|
@@ -12,8 +12,8 @@ ose3-master[1:3].test.example.com
|
|
|
|
|
|
[nodes]
|
|
|
ose3-master[1:3].test.example.com
|
|
|
-ose3-infra[1:2].test.example.com openshift_node_labels="{'region': 'infra', 'zone': 'default'}"
|
|
|
-ose3-node[1:2].test.example.com openshift_node_labels="{'region': 'primary', 'zone': 'default'}"
|
|
|
+ose3-infra[1:2].test.example.com
|
|
|
+ose3-node[1:2].test.example.com
|
|
|
|
|
|
[nfs]
|
|
|
ose3-master1.test.example.com
|
|
@@ -51,7 +51,7 @@ openshift_deployment_type=origin
|
|
|
# use this to lookup the latest exact version of the container images, which is the tag actually used to configure
|
|
|
# the cluster. For RPM installations we just verify the version detected in your configured repos matches this
|
|
|
# release.
|
|
|
-openshift_release=v3.9
|
|
|
+openshift_release="3.9"
|
|
|
|
|
|
# default subdomain to use for exposed routes, you should have wildcard dns
|
|
|
# for *.apps.test.example.com that points at your infra nodes which will run
|
|
@@ -80,21 +80,10 @@ debug_level=2
|
|
|
# This could potentially trigger an upgrade and downtime, so be careful with modifying this value after the cluster is set up.
|
|
|
#openshift_pkg_version=-3.9.0
|
|
|
|
|
|
-# This enables all the system containers except for docker:
|
|
|
-#openshift_use_system_containers=False
|
|
|
-#
|
|
|
-# But you can choose separately each component that must be a
|
|
|
-# system container:
|
|
|
-#
|
|
|
-#openshift_use_openvswitch_system_container=False
|
|
|
-#openshift_use_node_system_container=False
|
|
|
-#openshift_use_master_system_container=False
|
|
|
-#openshift_use_etcd_system_container=False
|
|
|
-#
|
|
|
-# In either case, system_images_registry must be specified to be able to find the system images
|
|
|
+# If using Atomic Host, you may specify system container image registry for the nodes:
|
|
|
#system_images_registry="docker.io"
|
|
|
# when openshift_deployment_type=='openshift-enterprise'
|
|
|
-#system_images_registry="registry.access.redhat.com"
|
|
|
+#system_images_registry="registry.redhat.io"
|
|
|
|
|
|
# Manage openshift example imagestreams and templates during install and upgrade
|
|
|
#openshift_install_examples=true
|
|
@@ -103,28 +92,17 @@ debug_level=2
|
|
|
# See: https://docs.openshift.org/latest/install_config/web_console_customization.html#changing-the-logout-url
|
|
|
#openshift_master_logout_url=http://example.com
|
|
|
|
|
|
-# Configure extensionScripts in the master config for console customization
|
|
|
-# See: https://docs.openshift.org/latest/install_config/web_console_customization.html#loading-custom-scripts-and-stylesheets
|
|
|
-#openshift_master_extension_scripts=['/path/to/script1.js','/path/to/script2.js']
|
|
|
-
|
|
|
-# Configure extensionStylesheets in the master config for console customization
|
|
|
-# See: https://docs.openshift.org/latest/install_config/web_console_customization.html#loading-custom-scripts-and-stylesheets
|
|
|
-#openshift_master_extension_stylesheets=['/path/to/stylesheet1.css','/path/to/stylesheet2.css']
|
|
|
-
|
|
|
# Configure extensions in the master config for console customization
|
|
|
# See: https://docs.openshift.org/latest/install_config/web_console_customization.html#serving-static-files
|
|
|
-#openshift_master_extensions=[{'name': 'images', 'sourceDirectory': '/path/to/my_images'}]
|
|
|
-
|
|
|
-# Configure extensions in the master config for console customization
|
|
|
-# See: https://docs.openshift.org/latest/install_config/web_console_customization.html#serving-static-files
|
|
|
-#openshift_master_oauth_templates:
|
|
|
-# login: /path/to/login-template.html
|
|
|
+#openshift_master_oauth_templates={'login': '/path/to/login-template.html'}
|
|
|
# openshift_master_oauth_template is deprecated. Use openshift_master_oauth_templates instead.
|
|
|
#openshift_master_oauth_template=/path/to/login-template.html
|
|
|
|
|
|
# Configure imagePolicyConfig in the master config
|
|
|
-# See: https://godoc.org/github.com/openshift/origin/pkg/cmd/server/api#ImagePolicyConfig
|
|
|
+# See: https://docs.openshift.org/latest/admin_guide/image_policy.html
|
|
|
#openshift_master_image_policy_config={"maxImagesBulkImportedPerRepository": 3, "disableScheduledImport": true}
|
|
|
+# This setting overrides allowedRegistriesForImport in openshift_master_image_policy_config. By default, all registries are allowed.
