # address and port.
+ # The second network, `+"`"+`network2`+"`"+`, in this example is defined differently with all endpoints
+ # retrieved through the specified Multi-Cluster registry being mapped to network2. The
+ # gateway is also defined differently with the name of the gateway service on the remote
+ # cluster. The public IP for the gateway will be determined from that remote service (not
+ # supported yet).
+ #
+ # meshNetworks:
+ # network1:
+ # endpoints:
+ # - fromCidr: "192.168.0.1/24"
+ # gateways:
+ # - address: 1.1.1.1
+ # port: 80
+ # network2:
+ # endpoints:
+ # - fromRegistry: reg1
+ # gateways:
+ # - registryServiceName: istio-ingressgateway
+ # port: 443
+ #
+ meshNetworks: {}
+
+ # Specifies the global locality load balancing settings.
+ # Locality-weighted load balancing allows administrators to control the distribution of traffic to
+ # endpoints based on the localities of where the traffic originates and where it will terminate.
+ # Please set either failover or distribute configuration but not both.
+ #
+ # localityLbSetting:
+ # distribute:
+ # - from: "us-central1/*"
+ # to:
+ # "us-central1/*": 80
+ # "us-central2/*": 20
+ #
+ # localityLbSetting:
+ # failover:
+ # - from: us-east
+ # to: eu-west
+ # - from: us-west
+ # to: us-east
+ localityLbSetting: {}
+
+ # Specifies whether helm test is enabled or not.
+ # This field is set to false by default, so 'helm template ...'
+ # will ignore the helm test yaml files when generating the template
+ enableHelmTest: false
+
+certmanager: {}
+
+# Internal setting - used when generating helm templates for kustomize.
+# clusterResources controls the inclusion of cluster-wide resources when generating the charts/installing.
+# For backward compat, it is set to 'true', resulting in the old-style installation.
+# When set to 'false', all cluster-wide resources will be omitted, and are expected to be installed
+# at the same time with the CRDs.
+clusterResources: true
+
+# Version is set as 'version' label and part of the resource names when installing.
+# It is used to support multiple version in same namespace, similar with normal app traffic shift.
+version: ""
+`)
+
+func chartsGlobalYamlBytes() ([]byte, error) {
+ return _chartsGlobalYaml, nil
+}
+
+func chartsGlobalYaml() (*asset, error) {
+ bytes, err := chartsGlobalYamlBytes()
+ if err != nil {
+ return nil, err
+ }
+
+ info := bindataFileInfo{name: "charts/global.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)}
+ a := &asset{bytes: bytes, info: info}
+ return a, nil
+}
+
var _chartsIstioCniChartYaml = []byte(`apiVersion: v1
name: istio-cni
version: 0.2.0
@@ -32126,702 +32563,33 @@ spec:
image: node-agent-k8s
gateways:
- istio-egressgateway:
- autoscaleEnabled: true
- zvpn:
- suffix: global
- enabled: true
- drainDuration: 45s
- connectTimeout: 10s
- env:
- ISTIO_META_ROUTER_MODE: "sni-dnat"
- ports:
- - port: 80
- name: http2
- - port: 443
- name: https
- - port: 15443
- targetPort: 15443
- name: tls
- secretVolumes:
- - name: egressgateway-certs
- secretName: istio-egressgateway-certs
- mountPath: /etc/istio/egressgateway-certs
- - name: egressgateway-ca-certs
- secretName: istio-egressgateway-ca-certs
- mountPath: /etc/istio/egressgateway-ca-certs
-
- istio-ingressgateway:
- autoscaleEnabled: true
- applicationPorts: ""
- debug: info
- domain: ""
- zvpn:
- enabled: true
- suffix: global
- telemetry_domain_name: ""
- env:
- ISTIO_META_ROUTER_MODE: "sni-dnat"
- ports:
- - port: 15020
- targetPort: 15020
- name: status-port
- - port: 80
- targetPort: 80
- name: http2
- - port: 443
- name: https
- - port: 15029
- targetPort: 15029
- name: kiali
- - port: 15030
- targetPort: 15030
- name: prometheus
- - port: 15031
- targetPort: 15031
- name: grafana
