You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -151,3 +152,9 @@ The same for container level, you need to set:
151
152
| podDisruptionBudget.enabled | bool |`false`| Enable or disable podDisruptionBudget |
152
153
| podDisruptionBudget.maxUnavailable | int |`1`| Set the maxUnavailable of podDisruptionBudget |
153
154
| podDisruptionBudget.minAvailable | string |`"90%"`| Set the `minAvailable` of podDisruptionBudget. You can specify only one of `maxUnavailable` and `minAvailable` in a single PodDisruptionBudget. See [Specifying a Disruption Budget for your Application](https://kubernetes.io/docs/tasks/run-application/configure-pdb/#specifying-a-poddisruptionbudget) for more details |
| serviceMonitor.enabled | bool |`false`| Enable or disable ServiceMonitor |
157
+
| serviceMonitor.interval | string |`"15s"`|@param serviceMonitor.interval Interval at which metrics should be scraped |
158
+
| serviceMonitor.labels | object |`{}`|@param serviceMonitor.labels ServiceMonitor extra labels |
159
+
| serviceMonitor.metricRelabelings | object |`{}`|@param serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion. ref: https://prometheus.io/docs/prometheus/latest/configuration/configuration/#metric_relabel_configs|
160
+
| serviceMonitor.namespace | string |`"monitoring"`|@param serviceMonitor.namespace Namespace in which to create the ServiceMonitor |
Copy file name to clipboardExpand all lines: charts/apisix/README.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -123,6 +123,7 @@ The command removes all the Kubernetes components associated with the chart and
123
123
| apisix.ssl.enabled | bool |`false`||
124
124
| apisix.ssl.existingCASecret | string |`""`| Specifies the name of Secret contains trusted CA certificates in the PEM format used to verify the certificate when APISIX needs to do SSL/TLS handshaking with external services (e.g. etcd) |
125
125
| apisix.ssl.fallbackSNI | string |`""`| Define SNI to fallback if none is presented by client |
@@ -150,7 +151,7 @@ The command removes all the Kubernetes components associated with the chart and
150
151
| control.service.port | int |`9090`| which port to use for Apache APISIX Control API |
151
152
| control.service.servicePort | int |`9090`| Service port to use for Apache APISIX Control API |
152
153
| control.service.type | string |`"ClusterIP"`| Control service type |
153
-
| etcd | object |`{"auth":{"rbac":{"create":false,"rootPassword":""},"tls":{"certFilename":"","certKeyFilename":"","enabled":false,"existingSecret":"","sni":"","verify":true}},"autoCompactionMode":"periodic","autoCompactionRetention":"1h","containerSecurityContext":{"enabled":false},"enabled":true,"prefix":"/apisix","replicaCount":3,"service":{"port":2379},"timeout":30}`| etcd configuration use the FQDN address or the IP of the etcd |
154
+
| etcd | object |`{"auth":{"rbac":{"create":false,"rootPassword":""},"tls":{"certFilename":"","certKeyFilename":"","enabled":false,"existingSecret":"","sni":"","verify":true}},"autoCompactionMode":"periodic","autoCompactionRetention":"1h","containerSecurityContext":{"enabled":false},"enabled":true,"image":{"registry":"docker.io","repository":"bitnami/etcd","tag":"latest"},"prefix":"/apisix","replicaCount":3,"service":{"port":2379},"timeout":30}`| etcd configuration use the FQDN address or the IP of the etcd |
154
155
| etcd.auth | object |`{"rbac":{"create":false,"rootPassword":""},"tls":{"certFilename":"","certKeyFilename":"","enabled":false,"existingSecret":"","sni":"","verify":true}}`| if etcd.enabled is true, set more values of bitnami/etcd helm chart |
155
156
| etcd.auth.rbac.create | bool |`false`| No authentication by default. Switch to enable RBAC authentication |
156
157
| etcd.auth.rbac.rootPassword | string |`""`| root password for etcd. Requires etcd.auth.rbac.create to be true. |
@@ -161,7 +162,9 @@ The command removes all the Kubernetes components associated with the chart and
161
162
| etcd.auth.tls.sni | string |`""`| specify the TLS Server Name Indication extension, the ETCD endpoint hostname will be used when this setting is unset. |
162
163
| etcd.auth.tls.verify | bool |`true`| whether to verify the etcd endpoint certificate when setup a TLS connection to etcd |
163
164
| etcd.containerSecurityContext | object |`{"enabled":false}`| added for backward compatibility with old kubernetes versions, as seccompProfile is not supported in kubernetes < 1.19 |
164
-
| etcd.enabled | bool |`true`| install etcd(v3) by default, set false if do not want to install etcd(v3) together |
165
+
| etcd.enabled | bool |`true`| install built-in etcd by default, set false if do not want to install built-in etcd together, this etcd is based on bitnami/etcd helm chart and latest bitnami docker image, only for development and testing purposes, if you want to use etcd in production, we recommend you to install etcd by yourself and use `externalEtcd` to connect it. |
| etcd.image.tag | string |`"latest"`|`bitnami/etcd` only provide `latest` tag now, ref: https://github.com/bitnami/containers/issues/83267, you can switch `etcd.image.repository` to `bitnamilegacy/etcd` to use old versioned tags. |
| etcd.timeout | int |`30`| Set the timeout value in seconds for subsequent socket operations from apisix to etcd cluster |
167
170
| externalEtcd | object |`{"existingSecret":"","host":["http://etcd.host:2379"],"password":"","secretPasswordKey":"etcd-root-password","user":"root"}`| external etcd configuration. If etcd.enabled is false, these configuration will be used. |
0 commit comments