|
|
|
+#openshift_master_image_policy_allowed_registries_for_import=["docker.io", "*.docker.io", "*.redhat.com", "gcr.io", "quay.io", "registry.centos.org", "registry.redhat.io", "*.amazonaws.com"]
|
|
|
|
|
|
# Configure master API rate limits for external clients
|
|
|
#openshift_master_external_ratelimit_qps=200
|
|
@@ -133,34 +111,9 @@ debug_level=2
|
|
|
#openshift_master_loopback_ratelimit_qps=300
|
|
|
#openshift_master_loopback_ratelimit_burst=600
|
|
|
|
|
|
-# Docker Configuration
|
|
|
-# Add additional, insecure, and blocked registries to global docker configuration
|
|
|
-# For enterprise deployment types we ensure that registry.access.redhat.com is
|
|
|
-# included if you do not include it
|
|
|
-#openshift_docker_additional_registries=registry.example.com
|
|
|
-#openshift_docker_insecure_registries=registry.example.com
|
|
|
-#openshift_docker_blocked_registries=registry.hacker.com
|
|
|
-# Disable pushing to dockerhub
|
|
|
-#openshift_docker_disable_push_dockerhub=True
|
|
|
-# Use Docker inside a System Container. Note that this is a tech preview and should
|
|
|
-# not be used to upgrade!
|
|
|
-# The following options for docker are ignored:
|
|
|
-# - docker_version
|
|
|
-# - docker_upgrade
|
|
|
-# The following options must not be used
|
|
|
-# - openshift_docker_options
|
|
|
-#openshift_docker_use_system_container=False
|
|
|
-# Install and run cri-o. By default this will install cri-o as a system container.
|
|
|
+# Install and run cri-o.
|
|
|
#openshift_use_crio=False
|
|
|
-# You can install cri-o as an rpm by setting the following variable:
|
|
|
-#openshift_crio_use_rpm=False
|
|
|
-# NOTE: This uses openshift_docker_systemcontainer_image_registry_override as it's override
|
|
|
-# just as container-engine does.
|
|
|
-# Force the registry to use for the container-engine/crio system container. By default the registry
|
|
|
-# will be built off of the deployment type and ansible_distribution. Only
|
|
|
-# use this option if you are sure you know what you are doing!
|
|
|
-#openshift_docker_systemcontainer_image_override="registry.example.com/container-engine:latest"
|
|
|
-#openshift_crio_systemcontainer_image_override="registry.example.com/cri-o:latest"
|
|
|
+#openshift_use_crio_only=False
|
|
|
# The following two variables are used when openshift_use_crio is True
|
|
|
# and cleans up after builds that pass through docker. When openshift_use_crio is True
|
|
|
# these variables are set to the defaults shown. You may override them here.
|
|
@@ -186,8 +139,12 @@ debug_level=2
|
|
|
# Skip upgrading Docker during an OpenShift upgrade, leaves the current Docker version alone.
|
|
|
# docker_upgrade=False
|
|
|
|
|
|
-# Specify exact version of etcd to configure or upgrade to.
|
|
|
-# etcd_version="3.1.0"
|
|
|
+# Specify a list of block devices to be formatted and mounted on the nodes
|
|
|
+# during prerequisites.yml. For each hash, "device", "path", "filesystem" are
|
|
|
+# required. To add devices only on certain classes of node, redefine
|
|
|
+# container_runtime_extra_storage as a group var.
|
|
|
+#container_runtime_extra_storage='[{"device":"/dev/vdc","path":"/var/lib/origin/openshift.local.volumes","filesystem":"xfs","options":"gquota"}]'