- - port: 15032
- targetPort: 15032
- name: tracing
- - port: 15443
- targetPort: 15443
- name: tls
- meshExpansionPorts:
- - port: 15011
- targetPort: 15011
- name: tcp-pilot-grpc-tls
- - port: 8060
- targetPort: 8060
- name: tcp-citadel-grpc-tls
- - port: 853
- targetPort: 853
- name: tcp-dns-tls
- secretVolumes:
- - name: ingressgateway-certs
- secretName: istio-ingressgateway-certs
- mountPath: /etc/istio/ingressgateway-certs
- - name: ingressgateway-ca-certs
- secretName: istio-ingressgateway-ca-certs
- mountPath: /etc/istio/ingressgateway-ca-certs
- telemetry_addon_gateways:
- tracing_gateway:
- name: tracing
- port: 15032
- desPort: 80
- enabled: false
- tls: false
- kiali_gateway:
- name: kiali
- port: 15029
- desPort: 20001
- enabled: false
- tls: false
- grafana_gateway:
- name: grafana
- port: 15031
- desPort: 3000
- enabled: false
- tls: false
- prometheus_gateway:
- name: prometheus
- port: 15030
- desPort: 9090
- enabled: false
- tls: false
-
- sidecarInjectorWebhook:
- image: sidecar_injector
- enableNamespacesByDefault: false
- rewriteAppHTTPProbe: false
- selfSigned: false
- injectLabel: istio-injection
-
- prometheus:
- enabled: true
- replicaCount: 1
- hub: docker.io/prom
- tag: v2.8.0
- retention: 6h
- scrapeInterval: 15s
- contextPath: /prometheus
- ingress:
- enabled: false
- hosts:
- - prometheus.local
- annotations:
- tls:
- security:
- enabled: true
- nodeSelector: {}
- tolerations: []
- podAntiAffinityLabelSelector: []
- podAntiAffinityTermLabelSelector: []
-
- grafana:
- enabled: false
- replicaCount: 1
- image:
- repository: grafana/grafana
- tag: 6.1.6
- persist: false
- storageClassName: ""
- accessMode: ReadWriteMany
- security:
- enabled: false
- secretName: grafana
- usernameKey: username
- passphraseKey: passphrase
-
- contextPath: /grafana
- service:
- annotations: {}
- name: http
- type: ClusterIP
- externalPort: 3000
- loadBalancerIP:
- loadBalancerSourceRanges:
- ingress:
- enabled: false
- hosts:
- - grafana.local
- annotations:
- tls:
- datasources:
- datasources.yaml:
- apiVersion: 1
- datasources:
- dashboardProviders:
- dashboardproviders.yaml:
- apiVersion: 1
- providers:
- - name: 'istio'
- orgId: 1
- folder: 'istio'
- type: file
- disableDeletion: false
- options:
- path: /var/lib/grafana/dashboards/istio
- nodeSelector: {}
- tolerations: []
- podAntiAffinityLabelSelector: []
- podAntiAffinityTermLabelSelector: []
- env: {}
- envSecrets: {}
-
- tracing:
- enabled: false
- provider: jaeger
- nodeSelector: {}
- podAntiAffinityLabelSelector: []
- podAntiAffinityTermLabelSelector: []
- jaeger:
- hub: docker.io/jaegertracing
- tag: 1.12
- memory:
- max_traces: 50000
- spanStorageType: badger
- persist: false
- storageClassName: ""
- accessMode: ReadWriteMany
- zipkin:
- hub: docker.io/openzipkin
- tag: 2.14.2
- probeStartupDelay: 200
- queryPort: 9411
- resources:
- limits:
- cpu: 300m
- memory: 900Mi
- requests:
- cpu: 150m
- memory: 900Mi
- javaOptsHeap: 700
- maxSpans: 500000
- node:
- cpus: 2
- opencensus:
- hub: docker.io/omnition
- tag: 0.1.9
- resources:
- limits:
- cpu: 1
- memory: 2Gi
- requests:
- cpu: 200m
- memory: 400Mi
- exporters:
- stackdriver:
- enable_tracing: true
- service:
- annotations: {}
- name: http
- type: ClusterIP
- externalPort: 9411
- ingress:
- enabled: false
- hosts:
- annotations:
- tls:
-
- kiali:
- enabled: false
- replicaCount: 1
- hub: docker.io/kiali
- tag: v1.1.0
- contextPath: /kiali
- nodeSelector: {}
- podAntiAffinityLabelSelector: []
- podAntiAffinityTermLabelSelector: []
- ingress:
- enabled: false
- hosts:
- - kiali.local
- annotations:
- tls:
- dashboard:
- secretName: kiali
- usernameKey: username
- passphraseKey: passphrase
- viewOnlyMode: false
- grafanaURL:
- jaegerURL:
- prometheusNamespace:
- createDemoSecret: true
- security:
- enabled: true
- cert_file: /kiali-cert/cert-chain.pem
- private_key_file: /kiali-cert/key.pem
-
- # TODO: derive from operator API
- version: ""
- clusterResources: true
-`)
-
-func profilesDefaultYamlBytes() ([]byte, error) {
- return _profilesDefaultYaml, nil
-}
-
-func profilesDefaultYaml() (*asset, error) {
- bytes, err := profilesDefaultYamlBytes()
- if err != nil {
- return nil, err
- }
-
- info := bindataFileInfo{name: "profiles/default.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)}
- a := &asset{bytes: bytes, info: info}
- return a, nil
-}
-
-var _profilesDefaultYamlOrig = []byte(`apiVersion: install.istio.io/v1alpha2
-kind: IstioControlPlane
-spec:
- hub: gcr.io/istio-release
- tag: master-latest-daily
- defaultNamespace: istio-system
-
- # Traffic management feature
- trafficManagement:
- enabled: true
- components:
- pilot:
- enabled: true
- k8s:
- env:
- - name: POD_NAME
- valueFrom:
- fieldRef:
- apiVersion: v1
- fieldPath: metadata.name
- - name: POD_NAMESPACE
- valueFrom:
- fieldRef:
- apiVersion: v1
- fieldPath: metadata.namespace
- - name: GODEBUG
- value: gctrace=1
- - name: PILOT_TRACE_SAMPLING
- value: "1"
- - name: CONFIG_NAMESPACE
- value: istio-config
- hpaSpec:
- maxReplicas: 5
- minReplicas: 1
- scaleTargetRef:
- apiVersion: apps/v1
- kind: Deployment
- name: istio-pilot
- metrics:
- - type: Resource
- resource:
- name: cpu
- targetAverageUtilization: 80
- readinessProbe:
- httpGet:
- path: /ready
- port: 8080
- initialDelaySeconds: 5
- periodSeconds: 30
- timeoutSeconds: 5
- resources:
- requests:
- cpu: 500m
- memory: 2048Mi
-
- # Policy feature
- policy:
- enabled: true
- components:
- policy:
- enabled: true
- k8s:
- replicaCount: 1
- hpaSpec:
- maxReplicas: 5
- minReplicas: 1
- scaleTargetRef:
- apiVersion: apps/v1
- kind: Deployment
- name: istio-policy
- metrics:
- - type: Resource
- resource:
- name: cpu
- targetAverageUtilization: 80
- env:
- - name: GODEBUG
- value: "gctrace=1"
-
- # Telemetry feature
- telemetry:
- enabled: true
- components:
- telemetry:
- enabled: true
- k8s:
- env:
- - name: GODEBUG
- value: "gctrace=1"
- - name: GOMAXPROCS
- value: "6"
- hpaSpec:
- maxReplicas: 5
- minReplicas: 1
- scaleTargetRef:
- apiVersion: apps/v1
- kind: Deployment
- name: istio-telemetry
- metrics:
- - type: Resource
- resource:
- name: cpu
- targetAverageUtilization: 80
- replicaCount: 1
- resources:
- requests:
- cpu: 1000m
- memory: 1G
- limits:
- cpu: 4800m
- memory: 4G
-
- # Security feature
- security:
- enabled: true
- components:
- certManager:
- enabled: false
- nodeAgent:
- enabled: false
-
- # Config management feature
- configManagement:
- enabled: true
- components:
- galley:
- enabled: true
- k8s:
- replicaCount: 1
- resources:
- requests:
- cpu: 100m
-
- # Auto injection feature
- autoInjection:
- enabled: true
- components:
- injector:
- enabled: true
- k8s:
- replicaCount: 1
-
- # Istio Gateway feature
- gateways:
- enabled: true
- components:
- ingressGateway:
- enabled: true
- k8s:
- hpaSpec:
- maxReplicas: 5
- minReplicas: 1
- scaleTargetRef:
- apiVersion: apps/v1
- kind: Deployment
- name: istio-ingressgateway
- metrics:
- - type: Resource
- resource:
- name: cpu
- targetAverageUtilization: 80
- resources:
- requests:
- cpu: 100m
- memory: 128Mi
- limits:
- cpu: 2000m
- memory: 1024Mi
-
- egressGateway:
- enabled: false
- k8s:
- hpaSpec:
- maxReplicas: 5
- minReplicas: 1
- scaleTargetRef:
- apiVersion: apps/v1
- kind: Deployment
- name: istio-egressgateway
- metrics:
- - type: Resource
- resource:
- name: cpu
- targetAverageUtilization: 80
- resources:
- requests:
- cpu: 100m
- memory: 128Mi
- limits:
- cpu: 2000m
- memory: 256Mi
-
- # Global values passed through to helm global.yaml.
