values.yaml 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250
  1. ## Default values for emqx.
  2. ## This is a YAML-formatted file.
  3. ## Declare variables to be passed into your templates.
  4. ## It is recommended to have odd number of nodes in a cluster, otherwise the emqx cluster cannot be automatically healed in case of net-split.
  5. replicaCount: 3
  6. image:
  7. repository: emqx/emqx-enterprise
  8. pullPolicy: IfNotPresent
  9. # Overrides the image tag whose default is the chart appVersion.
  10. tag: ""
  11. ## Optionally specify an array of imagePullSecrets.
  12. ## Secrets must be manually created in the namespace.
  13. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
  14. ##
  15. # pullSecrets:
  16. # - myRegistryKeySecretName
  17. serviceAccount:
  18. # Specifies whether a service account should be created
  19. # If set false, means you need create service account by yourself
  20. create: true
  21. # The name of the service account to use.
  22. # If not set and create is true, a name is generated using the fullname template
  23. name: ""
  24. # Annotations to add to the service account
  25. annotations: {}
  26. # The name of a secret in the same kubernetes namespace which contains values to
  27. # be added to the environment (must be manually created)
  28. # This can be useful for passwords and logins, etc.
  29. # envFromSecret: "emqx-secrets"
  30. ## Forces the recreation of pods during helm upgrades. This can be useful to update configuration values even if the container image did not change.
  31. recreatePods: false
  32. clusterDomain: cluster.local
  33. podAnnotations: {}
  34. # Pod deployment policy
  35. # value: OrderedReady | Parallel
  36. # To redeploy a chart with existing PVC(s), the value must be set to Parallel to avoid deadlock
  37. podManagementPolicy: Parallel
  38. persistence:
  39. enabled: false
  40. size: 20Mi
  41. storageClassName: ""
  42. accessMode: ReadWriteOnce
  43. ## Existing PersistentVolumeClaims
  44. ## The value is evaluated as a template
  45. ## So, for example, the name can depend on .Release or .Chart
  46. # existingClaim: ""
  47. resources: {}
  48. # limits:
  49. # cpu: 500m
  50. # memory: 512Mi
  51. # requests:
  52. # cpu: 500m
  53. # memory: 512Mi
  54. extraVolumeMounts: []
  55. ## Additional volumeMounts to the default backend container.
  56. # - name: my-owner-acl
  57. # mountPath: /opt/emqx/etc/acl.conf
  58. # subPath: acl.conf
  59. extraVolumes: []
  60. ## Additional volumes to the default backend pod.
  61. # - name: my-owner-acl
  62. # secret: fake-acl-conf
  63. # Containers that run before the creation of EMQX containers. They can contain utilities or setup scripts.
  64. initContainers: {}
  65. # - name: sysctl
  66. # image: busybox
  67. # securityContext:
  68. # runAsUser: 0
  69. # runAsGroup: 0
  70. # capabilities:
  71. # add:
  72. # - SYS_ADMIN
  73. # drop:
  74. # - ALL
  75. # command:
  76. # - /bin/sh
  77. # - -c
  78. # - |
  79. # mount -o remount rw /proc/sys
  80. # sysctl -w net.core.somaxconn=65535
  81. # sysctl -w net.ipv4.ip_local_port_range="1024 65535"
  82. # sysctl -w kernel.core_uses_pid=0
  83. # sysctl -w net.ipv4.tcp_tw_reuse=1
  84. # sysctl -w fs.nr_open=1000000000
  85. # sysctl -w fs.file-max=1000000000
  86. # sysctl -w net.ipv4.ip_local_port_range='1025 65534'
  87. # sysctl -w net.ipv4.udp_mem='74583000 499445000 749166000'
  88. # sysctl -w net.ipv4.tcp_max_sync_backlog=163840
  89. # sysctl -w net.core.netdev_max_backlog=163840
  90. # sysctl -w net.core.optmem_max=16777216
  91. # sysctl -w net.ipv4.tcp_rmem='1024 4096 16777216'
  92. # sysctl -w net.ipv4.tcp_wmem='1024 4096 16777216'
  93. # sysctl -w net.ipv4.tcp_max_tw_buckets=1048576
  94. # sysctl -w net.ipv4.tcp_fin_timeout=15
  95. # sysctl -w net.core.rmem_default=262144000
  96. # sysctl -w net.core.wmem_default=262144000
  97. # sysctl -w net.core.rmem_max=262144000
  98. # sysctl -w net.core.wmem_max=262144000
  99. # sysctl -w net.ipv4.tcp_mem='378150000 504200000 756300000'
