Documentation/helm-values.rst
.. AUTO-GENERATED. Please DO NOT edit manually.
.. role:: raw-html-m2r(raw) :format: html
.. list-table:: :header-rows: 1
KeyMTU0affinity{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"k8s-app":"cilium"}},"topologyKey":"kubernetes.io/hostname"}]}}agenttrueagentNotReadyTaintKeyignore-taint.cluster-autoscaler.kubernetes.io/\ , the Cluster Autoscaler will ignore the taint on its decisions, allowing the cluster to scale up."node.cilium.io/agent-not-ready"aksbyocni.enabledazure.enabled\ ) instead.falsealibabacloud.enabledfalsealibabacloud.nodeSpec.securityGroupTags[]alibabacloud.nodeSpec.securityGroups[]alibabacloud.nodeSpec.vSwitchTags[]alibabacloud.nodeSpec.vSwitches[]annotateK8sNodefalseannotations{}apiRateLimitnilauthentication.enabledfalseauthentication.gcInterval"5m0s"authentication.mutual.connectTimeout"5s"authentication.mutual.port4250authentication.mutual.spire.adminSocketPath"/run/spire/sockets/admin.sock"authentication.mutual.spire.agentSocketPath"/run/spire/sockets/agent/agent.sock"authentication.mutual.spire.annotations{}authentication.mutual.spire.connectionTimeout"30s"authentication.mutual.spire.enabledfalseauthentication.mutual.spire.install.agent.affinity{}authentication.mutual.spire.install.agent.annotations{}authentication.mutual.spire.install.agent.image{"digest":"sha256:5106ac601272a88684db14daf7f54b9a45f31f77bb16a906bd5e87756ee7b97c","override":null,"pullPolicy":"IfNotPresent","repository":"ghcr.io/spiffe/spire-agent","tag":"1.9.6","useDigest":true}authentication.mutual.spire.install.agent.labels{}authentication.mutual.spire.install.agent.nodeSelector{}authentication.mutual.spire.install.agent.podSecurityContext{}authentication.mutual.spire.install.agent.priorityClassName""authentication.mutual.spire.install.agent.resources{}authentication.mutual.spire.install.agent.securityContext{}authentication.mutual.spire.install.agent.serviceAccount{"create":true,"name":"spire-agent"}authentication.mutual.spire.install.agent.skipKubeletVerificationtrueauthentication.mutual.spire.install.agent.tolerations[{"effect":"NoSchedule","key":"node.kubernetes.io/not-ready"},{"effect":"NoSchedule","key":"node-role.kubernetes.io/master"},{"effect":"NoSchedule","key":"node-role.kubernetes.io/control-plane"},{"effect":"NoSchedule","key":"node.cloudprovider.kubernetes.io/uninitialized","value":"true"},{"key":"CriticalAddonsOnly","operator":"Exists"}]authentication.mutual.spire.install.enabledtrueauthentication.mutual.spire.install.existingNamespacefalseauthentication.mutual.spire.install.initImage{"digest":"sha256:1487d0af5f52b4ba31c7e465126ee2123fe3f2305d638e7827681e7cf6c83d5e","override":null,"pullPolicy":"IfNotPresent","repository":"docker.io/library/busybox","tag":"1.37.0","useDigest":true}authentication.mutual.spire.install.namespace"cilium-spire"authentication.mutual.spire.install.server.affinity{}authentication.mutual.spire.install.server.annotations{}authentication.mutual.spire.install.server.ca.keyType"rsa-4096"authentication.mutual.spire.install.server.ca.subject{"commonName":"Cilium SPIRE CA","country":"US","organization":"SPIRE"}authentication.mutual.spire.install.server.dataStorage.accessMode"ReadWriteOnce"authentication.mutual.spire.install.server.dataStorage.enabledtrueauthentication.mutual.spire.install.server.dataStorage.size"1Gi"authentication.mutual.spire.install.server.dataStorage.storageClassnilauthentication.mutual.spire.install.server.image{"digest":"sha256:59a0b92b39773515e25e68a46c40d3b931b9c1860bc445a79ceb45a805cab8b4","override":null,"pullPolicy":"IfNotPresent","repository":"ghcr.io/spiffe/spire-server","tag":"1.9.6","useDigest":true}authentication.mutual.spire.install.server.initContainers[]authentication.mutual.spire.install.server.labels{}authentication.mutual.spire.install.server.nodeSelector{}authentication.mutual.spire.install.server.podSecurityContext{}authentication.mutual.spire.install.server.priorityClassName""authentication.mutual.spire.install.server.resources{}authentication.mutual.spire.install.server.securityContext{}authentication.mutual.spire.install.server.service.annotations{}authentication.mutual.spire.install.server.service.labels{}authentication.mutual.spire.install.server.service.type"ClusterIP"authentication.mutual.spire.install.server.serviceAccount{"create":true,"name":"spire-server"}authentication.mutual.spire.install.server.tolerations[]authentication.mutual.spire.serverAddress<service-name>.\ :raw-html-m2r:<namespace>.svc(.*):\ :raw-html-m2r:<port-number> format), Cilium Operator will resolve its address by looking up the clusterIP from Service resource. Example values: 10.0.0.1:8081, spire-server.cilium-spire.svc:8081nilauthentication.mutual.spire.trustDomain"spiffe.cilium"authentication.queueSize1024authentication.rotatedIdentitiesQueueSize1024autoDirectNodeRoutesfalseazure.enabledaksbyocni.enabled\ ) instead.falseazure.nodeSpec.azureInterfaceName""bandwidthManager{"bbr":false,"bbrHostNamespaceOnly":false,"enabled":false}bandwidthManager.bbrfalsebandwidthManager.bbrHostNamespaceOnlyfalsebandwidthManager.enabledfalsebgpControlPlane{"enabled":false,"legacyOriginAttribute":{"enabled":false},"routerIDAllocation":{"ipPool":"","mode":"default"},"secretsNamespace":{"create":false,"name":"kube-system"},"statusReport":{"enabled":true}}bgpControlPlane.enabledfalsebgpControlPlane.legacyOriginAttribute{"enabled":false}bgpControlPlane.legacyOriginAttribute.enabledfalsebgpControlPlane.routerIDAllocation{"ipPool":"","mode":"default"}bgpControlPlane.routerIDAllocation.ipPool""bgpControlPlane.routerIDAllocation.mode"default"bgpControlPlane.secretsNamespace{"create":false,"name":"kube-system"}bgpControlPlane.secretsNamespace.createfalsebgpControlPlane.secretsNamespace.name"kube-system"bgpControlPlane.statusReport{"enabled":true}bgpControlPlane.statusReport.enabledtruebpf.authMapMax524288bpf.autoMount.enabledautoMount