- values:
- global:
- logging:
- level: "default:info"
- logAsJson: false
- k8sIngress:
- enabled: false
- gatewayName: ingressgateway
- enableHttps: false
- proxy:
- image: proxyv2
- clusterDomain: "cluster.local"
- resources:
- requests:
- cpu: 100m
- memory: 128Mi
- limits:
- cpu: 2000m
- memory: 1024Mi
- concurrency: 2
- accessLogFile: ""
- accessLogFormat: ""
- accessLogEncoding: TEXT
- envoyAccessLogService:
- enabled: false
- host: # example: accesslog-service.istio-system
- port: # example: 15000
- logLevel: warning
- componentLogLevel: "misc:error"
- dnsRefreshRate: 300s
- privileged: false
- enableCoreDump: false
- statusPort: 15020
- readinessInitialDelaySeconds: 1
- readinessPeriodSeconds: 2
- readinessFailureThreshold: 30
- includeIPRanges: "*"
- excludeIPRanges: ""
- excludeOutboundPorts: ""
- kubevirtInterfaces: ""
- includeInboundPorts: "*"
- excludeInboundPorts: ""
- autoInject: enabled
- envoyStatsd:
- enabled: false
- host: # example: statsd-svc.istio-system
- port: # example: 9125
- envoyMetricsService:
- enabled: false
- host: # example: metrics-service.istio-system
- port: # example: 15000
- tracer: "zipkin"
- proxy_init:
- image: proxy_init
- resources:
- limits:
- cpu: 100m
- memory: 50Mi
- requests:
- cpu: 10m
- memory: 10Mi
- imagePullPolicy: Always
- controlPlaneSecurityEnabled: true
- disablePolicyChecks: true
- policyCheckFailOpen: false
- enableTracing: true
- tracer:
- lightstep:
- address: "" # example: lightstep-satellite:443
- accessToken: "" # example: abcdefg1234567
- secure: true # example: true|false
- cacertPath: "" # example: /etc/lightstep/cacert.pem
- zipkin:
- address: ""
- datadog:
- address: "$(HOST_IP):8126"
- mtls:
- enabled: false
- imagePullSecrets: []
- arch:
- amd64: 2
- s390x: 2
- ppc64le: 2
- oneNamespace: false
- defaultNodeSelector: {}
- configValidation: true
- meshExpansion:
- enabled: false
- useILB: false
- multiCluster:
- enabled: false
- defaultResources:
- requests:
- cpu: 10m
- defaultPodDisruptionBudget:
- enabled: true
- priorityClassName: ""
- useMCP: true
- trustDomain: ""
- outboundTrafficPolicy:
- mode: ALLOW_ANY
- sds:
- enabled: false
- udsPath: ""
- meshNetworks: {}
- localityLbSetting:
- enabled: true
- enableHelmTest: false
-
- pilot:
- autoscaleEnabled: true
- autoscaleMin: 1
- autoscaleMax: 5
- replicaCount: 1
- rollingMaxSurge: 100%
- rollingMaxUnavailable: 25%
- image: pilot
- traceSampling: 1.0
- configNamespace: istio-config
- appNamespaces: []
- env:
- GODEBUG: gctrace=1
- cpu:
- targetAverageUtilization: 80
- nodeSelector: {}
- tolerations: []
- podAntiAffinityLabelSelector: []
- podAntiAffinityTermLabelSelector: []
- keepaliveMaxServerConnectionAge: 30m
- deploymentLabels:
- meshNetworks:
- networks: {}
- configMap: true
- ingress:
- ingressService: istio-ingressgateway
- ingressControllerMode: "OFF"
- ingressClass: istio
- telemetry:
- enabled: true
- policy:
- enabled: false
- useMCP: true
-
- mixer:
- adapters:
- stdio:
- enabled: false
- outputAsJson: false
- prometheus:
- enabled: true
- metricsExpiryDuration: 10m
- kubernetesenv:
- enabled: true
- stackdriver:
- enabled: false
- auth:
- appCredentials: false
- apiKey: ""
- serviceAccountPath: ""
- tracer:
- enabled: false
- sampleProbability: 1
- useAdapterCRDs: false
-
- telemetry:
- image: mixer
- replicaCount: 1
- rollingMaxSurge: 100%
- rollingMaxUnavailable: 25%
- autoscaleEnabled: true