|
|
|
+
|
|
|
# Enable etcd debug logging, defaults to false
|
|
|
# etcd_debug=true
|
|
|
# Set etcd log levels by package
|
|
@@ -210,15 +167,19 @@ debug_level=2
|
|
|
# Tasks to run after each master is upgraded and system/services have been restarted.
|
|
|
# openshift_master_upgrade_post_hook=/usr/share/custom/post_master.yml
|
|
|
|
|
|
-# Alternate image format string, useful if you've got your own registry mirror
|
|
|
-# Configure this setting just on node or master
|
|
|
-#oreg_url_master=example.com/openshift3/ose-${component}:${version}
|
|
|
-#oreg_url_node=example.com/openshift3/ose-${component}:${version}
|
|
|
-# For setting the configuration globally
|
|
|
+# Cluster Image Source (registry) configuration
|
|
|
+# openshift-enterprise default is 'registry.access.redhat.com/openshift3/ose-${component}:${version}'
|
|
|
+# origin default is 'docker.io/openshift/origin-${component}:${version}'
|
|
|
#oreg_url=example.com/openshift3/ose-${component}:${version}
|
|
|
-# If oreg_url points to a registry other than registry.access.redhat.com we can
|
|
|
+# If oreg_url points to a registry other than registry.redhat.io we can
|
|
|
# modify image streams to point at that registry by setting the following to true
|
|
|
#openshift_examples_modify_imagestreams=true
|
|
|
+# Add insecure and blocked registries to global docker configuration
|
|
|
+#openshift_docker_insecure_registries=registry.example.com
|
|
|
+#openshift_docker_blocked_registries=registry.hacker.com
|
|
|
+# You may also configure additional default registries for docker, however this
|
|
|
+# is discouraged. Instead you should make use of fully qualified image names.
|
|
|
+#openshift_docker_additional_registries=registry.example.com
|
|
|
|
|
|
# If oreg_url points to a registry requiring authentication, provide the following:
|
|
|
#oreg_auth_user=some_user
|
|
@@ -232,12 +193,12 @@ debug_level=2
|
|
|
#openshift_additional_repos=[{'id': 'openshift-origin-copr', 'name': 'OpenShift Origin COPR', 'baseurl': 'https://copr-be.cloud.fedoraproject.org/results/maxamillion/origin-next/epel-7-$basearch/', 'enabled': 1, 'gpgcheck': 1, 'gpgkey': 'https://copr-be.cloud.fedoraproject.org/results/maxamillion/origin-next/pubkey.gpg'}]
|
|
|
#openshift_repos_enable_testing=false
|
|
|
|
|
|
-# If the image for etcd needs to be pulled from anywhere else than registry.access.redhat.com, e.g. in
|
|
|
+# If the image for etcd needs to be pulled from anywhere else than registry.redhat.io, e.g. in
|
|
|
# a disconnected and containerized installation, use osm_etcd_image to specify the image to use:
|
|
|
-#osm_etcd_image=rhel7/etcd
|
|
|
+#osm_etcd_image=registry.example.com/rhel7/etcd
|
|
|
|
|
|
# htpasswd auth
|
|
|
-#openshift_master_identity_providers=[{'name': 'htpasswd_auth', 'login': 'true', 'challenge': 'true', 'kind': 'HTPasswdPasswordIdentityProvider', 'filename': '/etc/origin/master/htpasswd'}]
|
|
|
+#openshift_master_identity_providers=[{'name': 'htpasswd_auth', 'login': 'true', 'challenge': 'true', 'kind': 'HTPasswdPasswordIdentityProvider'}]
|
|
|
# Defining htpasswd users
|
|
|
#openshift_master_htpasswd_users={'user1': '<pre-hashed password>', 'user2': '<pre-hashed password>'}
|
|
|
# or
|
|
@@ -333,6 +294,10 @@ debug_level=2
|
|
|
# openshift_gcp_prefix is a unique string to identify each openshift cluster.
|
|
|
#openshift_gcp_prefix=
|
|
|
#openshift_gcp_multizone=False
|
|
|
+# Note: To enable nested virtualization in gcp use the following variable and url
|
|
|
+#openshift_gcp_licenses="https://www.googleapis.com/compute/v1/projects/vm-options/global/licenses/enable-vmx"
|
|
|
+# Additional details regarding nested virtualization are available:
|
|
|
+# https://cloud.google.com/compute/docs/instances/enable-nested-virtualization-vm-instances
|
|
|
#
|
|
|
# vSphere
|
|
|
#openshift_cloudprovider_kind=vsphere
|
|
@@ -411,23 +376,27 @@ debug_level=2
|
|
|
#
|
|
|
# An OpenShift router will be created during install if there are
|
|
|
# nodes present with labels matching the default router selector,
|
|
|
-# "region=infra". Set openshift_node_labels per node as needed in
|
|
|
-# order to label nodes.
|
|
|
+# "node-role.kubernetes.io/infra=true".