  100. # sysctl -w net.netfilter.nf_conntrack_max=1000000
  101. # sysctl -w net.netfilter.nf_conntrack_tcp_timeout_time_wait=30
  102. ## EMQX configuration item, see the documentation (https://hub.docker.com/r/emqx/emqx-enterprise)
  103. emqxConfig:
  104. EMQX_CLUSTER__DISCOVERY_STRATEGY: "dns"
  105. EMQX_DASHBOARD__DEFAULT_USERNAME: "admin"
  106. EMQX_DASHBOARD__DEFAULT_PASSWORD: "public"
  107. ## EMQX Enterprise Edition requires manual creation of a Secret containing the licensed content. Write the name of Secret to the value of "emqxLicenseSecretName"
  108. ## Example:
  109. ## kubectl create secret generic emqx-license-secret-name --from-file=/path/to/emqx.lic
  110. emqxLicenseSecretName:
  111. service:
  112. ## Service type
  113. ##
  114. type: ClusterIP
  115. ## Port for MQTT
  116. ##
  117. mqtt: 1883
  118. ## Port for MQTT(SSL)
  119. ##
  120. mqttssl: 8883
  121. ## Port for WebSocket/HTTP
  122. ##
  123. ws: 8083
  124. ## Port for WSS/HTTPS
  125. ##
  126. wss: 8084
  127. ## Port for dashboard and API
  128. ##
  129. dashboard: 18083
  130. ## Port for dashboard and API over HTTPS
  131. ##
  132. # dashboardtls: 18084
  133. ## Specify the nodePort(s) value for the LoadBalancer and NodePort service types.
  134. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport
  135. ##
  136. nodePorts:
  137. mqtt:
  138. mqttssl:
  139. mgmt:
  140. ws:
  141. wss:
  142. dashboard:
  143. dashboardtls:
  144. ## Set the LoadBalancer service type to internal only.
  145. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer
  146. ##
  147. # loadBalancerIP:
  148. ## Load Balancer sources
  149. ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service
  150. ## Example:
  151. ## loadBalancerSourceRanges:
  152. ## - 10.10.10.0/24
  153. ##
  154. loadBalancerSourceRanges: []
  155. ## Set the ExternalIPs
  156. ##
  157. externalIPs: []
  158. ## Denotes if this Service desires to route external traffic to node-local or cluster-wide endpoints.
  159. ## There are two available options: Cluster (default) and Local.
  160. ## Cluster obscures the client source IP and may cause a second hop to another node, but should have good overall load-spreading.
  161. ## Local preserves the client source IP and avoids a second hop for LoadBalancer and NodePort type Services, but risks potentially imbalanced traffic spreading.
  162. ##
  163. externalTrafficPolicy: "Cluster"
  164. ## Provide any additional annotations which may be required. Evaluated as a template
  165. ##
  166. annotations: {}
  167. nodeSelector: {}
  168. tolerations: []
  169. affinity: {}
  170. ingress:
  171. ## ingress for EMQX Dashboard
  172. dashboard:
  173. enabled: false
  174. # ingressClassName: nginx
  175. annotations: {}
  176. # kubernetes.io/ingress.class: nginx
  177. # kubernetes.io/tls-acme: "true"
  178. path: /
  179. pathType: ImplementationSpecific
  180. hosts:
  181. - dashboard.emqx.local
  182. tls: []
  183. ## ingress for MQTT
  184. mqtt:
  185. enabled: false
  186. # ingressClassName: haproxy
  187. annotations: {}
  188. # kubernetes.io/ingress.class: haproxy
  189. # kubernetes.io/tls-acme: "true"
  190. # haproxy-ingress.github.io/tcp-service-port: "8883"
  191. # haproxy-ingress.github.io/proxy-protocol: "v2"
  192. path: /
  193. pathType: ImplementationSpecific
  194. hosts:
  195. - mqtt.emqx.local
  196. tls: []
  197. podSecurityContext:
  198. enabled: true
  199. fsGroup: 1000
  200. fsGroupChangePolicy: Always
  201. runAsUser: 1000
  202. supplementalGroups:
  203. - 1000
  204. containerSecurityContext:
  205. enabled: true
  206. runAsNonRoot: true
  207. runAsUser: 1000
  208. metrics:
  209. enabled: false
  210. type: prometheus
  211. ssl:
  212. enabled: false
  213. useExisting: false
  214. existingName: emqx-tls
  215. dnsnames: []
  216. commonName:
  217. issuer:
  218. name: letsencrypt-dns
  219. kind: ClusterIssuer
  220. ## Setting PodDisruptionBudget.
  221. ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb
  222. ##
  223. pdb:
  224. enabled: false
  225. maxUnavailable: 1