Created
May 11, 2020 18:22
-
-
Save harsh4870/a334d0a3b0ac337f3de745aa2f72be6d to your computer and use it in GitHub Desktop.
kong-values.yaml with postgres setup
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Default values for Kong's Helm Chart. | |
# Declare variables to be passed into your templates. | |
# | |
# Sections: | |
# - Kong parameters | |
# - Ingress Controller parameters | |
# - Postgres sub-chart parameters | |
# - Miscellaneous parameters | |
# - Kong Enterprise parameters | |
# ----------------------------------------------------------------------------- | |
# Kong parameters | |
# ----------------------------------------------------------------------------- | |
# Specify Kong configurations | |
# Kong configurations guide https://docs.konghq.com/latest/configuration | |
# Values here take precedence over values from other sections of values.yaml, | |
# e.g. setting pg_user here will override the value normally set when postgresql.enabled | |
# is set below. In general, you should not set values here if they are set elsewhere. | |
env: | |
database: "postgres" | |
pg_host : postgres | |
pg_port : 5432 | |
pg_timeout : 5000 | |
pg_user : root | |
pg_password : password | |
pg_database : kong | |
nginx_worker_processes: "1" | |
proxy_access_log: /dev/stdout | |
admin_access_log: /dev/stdout | |
admin_gui_access_log: /dev/stdout | |
portal_api_access_log: /dev/stdout | |
proxy_error_log: /dev/stderr | |
admin_error_log: /dev/stderr | |
admin_gui_error_log: /dev/stderr | |
portal_api_error_log: /dev/stderr | |
prefix: /kong_prefix/ | |
# Specify Kong's Docker image and repository details here | |
image: | |
repository: kong | |
tag: "2.0" | |
# kong-enterprise-k8s image (Kong OSS + Enterprise plugins) | |
# repository: kong-docker-kong-enterprise-k8s.bintray.io/kong-enterprise-k8s | |
# tag: "2.0.2.0-alpine" | |
# kong-enterprise image | |
# repository: kong-docker-kong-enterprise-edition-docker.bintray.io/kong-enterprise-edition | |
# tag: "1.5.0.0-alpine" | |
pullPolicy: IfNotPresent | |
## Optionally specify an array of imagePullSecrets. | |
## Secrets must be manually created in the namespace. | |
## If using the official Kong Enterprise registry above, you MUST provide a secret. | |
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ | |
## | |
# pullSecrets: | |
# - myRegistrKeySecretName | |
# Specify Kong admin API service and listener configuration | |
admin: | |
# Enable creating a Kubernetes service for the admin API | |
# Disabling this is recommended for most ingress controller configurations | |
# Enterprise users that wish to use Kong Manager with the controller should enable this | |
enabled: true | |
type: NodePort | |
# If you want to specify annotations for the admin service, uncomment the following | |
# line, add additional or adjust as needed, and remove the curly braces after 'annotations:'. | |
annotations: {} | |
# service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: "*" | |
http: | |
# Enable plaintext HTTP listen for the admin API | |
# Disabling this and using a TLS listen only is recommended for most configuration | |
enabled: true | |
servicePort: 8001 | |
containerPort: 8001 | |
# Set a nodePort which is available if service type is NodePort | |
# nodePort: 32080 | |
# Additional listen parameters, e.g. "reuseport", "backlog=16384" | |
parameters: [] | |
tls: | |
# Enable HTTPS listen for the admin API | |
enabled: true | |
servicePort: 8444 | |
containerPort: 8444 | |
# Set a target port for the TLS port in the admin API service, useful when using TLS | |
# termination on an ELB. | |
# overrideServiceTargetPort: 8000 | |
# Set a nodePort which is available if service type is NodePort | |
# nodePort: 32443 | |
# Additional listen parameters, e.g. "reuseport", "backlog=16384" | |
parameters: | |
- http2 | |
# Kong admin ingress settings. Useful if you want to expose the Admin | |
# API of Kong outside the k8s cluster. | |
ingress: | |
# Enable/disable exposure using ingress. | |
enabled: false | |
# TLS secret name. | |
# tls: kong-admin.example.com-tls | |
# Ingress hostname | |
hostname: | |
# Map of ingress annotations. | |
annotations: {} | |
# Ingress path. | |
path: / | |
# Specify Kong status listener configuration | |
# This listen is internal-only. It cannot be exposed through a service or ingress. | |
status: | |
http: | |
# Enable plaintext HTTP listen for the status listen | |
enabled: true | |
containerPort: 8100 | |
tls: | |