- sessionAffinityEnabled: false
- loadshedding:
- mode: enforce
- latencyThreshold: 100ms
- reportBatchMaxEntries: 100
- reportBatchMaxTime: 1s
- useMCP: true
- nodeSelector: {}
- tolerations: []
- podAntiAffinityLabelSelector: []
- podAntiAffinityTermLabelSelector: []
-
- policy:
- image: mixer
- rollingMaxSurge: 100%
- rollingMaxUnavailable: 25%
- adapters:
- kubernetesenv:
- enabled: true
-
- galley:
- rollingMaxSurge: 100%
- rollingMaxUnavailable: 25%
-
- citadel:
- image: citadel
- rollingMaxSurge: 100%
- rollingMaxUnavailable: 25%
- selfSigned: true # indicate if self-signed CA is used.
- trustDomain: cluster.local # indicate the domain used in SPIFFE identity URL
- enableNamespacesByDefault: true
- dnsCerts:
- istio-pilot-service-account.istio-system: istio-pilot.istio-system
-
- certmanager:
- hub: quay.io/jetstack
- tag: v0.6.2
- image: cert-manager-controller
-
- nodeagent:
- image: node-agent-k8s
-
- gateways:
+ istio-egressgateway:
+ autoscaleEnabled: true
+ zvpn:
+ suffix: global
+ enabled: true
+ drainDuration: 45s
+ connectTimeout: 10s
+ env:
+ ISTIO_META_ROUTER_MODE: "sni-dnat"
+ ports:
+ - port: 80
+ name: http2
+ - port: 443
+ name: https
+ - port: 15443
+ targetPort: 15443
+ name: tls
+ secretVolumes:
+ - name: egressgateway-certs
+ secretName: istio-egressgateway-certs
+ mountPath: /etc/istio/egressgateway-certs
+ - name: egressgateway-ca-certs
+ secretName: istio-egressgateway-ca-certs
+ mountPath: /etc/istio/egressgateway-ca-certs
+
istio-ingressgateway:
autoscaleEnabled: true
- rollingMaxSurge: 100%
- rollingMaxUnavailable: 25%
applicationPorts: ""
debug: info
domain: ""
@@ -32897,46 +32665,8 @@ spec:
desPort: 9090
enabled: false
tls: false
-<<<<<<< HEAD
- istio-egressgateway:
- ports:
- - port: 80
- name: http2
- - port: 443
- name: https
- - port: 15443
- targetPort: 15443
- name: tls
- zvpn:
- suffix: global
- enabled: true
- rollingMaxSurge: 100%
- rollingMaxUnavailable: 25%
- autoscaleEnabled: true
- drainDuration: 45s
- connectTimeout: 10s
- serviceAnnotations: {}
- podAnnotations: {}
- type: ClusterIP # change to NodePort or LoadBalancer if need be
- secretVolumes:
- - name: egressgateway-certs
- secretName: istio-egressgateway-certs
- mountPath: /etc/istio/egressgateway-certs
- - name: egressgateway-ca-certs
- secretName: istio-egressgateway-ca-certs
- mountPath: /etc/istio/egressgateway-ca-certs
- env:
- ISTIO_META_ROUTER_MODE: "sni-dnat"
- nodeSelector: {}
- tolerations: []
- podAntiAffinityLabelSelector: []
- podAntiAffinityTermLabelSelector: []
-=======
->>>>>>> 598103cf7e20c05c6aa466d2a6a30c1b4ce1f71b
sidecarInjectorWebhook:
- rollingMaxSurge: 100%
- rollingMaxUnavailable: 25%
image: sidecar_injector
enableNamespacesByDefault: false
rewriteAppHTTPProbe: false
@@ -33104,17 +32834,17 @@ spec:
clusterResources: true
`)
-func profilesDefaultYamlOrigBytes() ([]byte, error) {
- return _profilesDefaultYamlOrig, nil
+func profilesDefaultYamlBytes() ([]byte, error) {
+ return _profilesDefaultYaml, nil
}
-func profilesDefaultYamlOrig() (*asset, error) {
- bytes, err := profilesDefaultYamlOrigBytes()
+func profilesDefaultYaml() (*asset, error) {
+ bytes, err := profilesDefaultYamlBytes()
if err != nil {
return nil, err
}
- info := bindataFileInfo{name: "profiles/default.yaml.orig", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)}