is enabled, the BPF filesystem is mounted at bpf.root path on the underlying host and inside the cilium agent pod. If users disable autoMount\ , it's expected that users have mounted bpffs filesystem at the specified bpf.root volume, and then the volume will be mounted inside the cilium agent pod at the same path.truebpf.ctAccountingfalsebpf.ctAnyMax262144bpf.ctTcpMax524288bpf.datapathModebpf.tproxy\ ).vethbpf.disableExternalIPMitigationfalsebpf.distributedLRU{"enabled":false}bpf.distributedLRU.enabledfalsebpf.enableTCXtruebpf.events{"default":{"burstLimit":null,"rateLimit":null},"drop":{"enabled":true},"policyVerdict":{"enabled":true},"trace":{"enabled":true}}bpf.events.default{"burstLimit":null,"rateLimit":null}bpf.events.default.burstLimit0bpf.events.default.rateLimit0bpf.events.drop.enabledtruebpf.events.policyVerdict.enabledtruebpf.events.trace.enabledtruebpf.hostLegacyRoutingfalsebpf.lbAlgorithmAnnotationfalsebpf.lbExternalClusterIPfalsebpf.lbMapMax65536bpf.lbModeAnnotationfalsebpf.lbSourceRangeAllTypesfalsebpf.mapDynamicSizeRatio0.0025bpf.masqueradefalsebpf.monitorAggregation"medium"bpf.monitorFlags"all"bpf.monitorInterval"5s"bpf.monitorTraceIPOption0bpf.natMax524288bpf.neighMax524288bpf.nodeMapMaxnilbpf.policyMapMax16384bpf.policyMapPressureMetricsThreshold0.1bpf.policyStatsMapMax65536bpf.preallocateMapsfalsebpf.root"/sys/fs/bpf"bpf.tproxybpf.datapathMode=netkit\ , bpf.datapathMode=netkit-l2\ ).falsebpf.vlanBypass[]bpfClockProbefalsecertgen{"affinity":{},"annotations":{"cronJob":{},"job":{}},"cronJob":{"failedJobsHistoryLimit":1,"successfulJobsHistoryLimit":3},"extraVolumeMounts":[],"extraVolumes":[],"generateCA":true,"image":{"digest":"sha256:f0c656830e856d26b24b0e144df1f8b327d3b46748d76a630514111fc365b697","override":null,"pullPolicy":"IfNotPresent","repository":"quay.io/cilium/certgen","tag":"v0.4.1","useDigest":true},"nodeSelector":{},"podLabels":{},"priorityClassName":"","resources":{},"tolerations":[],"ttlSecondsAfterFinished":null}certgen.affinity{}certgen.annotations{"cronJob":{},"job":{}}certgen.cronJob.failedJobsHistoryLimit1certgen.cronJob.successfulJobsHistoryLimit3certgen.extraVolumeMounts[]certgen.extraVolumes[]certgen.generateCAtruecertgen.nodeSelector{}certgen.podLabels{}certgen.priorityClassName""certgen.resources{}certgen.tolerations[]certgen.ttlSecondsAfterFinishednilcgroup{"autoMount":{"enabled":true,"resources":{}},"hostRoot":"/run/cilium/cgroupv2"}cgroup.autoMount.enabledautoMount is enabled, cgroup2 filesystem is mounted at cgroup.hostRoot path on the underlying host and inside the cilium agent pod. If users disable autoMount\ , it's expected that users have mounted cgroup2 filesystem at the specified cgroup.hostRoot volume, and then the volume will be mounted inside the cilium agent pod at the same path.truecgroup.autoMount.resources{}cgroup.hostRootcgroup.autoMount\ )"/run/cilium/cgroupv2"ciliumEndpointSlice{"enabled":false,"rateLimits":[{"burst":20,"limit":10,"nodes":0},{"burst":100,"limit":50,"nodes":100}]}ciliumEndpointSlice.enabledfalseciliumEndpointSlice.rateLimits[{"burst":20,"limit":10,"nodes":0},{"burst":100,"limit":50,"nodes":100}]cleanBpfStatefalsecleanStatefalsecluster.id0cluster.name"default"clustermesh.annotations{}clustermesh.apiserver.affinity{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"podAffinityTerm":{"labelSelector":{"matchLabels":{"k8s-app":"clustermesh-apiserver"}},"topologyKey":"kubernetes.io/hostname"},"weight":100}]}}clustermesh.apiserver.etcd.init.extraArgsclustermesh-apiserver etcdinit.[]clustermesh.apiserver.etcd.init.extraEnvclustermesh-apiserver etcdinit.[]clustermesh.apiserver.etcd.init.resources{}clustermesh.apiserver.etcd.lifecycle{}clustermesh.apiserver.etcd.resources{}clustermesh.apiserver.etcd.securityContext{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]}}clustermesh.apiserver.etcd.storageMedium"Disk"clustermesh.apiserver.extraArgs[]clustermesh.apiserver.extraEnv[]clustermesh.apiserver.extraVolumeMounts[]clustermesh.apiserver.extraVolumes[]clustermesh.apiserver.healthPort9880clustermesh.apiserver.image{"digest":"","override":null,"pullPolicy":"IfNotPresent","repository":"quay.io/cilium/clustermesh-apiserver","tag":"v1.19.3","useDigest":false}clustermesh.apiserver.kvstoremesh.enabledtrueclustermesh.apiserver.kvstoremesh.extraArgs[]clustermesh.apiserver.kvstoremesh.extraEnv[]clustermesh.apiserver.kvstoremesh.extraVolumeMounts[]clustermesh.apiserver.kvstoremesh.healthPort9881clustermesh.apiserver.kvstoremesh.kvstoreModeclustermesh-apiserver pod. - "external": clustermesh-apiserver will sync remote cluster information to the etcd used as kvstore. This can't be enabled with crd identity allocation