# Enable HTTPS listen for the status listen | |
# Kong does not currently support HTTPS status listens, so this should remain false | |
enabled: false | |
containerPort: 8543 | |
# Specify Kong proxy service and listener configuration | |
proxy: | |
# Enable creating a Kubernetes service for the proxy | |
enabled: true | |
type: LoadBalancer | |
# If you want to specify annotations for the proxy service, uncomment the following | |
# line, add additional or adjust as needed, and remove the curly braces after 'annotations:'. | |
annotations: {} | |
# service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: "*" | |
http: | |
# Enable plaintext HTTP listen for the proxy | |
enabled: true | |
servicePort: 80 | |
containerPort: 8000 | |
# Set a nodePort which is available if service type is NodePort | |
# nodePort: 32080 | |
# Additional listen parameters, e.g. "reuseport", "backlog=16384" | |
parameters: [] | |
tls: | |
# Enable HTTPS listen for the proxy | |
enabled: true | |
servicePort: 443 | |
containerPort: 8443 | |
# Set a target port for the TLS port in proxy service, useful when using TLS | |
# termination on an ELB. | |
# overrideServiceTargetPort: 8000 | |
# Set a nodePort which is available if service type is NodePort | |
# nodePort: 32443 | |
# Additional listen parameters, e.g. "reuseport", "backlog=16384" | |
parameters: | |
- http2 | |
# Define stream (TCP) listen | |
# To enable, remove "{}", uncomment the section below, and select your desired | |
# ports and parameters. Listens are dynamically named after their servicePort, | |
# e.g. "stream-9000" for the below. | |
stream: {} | |
# # Set the container (internal) and service (external) ports for this listen. | |
# # These values should normally be the same. If your environment requires they | |
# # differ, note that Kong will match routes based on the containerPort only. | |
# - containerPort: 9000 | |
# servicePort: 9000 | |
# # Optionally set a static nodePort if the service type is NodePort | |
# # nodePort: 32080 | |
# # Additional listen parameters, e.g. "ssl", "reuseport", "backlog=16384" | |
# # "ssl" is required for SNI-based routes. It is not supported on versions <2.0 | |
# parameters: [] | |
# Kong proxy ingress settings. | |
# Note: You need this only if you are using another Ingress Controller | |
# to expose Kong outside the k8s cluster. | |
ingress: | |
# Enable/disable exposure using ingress. | |
enabled: false | |
hosts: [] | |
# TLS section. Unlike other ingresses, this follows the format at | |
# https://kubernetes.io/docs/concepts/services-networking/ingress/#tls | |
# tls: | |
# - hosts: | |
# - 1.example.com | |
# secretName: example1-com-tls-secret | |
# - hosts: | |
# - 2.example.net | |
# secretName: example2-net-tls-secret | |
# Map of ingress annotations. | |
annotations: {} | |
# Ingress path. | |
path: / | |
externalIPs: [] | |
# Custom Kong plugins can be loaded into Kong by mounting the plugin code | |
# into the file-system of Kong container. | |
# The plugin code should be present in ConfigMap or Secret inside the same | |
# namespace as Kong is being installed. | |
# The `name` property refers to the name of the ConfigMap or Secret | |
# itself, while the pluginName refers to the name of the plugin as it appears | |
# in Kong. | |
# Subdirectories (which are optional) require separate ConfigMaps/Secrets. | |
# "path" indicates their directory under the main plugin directory: the example | |
# below will mount the contents of kong-plugin-rewriter-migrations at "/opt/kong/rewriter/migrations". | |
plugins: {} | |
# configMaps: | |
# - pluginName: rewriter | |
# name: kong-plugin-rewriter | |
# subdirectories: | |
# - name: kong-plugin-rewriter-migrations | |
# path: migrations | |
# secrets: | |
# - pluginName: rewriter | |
# name: kong-plugin-rewriter | |
# Inject specified secrets as a volume in Kong Container at path /etc/secrets/{secret-name}/ | |
# This can be used to override default SSL certificates. | |
# Be aware that the secret name will be used verbatim, and that certain types | |
# of punctuation (e.g. `.`) can cause issues. | |
# Example configuration | |
# secretVolumes: | |
# - kong-proxy-tls | |
# - kong-admin-tls | |
secretVolumes: [] | |
# Enable/disable migration jobs, and set annotations for them | |
migrations: | |
# Enable pre-upgrade migrations (run "kong migrations up") | |
preUpgrade: true | |
# Enable post-upgrade migrations (run "kong migrations finish") | |
postUpgrade: true | |
