values.yaml 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262
  1. ## Default values for emqx.
  2. ## This is a YAML-formatted file.
  3. ## Declare variables to be passed into your templates.
  4. ## It is recommended to have odd number of nodes in a cluster, otherwise the emqx cluster cannot be automatically healed in case of net-split.
  5. replicaCount: 3
  6. image:
  7. repository: emqx/emqx
  8. pullPolicy: IfNotPresent
  9. # Overrides the image tag whose default is the chart appVersion.
  10. tag: ""
  11. ## Optionally specify an array of imagePullSecrets.
  12. ## Secrets must be manually created in the namespace.
  13. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
  14. ##
  15. # pullSecrets:
  16. # - myRegistryKeySecretName
  17. serviceAccount:
  18. # Specifies whether a service account should be created
  19. # If set false, means you need create service account by yourself
  20. create: true
  21. # The name of the service account to use.
  22. # If not set and create is true, a name is generated using the fullname template
  23. name: ""
  24. # Annotations to add to the service account
  25. annotations: {}
  26. # The name of a secret in the same kubernetes namespace which contains values to
  27. # be added to the environment (must be manually created)
  28. # This can be useful for passwords and logins, etc.
  29. # envFromSecret: "emqx-secrets"
  30. ## Forces the recreation of pods during helm upgrades. This can be useful to update configuration values even if the container image did not change.
  31. recreatePods: false
  32. ## Sets the minReadySeconds parameter on the stateful set. This can be used to add delay between restart / updates between the single pods.
  33. minReadySeconds:
  34. clusterDomain: cluster.local
  35. podAnnotations: {}
  36. # Pod deployment policy
  37. # value: OrderedReady | Parallel
  38. # To redeploy a chart with existing PVC(s), the value must be set to Parallel to avoid deadlock
  39. podManagementPolicy: Parallel
  40. persistence:
  41. enabled: false
  42. size: 20Mi
  43. storageClassName: ""
  44. accessMode: ReadWriteOnce
  45. ## Existing PersistentVolumeClaims
  46. ## The value is evaluated as a template
  47. ## So, for example, the name can depend on .Release or .Chart
  48. # existingClaim: ""
  49. resources: {}
  50. # limits:
  51. # cpu: 500m
  52. # memory: 512Mi
  53. # requests:
  54. # cpu: 500m
  55. # memory: 512Mi
  56. extraVolumeMounts: []
  57. ## Additional volumeMounts to the default backend container.
  58. # - name: my-owner-acl
  59. # mountPath: /opt/emqx/etc/acl.conf
  60. # subPath: acl.conf
  61. extraVolumes: []
  62. ## Additional volumes to the default backend pod.
  63. # - name: my-owner-acl
  64. # secret: fake-acl-conf
  65. # Containers that run before the creation of EMQX containers. They can contain utilities or setup scripts.
  66. initContainers: {}
  67. # - name: sysctl
  68. # image: busybox
  69. # securityContext:
  70. # runAsUser: 0
  71. # runAsGroup: 0
  72. # capabilities:
  73. # add:
  74. # - SYS_ADMIN
  75. # drop:
  76. # - ALL
  77. # command:
  78. # - /bin/sh
  79. # - -c
  80. # - |
  81. # mount -o remount rw /proc/sys
  82. # sysctl -w net.core.somaxconn=65535
  83. # sysctl -w net.ipv4.ip_local_port_range="1024 65535"
  84. # sysctl -w kernel.core_uses_pid=0
  85. # sysctl -w net.ipv4.tcp_tw_reuse=1
  86. # sysctl -w fs.nr_open=1000000000
  87. # sysctl -w fs.file-max=1000000000
  88. # sysctl -w net.ipv4.ip_local_port_range='1025 65534'
  89. # sysctl -w net.ipv4.udp_mem='74583000 499445000 749166000'
  90. # sysctl -w net.ipv4.tcp_max_sync_backlog=163840
  91. # sysctl -w net.core.netdev_max_backlog=163840
  92. # sysctl -w net.core.optmem_max=16777216
  93. # sysctl -w net.ipv4.tcp_rmem='1024 4096 16777216'
  94. # sysctl -w net.ipv4.tcp_wmem='1024 4096 16777216'
  95. # sysctl -w net.ipv4.tcp_max_tw_buckets=1048576
  96. # sysctl -w net.ipv4.tcp_fin_timeout=15
  97. # sysctl -w net.core.rmem_default=262144000
  98. # sysctl -w net.core.wmem_default=262144000
  99. # sysctl -w net.core.rmem_max=262144000
  100. # sysctl -w net.core.wmem_max=262144000
  101. # sysctl -w net.ipv4.tcp_mem='378150000 504200000 756300000'
  102. # sysctl -w net.netfilter.nf_conntrack_max=1000000
  103. # sysctl -w net.netfilter.nf_conntrack_tcp_timeout_time_wait=30
  104. ## EMQX configuration item, see the documentation (https://hub.docker.com/r/emqx/emqx)
  105. emqxConfig:
  106. EMQX_CLUSTER__DISCOVERY_STRATEGY: "dns"
  107. EMQX_DASHBOARD__DEFAULT_USERNAME: "admin"
  108. EMQX_DASHBOARD__DEFAULT_PASSWORD: "public"
  109. ## EMQX Enterprise Edition requires manual creation of a Secret containing the licensed content. Write the name of Secret to the value of "emqxLicenseSecretName"
  110. ## Example:
  111. ## kubectl create secret generic emqx-license-secret-name --from-file=/path/to/emqx.lic
  112. emqxLicenseSecretName:
  113. service:
  114. ## Service type
  115. ##
  116. type: ClusterIP
  117. ## The cluster IP if one wants to customize it to a fixed value
  118. ##
  119. clusterIP: None
  120. ## Port for MQTT
  121. ##
  122. mqtt: 1883
  123. ## Port for MQTT(SSL)
  124. ##
  125. mqttssl: 8883
  126. ## Port for WebSocket/HTTP
  127. ##
  128. ws: 8083
  129. ## Port for WSS/HTTPS
  130. ##
  131. wss: 8084
  132. ## Port for dashboard and API
  133. ##
  134. dashboard: 18083
  135. ## Port for dashboard and API over HTTPS
  136. ##
  137. # dashboardtls: 18084
  138. ## Specify the nodePort(s) value for the LoadBalancer and NodePort service types.
  139. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport
  140. ##
  141. nodePorts:
  142. mqtt:
  143. mqttssl:
  144. mgmt:
  145. ws:
  146. wss:
  147. dashboard:
  148. dashboardtls:
  149. ## Specifies the load balancer implementation this Service belongs to.
  150. ## Once set, it can not be changed.
  151. ##
  152. # loadBalancerClass:
  153. ## Set the LoadBalancer service type to internal only.
  154. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer
  155. ##
  156. # loadBalancerIP:
  157. ## Load Balancer sources
  158. ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service
  159. ## Example:
  160. ## loadBalancerSourceRanges:
  161. ## - 10.10.10.0/24
  162. ##
  163. loadBalancerSourceRanges: []
  164. ## Set the ExternalIPs
  165. ##
  166. externalIPs: []
  167. ## Denotes if this Service desires to route external traffic to node-local or cluster-wide endpoints.
  168. ## There are two available options: Cluster (default) and Local.
  169. ## Cluster obscures the client source IP and may cause a second hop to another node, but should have good overall load-spreading.
  170. ## Local preserves the client source IP and avoids a second hop for LoadBalancer and NodePort type Services, but risks potentially imbalanced traffic spreading.
  171. ##
  172. externalTrafficPolicy: "Cluster"
  173. ## Provide any additional annotations which may be required. Evaluated as a template
  174. ##
  175. annotations: {}
  176. nodeSelector: {}
  177. tolerations: []
  178. affinity: {}
  179. topologySpreadConstraints: []
  180. ingress:
  181. ## ingress for EMQX Dashboard
  182. dashboard:
  183. enabled: false
  184. # ingressClassName: nginx
  185. annotations: {}
  186. # kubernetes.io/ingress.class: nginx
  187. # kubernetes.io/tls-acme: "true"
  188. path: /
  189. pathType: ImplementationSpecific
  190. hosts:
  191. - dashboard.emqx.local
  192. tls: []
  193. ## ingress for MQTT
  194. mqtt:
  195. enabled: false
  196. # ingressClassName: haproxy
  197. annotations: {}
  198. # kubernetes.io/ingress.class: haproxy
  199. # kubernetes.io/tls-acme: "true"
  200. # haproxy-ingress.github.io/tcp-service-port: "8883"
  201. # haproxy-ingress.github.io/proxy-protocol: "v2"
  202. path: /
  203. pathType: ImplementationSpecific
  204. hosts:
  205. - mqtt.emqx.local
  206. tls: []
  207. podSecurityContext:
  208. enabled: true
  209. fsGroup: 1000
  210. fsGroupChangePolicy: Always
  211. runAsUser: 1000
  212. supplementalGroups:
  213. - 1000
  214. containerSecurityContext:
  215. enabled: true
  216. runAsNonRoot: true
  217. runAsUser: 1000
  218. metrics:
  219. enabled: false
  220. type: prometheus
  221. ssl:
  222. enabled: false
  223. useExisting: false
  224. existingName: emqx-tls
  225. dnsnames: []
  226. commonName:
  227. issuer:
  228. name: letsencrypt-dns
  229. kind: ClusterIssuer
  230. ## Setting PodDisruptionBudget.
  231. ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb
  232. ##
  233. pdb:
  234. enabled: false
  235. maxUnavailable: 1