mode."internal"clustermesh.apiserver.kvstoremesh.lifecycle{}clustermesh.apiserver.kvstoremesh.readinessProbe{}clustermesh.apiserver.kvstoremesh.resources{}clustermesh.apiserver.kvstoremesh.securityContext{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]}}clustermesh.apiserver.lifecycle{}clustermesh.apiserver.metrics.enabledtrueclustermesh.apiserver.metrics.etcd.enabledtrueclustermesh.apiserver.metrics.etcd.mode"basic"clustermesh.apiserver.metrics.etcd.port9963clustermesh.apiserver.metrics.kvstoremesh.enabledtrueclustermesh.apiserver.metrics.kvstoremesh.port9964clustermesh.apiserver.metrics.port9962clustermesh.apiserver.metrics.serviceMonitor.annotations{}clustermesh.apiserver.metrics.serviceMonitor.enabledfalseclustermesh.apiserver.metrics.serviceMonitor.etcd.interval"10s"clustermesh.apiserver.metrics.serviceMonitor.etcd.metricRelabelingsnilclustermesh.apiserver.metrics.serviceMonitor.etcd.relabelingsnilclustermesh.apiserver.metrics.serviceMonitor.etcd.scrapeTimeoutnilclustermesh.apiserver.metrics.serviceMonitor.interval"10s"clustermesh.apiserver.metrics.serviceMonitor.kvstoremesh.interval"10s"clustermesh.apiserver.metrics.serviceMonitor.kvstoremesh.metricRelabelingsnilclustermesh.apiserver.metrics.serviceMonitor.kvstoremesh.relabelingsnilclustermesh.apiserver.metrics.serviceMonitor.kvstoremesh.scrapeTimeoutnilclustermesh.apiserver.metrics.serviceMonitor.labels{}clustermesh.apiserver.metrics.serviceMonitor.metricRelabelingsnilclustermesh.apiserver.metrics.serviceMonitor.relabelingsnilclustermesh.apiserver.metrics.serviceMonitor.scrapeTimeoutnilclustermesh.apiserver.nodeSelector{"kubernetes.io/os":"linux"}clustermesh.apiserver.podAnnotations{}clustermesh.apiserver.podDisruptionBudget.enabledfalseclustermesh.apiserver.podDisruptionBudget.maxUnavailable1clustermesh.apiserver.podDisruptionBudget.minAvailablemaxUnavailable: nullnilclustermesh.apiserver.podDisruptionBudget.unhealthyPodEvictionPolicynilclustermesh.apiserver.podLabels{}clustermesh.apiserver.podSecurityContext{"fsGroup":65532,"runAsGroup":65532,"runAsNonRoot":true,"runAsUser":65532}clustermesh.apiserver.priorityClassName""clustermesh.apiserver.readinessProbe{}clustermesh.apiserver.replicas1clustermesh.apiserver.resources{}clustermesh.apiserver.securityContext{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]}}clustermesh.apiserver.service.annotations{}clustermesh.apiserver.service.enableSessionAffinity"HAOnly"clustermesh.apiserver.service.externalTrafficPolicy"Cluster"clustermesh.apiserver.service.externallyCreatedfalseclustermesh.apiserver.service.internalTrafficPolicy"Cluster"clustermesh.apiserver.service.labels{}clustermesh.apiserver.service.loadBalancerClassnilclustermesh.apiserver.service.loadBalancerIPnilclustermesh.apiserver.service.loadBalancerSourceRanges[]clustermesh.apiserver.service.nodePort32379clustermesh.apiserver.service.type"NodePort"clustermesh.apiserver.terminationGracePeriodSeconds30clustermesh.apiserver.tls.admin{"cert":"","key":""}clustermesh.apiserver.tls.admin.certauto is disabled.""clustermesh.apiserver.tls.admin.keyauto is disabled.""clustermesh.apiserver.tls.authMode<cluster-name>\ ). The "remote" certificate must be generated with CN=remote-\ :raw-html-m2r:<cluster-name> if provided manually. Cluster mode is meaningful only when the same CA is shared across all clusters part of the mesh."migration"clustermesh.apiserver.tls.auto{"certManagerIssuerRef":{},"certValidityDuration":1095,"enabled":true,"method":"helm"}clustermesh.apiserver.tls.auto.certManagerIssuerRef{}clustermesh.apiserver.tls.auto.certValidityDuration1095clustermesh.apiserver.tls.auto.enabledtls.crt and tls.key and optionally ca.crt if a CA bundle is not configured.trueclustermesh.apiserver.tls.enableSecretstls-provided templates. This option is deprecated as secrets are expected to be created externally when 'auto' is not enabled.trueclustermesh.apiserver.tls.remote{"cert":"","key":""}clustermesh.apiserver.tls.remote.certauto is disabled.""clustermesh.apiserver.tls.remote.keyauto is disabled.""clustermesh.apiserver.tls.server{"cert":"","extraDnsNames":[],"extraIpAddresses":[],"key":""}clustermesh.apiserver.tls.server.certauto is disabled.""clustermesh.apiserver.tls.server.extraDnsNames[]clustermesh.apiserver.tls.server.extraIpAddresses[]clustermesh.apiserver.tls.server.keyauto is disabled.""clustermesh.apiserver.tolerations[]clustermesh.apiserver.topologySpreadConstraints[]clustermesh.apiserver.updateStrategy{"rollingUpdate":{"maxSurge":1,"maxUnavailable":0},"type":"RollingUpdate"}clustermesh.cacheTTL"0s"clustermesh.config{"clusters":[],"domain":"mesh.cilium.io","enabled":false}clustermesh.config.clusters[]clustermesh.config.domain"mesh.cilium.io"clustermesh.config.enabledclustermesh.apiserver.tls.authMode is not set to legacy\ )falseclustermesh.enableEndpointSliceSynchronizationfalseclustermesh.enableMCSAPISupportfalseclustermesh.maxConnectedClusters255clustermesh.mcsapi.corednsAutoConfigure.affinity{}clustermesh.mcsapi.corednsAutoConfigure.annotations{}clustermesh.mcsapi.corednsAutoConfigure.coredns.clusterDomain"cluster.local"clustermesh.mcsapi.corednsAutoConfigure.coredns.clustersetDomain"clusterset.local"clustermesh.mcsapi.corednsAutoConfigure.coredns.configMapName"coredns"clustermesh.mcsapi.corednsAutoConfigure.coredns.deploymentName"coredns"clustermesh.mcsapi.corednsAutoConfigure.coredns.namespace"kube-system"clustermesh.mcsapi.corednsAutoConfigure.coredns.serviceAccountName"coredns"clustermesh.mcsapi.corednsAutoConfigure.enabledfalseclustermesh.mcsapi.corednsAutoConfigure.extraArgsclustermesh-apiserver coredns-mcsapi-auto-configure.