# Annotations to apply to migrations jobs | |
# By default, these disable service mesh sidecar injection for Istio and Kuma, | |
# as the sidecar containers do not terminate and prevent the jobs from completing | |
annotations: | |
sidecar.istio.io/inject: false | |
kuma.io/sidecar-injection: "disabled" | |
# Kong's configuration for DB-less mode | |
# Note: Use this section only if you are deploying Kong in DB-less mode | |
# and not as an Ingress Controller. | |
dblessConfig: | |
# Either Kong's configuration is managed from an existing ConfigMap (with Key: kong.yml) | |
configMap: "" | |
# Or the configuration is passed in full-text below | |
config: | |
_format_version: "1.1" | |
services: | |
# Example configuration | |
# - name: example.com | |
# url: http://example.com | |
# routes: | |
# - name: example | |
# paths: | |
# - "/example" | |
# ----------------------------------------------------------------------------- | |
# Ingress Controller parameters | |
# ----------------------------------------------------------------------------- | |
# Kong Ingress Controller's primary purpose is to satisfy Ingress resources | |
# created in k8s. It uses CRDs for more fine grained control over routing and | |
# for Kong specific configuration. | |
ingressController: | |
enabled: true | |
image: | |
repository: kong-docker-kubernetes-ingress-controller.bintray.io/kong-ingress-controller | |
tag: 0.8.0 | |
args: [] | |
# Specify Kong Ingress Controller configuration via environment variables | |
env: | |
# The controller disables TLS verification by default because Kong | |
# generates self-signed certificates by default. Set this to false once you | |
# have installed CA-signed certificates. | |
kong_admin_tls_skip_verify: true | |
# If using Kong Enterprise with RBAC enabled, uncomment the section below | |
# and specify the secret/key containing your admin token. | |
# kong_admin_token: | |
# valueFrom: | |
# secretKeyRef: | |
# name: CHANGEME-admin-token-secret | |
# key: CHANGEME-admin-token-key | |
admissionWebhook: | |
enabled: false | |
failurePolicy: Fail | |
port: 8080 | |
ingressClass: kong | |
rbac: | |
# Specifies whether RBAC resources should be created | |
create: true | |
serviceAccount: | |
# Specifies whether a ServiceAccount should be created | |
create: true | |
# The name of the ServiceAccount to use. | |
# If not set and create is true, a name is generated using the fullname template | |
name: | |
# The annotations for service account | |
annotations: {} | |
installCRDs: true | |
# general properties | |
livenessProbe: | |
httpGet: | |
path: "/healthz" | |
port: 10254 | |
scheme: HTTP | |
initialDelaySeconds: 5 | |
timeoutSeconds: 5 | |
periodSeconds: 10 | |
successThreshold: 1 | |
failureThreshold: 3 | |
readinessProbe: | |
httpGet: | |
path: "/healthz" | |
port: 10254 | |
scheme: HTTP | |
initialDelaySeconds: 5 | |
timeoutSeconds: 5 | |
periodSeconds: 10 | |
successThreshold: 1 | |
failureThreshold: 3 | |
resources: {} | |
# ----------------------------------------------------------------------------- | |
# Postgres sub-chart parameters | |
# ----------------------------------------------------------------------------- | |
# Kong can run without a database or use either Postgres or Cassandra | |
# as a backend datatstore for it's configuration. | |
# By default, this chart installs Kong without a database. | |
# If you would like to use a database, there are two options: | |
# - (recommended) Deploy and maintain a database and pass the connection | |
# details to Kong via the `env` section. | |
# - You can use the below `postgresql` sub-chart to deploy a database | |
# along-with Kong as part of a single Helm release. | |
# PostgreSQL chart documentation: | |
# https://github.com/helm/charts/blob/master/stable/postgresql/README.md | |
postgresql: | |
enabled: true | |
postgresqlUsername: kong | |
postgresqlDatabase: kong | |
service: | |
port: 5432 | |
# ----------------------------------------------------------------------------- | |
# Miscellaneous parameters | |
# ----------------------------------------------------------------------------- | |
waitImage: | |
repository: busybox | |
tag: latest | |
pullPolicy: IfNotPresent | |
# update strategy | |
updateStrategy: {} | |
# type: RollingUpdate | |
# rollingUpdate: | |
# maxSurge: "100%" | |
# maxUnavailable: "0%" | |
# If you want to specify resources, uncomment the following | |
# lines, adjust them as necessary, and remove the curly braces after 'resources:'. | |
resources: {} | |
