You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: charts/apisix/README.md
+5-2Lines changed: 5 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -43,9 +43,11 @@ The command removes all the Kubernetes components associated with the chart and
43
43
| affinity | object |`{}`| Set affinity for Apache APISIX deploy |
44
44
| apisix.admin.allow.ipList | list |`["127.0.0.1/24"]`| The client IP CIDR allowed to access Apache APISIX Admin API service. |
45
45
| apisix.admin.cors | bool |`true`| Admin API support CORS response headers |
46
-
| apisix.admin.credentials | object |`{"admin":"edd1c9f034335f136f87ad84b625c8f1","secretName":"","viewer":"4054f7cf07e344346cd3f287985e76a2"}`| Admin API credentials |
46
+
| apisix.admin.credentials | object |`{"admin":"edd1c9f034335f136f87ad84b625c8f1","secretAdminKey":"","secretName":"","secretViewerKey":"","viewer":"4054f7cf07e344346cd3f287985e76a2"}`| Admin API credentials |
47
47
| apisix.admin.credentials.admin | string |`"edd1c9f034335f136f87ad84b625c8f1"`| Apache APISIX admin API admin role credentials |
48
+
| apisix.admin.credentials.secretAdminKey | string |`""`| Name of the admin role key in the secret, overrides the default key name "admin" |
48
49
| apisix.admin.credentials.secretName | string |`""`| The APISIX Helm chart supports storing user credentials in a secret. The secret needs to contain two keys, admin and viewer, with their respective values set. |
50
+
| apisix.admin.credentials.secretViewerKey | string |`""`| Name of the viewer role key in the secret, overrides the default key name "viewer" |
49
51
| apisix.admin.credentials.viewer | string |`"4054f7cf07e344346cd3f287985e76a2"`| Apache APISIX admin API viewer role credentials |
50
52
| apisix.admin.enabled | bool |`true`| Enable Admin API |
51
53
| apisix.admin.externalIPs | list |`[]`| IPs for which nodes in the cluster will also accept traffic for the servic |
@@ -138,7 +140,7 @@ The command removes all the Kubernetes components associated with the chart and
| etcd | object |`{"auth":{"rbac":{"create":false,"rootPassword":""},"tls":{"certFilename":"","certKeyFilename":"","enabled":false,"existingSecret":"","sni":"","verify":true}},"enabled":true,"prefix":"/apisix","replicaCount":3,"service":{"port":2379},"timeout":30}`| etcd configuration use the FQDN address or the IP of the etcd |
143
+
| etcd | object |`{"auth":{"rbac":{"create":false,"rootPassword":""},"tls":{"certFilename":"","certKeyFilename":"","enabled":false,"existingSecret":"","sni":"","verify":true}},"containerSecurityContext":{"enabled":false},"enabled":true,"prefix":"/apisix","replicaCount":3,"service":{"port":2379},"timeout":30}`| etcd configuration use the FQDN address or the IP of the etcd |
142
144
| etcd.auth | object |`{"rbac":{"create":false,"rootPassword":""},"tls":{"certFilename":"","certKeyFilename":"","enabled":false,"existingSecret":"","sni":"","verify":true}}`| if etcd.enabled is true, set more values of bitnami/etcd helm chart |
143
145
| etcd.auth.rbac.create | bool |`false`| No authentication by default. Switch to enable RBAC authentication |
144
146
| etcd.auth.rbac.rootPassword | string |`""`| root password for etcd. Requires etcd.auth.rbac.create to be true. |
@@ -148,6 +150,7 @@ The command removes all the Kubernetes components associated with the chart and
148
150
| etcd.auth.tls.existingSecret | string |`""`| name of the secret contains etcd client cert |
149
151
| etcd.auth.tls.sni | string |`""`| specify the TLS Server Name Indication extension, the ETCD endpoint hostname will be used when this setting is unset. |
150
152
| etcd.auth.tls.verify | bool |`true`| whether to verify the etcd endpoint certificate when setup a TLS connection to etcd |
153
+
| etcd.containerSecurityContext | object |`{"enabled":false}`| added for backward compatibility with old kubernetes versions, as seccompProfile is not supported in kubernetes < 1.19 |
151
154
| etcd.enabled | bool |`true`| install etcd(v3) by default, set false if do not want to install etcd(v3) together |
0 commit comments