[]clustermesh.mcsapi.corednsAutoConfigure.extraVolumeMounts[]clustermesh.mcsapi.corednsAutoConfigure.extraVolumes[]clustermesh.mcsapi.corednsAutoConfigure.nodeSelector{}clustermesh.mcsapi.corednsAutoConfigure.podLabels{}clustermesh.mcsapi.corednsAutoConfigure.priorityClassName""clustermesh.mcsapi.corednsAutoConfigure.resources{}clustermesh.mcsapi.corednsAutoConfigure.tolerations[]clustermesh.mcsapi.corednsAutoConfigure.ttlSecondsAfterFinished1800clustermesh.mcsapi.enabledfalseclustermesh.mcsapi.installCRDstrueclustermesh.policyDefaultLocalClustertrueclustermesh.useAPIServerclustermesh.config.enabled=true. Refer to the clustermesh.config.enabled=true\ documentation for more information.falsecni.binPath"/opt/cni/bin"cni.chainingModenilcni.chainingTargetnilcni.confFileMountPath"/tmp/cni-configuration"cni.confPath"/etc/cni/net.d"cni.configMap""cni.configMapKey"cni-config"cni.customConffalsecni.enableRouteMTUForCNIChainingfalsecni.exclusive/etc/cni/net.d directory on the node, renaming all non-Cilium CNI configurations to *.cilium_bak. This ensures no Pods can be scheduled using other CNI plugins during Cilium agent downtime.truecni.hostConfDirMountPath"/host/etc/cni/net.d"cni.installtruecni.iptablesRemoveAWSRulestruecni.logFile"/var/run/cilium/cilium-cni.log"cni.resources{"limits":{"cpu":1,"memory":"1Gi"},"requests":{"cpu":"100m","memory":"10Mi"}}cni.uninstallfalsecommonLabels{}configDriftDetection{"driftChecker":true,"enabled":true,"ignoredKeys":[]}configDriftDetection.driftCheckertrueconfigDriftDetection.enabledtrueconfigDriftDetection.ignoredKeys[]connectivityProbeFrequencyRatio0.5conntrackGCInterval"0s"conntrackGCMaxInterval""crdWaitTimeout"5m"daemon.allowedConfigOverridesnildaemon.blockedConfigOverridesnildaemon.configSourcesnildaemon.enableSourceIPVerificationtruedaemon.runPath"/var/run/cilium"dashboards{"annotations":{},"enabled":false,"label":"grafana_dashboard","labelValue":"1","namespace":null}debug.enabledfalsedebug.metricsSamplingInterval"5m"debug.verbosenildefaultLBServiceIPAM"lbipam"directRoutingSkipUnreachablefalsedisableEndpointCRDfalsednsPolicy""dnsProxy.dnsRejectResponseCode"refused"dnsProxy.enableDnsCompressiontruednsProxy.endpointMaxIpPerHostname1000dnsProxy.idleConnectionGracePeriod"0s"dnsProxy.maxDeferredConnectionDeletes10000dnsProxy.minTtl0dnsProxy.preAllocateIdentitiestruednsProxy.preCache""dnsProxy.proxyPort0dnsProxy.proxyResponseMaxDelay"100ms"dnsProxy.socketLingerTimeout10egressGateway.enabledfalseegressGateway.reconciliationTriggerInterval"1s"enableCriticalPriorityClasshelm template calls, it depends on k8s libraries version that Helm was compiled against. This option allows to explicitly disable setting the priority class, which is useful for rendering charts for gke clusters in advance.trueenableIPv4BIGTCPfalseenableIPv4Masqueradetrue unless ipam eni mode is activeenableIPv6BIGTCPfalseenableIPv6MasqueradetrueenableInternalTrafficPolicytrueenableLBIPAMtrueenableMasqueradeRouteSourcefalseenableNoServiceEndpointsRoutabletrueenableNonDefaultDenyPoliciestrueenableXTSocketFallbacktrueencryption.enabledfalseencryption.ipsec.encryptedOverlayfalseencryption.ipsec.interface""encryption.ipsec.keyFile"keys"encryption.ipsec.keyRotationDuration"5m"encryption.ipsec.keyWatchertrueencryption.ipsec.mountPath"/etc/ipsec"encryption.ipsec.secretName"cilium-ipsec-keys"encryption.nodeEncryptionfalseencryption.strictMode{"allowRemoteNodeIdentities":false,"cidr":"","egress":{"allowRemoteNodeIdentities":false,"cidr":"","enabled":false},"enabled":false,"ingress":{"enabled":false}}encryption.strictMode.allowRemoteNodeIdentitiesfalseencryption.strictMode.cidr""encryption.strictMode.egress.allowRemoteNodeIdentitiesfalseencryption.strictMode.egress.cidr""encryption.strictMode.egress.enabledfalseencryption.strictMode.enabledfalseencryption.strictMode.ingress.enabledfalseencryption.type"ipsec"encryption.wireguard.persistentKeepalive"0s"encryption.ztunnel{"affinity":{},"annotations":{},"caAddress":"https://localhost:15012","extraEnv":[],"extraVolumeMounts":[],"extraVolumes":[],"healthPort":15021,"image":{"digest":null,"override":null,"pullPolicy":"IfNotPresent","repository":"docker.io/istio/ztunnel","tag":"1.28.0-distroless","useDigest":false},"nodeSelector":{"kubernetes.io/os":"linux"},"podAnnotations":{},"podLabels":{},"priorityClassName":null,"readinessProbe":{"failureThreshold":3,"initialDelaySeconds":0,"periodSeconds":10},"resources":{"requests":{"cpu":"200m","memory":"512Mi"}},"secrets":{"bootstrapRootCert":null},"terminationGracePeriodSeconds":30,"tolerations":[{"effect":"NoSchedule","operator":"Exists"},{"key":"CriticalAddonsOnly","operator":"Exists"},{"effect":"NoExecute","operator":"Exists"}],"updateStrategy":{"rollingUpdate":{"maxSurge":1,"maxUnavailable":0},"type":"RollingUpdate"}}encryption.ztunnel.affinity{}encryption.ztunnel.annotations{}encryption.ztunnel.caAddress"https://localhost:15012"encryption.ztunnel.extraEnv[]encryption.ztunnel.extraVolumeMounts[]encryption.ztunnel.extraVolumes[]encryption.ztunnel.healthPort15021encryption.ztunnel.image{"digest":null,"override":null,"pullPolicy":"IfNotPresent","repository":"docker.io/istio/ztunnel","tag":"1.28.0-distroless","useDigest":false}encryption.ztunnel.nodeSelector{"kubernetes.io/os":"linux"}encryption.ztunnel.podAnnotations{}encryption.ztunnel.podLabels{}encryption.ztunnel.priorityClassNamenilencryption.ztunnel.readinessProbe{"failureThreshold":3,"initialDelaySeconds":0,"periodSeconds":10}encryption.ztunnel.resources{"requests":{"cpu":"