|
|
|
#
|
|
|
# Example:
|
|
|
# [nodes]
|
|
|
-# node.example.com openshift_node_labels="{'region': 'infra'}"
|
|
|
+# node.example.com openshift_node_group_name="node-config-infra"
|
|
|
#
|
|
|
# Router selector (optional)
|
|
|
# Router will only be created if nodes matching this label are present.
|
|
|
-# Default value: 'region=infra'
|
|
|
-#openshift_hosted_router_selector='region=infra'
|
|
|
+# Default value: 'node-role.kubernetes.io/infra=true'
|
|
|
+#openshift_hosted_router_selector='node-role.kubernetes.io/infra=true'
|
|
|
#
|
|
|
# Router replicas (optional)
|
|
|
# Unless specified, openshift-ansible will calculate the replica count
|
|
|
# based on the number of nodes matching the openshift router selector.
|
|
|
#openshift_hosted_router_replicas=2
|
|
|
#
|
|
|
+# Router extended route validation (optional)
|
|
|
+# If enabled, openshift-ansible will configure the router to perform extended
|
|
|
+# validation on routes before admitting them.
|
|
|
+#openshift_hosted_router_extended_validation=true
|
|
|
+#
|
|
|
# Router force subdomain (optional)
|
|
|
# A router path format to force on all routes used by this router
|
|
|
# (will ignore the route host value)
|
|
@@ -462,17 +431,16 @@ debug_level=2
|
|
|
#
|
|
|
# An OpenShift registry will be created during install if there are
|
|
|
# nodes present with labels matching the default registry selector,
|
|
|
-# "region=infra". Set openshift_node_labels per node as needed in
|
|
|
-# order to label nodes.
|
|
|
+# "node-role.kubernetes.io/infra=true".
|
|
|
#
|
|
|
# Example:
|
|
|
# [nodes]
|
|
|
-# node.example.com openshift_node_labels="{'region': 'infra'}"
|
|
|
+# node.example.com openshift_node_group_name="node-config-infra"
|
|
|
#
|
|
|
# Registry selector (optional)
|
|
|
# Registry will only be created if nodes matching this label are present.
|
|
|
-# Default value: 'region=infra'
|
|
|
-#openshift_hosted_registry_selector='region=infra'
|
|
|
+# Default value: 'node-role.kubernetes.io/infra=true'
|
|
|
+#openshift_hosted_registry_selector='node-role.kubernetes.io/infra=true'
|
|
|
#
|
|
|
# Registry replicas (optional)
|
|
|
# Unless specified, openshift-ansible will calculate the replica count
|
|
@@ -527,6 +495,14 @@ debug_level=2
|
|
|
#openshift_hosted_registry_storage_openstack_volumeID=3a650b4f-c8c5-4e0a-8ca5-eaee11f16c57
|
|
|
#openshift_hosted_registry_storage_volume_size=10Gi
|
|
|
#
|
|
|
+# hostPath (local filesystem storage)
|
|
|
+# Suitable for "all-in-one" or proof of concept deployments
|
|
|
+# Must not be used for high-availability and production deployments
|
|
|
+#openshift_hosted_registry_storage_kind=hostpath
|
|
|
+#openshift_hosted_registry_storage_access_modes=['ReadWriteOnce']
|
|
|
+#openshift_hosted_registry_storage_hostpath_path=/var/lib/openshift_volumes
|
|
|
+#openshift_hosted_registry_storage_volume_size=10Gi
|
|
|
+#
|
|
|
# AWS S3
|
|
|
# S3 bucket must already exist.
|
|
|
#openshift_hosted_registry_storage_kind=object
|
|
@@ -564,6 +540,10 @@ debug_level=2
|
|
|
#openshift_hosted_registry_storage_s3_cloudfront_baseurl=https://myendpoint.cloudfront.net/
|
|
|
#openshift_hosted_registry_storage_s3_cloudfront_privatekeyfile=/full/path/to/secret.pem
|
|
|
#openshift_hosted_registry_storage_s3_cloudfront_keypairid=yourpairid
|
|
|
+# vSphere Volume with vSphere Cloud Provider
|
|
|
+# openshift_hosted_registry_storage_kind=vsphere
|
|
|
+# openshift_hosted_registry_storage_access_modes=['ReadWriteOnce']
|
|
|
+# openshift_hosted_registry_storage_annotations=['volume.beta.kubernetes.io/storage-provisioner: kubernetes.io/vsphere-volume']
|
|
|
#
|
|
|
# GCS Storage Bucket
|
|
|
#openshift_hosted_registry_storage_provider=gcs
|
|
@@ -577,6 +557,12 @@ debug_level=2
|
|
|
# By default metrics are not automatically deployed, set this to enable them
|
|
|
#openshift_metrics_install_metrics=true
|
|
|
#
|
|
|
+# metrics-server deployment
|
|
|
+# By default, metrics-server is not automatically deployed, unless metrics is also
|
|
|
+# deployed. Deploying metrics-server is necessary to use the HorizontalPodAutoscaler.
