forked from livekit/livekit-helm
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathserver-sample.yaml
More file actions
81 lines (74 loc) · 2.68 KB
/
server-sample.yaml
File metadata and controls
81 lines (74 loc) · 2.68 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
# LiveKit Helm chart will set up a Deployment, Service, HPA, and Ingress as either
# a single or multi-node LiveKit deployment.
# After installing this chart, you would still need to
# * Open ports on the firewall to the hosts (see https://docs.livekit.io/deploy/ports-firewall)
# * Update DNS of hostnames to the ingress/service that were created
replicaCount: 1
livekit:
# port: 7880
log_level: info
rtc:
use_external_ip: true
# default ports used
port_range_start: 50000
port_range_end: 60000
tcp_port: 7801
redis:
address: <redis_host:port>
# db: 0
# username:
# password:
# one or more API key/secret pairs
# see https://docs.livekit.io/guides/getting-started/#generate-api-key-and-secret
keys:
myapikey: "myapisecret"
turn:
enabled: true
# must match domain of your tls cert
domain: turn.myhost.com
# tls_port must be 443 if turn load balancer is disabled
tls_port: 3478
# udp_port should be 443 for best connectivity through firewalls
udp_port: 443
secretName: <tlssecret>
# valid values: disable, aws, gke
# tls cert and domain are required, even when load balancer is disabled
loadBalancerType: disable
loadBalancer:
# valid values: disable, alb, aws, gke
# on AWS, we recommend using alb load balancer, which supports TLS termination
# in order to use alb, aws-ingress-controller must be installed
# https://docs.aws.amazon.com/eks/latest/userguide/alb-ingress.html
type: disable
# Uncomment and enter host names if TLS is desired.
# TLS is not supported with `aws` load balancer
tls:
# - hosts:
# - livekit.myhost.com
# with ALB, certificates needs to reside in ACM for self-discovery
# with GKE, specify one or more secrets to use for the certificate
# see: https://cloud.google.com/kubernetes-engine/docs/how-to/ingress-multi-ssl#specifying_certificates_for_your_ingress
# secretName: <mysecret>
# when true (default), optimizes network stack for service
# increases UDP send and receive buffers
# optimizeNetwork: true
# autoscaling requires resources to be defined
autoscaling:
# set to true to enable autoscaling. when set, ignores replicaCount
enabled: false
minReplicas: 1
maxReplicas: 5
targetCPUUtilizationPercentage: 60
# if LiveKit should run only on specific nodes
# this can be used to isolate designated nodes
nodeSelector: {}
# node.kubernetes.io/instance-type: c5.2xlarge
resources: {}
# Due to port restrictions, you can run only one instance of LiveKit per physical
# node. Because of that, we recommend giving it plenty of resources to work with
# limits:
# cpu: 6000m
# memory: 2048Mi
# requests:
# cpu: 4000m
# memory: 1024Mi