200m","memory":"512Mi"}}encryption.ztunnel.secrets{"bootstrapRootCert":null}encryption.ztunnel.secrets.bootstrapRootCertnilencryption.ztunnel.terminationGracePeriodSeconds30encryption.ztunnel.tolerations[{"effect":"NoSchedule","operator":"Exists"},{"key":"CriticalAddonsOnly","operator":"Exists"},{"effect":"NoExecute","operator":"Exists"}]encryption.ztunnel.updateStrategy{"rollingUpdate":{"maxSurge":1,"maxUnavailable":0},"type":"RollingUpdate"}endpointHealthChecking.enabledtrueendpointLockdownOnMapOverflowfalseendpointPolicyUpdateTimeoutDurationnilendpointRoutes.enabledfalseeni.awsEnablePrefixDelegationfalseeni.awsReleaseExcessIPsfalseeni.ec2APIEndpoint""eni.enabledfalseeni.eniTags{}eni.gcInterval"5m"eni.gcTags{"io.cilium/cilium-managed":"true,"io.cilium/cluster-name":"<auto-detected>"}eni.iamRole""eni.instanceTagsFilter[]eni.nodeSpec{"deleteOnTermination":null,"disablePrefixDelegation":false,"excludeInterfaceTags":[],"firstInterfaceIndex":null,"securityGroupTags":[],"securityGroups":[],"subnetIDs":[],"subnetTags":[],"usePrimaryAddress":false}eni.nodeSpec.deleteOnTerminationnileni.nodeSpec.disablePrefixDelegationfalseeni.nodeSpec.excludeInterfaceTags[]eni.nodeSpec.firstInterfaceIndexnileni.nodeSpec.securityGroupTags[]eni.nodeSpec.securityGroups[]eni.nodeSpec.subnetIDs[]eni.nodeSpec.subnetTags[]eni.nodeSpec.usePrimaryAddressfalseeni.subnetIDsFilter[]eni.subnetTagsFilter[]envoy.affinity{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"cilium.io/no-schedule","operator":"NotIn","values":["true"]}]}]}},"podAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"k8s-app":"cilium"}},"topologyKey":"kubernetes.io/hostname"}]},"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"k8s-app":"cilium-envoy"}},"topologyKey":"kubernetes.io/hostname"}]}}envoy.annotations{}envoy.baseID0envoy.bootstrapConfigMapbootstrap-config.json key. When specified, Envoy will use this ConfigMap instead of the default provided by the chart. WARNING: Use of this setting has the potential to prevent cilium-envoy from starting up, and can cause unexpected behavior (e.g. due to syntax error or semantically incorrect configuration). Before submitting an issue, please ensure you have disabled this feature, as support cannot be provided for custom Envoy bootstrap configs. @schema type: [null, string] @schemanilenvoy.clusterMaxConnections1024envoy.clusterMaxRequests1024envoy.connectTimeoutSeconds2envoy.debug.admin.enabledfalseenvoy.debug.admin.port9901envoy.dnsPolicynilenvoy.enabledtrue for new installationenvoy.extraArgs[]envoy.extraContainers[]envoy.extraEnv[]envoy.extraHostPathMounts[]envoy.extraVolumeMounts[]envoy.extraVolumes[]envoy.healthPort9878envoy.httpRetryCount3envoy.httpUpstreamLingerTimeoutnilenvoy.idleTimeoutDurationSeconds60envoy.image{"digest":"sha256:ba0ab8adac082d50d525fd2c5ba096c8facea3a471561b7c61c7a5b9c2e0de0d","override":null,"pullPolicy":"IfNotPresent","repository":"quay.io/cilium/cilium-envoy","tag":"v1.36.6-1776000132-2437d2edeaf4d9b56ef279bd0d71127440c067aa","useDigest":true}envoy.initContainers[]envoy.initialFetchTimeoutSeconds30envoy.livenessProbe.enabledtrueenvoy.livenessProbe.failureThreshold10envoy.livenessProbe.periodSeconds30envoy.log.accessLogBufferSize4096envoy.log.defaultLevelcritical. Possible values: trace, debug, info, warning, error, critical, offinfoenvoy.log.format"[%Y-%m-%d %T.%e][%t][%l][%n] [%g:%#] %v"envoy.log.format_jsonnilenvoy.log.path""envoy.maxConcurrentRetries128envoy.maxConnectionDurationSeconds0envoy.maxGlobalDownstreamConnections50000envoy.maxRequestsPerConnection0envoy.nodeSelector{"kubernetes.io/os":"linux"}envoy.podAnnotations{}envoy.podLabels{}envoy.podSecurityContext{"appArmorProfile":{"type":"Unconfined"}}envoy.podSecurityContext.appArmorProfilecilium-agent and init containers{"type":"Unconfined"}envoy.policyRestoreTimeoutDurationnilenvoy.priorityClassNamenilenvoy.prometheus{"enabled":true,"port":"9964","serviceMonitor":{"annotations":{},"enabled":false,"interval":"10s","labels":{},"metricRelabelings":null,"relabelings":[{"action":"replace","replacement":"${1}","sourceLabels":["__meta_kubernetes_pod_node_name"],"targetLabel":"node"}],"scrapeTimeout":null}}envoy.prometheus.enabledtrueenvoy.prometheus.port"9964"envoy.prometheus.serviceMonitor.annotations{}envoy.prometheus.serviceMonitor.enabledfalseenvoy.prometheus.serviceMonitor.interval"10s"envoy.prometheus.serviceMonitor.labels{}envoy.prometheus.serviceMonitor.metricRelabelingsnilenvoy.prometheus.serviceMonitor.relabelings[{"action":"replace","replacement":"${1}","sourceLabels":["__meta_kubernetes_pod_node_name"],"targetLabel":"node"}]envoy.prometheus.serviceMonitor.scrapeTimeoutnilenvoy.readinessProbe.failureThreshold3envoy.readinessProbe.periodSeconds30envoy.resources{}envoy.rollOutPodsfalseenvoy.securityContext.capabilities.envoycilium-envoy container. Even though granted to the container, the cilium-envoy-starter wrapper drops all capabilities after forking the actual Envoy process. NET_BIND_SERVICE is the only capability that can be passed to the Envoy process by setting envoy.securityContext.capabilities.keepNetBindService=true (in addition to granting the capability to the container). Note: In case of embedded envoy, the capability must be granted to the cilium-agent container.