|
@@ -51,9 +51,43 @@ resources: {}
|
|
|
|
|
|
|
|
# Containers that run before the creation of EMQX containers. They can contain utilities or setup scripts.
|
|
# Containers that run before the creation of EMQX containers. They can contain utilities or setup scripts.
|
|
|
initContainers: {}
|
|
initContainers: {}
|
|
|
- # - name: mysql-probe
|
|
|
|
|
- # image: alpine
|
|
|
|
|
- # command: ["sh", "-c", "for i in $(seq 1 300); do nc -zvw1 mysql 3306 && exit 0 || sleep 3; done; exit 1"]
|
|
|
|
|
|
|
+ # - name: sysctl
|
|
|
|
|
+ # image: busybox
|
|
|
|
|
+ # securityContext:
|
|
|
|
|
+ # runAsUser: 0
|
|
|
|
|
+ # runAsGroup: 0
|
|
|
|
|
+ # capabilities:
|
|
|
|
|
+ # add:
|
|
|
|
|
+ # - SYS_ADMIN
|
|
|
|
|
+ # drop:
|
|
|
|
|
+ # - ALL
|
|
|
|
|
+ # command:
|
|
|
|
|
+ # - /bin/sh
|
|
|
|
|
+ # - -c
|
|
|
|
|
+ # - |
|
|
|
|
|
+ # mount -o remount rw /proc/sys
|
|
|
|
|
+ # sysctl -w net.core.somaxconn=65535
|
|
|
|
|
+ # sysctl -w net.ipv4.ip_local_port_range="1024 65535"
|
|
|
|
|
+ # sysctl -w kernel.core_uses_pid=0
|
|
|
|
|
+ # sysctl -w net.ipv4.tcp_tw_reuse=1
|
|
|
|
|
+ # sysctl -w fs.nr_open=1000000000
|
|
|
|
|
+ # sysctl -w fs.file-max=1000000000
|
|
|
|
|
+ # sysctl -w net.ipv4.ip_local_port_range='1025 65534'
|
|
|
|
|
+ # sysctl -w net.ipv4.udp_mem='74583000 499445000 749166000'
|
|
|
|
|
+ # sysctl -w net.ipv4.tcp_max_sync_backlog=163840
|
|
|
|
|
+ # sysctl -w net.core.netdev_max_backlog=163840
|
|
|
|
|
+ # sysctl -w net.core.optmem_max=16777216
|
|
|
|
|
+ # sysctl -w net.ipv4.tcp_rmem='1024 4096 16777216'
|
|
|
|
|
+ # sysctl -w net.ipv4.tcp_wmem='1024 4096 16777216'
|
|
|
|
|
+ # sysctl -w net.ipv4.tcp_max_tw_buckets=1048576
|
|
|
|
|
+ # sysctl -w net.ipv4.tcp_fin_timeout=15
|
|
|
|
|
+ # sysctl -w net.core.rmem_default=262144000
|
|
|
|
|
+ # sysctl -w net.core.wmem_default=262144000
|
|
|
|
|
+ # sysctl -w net.core.rmem_max=262144000
|
|
|
|
|
+ # sysctl -w net.core.wmem_max=262144000
|
|
|
|
|
+ # sysctl -w net.ipv4.tcp_mem='378150000 504200000 756300000'
|
|
|
|
|
+ # sysctl -w net.netfilter.nf_conntrack_max=1000000
|
|
|
|
|
+ # sysctl -w net.netfilter.nf_conntrack_tcp_timeout_time_wait=30
|
|
|
|
|
|
|
|
## EMQX configuration item, see the documentation (https://hub.docker.com/r/emqx/emqx)
|
|
## EMQX configuration item, see the documentation (https://hub.docker.com/r/emqx/emqx)
|
|
|
emqxConfig:
|
|
emqxConfig:
|
|
@@ -65,6 +99,8 @@ emqxConfig:
|
|
|
EMQX_CLUSTER__K8S__SUFFIX: "svc.cluster.local"
|
|
EMQX_CLUSTER__K8S__SUFFIX: "svc.cluster.local"
|
|
|
## if EMQX_CLUSTER__K8S__ADDRESS_TYPE eq dns
|
|
## if EMQX_CLUSTER__K8S__ADDRESS_TYPE eq dns
|
|
|
# EMQX_CLUSTER__K8S__SUFFIX: "pod.cluster.local"
|
|
# EMQX_CLUSTER__K8S__SUFFIX: "pod.cluster.local"
|
|
|
|
|
+ EMQX_DASHBOARD__DEFAULT_USERNAME: "admin"
|
|
|
|
|
+ EMQX_DASHBOARD__DEFAULT_PASSWORD: "public"
|
|
|
|
|
|
|
|
## EMQX Enterprise Edition requires manual creation of a Secret containing the licensed content. Write the name of Secret to the value of "emqxLicenseSecretName"
|
|
## EMQX Enterprise Edition requires manual creation of a Secret containing the licensed content. Write the name of Secret to the value of "emqxLicenseSecretName"
|
|
|
## Example:
|
|
## Example:
|
|
@@ -168,3 +204,7 @@ containerSecurityContext:
|
|
|
enabled: true
|
|
enabled: true
|
|
|
runAsNonRoot: true
|
|
runAsNonRoot: true
|
|
|
runAsUser: 1000
|
|
runAsUser: 1000
|
|
|
|
|
+
|
|
|
|
|
+metrics:
|
|
|
|
|
+ enabled: false
|
|
|
|
|
+ type: prometheus
|