# limits: | |
# cpu: 100m | |
# memory: 128Mi | |
# requests: | |
# cpu: 100m | |
# memory: 128Mi | |
# readinessProbe for Kong pods | |
# If using Kong Enterprise with RBAC, you must add a Kong-Admin-Token header | |
readinessProbe: | |
httpGet: | |
path: "/status" | |
port: metrics | |
scheme: HTTP | |
initialDelaySeconds: 5 | |
timeoutSeconds: 5 | |
periodSeconds: 10 | |
successThreshold: 1 | |
failureThreshold: 3 | |
# livenessProbe for Kong pods | |
livenessProbe: | |
httpGet: | |
path: "/status" | |
port: metrics | |
scheme: HTTP | |
initialDelaySeconds: 5 | |
timeoutSeconds: 5 | |
periodSeconds: 10 | |
successThreshold: 1 | |
failureThreshold: 3 | |
# Affinity for pod assignment | |
# Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity | |
# affinity: {} | |
# Tolerations for pod assignment | |
# Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ | |
tolerations: [] | |
# Node labels for pod assignment | |
# Ref: https://kubernetes.io/docs/user-guide/node-selection/ | |
nodeSelector: {} | |
# Annotation to be added to Kong pods | |
podAnnotations: {} | |
# Kong pod count | |
replicaCount: 1 | |
# Annotations to be added to Kong deployment | |
deploymentAnnotations: | |
kuma.io/gateway: enabled | |
traffic.sidecar.istio.io/includeInboundPorts: "" | |
# Enable autoscaling using HorizontalPodAutoscaler | |
autoscaling: | |
enabled: false | |
minReplicas: 2 | |
maxReplicas: 5 | |
## targetCPUUtilizationPercentage only used if the cluster doesn't support autoscaling/v2beta | |
targetCPUUtilizationPercentage: | |
## Otherwise for clusters that do support autoscaling/v2beta, use metrics | |
metrics: | |
- type: Resource | |
resource: | |
name: cpu | |
target: | |
type: Utilization | |
averageUtilization: 80 | |
# Kong Pod Disruption Budget | |
podDisruptionBudget: | |
enabled: false | |
maxUnavailable: "50%" | |
podSecurityPolicy: | |
enabled: false | |
spec: | |
privileged: false | |
fsGroup: | |
rule: RunAsAny | |
runAsUser: | |
rule: RunAsAny | |
runAsGroup: | |
rule: RunAsAny | |
seLinux: | |
rule: RunAsAny | |
supplementalGroups: | |
rule: RunAsAny | |
volumes: | |
- 'configMap' | |
- 'secret' | |
- 'emptyDir' | |
allowPrivilegeEscalation: false | |
hostNetwork: false | |
hostIPC: false | |
hostPID: false | |
# Make the root filesystem read-only. This is not compatible with Kong Enterprise <1.5. | |
# If you use Kong Enterprise <1.5, this must be set to false. | |
readOnlyRootFilesystem: true | |
priorityClassName: "" | |
# securityContext for Kong pods. | |
securityContext: | |
runAsUser: 1000 | |
serviceMonitor: | |
# Specifies whether ServiceMonitor for Prometheus operator should be created | |
enabled: false | |
# interval: 10s | |
# Specifies namespace, where ServiceMonitor should be installed | |
# namespace: monitoring | |
# labels: | |
# foo: bar | |
# ----------------------------------------------------------------------------- | |
# Kong Enterprise parameters | |
# ----------------------------------------------------------------------------- | |
# Toggle Kong Enterprise features on or off | |
# RBAC and SMTP configuration have additional options that must all be set together | |
# Other settings should be added to the "env" settings below | |
enterprise: | |
enabled: false | |
# Kong Enterprise license secret name | |
# This secret must contain a single 'license' key, containing your base64-encoded license data | |
# The license secret is required for all Kong Enterprise deployments | |
license_secret: you-must-create-a-kong-license-secret | |
vitals: | |
enabled: true | |
portal: | |
enabled: false | |
rbac: | |
enabled: false | |
admin_gui_auth: basic-auth | |
# If RBAC is enabled, this Secret must contain an admin_gui_session_conf key | |
# The key value must be a secret configuration, following the example at | |
# https://docs.konghq.com/enterprise/latest/kong-manager/authentication/sessions | |
session_conf_secret: you-must-create-an-rbac-session-conf-secret | |
# If admin_gui_auth is not set to basic-auth, provide a secret name which | |
# has an admin_gui_auth_conf key containing the plugin config JSON | |
admin_gui_auth_conf_secret: you-must-create-an-admin-gui-auth-conf-secret | |
# For configuring emails and SMTP, please read through: | |
# https://docs.konghq.com/enterprise/latest/developer-portal/configuration/smtp | |
# https://docs.konghq.com/enterprise/latest/kong-manager/networking/email | |
smtp: | |
enabled: false | |
portal_emails_from: [email protected] | |
portal_emails_reply_to: [email protected] | |
admin_emails_from: [email protected] | |
