values.yaml 7.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266
  1. ## Default values for emqx.
  2. ## This is a YAML-formatted file.
  3. ## Declare variables to be passed into your templates.
  4. ## It is recommended to have odd number of nodes in a cluster, otherwise the emqx cluster cannot be automatically healed in case of net-split.
  5. replicaCount: 3
  6. image:
  7. repository: emqx/emqx
  8. pullPolicy: IfNotPresent
  9. # Overrides the image tag whose default is the chart appVersion.
  10. tag: ""
  11. ## Optionally specify an array of imagePullSecrets.
  12. ## Secrets must be manually created in the namespace.
  13. ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
  14. ##
  15. # pullSecrets:
  16. # - myRegistryKeySecretName
  17. serviceAccount:
  18. # Specifies whether a service account should be created
  19. # If set false, means you need create service account by yourself
  20. create: true
  21. # The name of the service account to use.
  22. # If not set and create is true, a name is generated using the fullname template
  23. name: ""
  24. # Annotations to add to the service account
  25. annotations: {}
  26. # The name of a secret in the same kubernetes namespace which contains values to
  27. # be added to the environment (must be manually created)
  28. # This can be useful for passwords and logins, etc.
  29. # envFromSecret: "emqx-secrets"
  30. ## Forces the recreation of pods during helm upgrades. This can be useful to update configuration values even if the container image did not change.
  31. recreatePods: false
  32. ## Sets the minReadySeconds parameter on the stateful set. This can be used to add delay between restart / updates between the single pods.
  33. minReadySeconds:
  34. ## Sets the priorityClassName parameter on the pods. This can be used to run the pods with increased priority.
  35. priorityClassName:
  36. clusterDomain: cluster.local
  37. podAnnotations: {}
  38. # Pod deployment policy
  39. # value: OrderedReady | Parallel
  40. # To redeploy a chart with existing PVC(s), the value must be set to Parallel to avoid deadlock
  41. podManagementPolicy: Parallel
  42. persistence:
  43. enabled: false
  44. size: 20Mi
  45. storageClassName: ""
  46. accessMode: ReadWriteOnce
  47. ## Existing PersistentVolumeClaims
  48. ## The value is evaluated as a template
  49. ## So, for example, the name can depend on .Release or .Chart
  50. # existingClaim: ""
  51. resources: {}
  52. # limits:
  53. # cpu: 500m
  54. # memory: 512Mi
  55. # requests:
  56. # cpu: 500m
  57. # memory: 512Mi
  58. extraVolumeMounts: []
  59. ## Additional volumeMounts to the default backend container.
  60. # - name: my-owner-acl
  61. # mountPath: /opt/emqx/etc/acl.conf
  62. # subPath: acl.conf
  63. extraVolumes: []
  64. ## Additional volumes to the default backend pod.
  65. # - name: my-owner-acl
  66. # secret: fake-acl-conf
  67. # Containers that run before the creation of EMQX containers. They can contain utilities or setup scripts.
  68. initContainers: {}
  69. # - name: sysctl
  70. # image: busybox
  71. # securityContext:
  72. # runAsUser: 0
  73. # runAsGroup: 0
  74. # capabilities:
  75. # add:
  76. # - SYS_ADMIN
  77. # drop:
  78. # - ALL
  79. # command:
  80. # - /bin/sh
  81. # - -c
  82. # - |
  83. # mount -o remount rw /proc/sys
  84. # sysctl -w net.core.somaxconn=65535
  85. # sysctl -w net.ipv4.ip_local_port_range="1024 65535"
  86. # sysctl -w kernel.core_uses_pid=0
  87. # sysctl -w net.ipv4.tcp_tw_reuse=1
  88. # sysctl -w fs.nr_open=1000000000
  89. # sysctl -w fs.file-max=1000000000
  90. # sysctl -w net.ipv4.ip_local_port_range='1025 65534'
  91. # sysctl -w net.ipv4.udp_mem='74583000 499445000 749166000'
  92. # sysctl -w net.ipv4.tcp_max_sync_backlog=163840
  93. # sysctl -w net.core.netdev_max_backlog=163840
  94. # sysctl -w net.core.optmem_max=16777216
  95. # sysctl -w net.ipv4.tcp_rmem='1024 4096 16777216'
  96. # sysctl -w net.ipv4.tcp_wmem='1024 4096 16777216'
  97. # sysctl -w net.ipv4.tcp_max_tw_buckets=1048576
  98. # sysctl -w net.ipv4.tcp_fin_timeout=15
  99. # sysctl -w net.core.rmem_default=262144000
  100. # sysctl -w net.core.wmem_default=262144000
  101. # sysctl -w net.core.rmem_max=262144000
  102. # sysctl -w net.core.wmem_max=262144000
  103. # sysctl -w net.ipv4.tcp_mem='378150000 504200000 756300000'