["NET_ADMIN","SYS_ADMIN"]envoy.securityContext.capabilities.keepCapNetBindServiceNET_BIND_SERVICE for Envoy process.falseenvoy.securityContext.privilegedfalseenvoy.securityContext.seLinuxOptionscilium-envoy container{"level":"s0","type":"spc_t"}envoy.startupProbe.enabledtrueenvoy.startupProbe.failureThreshold105envoy.startupProbe.periodSeconds2envoy.streamIdleTimeoutDurationSeconds300envoy.terminationGracePeriodSeconds1envoy.tolerations[{"operator":"Exists"}]envoy.updateStrategy{"rollingUpdate":{"maxUnavailable":2},"type":"RollingUpdate"}envoy.useOriginalSourceAddresstrueenvoy.xffNumTrustedHopsL7PolicyEgress0envoy.xffNumTrustedHopsL7PolicyIngress0envoyConfig.enabledfalseenvoyConfig.retryInterval"15s"envoyConfig.secretsNamespace{"create":true,"name":"cilium-secrets"}envoyConfig.secretsNamespace.createtrueenvoyConfig.secretsNamespace.name"cilium-secrets"etcd.enabledfalseetcd.endpoints["https://CHANGE-ME:2379"]etcd.sslfalseextraArgs[]extraConfig{}extraContainers[]extraEnv[]extraHostPathMounts[]extraInitContainers[]extraVolumeMounts[]extraVolumes[]forceDeviceDetectionfalsegatewayAPI.enableAlpnappProtocol support, and services that wish to use HTTP/2 will need to indicate that via their appProtocol.falsegatewayAPI.enableAppProtocolfalsegatewayAPI.enableProxyProtocolfalsegatewayAPI.enabledfalsegatewayAPI.externalTrafficPolicyhostNetwork.enabled == true. ref: https://kubernetes.io/docs/reference/networking/virtual-ips/#external-traffic-policy"Cluster"gatewayAPI.gatewayClass.create"auto"gatewayAPI.hostNetwork.enabledfalsegatewayAPI.hostNetwork.nodes.matchLabels{}gatewayAPI.secretsNamespace{"create":true,"name":"cilium-secrets","sync":true}gatewayAPI.secretsNamespace.createtruegatewayAPI.secretsNamespace.name"cilium-secrets"gatewayAPI.secretsNamespace.synctruegatewayAPI.xffNumTrustedHops0gke.enabledfalsehealthCheckICMPFailureThreshold3healthCheckingtruehealthPort9879hostFirewall{"enabled":false}hostFirewall.enabledfalsehubble.annotations{}hubble.dropEventEmitter{"enabled":false,"interval":"2m","reasons":["auth_required","policy_denied"]}hubble.dropEventEmitter.interval"2m"hubble.dropEventEmitter.reasons["auth_required","policy_denied"]hubble.enabledtruehubble.export{"dynamic":{"config":{"configMapName":"cilium-flowlog-config","content":[{"aggregationInterval":"0s","excludeFilters":[],"fieldAggregate":[],"fieldMask":[],"fileCompress":false,"fileMaxBackups":5,"fileMaxSizeMb":10,"filePath":"/var/run/cilium/hubble/events.log","includeFilters":[],"name":"all"}],"createConfigMap":true},"enabled":false},"static":{"aggregationInterval":"0s","allowList":[],"denyList":[],"enabled":false,"fieldAggregate":[],"fieldMask":[],"fileCompress":false,"fileMaxBackups":5,"fileMaxSizeMb":10,"filePath":"/var/run/cilium/hubble/events.log"}}hubble.export.dynamic{"config":{"configMapName":"cilium-flowlog-config","content":[{"aggregationInterval":"0s","excludeFilters":[],"fieldAggregate":[],"fieldMask":[],"fileCompress":false,"fileMaxBackups":5,"fileMaxSizeMb":10,"filePath":"/var/run/cilium/hubble/events.log","includeFilters":[],"name":"all"}],"createConfigMap":true},"enabled":false}hubble.export.dynamic.config.configMapName"cilium-flowlog-config"hubble.export.dynamic.config.content[{"aggregationInterval":"0s","excludeFilters":[],"fieldAggregate":[],"fieldMask":[],"fileCompress":false,"fileMaxBackups":5,"fileMaxSizeMb":10,"filePath":"/var/run/cilium/hubble/events.log","includeFilters":[],"name":"all"}]hubble.export.dynamic.config.createConfigMaptruehubble.export.static{"aggregationInterval":"0s","allowList":[],"denyList":[],"enabled":false,"fieldAggregate":[],"fieldMask":[],"fileCompress":false,"fileMaxBackups":5,"fileMaxSizeMb":10,"filePath":"/var/run/cilium/hubble/events.log"}hubble.export.static.aggregationInterval"0s"hubble.export.static.fileCompressfalsehubble.export.static.fileMaxBackups5hubble.export.static.fileMaxSizeMb10hubble.listenAddress":4244"hubble.metrics{"dashboards":{"annotations":{},"enabled":false,"label":"grafana_dashboard","labelValue":"1","namespace":null},"dynamic":{"config":{"configMapName":"cilium-dynamic-metrics-config","content":[],"createConfigMap":true},"enabled":false},"enableOpenMetrics":false,"enabled":null,"port":9965,"serviceAnnotations":{},"serviceMonitor":{"annotations":{},"enabled":false,"interval":"10s","jobLabel":"","labels":{},"metricRelabelings":null,"relabelings":[{"action":"replace","replacement":"${1}","sourceLabels":["__meta_kubernetes_pod_node_name"],"targetLabel":"node"}],"scrapeTimeout":null,"tlsConfig":{}},"tls":{"enabled":false,"server":{"cert":"","existingSecret":"","extraDnsNames":[],"extraIpAddresses":[],"key":"","mtls":{"enabled":false,"key":"ca.crt","name":null,"useSecret":false}}}}hubble.metrics.dashboards{"annotations":{},"enabled":false,"label":"grafana_dashboard","labelValue":"1","namespace":null}hubble.metrics.dynamic.config.configMapName"cilium-dynamic-metrics-config"hubble.metrics.dynamic.config.content[]hubble.metrics.dynamic.config.createConfigMaptruehubble.metrics.enableOpenMetricsfalsehubble.metrics.enablednilhubble.metrics.port9965hubble.metrics.serviceAnnotations{}hubble.metrics.serviceMonitor.annotations{}hubble.metrics.serviceMonitor.enabledfalsehubble.metrics.serviceMonitor.interval"10s"hubble.metrics.serviceMonitor.jobLabel""hubble.metrics.serviceMonitor.labels{}hubble.metrics.serviceMonitor.metricRelabelingsnilhubble.metrics.serviceMonitor.relabelings[{"action":"replace","replacement":"${1}","sourceLabels":["__meta_kubernetes_pod_node_name"],"targetLabel":"node"}]hubble.metrics.serviceMonitor.scrapeTimeoutnilhubble.metrics.tls.server.cert""hubble.metrics.tls.server.existingSecret""hubble.metrics.tls.server.extraDnsNames[]hubble.metrics.tls.server.extraIpAddresses[]hubble.metrics.tls.server.key""hubble.metrics.tls.server.mtls{"enabled":false,"key":"ca.crt","name":null,"useSecret":false}hubble.metrics.tls.server.mtls.key"ca.crt"hubble.metrics.tls.server.mtls.namenilhubble.networkPolicyCorrelationegress_allowed_by\ , ingress_denied_by fields with policy information.