+ info := bindataFileInfo{name: "profiles/default.yaml", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)}
a := &asset{bytes: bytes, info: info}
return a, nil
}
@@ -33248,159 +32978,6 @@ func profilesDemoAuthYaml() (*asset, error) {
return a, nil
}
-var _profilesDemoAuthYamlOrig = []byte(`apiVersion: install.istio.io/v1alpha2
-kind: IstioControlPlane
-spec:
- gateways:
- components:
- egressGateway:
-<<<<<<< HEAD
- enabled: false
- k8s:
- resources:
- requests:
- cpu: 10m
- memory: 40Mi
-=======
- common:
- enabled: true
- k8s:
- resources:
- requests:
- cpu: 10m
- memory: 40Mi
- limits:
- cpu: 2000m
- memory: 256Mi
- values:
- autoscaleEnabled: false
->>>>>>> 0e53114f62ca1dafda5750c8817f10747379b0af
- ingressGateway:
- enabled: true
- k8s:
- resources:
- requests:
- cpu: 10m
- memory: 40Mi
- policy:
- components:
- policy:
- k8s:
- resources:
- requests:
- cpu: 10m
- memory: 100Mi
-
- telemetry:
- components:
- telemetry:
- k8s:
- resources:
- requests:
- cpu: 50m
- memory: 100Mi
-
-
- trafficManagement:
- components:
- pilot:
- k8s:
- env:
- - name: POD_NAME
- valueFrom:
- fieldRef:
- apiVersion: v1
- fieldPath: metadata.name
- - name: POD_NAMESPACE
- valueFrom:
- fieldRef:
- apiVersion: v1
- fieldPath: metadata.namespace
- - name: GODEBUG
- value: gctrace=1
- - name: PILOT_TRACE_SAMPLING
- value: "100"
- - name: CONFIG_NAMESPACE
- value: istio-config
- resources:
- requests:
- cpu: 10m
- memory: 100Mi
-
- proxy:
- values:
- accessLogFile: /dev/stdout
- resources:
- requests:
- cpu: 10m
- memory: 40Mi
-
- values:
- global:
- disablePolicyChecks: false
- mtls:
- enabled: true
-
- pilot:
- autoscaleEnabled: false
-
- proxy:
- accessLogFile: /dev/stdout
- resources:
- requests:
- cpu: 10m
- memory: 40Mi
-
- mixer:
- adapters:
- useAdapterCRDs: false
- kubernetesenv:
- enabled: true
- prometheus:
- enabled: true
- metricsExpiryDuration: 10m
- stackdriver:
- enabled: false
- stdio:
- enabled: true
- outputAsJson: false
- policy:
- autoscaleEnabled: false
- telemetry:
- autoscaleEnabled: false
-
- gateway:
- istio-egressgateway:
- autoscaleEnabled: false
- istio-ingressgateway:
- autoscaleEnabled: false
-
- grafana:
- enabled: true
-
- tracing:
- enabled: true
-
- kiali:
- enabled: true
- createDemoSecret: true
-`)
-
-func profilesDemoAuthYamlOrigBytes() ([]byte, error) {
- return _profilesDemoAuthYamlOrig, nil
-}
-
-func profilesDemoAuthYamlOrig() (*asset, error) {
- bytes, err := profilesDemoAuthYamlOrigBytes()
- if err != nil {
- return nil, err
- }
-
- info := bindataFileInfo{name: "profiles/demo-auth.yaml.orig", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)}
- a := &asset{bytes: bytes, info: info}
- return a, nil
-}
-
var _profilesDemoYaml = []byte(`apiVersion: install.istio.io/v1alpha2
kind: IstioControlPlane
spec:
@@ -33530,150 +33107,6 @@ func profilesDemoYaml() (*asset, error) {
return a, nil
}
-var _profilesDemoYamlOrig = []byte(`apiVersion: install.istio.io/v1alpha2
-kind: IstioControlPlane
-spec:
- gateways:
- components:
- egressGateway:
-<<<<<<< HEAD
- enabled: false
- k8s:
- resources:
- requests:
- cpu: 10m
- memory: 40Mi
-
-=======
- common:
- enabled: true
- k8s:
- resources:
- requests:
- cpu: 10m
- memory: 40Mi
- limits:
- cpu: 2000m
- memory: 256Mi
- values:
- autoscaleEnabled: false
->>>>>>> 0e53114f62ca1dafda5750c8817f10747379b0af
- ingressGateway:
- enabled: true
- k8s:
- resources:
- requests:
- cpu: 10m
- memory: 40Mi
-
- policy:
- components:
- policy:
- k8s:
- resources:
- requests:
- cpu: 10m
- memory: 100Mi
-
- telemetry:
- components:
- telemetry:
- k8s:
- resources:
- requests:
- cpu: 50m
- memory: 100Mi
-
- trafficManagement:
- components:
- pilot:
- k8s:
- env:
- - name: POD_NAME
- valueFrom:
- fieldRef:
- apiVersion: v1
- fieldPath: metadata.name
- - name: POD_NAMESPACE
- valueFrom:
- fieldRef:
- apiVersion: v1
- fieldPath: metadata.namespace
- - name: GODEBUG
- value: gctrace=1
- - name: PILOT_TRACE_SAMPLING
- value: "100"
- - name: CONFIG_NAMESPACE
- value: istio-config
- resources:
- requests:
- cpu: 10m
- memory: 100Mi
-
- values:
- global:
- disablePolicyChecks: false
-
- pilot:
- autoscaleEnabled: false
-
- proxy:
- accessLogFile: /dev/stdout
- resources:
- requests:
- cpu: 10m
- memory: 40Mi
-
- mixer:
- adapters:
- useAdapterCRDs: false
- kubernetesenv:
- enabled: true
- prometheus:
- enabled: true
- metricsExpiryDuration: 10m
- stackdriver:
- enabled: false
- stdio:
- enabled: true
- outputAsJson: false
- policy:
- autoscaleEnabled: false
- telemetry:
- autoscaleEnabled: false
-
- gateway:
- istio-egressgateway:
- autoscaleEnabled: false
- istio-ingressgateway:
- autoscaleEnabled: false
-
- grafana:
- enabled: true
-
- tracing:
- enabled: true
-
- kiali:
- enabled: true
- createDemoSecret: true
-`)
-
-func profilesDemoYamlOrigBytes() ([]byte, error) {
- return _profilesDemoYamlOrig, nil
-}
-
-func profilesDemoYamlOrig() (*asset, error) {
- bytes, err := profilesDemoYamlOrigBytes()
- if err != nil {
- return nil, err
- }
-
- info := bindataFileInfo{name: "profiles/demo.yaml.orig", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)}
- a := &asset{bytes: bytes, info: info}
- return a, nil
-}
-
var _profilesMinimalYaml = []byte(`apiVersion: install.istio.io/v1alpha2
kind: IstioControlPlane
spec:
@@ -33768,74 +33201,6 @@ func profilesSdsYaml() (*asset, error) {
return a, nil
}
-var _profilesSdsYamlOrig = []byte(`apiVersion: install.istio.io/v1alpha2
-kind: IstioControlPlane
-spec:
- security:
- components:
- nodeAgent:
- enabled: true
-<<<<<<< HEAD
-<<<<<<< HEAD
-
-=======
->>>>>>> 0584d5d7... add back the mandiff test. (#223)
-=======
- k8s:
- env:
- - name: CA_ADDR
- value: "istio-citadel:8060"
- - name: CA_PROVIDER
- value: Citadel
- - name: Plugins
- value: ""
- - name: VALID_TOKEN
- value: "true"
- - name: Trust_Domain
- value: ""
- - name: NAMESPACE
- valueFrom:
- fieldRef:
- fieldPath: metadata.namespace
->>>>>>> a119f421... fix mandiff gaps. (#222)
- values:
- global:
- controlPlaneSecurityEnabled: false
- mtls:
- enabled: true
- controlPlaneSecurityEnabled: false
- sds:
- enabled: true
- udsPath: "unix:/var/run/sds/uds_path"
- useNormalJwt: false
- useTrustworthyJwt: true
- nodeagent:
- image: node-agent-k8s
- env:
- CA_PROVIDER: "Citadel"
- CA_ADDR: "istio-citadel:8060"
- VALID_TOKEN: true
-<<<<<<< HEAD
-=======
-
->>>>>>> 0584d5d7... add back the mandiff test. (#223)
-`)
-
-func profilesSdsYamlOrigBytes() ([]byte, error) {
- return _profilesSdsYamlOrig, nil
-}
-
-func profilesSdsYamlOrig() (*asset, error) {
- bytes, err := profilesSdsYamlOrigBytes()
- if err != nil {
- return nil, err
- }
-
- info := bindataFileInfo{name: "profiles/sds.yaml.orig", size: 0, mode: os.FileMode(0), modTime: time.Unix(0, 0)}
- a := &asset{bytes: bytes, info: info}
- return a, nil
-}
-
// Asset loads and returns the asset for the given name.
// It returns an error if the asset could not be found or
// could not be loaded.
@@ -33927,6 +33292,7 @@ var _bindata = map[string]func() (*asset, error){
"charts/gateways/istio-ingress/templates/serviceaccount.yaml": chartsGatewaysIstioIngressTemplatesServiceaccountYaml,
"charts/gateways/istio-ingress/templates/sidecar.yaml": chartsGatewaysIstioIngressTemplatesSidecarYaml,
"charts/gateways/istio-ingress/values.yaml": chartsGatewaysIstioIngressValuesYaml,
+ "charts/global.yaml": chartsGlobalYaml,
"charts/istio-cni/Chart.yaml": chartsIstioCniChartYaml,
"charts/istio-cni/templates/clusterrole.yaml": chartsIstioCniTemplatesClusterroleYaml,
"charts/istio-cni/templates/clusterrolebinding.yaml": chartsIstioCniTemplatesClusterrolebindingYaml,
@@ -34099,14 +33465,10 @@ var _bindata = map[string]func() (*asset, error){
"charts/security/nodeagent/templates/serviceaccount.yaml": chartsSecurityNodeagentTemplatesServiceaccountYaml,
"charts/security/nodeagent/values.yaml": chartsSecurityNodeagentValuesYaml,
"profiles/default.yaml": profilesDefaultYaml,
- "profiles/default.yaml.orig": profilesDefaultYamlOrig,
"profiles/demo-auth.yaml": profilesDemoAuthYaml,
- "profiles/demo-auth.yaml.orig": profilesDemoAuthYamlOrig,
"profiles/demo.yaml": profilesDemoYaml,
- "profiles/demo.yaml.orig": profilesDemoYamlOrig,
"profiles/minimal.yaml": profilesMinimalYaml,
"profiles/sds.yaml": profilesSdsYaml,
- "profiles/sds.yaml.orig": profilesSdsYamlOrig,
}
// AssetDir returns the file names below a certain
@@ -34205,6 +33567,7 @@ var _bintree = &bintree{nil, map[string]*bintree{
"values.yaml": &bintree{chartsGatewaysIstioIngressValuesYaml, map[string]*bintree{}},
}},
}},
+ "global.yaml": &bintree{chartsGlobalYaml, map[string]*bintree{}},
"istio-cni": &bintree{nil, map[string]*bintree{
"Chart.yaml": &bintree{chartsIstioCniChartYaml, map[string]*bintree{}},
"templates": &bintree{nil, map[string]*bintree{
@@ -34453,14 +33816,10 @@ var _bintree = &bintree{nil, map[string]*bintree{
}},
"profiles": &bintree{nil, map[string]*bintree{
"default.yaml": &bintree{profilesDefaultYaml, map[string]*bintree{}},
- "default.yaml.orig": &bintree{profilesDefaultYamlOrig, map[string]*bintree{}},
"demo-auth.yaml": &bintree{profilesDemoAuthYaml, map[string]*bintree{}},
- "demo-auth.yaml.orig": &bintree{profilesDemoAuthYamlOrig, map[string]*bintree{}},
"demo.yaml": &bintree{profilesDemoYaml, map[string]*bintree{}},
- "demo.yaml.orig": &bintree{profilesDemoYamlOrig, map[string]*bintree{}},
"minimal.yaml": &bintree{profilesMinimalYaml, map[string]*bintree{}},
"sds.yaml": &bintree{profilesSdsYaml, map[string]*bintree{}},
- "sds.yaml.orig": &bintree{profilesSdsYamlOrig, map[string]*bintree{}},
}},
}}