|
|
|
+# Set this to enable it.
|
|
|
+#openshift_metrics_server_install=true
|
|
|
+#
|
|
|
# Storage Options
|
|
|
# If openshift_metrics_storage_kind is unset then metrics will be stored
|
|
|
# in an EmptyDir volume and will be deleted when the cassandra pod terminates.
|
|
@@ -624,17 +610,32 @@ debug_level=2
|
|
|
# Currently, you may only alter the hostname portion of the url, alterting the
|
|
|
# `/hawkular/metrics` path will break installation of metrics.
|
|
|
#openshift_metrics_hawkular_hostname=hawkular-metrics.example.com
|
|
|
-# Configure the prefix and version for the component images
|
|
|
-#openshift_metrics_image_prefix=docker.io/openshift/origin-
|
|
|
-#openshift_metrics_image_version=v3.9
|
|
|
+# Configure the metrics component images # Note, these will be modified by oreg_url by default
|
|
|
+#openshift_metrics_cassandra_image="docker.io/openshift/origin-metrics-cassandra:{{ openshift_image_tag }}"
|
|
|
+#openshift_metrics_hawkular_agent_image="docker.io/openshift/origin-metrics-hawkular-openshift-agent:{{ openshift_image_tag }}"
|
|
|
+#openshift_metrics_hawkular_metrics_image="docker.io/openshift/origin-metrics-hawkular-metrics:{{ openshift_image_tag }}"
|
|
|
+#openshift_metrics_schema_installer_image="docker.io/openshift/origin-metrics-schema-installer:{{ openshift_image_tag }}"
|
|
|
+#openshift_metrics_heapster_image="docker.io/openshift/origin-metrics-heapster:{{ openshift_image_tag }}"
|
|
|
# when openshift_deployment_type=='openshift-enterprise'
|
|
|
-#openshift_metrics_image_prefix=registry.access.redhat.com/openshift3/
|
|
|
-#openshift_metrics_image_version=v3.9
|
|
|
+#openshift_metrics_cassandra_image="registry.redhat.io/openshift3/metrics-cassandra:{{ openshift_image_tag }}"
|
|
|
+#openshift_metrics_hawkular_agent_image="registry.redhat.io/openshift3/metrics-hawkular-openshift-agent:{{ openshift_image_tag }}"
|
|
|
+#openshift_metrics_hawkular_metrics_image="registry.redhat.io/openshift3/metrics-hawkular-metrics:{{ openshift_image_tag }}"
|
|
|
+#openshift_metrics_schema_installer_image="registry.redhat.io/openshift3/metrics-schema-installer:{{ openshift_image_tag }}"
|
|
|
+#openshift_metrics_heapster_image="registry.redhat.io/openshift3/metrics-heapster:{{ openshift_image_tag }}"
|
|
|
#
|
|
|
# StorageClass
|
|
|
# openshift_storageclass_name=gp2
|
|
|
# openshift_storageclass_parameters={'type': 'gp2', 'encrypted': 'false'}
|
|
|
+# openshift_storageclass_mount_options=['dir_mode=0777', 'file_mode=0777']
|
|
|
+# openshift_storageclass_reclaim_policy="Delete"
|
|
|
#
|
|
|
+# PersistentLocalStorage
|
|
|
+# If Persistent Local Storage is wanted, this boolean can be defined to True.
|
|
|
+# This will create all necessary configuration to use persistent storage on nodes.