admin_emails_reply_to: [email protected] | |
smtp_admin_emails: [email protected] | |
smtp_host: smtp.example.com | |
smtp_port: 587 | |
smtp_starttls: true | |
auth: | |
# If your SMTP server does not require authentication, this section can | |
# be left as-is. If smtp_username is set to anything other than an empty | |
# string, you must create a Secret with an smtp_password key containing | |
# your SMTP password and specify its name here. | |
smtp_username: '' # e.g. [email protected] | |
smtp_password_secret: you-must-create-an-smtp-password | |
manager: | |
# Enable creating a Kubernetes service for Kong Manager | |
enabled: true | |
type: NodePort | |
# If you want to specify annotations for the Manager service, uncomment the following | |
# line, add additional or adjust as needed, and remove the curly braces after 'annotations:'. | |
annotations: {} | |
# service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: "*" | |
http: | |
# Enable plaintext HTTP listen for Kong Manager | |
enabled: true | |
servicePort: 8002 | |
containerPort: 8002 | |
# Set a nodePort which is available if service type is NodePort | |
# nodePort: 32080 | |
# Additional listen parameters, e.g. "reuseport", "backlog=16384" | |
parameters: [] | |
tls: | |
# Enable HTTPS listen for Kong Manager | |
enabled: true | |
servicePort: 8445 | |
containerPort: 8445 | |
# Set a nodePort which is available if service type is NodePort | |
# nodePort: 32443 | |
# Additional listen parameters, e.g. "reuseport", "backlog=16384" | |
parameters: | |
- http2 | |
ingress: | |
# Enable/disable exposure using ingress. | |
enabled: false | |
# TLS secret name. | |
# tls: kong-proxy.example.com-tls | |
# Ingress hostname | |
hostname: | |
# Map of ingress annotations. | |
annotations: {} | |
# Ingress path. | |
path: / | |
externalIPs: [] | |
portal: | |
# Enable creating a Kubernetes service for the Developer Portal | |
enabled: true | |
type: NodePort | |
# If you want to specify annotations for the Portal service, uncomment the following | |
# line, add additional or adjust as needed, and remove the curly braces after 'annotations:'. | |
annotations: {} | |
# service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: "*" | |
http: | |
# Enable plaintext HTTP listen for the Developer Portal | |
enabled: true | |
servicePort: 8003 | |
containerPort: 8003 | |
# Set a nodePort which is available if service type is NodePort | |
# nodePort: 32080 | |
# Additional listen parameters, e.g. "reuseport", "backlog=16384" | |
parameters: [] | |
tls: | |
# Enable HTTPS listen for the Developer Portal | |
enabled: true | |
servicePort: 8446 | |
containerPort: 8446 | |
# Set a nodePort which is available if service type is NodePort | |
# nodePort: 32443 | |
# Additional listen parameters, e.g. "reuseport", "backlog=16384" | |
parameters: | |
- http2 | |
ingress: | |
# Enable/disable exposure using ingress. | |
enabled: false | |
# TLS secret name. | |
# tls: kong-proxy.example.com-tls | |
# Ingress hostname | |
hostname: | |
# Map of ingress annotations. | |
annotations: {} | |
# Ingress path. | |
path: / | |
externalIPs: [] | |
portalapi: | |
# Enable creating a Kubernetes service for the Developer Portal API | |
enabled: true | |
type: NodePort | |
# If you want to specify annotations for the Portal API service, uncomment the following | |
# line, add additional or adjust as needed, and remove the curly braces after 'annotations:'. | |
annotations: {} | |
# service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: "*" | |
http: | |
# Enable plaintext HTTP listen for the Developer Portal API | |
enabled: true | |
servicePort: 8004 | |
containerPort: 8004 | |
# Set a nodePort which is available if service type is NodePort | |
# nodePort: 32080 | |
# Additional listen parameters, e.g. "reuseport", "backlog=16384" | |
parameters: [] | |
tls: | |
# Enable HTTPS listen for the Developer Portal API | |
enabled: true | |
servicePort: 8447 | |
containerPort: 8447 | |
# Set a nodePort which is available if service type is NodePort | |
# nodePort: 32443 | |
# Additional listen parameters, e.g. "reuseport", "backlog=16384" | |
parameters: | |
- http2 | |
ingress: | |
# Enable/disable exposure using ingress. | |
enabled: false | |
# TLS secret name. | |
# tls: kong-proxy.example.com-tls | |
# Ingress hostname | |
hostname: | |
# Map of ingress annotations. | |
annotations: {} | |
# Ingress path. | |
path: / | |
externalIPs: [] |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment