This repository has been archived by the owner on Nov 8, 2018. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 0
/
cluster.yaml
95 lines (68 loc) · 3 KB
/
cluster.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
# Unique name of Kubernetes cluster. In order to deploy
# more than one cluster into the same AWS account, this
# name must not conflict with an existing cluster.
clusterName: csd-identity
# DNS name routable to the Kubernetes controller nodes
# from worker nodes and external clients. Configure the options
# below if you'd like kube-aws to create a Route53 record sets/hosted zones
# for you. Otherwise the deployer is responsible for making this name routable
externalDNSName: identity-k8s.civilservice.digital
# CoreOS release channel to use. Currently supported options: [ alpha, beta ]
# See coreos.com/releases for more information
#releaseChannel: alpha
# Set to true if you want kube-aws to create a Route53 A Record for you.
createRecordSet: true
# TTL in seconds for the Route53 RecordSet created if createRecordSet is set to true.
recordSetTTL: 60
# The name of the hosted zone to add the externalDNSName to,
# E.g: "google.com". This needs to already exist, kube-aws will not create
# it for you.
hostedZone: "civilservice.digital"
# Name of the SSH keypair already loaded into the AWS
# account being used to deploy this cluster.
keyName: k8s-identity
# Region to provision Kubernetes cluster
region: eu-west-1
# Availability Zone to provision Kubernetes cluster
availabilityZone: eu-west-1a
# ARN of the KMS key used to encrypt TLS assets.
kmsKeyArn: "arn:aws:kms:eu-west-1:290289616051:key/b99f499f-e8b8-43f2-a735-c67fd8bb99e9"
# Instance type for controller node
#controllerInstanceType: m3.medium
# Disk size (GiB) for controller node
#controllerRootVolumeSize: 30
# Number of worker nodes to create
workerCount: 3
# Instance type for worker nodes
#workerInstanceType: m3.medium
# Disk size (GiB) for worker nodes
#workerRootVolumeSize: 30
# Price (Dollars) to bid for spot instances. Omit for on-demand instances.
# workerSpotPrice: "0.05"
# ID of existing VPC to create subnet in. Leave blank to create a new VPC
# vpcId:
# ID of existing route table in existing VPC to attach subnet to. Leave blank to use the VPC's main route table.
# routeTableId:
# CIDR for Kubernetes VPC. If vpcId is specified, must match the CIDR of existing vpc.
# vpcCIDR: "10.0.0.0/16"
# CIDR for Kubernetes subnet
# instanceCIDR: "10.0.0.0/24"
# IP Address for controller in Kubernetes subnet
# controllerIP: 10.0.0.50
# CIDR for all service IP addresses
# serviceCIDR: "10.3.0.0/24"
# CIDR for all pod IP addresses
# podCIDR: "10.2.0.0/16"
# IP address of Kubernetes dns service (must be contained by serviceCIDR)
# dnsServiceIP: 10.3.0.10
# Version of hyperkube image to use. This is the tag for the hyperkube image repository.
kubernetesVersion: v1.3.0_coreos.0
# Hyperkube image repository to use.
# hyperkubeImageRepo: quay.io/coreos/hyperkube
# Use Calico for network policy. When set to "true" the kubernetesVersion (above)
# must also be updated to include a version tagged with CNI e.g. v1.2.3_coreos.cni.1
# useCalico: false
# AWS Tags for cloudformation stack resources
stackTags:
Name: "Kubernetes"
Environment: "CSD Identity"