|
|
|
+#openshift_persistentlocalstorage_enabled=False
|
|
|
+#openshift_persistentlocalstorage_classes=[]
|
|
|
+#openshift_persistentlocalstorage_path=/mnt/local-storage
|
|
|
+#openshift_persistentlocalstorage_provisionner_image=quay.io/external_storage/local-volume-provisioner:v1.0.1
|
|
|
|
|
|
# Logging deployment
|
|
|
#
|
|
@@ -686,12 +687,6 @@ debug_level=2
|
|
|
# Configure the number of elastic search nodes, unless you're using dynamic provisioning
|
|
|
# this value must be 1
|
|
|
#openshift_logging_es_cluster_size=1
|
|
|
-# Configure the prefix and version for the component images
|
|
|
-#openshift_logging_image_prefix=docker.io/openshift/origin-
|
|
|
-#openshift_logging_image_version=v3.9.0
|
|
|
-# when openshift_deployment_type=='openshift-enterprise'
|
|
|
-#openshift_logging_image_prefix=registry.access.redhat.com/openshift3/
|
|
|
-#openshift_logging_image_version=3.9.0
|
|
|
|
|
|
# Prometheus deployment
|
|
|
#
|
|
@@ -699,76 +694,18 @@ debug_level=2
|
|
|
#openshift_hosted_prometheus_deploy=true
|
|
|
#
|
|
|
# Prometheus storage config
|
|
|
-# Option A - NFS Host Group
|
|
|
-# An NFS volume will be created with path "nfs_directory/volume_name"
|
|
|
-# on the host within the [nfs] host group. For example, the volume
|
|
|
-# path using these options would be "/exports/prometheus"
|
|
|
-#openshift_prometheus_storage_kind=nfs
|
|
|
-#openshift_prometheus_storage_access_modes=['ReadWriteOnce']
|
|
|
-#openshift_prometheus_storage_nfs_directory=/exports
|
|
|
-#openshift_prometheus_storage_nfs_options='*(rw,root_squash)'
|
|
|
-#openshift_prometheus_storage_volume_name=prometheus
|
|
|
-#openshift_prometheus_storage_volume_size=10Gi
|
|
|
-#openshift_prometheus_storage_labels={'storage': 'prometheus'}
|
|
|
-#openshift_prometheus_storage_type='pvc'
|
|
|
-#openshift_prometheus_storage_class=glusterfs-storage
|
|
|
-# For prometheus-alertmanager
|
|
|
-#openshift_prometheus_alertmanager_storage_kind=nfs
|
|
|
-#openshift_prometheus_alertmanager_storage_access_modes=['ReadWriteOnce']
|
|
|
-#openshift_prometheus_alertmanager_storage_nfs_directory=/exports
|
|
|
-#openshift_prometheus_alertmanager_storage_nfs_options='*(rw,root_squash)'
|
|
|
-#openshift_prometheus_alertmanager_storage_volume_name=prometheus-alertmanager
|
|
|
-#openshift_prometheus_alertmanager_storage_volume_size=10Gi
|
|
|
-#openshift_prometheus_alertmanager_storage_labels={'storage': 'prometheus-alertmanager'}
|
|
|
-#openshift_prometheus_alertmanager_storage_type='pvc'
|
|
|
-#openshift_prometheus_alertmanager_storage_class=glusterfs-storage
|
|
|
-# For prometheus-alertbuffer
|
|
|
-#openshift_prometheus_alertbuffer_storage_kind=nfs
|
|
|
-#openshift_prometheus_alertbuffer_storage_access_modes=['ReadWriteOnce']
|
|
|
-#openshift_prometheus_alertbuffer_storage_nfs_directory=/exports
|
|
|
-#openshift_prometheus_alertbuffer_storage_nfs_options='*(rw,root_squash)'
|
|
|
-#openshift_prometheus_alertbuffer_storage_volume_name=prometheus-alertbuffer
|
|
|
-#openshift_prometheus_alertbuffer_storage_volume_size=10Gi
|
|
|
-#openshift_prometheus_alertbuffer_storage_labels={'storage': 'prometheus-alertbuffer'}
|
|
|
-#openshift_prometheus_alertbuffer_storage_type='pvc'
|
|
|
-#openshift_prometheus_alertbuffer_storage_class=glusterfs-storage
|
|
|
-#
|
|
|
-# Option B - External NFS Host
|
|
|
-# NFS volume must already exist with path "nfs_directory/_volume_name" on
|
|
|
-# the storage_host. For example, the remote volume path using these
|
|
|
-# options would be "nfs.example.com:/exports/prometheus"
|
|
|
-#openshift_prometheus_storage_kind=nfs
|
|
|
-#openshift_prometheus_storage_access_modes=['ReadWriteOnce']
|
|
|
-#openshift_prometheus_storage_host=nfs.example.com
|
|
|
-#openshift_prometheus_storage_nfs_directory=/exports
|
|
|
-#openshift_prometheus_storage_volume_name=prometheus
|
|
|
-#openshift_prometheus_storage_volume_size=10Gi
|
|
|
-#openshift_prometheus_storage_labels={'storage': 'prometheus'}
|
|
|
-#openshift_prometheus_storage_type='pvc'
|
|
|
-#openshift_prometheus_storage_class=glusterfs-storage
|
|
|
-# For prometheus-alertmanager
|
|
|
-#openshift_prometheus_alertmanager_storage_kind=nfs
|
|
|
-#openshift_prometheus_alertmanager_storage_access_modes=['ReadWriteOnce']
|
|
|
-#openshift_prometheus_alertmanager_storage_host=nfs.example.com
|
|
|
-#openshift_prometheus_alertmanager_storage_nfs_directory=/exports
|
|
|
-#openshift_prometheus_alertmanager_storage_volume_name=prometheus-alertmanager
|
|
|
-#openshift_prometheus_alertmanager_storage_volume_size=10Gi
|
|
|
-#openshift_prometheus_alertmanager_storage_labels={'storage': 'prometheus-alertmanager'}
|
|
|
-#openshift_prometheus_alertmanager_storage_type='pvc'
|
|
|
-#openshift_prometheus_alertmanager_storage_class=glusterfs-storage
|
|
|
-# For prometheus-alertbuffer
|
|
|
-#openshift_prometheus_alertbuffer_storage_kind=nfs
|
|
|
-#openshift_prometheus_alertbuffer_storage_access_modes=['ReadWriteOnce']
|
|
|
-#openshift_prometheus_alertbuffer_storage_host=nfs.example.com
|
|
|
-#openshift_prometheus_alertbuffer_storage_nfs_directory=/exports
|
|
|
-#openshift_prometheus_alertbuffer_storage_volume_name=prometheus-alertbuffer
|
|
|
-#openshift_prometheus_alertbuffer_storage_volume_size=10Gi
|
|
|
-#openshift_prometheus_alertbuffer_storage_labels={'storage': 'prometheus-alertbuffer'}
|
|
|
-#openshift_prometheus_alertbuffer_storage_type='pvc'
|
|
|
-#openshift_prometheus_alertbuffer_storage_class=glusterfs-storage
|
|
|
-#
|
|
|
-# Option C - none -- Prometheus, alertmanager and alertbuffer will use emptydir volumes
|
|
|
-# which are destroyed when pods are deleted
|
|
|
+# By default prometheus uses emptydir storage, if you want to persist you should
|
|
|
+# configure it to use pvc storage type. Each volume must be ReadWriteOnce.
|
|
|
+#openshift_prometheus_storage_type=emptydir
|
|
|
+#openshift_prometheus_alertmanager_storage_type=emptydir
|
|
|
+#openshift_prometheus_alertbuffer_storage_type=emptydir
|
|
|
+# Use PVCs for persistence
|
|
|
+#openshift_prometheus_storage_type=pvc
|
|
|
+#openshift_prometheus_alertmanager_storage_type=pvc
|
|
|
+#openshift_prometheus_alertbuffer_storage_type=pvc
|
|
|
+
|
|
|
+# Grafana deployment, requires Prometheus
|
|
|
+#openshift_hosted_grafana_deploy=true
|
|
|
|
|
|
# Configure the multi-tenant SDN plugin (default is 'redhat/openshift-ovs-subnet')
|
|
|
# os_sdn_network_plugin_name='redhat/openshift-ovs-multitenant'
|
|
@@ -860,6 +797,10 @@ debug_level=2
|
|
|
#
|
|
|
# Detected names may be overridden by specifying the "names" key
|
|
|
#openshift_master_named_certificates=[{"certfile": "/path/to/custom1.crt", "keyfile": "/path/to/custom1.key", "names": ["public-master-host.com"], "cafile": "/path/to/custom-ca1.crt"}]
|
|
|
+#
|
|
|
+# Add a trusted CA to all pods, copies from the control host, may be multiple
|
|
|
+# certs in one file
|
|
|
+#openshift_additional_ca=/path/to/additional-ca.crt
|
|
|
|
|
|
# Session options
|
|
|
#openshift_master_session_name=ssn
|
|
@@ -885,17 +826,7 @@ debug_level=2
|
|
|
# interface other than the default network interface.
|
|
|
#openshift_set_node_ip=True
|
|
|
|
|
|
-# Configure dnsIP in the node config.
|
|
|
-# This setting overrides the bind IP address used by each node's dnsmasq.
|
|
|
-# By default, this value is set to the IP which ansible uses to connect to the node.
|
|
|
-# Only update this variable if you need to bind dnsmasq on a different interface
|
|
|
-#
|
|
|
-# Example:
|
|
|
-# [nodes]
|
|
|
-# node.example.com openshift_dns_ip=172.30.0.1
|
|
|
-
|
|
|
-# Configure node kubelet arguments. pods-per-core is valid in OpenShift Origin 1.3 or OpenShift Container Platform 3.3 and later.
|
|
|
-#openshift_node_kubelet_args={'pods-per-core': ['10'], 'max-pods': ['250'], 'image-gc-high-threshold': ['85'], 'image-gc-low-threshold': ['80']}
|
|
|
+#openshift_node_kubelet_args is deprecated, use node config edits instead
|
|
|
|
|
|
# Configure logrotate scripts
|
|
|
# See: https://github.com/nickhammond/ansible-logrotate
|
|
@@ -979,13 +910,10 @@ debug_level=2
|
|
|
# Enable template service broker (requires service catalog to be enabled, above)
|
|
|
#template_service_broker_install=true
|
|
|
|
|
|
-# Force a specific prefix (IE: registry) to use when pulling the service catalog image
|
|
|
-# NOTE: The registry all the way up to the start of the image name must be provided. Two examples
|
|
|
-# below are provided.
|
|
|
-#openshift_service_catalog_image_prefix=docker.io/openshift/origin-
|
|
|
-#openshift_service_catalog_image_prefix=registry.access.redhat.com/openshift3/ose-
|
|
|
-# Force a specific image version to use when pulling the service catalog image
|
|
|
-#openshift_service_catalog_image_version=v3.9
|
|
|
+# Specify an openshift_service_catalog image
|
|
|
+# (defaults for origin and openshift-enterprise, repsectively)
|
|
|
+#openshift_service_catalog_image="docker.io/openshift/origin-service-catalog:{{ openshift_image_tag }}""
|
|
|
+#openshift_service_catalog_image="registry.redhat.io/openshift3/ose-service-catalog:{{ openshift_image_tag }}"
|
|
|
|
|
|
# TSB image tag
|
|
|
#template_service_broker_version='v3.9'
|
|
@@ -994,7 +922,7 @@ debug_level=2
|
|
|
#openshift_template_service_broker_namespaces=['openshift']
|
|
|
|
|
|
# masterConfig.volumeConfig.dynamicProvisioningEnabled, configurable as of 1.2/3.2, enabled by default
|
|
|
-#openshift_master_dynamic_provisioning_enabled=False
|
|
|
+#openshift_master_dynamic_provisioning_enabled=True
|
|
|
|
|
|
# Admission plugin config
|
|
|
#openshift_master_admission_plugin_config={"ProjectRequestLimit":{"configuration":{"apiVersion":"v1","kind":"ProjectRequestLimitConfig","limits":[{"selector":{"admin":"true"}},{"maxProjects":"1"}]}},"PodNodeConstraints":{"configuration":{"apiVersion":"v1","kind":"PodNodeConstraintsConfig"}}}
|
|
@@ -1004,21 +932,19 @@ debug_level=2
|
|
|
|
|
|
# OpenShift Per-Service Environment Variables
|
|
|
# Environment variables are added to /etc/sysconfig files for
|
|
|
-# each OpenShift service: node, master (api and controllers).
|
|
|
+# each OpenShift node.
|
|
|
# API and controllers environment variables are merged in single
|
|
|
# master environments.
|
|
|
-#openshift_master_api_env_vars={"ENABLE_HTTP2": "true"}
|
|
|
-#openshift_master_controllers_env_vars={"ENABLE_HTTP2": "true"}
|
|
|
#openshift_node_env_vars={"ENABLE_HTTP2": "true"}
|
|
|
|
|
|
# Enable API service auditing
|
|
|
-#openshift_master_audit_config={"enabled": true}
|
|
|
+#openshift_master_audit_config={"enabled": "true"}
|
|
|
#
|
|
|
# In case you want more advanced setup for the auditlog you can
|
|
|
# use this line.
|
|
|
# The directory in "auditFilePath" will be created if it's not
|
|
|
# exist
|
|
|
-#openshift_master_audit_config={"enabled": true, "auditFilePath": "/var/log/openpaas-oscp-audit/openpaas-oscp-audit.log", "maximumFileRetentionDays": 14, "maximumFileSizeMegabytes": 500, "maximumRetainedFiles": 5}
|
|
|
+#openshift_master_audit_config={"enabled": "true", "auditFilePath": "/var/lib/origin/openpaas-oscp-audit/openpaas-oscp-audit.log", "maximumFileRetentionDays": "14", "maximumFileSizeMegabytes": "500", "maximumRetainedFiles": "5"}
|
|
|
|
|
|
# Enable origin repos that point at Centos PAAS SIG, defaults to true, only used
|
|
|
# by openshift_deployment_type=origin
|
|
@@ -1160,6 +1086,9 @@ debug_level=2
|
|
|
#openshift_master_open_ports=[{"service":"svc1","port":"11/tcp"}]
|
|
|
#openshift_node_open_ports=[{"service":"svc2","port":"12-13/tcp"},{"service":"svc3","port":"14/udp"}]
|
|
|
|
|
|
+# Service port node range
|
|
|
+#openshift_node_port_range=30000-32767
|
|
|
+
|
|
|
# Enable unsupported configurations, things that will yield a partially
|
|
|
# functioning cluster but would not be supported for production use
|
|
|
#openshift_enable_unsupported_configurations=false
|