  104. # sysctl -w net.netfilter.nf_conntrack_max=1000000
  105. # sysctl -w net.netfilter.nf_conntrack_tcp_timeout_time_wait=30
  106. ## EMQX configuration item, see the documentation (https://hub.docker.com/r/emqx/emqx)
  107. emqxConfig:
  108. EMQX_CLUSTER__DISCOVERY_STRATEGY: "dns"
  109. EMQX_DASHBOARD__DEFAULT_USERNAME: "admin"
  110. EMQX_DASHBOARD__DEFAULT_PASSWORD: "public"
  111. ## EMQX Enterprise Edition requires manual creation of a Secret containing the licensed content. Write the name of Secret to the value of "emqxLicenseSecretName"
  112. ## Example:
  113. ## kubectl create secret generic emqx-license-secret-name --from-file=/path/to/emqx.lic
  114. emqxLicenseSecretName:
  115. service:
  116. ## Service type
  117. ##
  118. type: ClusterIP
  119. ## The cluster IP if one wants to customize it to a fixed value
  120. ##
  121. clusterIP: None
  122. ## Port for MQTT
  123. ##
  124. mqtt: 1883
  125. ## Port for MQTT(SSL)
  126. ##
  127. mqttssl: 8883
  128. ## Port for WebSocket/HTTP
  129. ##
  130. ws: 8083
  131. ## Port for WSS/HTTPS
  132. ##
  133. wss: 8084
  134. ## Port for dashboard and API
  135. ##
  136. dashboard: 18083
  137. ## Port for dashboard and API over HTTPS
  138. ##
  139. # dashboardtls: 18084
  140. ## Specify the nodePort(s) value for the LoadBalancer and NodePort service types.
  141. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport
  142. ##
  143. nodePorts:
  144. mqtt:
  145. mqttssl:
  146. mgmt:
  147. ws:
  148. wss:
  149. dashboard:
  150. dashboardtls:
  151. ## Specifies the load balancer implementation this Service belongs to.
  152. ## Once set, it can not be changed.
  153. ##
  154. # loadBalancerClass:
  155. ## Set the LoadBalancer service type to internal only.
  156. ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer
  157. ##
  158. # loadBalancerIP:
  159. ## Load Balancer sources
  160. ## ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service
  161. ## Example:
  162. ## loadBalancerSourceRanges:
  163. ## - 10.10.10.0/24
  164. ##
  165. loadBalancerSourceRanges: []
  166. ## Set the ExternalIPs
  167. ##
  168. externalIPs: []
  169. ## Denotes if this Service desires to route external traffic to node-local or cluster-wide endpoints.
  170. ## There are two available options: Cluster (default) and Local.
  171. ## Cluster obscures the client source IP and may cause a second hop to another node, but should have good overall load-spreading.
  172. ## Local preserves the client source IP and avoids a second hop for LoadBalancer and NodePort type Services, but risks potentially imbalanced traffic spreading.
  173. ##
  174. externalTrafficPolicy: "Cluster"
  175. ## Provide any additional annotations which may be required. Evaluated as a template
  176. ##
  177. annotations: {}
  178. labels: {}
  179. nodeSelector: {}
  180. tolerations: []
  181. affinity: {}
  182. topologySpreadConstraints: []
  183. ingress:
  184. ## ingress for EMQX Dashboard
  185. dashboard:
  186. enabled: false
  187. # ingressClassName: nginx
  188. annotations: {}
  189. # kubernetes.io/ingress.class: nginx
  190. # kubernetes.io/tls-acme: "true"
  191. path: /
  192. pathType: ImplementationSpecific
  193. hosts:
  194. - dashboard.emqx.local
  195. tls: []
  196. ## ingress for MQTT
  197. mqtt:
  198. enabled: false
  199. # ingressClassName: haproxy
  200. annotations: {}
  201. # kubernetes.io/ingress.class: haproxy
  202. # kubernetes.io/tls-acme: "true"
  203. # haproxy-ingress.github.io/tcp-service-port: "8883"
  204. # haproxy-ingress.github.io/proxy-protocol: "v2"
  205. path: /
  206. pathType: ImplementationSpecific
  207. hosts:
  208. - mqtt.emqx.local
  209. tls: []
  210. podSecurityContext:
  211. enabled: true
  212. fsGroup: 1000
  213. fsGroupChangePolicy: Always
  214. runAsUser: 1000
  215. supplementalGroups:
  216. - 1000
  217. containerSecurityContext:
  218. enabled: true
  219. runAsNonRoot: true
  220. runAsUser: 1000
  221. metrics:
  222. enabled: false
  223. type: prometheus
  224. ssl:
  225. enabled: false
  226. useExisting: false
  227. existingName: emqx-tls
  228. dnsnames: []
  229. commonName:
  230. issuer:
  231. name: letsencrypt-dns
  232. kind: ClusterIssuer
  233. ## Setting PodDisruptionBudget.
  234. ## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb
  235. ##
  236. pdb:
  237. enabled: false
  238. maxUnavailable: 1