{"enabled":true}hubble.peerService.clusterDomain"cluster.local"hubble.peerService.targetPort4244hubble.preferIpv6falsehubble.redact{"enabled":false,"http":{"headers":{"allow":[],"deny":[]},"urlQuery":false,"userInfo":true},"kafka":{"apiKey":true}}hubble.redact.http.headers.allowallow and deny lists cannot be used both at the same time, only one can be present. Example: redact: enabled: true http: headers: allow: - traceparent - tracestate - Cache-Control You can specify the options from the helm CLI: --set hubble.redact.enabled="true" --set hubble.redact.http.headers.allow="traceparent,tracestate,Cache-Control"[]hubble.redact.http.headers.denyallow and deny lists cannot be used both at the same time, only one can be present. Example: redact: enabled: true http: headers: deny: - Authorization - Proxy-Authorization You can specify the options from the helm CLI: --set hubble.redact.enabled="true" --set hubble.redact.http.headers.deny="Authorization,Proxy-Authorization"[]hubble.redact.http.urlQueryfalsehubble.redact.http.userInfotruehubble.redact.kafka.apiKeytruehubble.relay.affinity{"podAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"k8s-app":"cilium"}},"topologyKey":"kubernetes.io/hostname"}]}}hubble.relay.annotations{}hubble.relay.enabledfalsehubble.relay.extraEnv[]hubble.relay.extraVolumeMounts[]hubble.relay.extraVolumes[]hubble.relay.gops.enabledtruehubble.relay.gops.port9893hubble.relay.image{"digest":"","override":null,"pullPolicy":"IfNotPresent","repository":"quay.io/cilium/hubble-relay","tag":"v1.19.3","useDigest":false}hubble.relay.listenHost""hubble.relay.listenPort"4245"hubble.relay.logOptions{"format":null,"level":null}hubble.relay.logOptions.formathubble.relay.logOptions.levelhubble.relay.nodeSelector{"kubernetes.io/os":"linux"}hubble.relay.podAnnotations{}hubble.relay.podDisruptionBudget.enabledfalsehubble.relay.podDisruptionBudget.maxUnavailable1hubble.relay.podDisruptionBudget.minAvailablemaxUnavailable: nullnilhubble.relay.podDisruptionBudget.unhealthyPodEvictionPolicynilhubble.relay.podLabels{}hubble.relay.podSecurityContext{"fsGroup":65532,"seccompProfile":{"type":"RuntimeDefault"}}hubble.relay.pprof.address"localhost"hubble.relay.pprof.blockProfileRate0hubble.relay.pprof.enabledfalsehubble.relay.pprof.mutexProfileFraction0hubble.relay.pprof.port6062hubble.relay.priorityClassName""hubble.relay.prometheus{"enabled":false,"port":9966,"serviceMonitor":{"annotations":{},"enabled":false,"interval":"10s","labels":{},"metricRelabelings":null,"relabelings":null,"scrapeTimeout":null}}hubble.relay.prometheus.serviceMonitor.annotations{}hubble.relay.prometheus.serviceMonitor.enabledfalsehubble.relay.prometheus.serviceMonitor.interval"10s"hubble.relay.prometheus.serviceMonitor.labels{}hubble.relay.prometheus.serviceMonitor.metricRelabelingsnilhubble.relay.prometheus.serviceMonitor.relabelingsnilhubble.relay.prometheus.serviceMonitor.scrapeTimeoutnilhubble.relay.replicas1hubble.relay.resources{}hubble.relay.retryTimeoutnilhubble.relay.rollOutPodsfalsehubble.relay.securityContext{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"runAsGroup":65532,"runAsNonRoot":true,"runAsUser":65532,"seccompProfile":{"type":"RuntimeDefault"}}hubble.relay.service{"nodePort":31234,"type":"ClusterIP"}hubble.relay.service.nodePort31234hubble.relay.service.type"ClusterIP"hubble.relay.sortBufferDrainTimeoutnilhubble.relay.sortBufferLenMaxnilhubble.relay.terminationGracePeriodSeconds1hubble.relay.tls{"client":{"cert":"","existingSecret":"","key":""},"server":{"cert":"","enabled":false,"existingSecret":"","extraDnsNames":[],"extraIpAddresses":[],"key":"","mtls":false,"relayName":"ui.hubble-relay.cilium.io"}}hubble.relay.tls.client{"cert":"","existingSecret":"","key":""}hubble.relay.tls.client.cert""hubble.relay.tls.client.existingSecret""hubble.relay.tls.client.key""hubble.relay.tls.server{"cert":"","enabled":false,"existingSecret":"","extraDnsNames":[],"extraIpAddresses":[],"key":"","mtls":false,"relayName":"ui.hubble-relay.cilium.io"}hubble.relay.tls.server.cert""hubble.relay.tls.server.existingSecret""hubble.relay.tls.server.extraDnsNames[]hubble.relay.tls.server.extraIpAddresses[]hubble.relay.tls.server.key""hubble.relay.tolerations[]hubble.relay.topologySpreadConstraints[]hubble.relay.updateStrategy{"rollingUpdate":{"maxUnavailable":1},"type":"RollingUpdate"}hubble.skipUnknownCGroupIDstruehubble.socketPath"/var/run/cilium/hubble.sock"hubble.tls{"auto":{"certManagerIssuerRef":{},"certValidityDuration":365,"enabled":true,"method":"helm","schedule":"0 0 1 */4 *"},"enabled":true,"server":{"cert":"","existingSecret":"","extraDnsNames":[],"extraIpAddresses":[],"key":""}}hubble.tls.auto{"certManagerIssuerRef":{},"certValidityDuration":365,"enabled":true,"method":"helm","schedule":"0 0 1 */4 *"}hubble.tls.auto.certManagerIssuerRef{}hubble.tls.auto.certValidityDuration365hubble.tls.auto.enabledtruehubble.tls.auto.method"helm"hubble.tls.auto.schedule"0 0 1 */4 *"hubble.tls.enabledtruehubble.tls.server{"cert":"","existingSecret":"","extraDnsNames":[],"extraIpAddresses":[],"key":""}hubble.tls.server.cert""hubble.tls.server.existingSecret""hubble.tls.server.extraDnsNames[]hubble.tls.server.extraIpAddresses[]hubble.tls.server.key""hubble.ui.affinity{}hubble.ui.annotations{}hubble.ui.backend.extraEnv[]hubble.ui.backend.extraVolumeMounts[]hubble.ui.backend.extraVolumes[]hubble.ui.backend.image{"digest":"sha256:db1454e45dc39ca41fbf7cad31eec95d99e5b9949c39daaad0fa81ef29d56953","override":null,"pullPolicy":"IfNotPresent","repository":"quay.io/cilium/hubble-ui-backend","tag":"v0.13.3","useDigest":true}hubble.ui.backend.livenessProbe.enabledfalsehubble.ui.backend.readinessProbe.enabledfalsehubble.ui.backend.resources{}hubble.ui.backend.securityContext{"allowPrivilegeEscalation":false}hubble.ui.baseUrl/ is required for custom path, ex. /service-map/"/"hubble.ui.enabledfalsehubble.ui.frontend.extraEnv[]hubble.ui.frontend.extraVolumeMounts[]hubble.ui.frontend.extraVolumes[]hubble.ui.frontend.image{"digest":"sha256:661d5de7050182d495c6497ff0b007a7a1e379648e60830dd68c4d78ae21761d","override":null,"pullPolicy":"IfNotPresent","repository":"quay.io/cilium/hubble-ui","tag":"v0.13.3","useDigest":true}hubble.ui.frontend.resources{}hubble.ui.frontend.securityContext{"allowPrivilegeEscalation":false}hubble.ui.frontend.server.ipv6{"enabled":true}hubble.ui.ingress{"annotations":{},"className":"","enabled":false,"hosts":["chart-example.local"],"labels":{},"tls":[]}hubble.ui.labels{}hubble.ui.nodeSelector{"kubernetes.io/os":"linux"}hubble.ui.podAnnotations{}hubble.ui.podDisruptionBudget.enabledfalsehubble.ui.podDisruptionBudget.maxUnavailable1hubble.ui.podDisruptionBudget.minAvailablemaxUnavailable: nullnilhubble.ui.podDisruptionBudget.unhealthyPodEvictionPolicynilhubble.ui.podLabels{}hubble.ui.priorityClassName""hubble.ui.replicas1hubble.ui.rollOutPodsfalsehubble.ui.securityContext{"fsGroup":1001,"runAsGroup":1001,"runAsUser":1001}hubble.ui.service{"annotations":{},"labels":{},"nodePort":31235,"type":"ClusterIP"}hubble.ui.service.annotations{}hubble.ui.service.labels{}hubble.ui.service.nodePort31235hubble.ui.service.type"ClusterIP"hubble.ui.standalone.enabledhelm upgrade and when installed via the cilium cli, then cilium hubble enable --uifalsehubble.ui.standalone.tls.certsVolume{}hubble.ui.tls.client.cert""hubble.ui.tls.client.existingSecret""hubble.ui.tls.client.key""hubble.ui.tmpVolume{}hubble.ui.tolerations[]hubble.ui.topologySpreadConstraints[]hubble.ui.updateStrategy{"rollingUpdate":{"maxUnavailable":1},"type":"RollingUpdate"}identityAllocationModecrd\ , kvstore or doublewrite-readkvstore / doublewrite-readcrd for migrating between identity backends)."crd"identityChangeGracePeriod"5s"identityManagementMode"agent"image{"digest":"","override":null,"pullPolicy":"IfNotPresent","repository":"quay.io/cilium/cilium","tag":"v1.19.3","useDigest":false}imagePullSecrets[]ingressController.defaultfalseingressController.defaultSecretNamenilingressController.defaultSecretNamespacenilingressController.enableProxyProtocolfalseingressController.enabledfalseingressController.enforceHttpstrueingressController.hostNetwork.enabledfalseingressController.hostNetwork.nodes.matchLabels{}ingressController.hostNetwork.sharedListenerPort8080ingressController.ingressLBAnnotationPrefixes["lbipam.cilium.io","nodeipam.cilium.io","service.beta.kubernetes.io","service.kubernetes.io","cloud.google.com"]ingressController.loadbalancerMode"dedicated"ingressController.secretsNamespace{"create":true,"name":"cilium-secrets","sync":true}ingressController.secretsNamespace.createtrueingressController.secretsNamespace.name"cilium-secrets"ingressController.secretsNamespace.synctrueingressController.service{"allocateLoadBalancerNodePorts":null,"annotations":{},"externalTrafficPolicy":"Cluster","insecureNodePort":null,"labels":{},"loadBalancerClass":null,"loadBalancerIP":null,"name":"cilium-ingress","secureNodePort":null,"type":"LoadBalancer"}ingressController.service.allocateLoadBalancerNodePortsnilingressController.service.annotations{}ingressController.service.externalTrafficPolicy"Cluster"ingressController.service.insecureNodePortnilingressController.service.labels{}ingressController.service.loadBalancerClassnilingressController.service.loadBalancerIPnilingressController.service.name"cilium-ingress"ingressController.service.secureNodePortnilingressController.service.type"LoadBalancer"initResources{}installNoConntrackIptablesRulesfalseipMasqAgent{"enabled":false}ipam.ciliumNodeUpdateRate"15s"ipam.installUplinkRoutesForDelegatedIPAMfalseipam.mode"cluster-pool"ipam.multiPoolPreAllocation""ipam.nodeSpec{"ipamMaxAllocate":null,"ipamMinAllocate":null,"ipamPreAllocate":null,"ipamStaticIPTags":[]}ipam.nodeSpec.ipamMaxAllocatenilipam.nodeSpec.ipamMinAllocatenilipam.nodeSpec.ipamPreAllocatenilipam.nodeSpec.ipamStaticIPTags[]ipam.operator.autoCreateCiliumPodIPPools{}ipam.operator.clusterPoolIPv4MaskSize24ipam.operator.clusterPoolIPv4PodCIDRList["10.0.0.0/8"]ipam.operator.clusterPoolIPv6MaskSize120ipam.operator.clusterPoolIPv6PodCIDRList["fd00::/104"]ipam.operator.externalAPILimitBurstSize20ipam.operator.externalAPILimitQPS4.0iptablesRandomFullyfalseipv4.enabledtrueipv4NativeRoutingCIDR""ipv6.enabledfalseipv6NativeRoutingCIDR""k8s{"requireIPv4PodCIDR":false,"requireIPv6PodCIDR":false}k8s.requireIPv4PodCIDRfalsek8s.requireIPv6PodCIDRfalsek8sClientExponentialBackoff{"backoffBaseSeconds":1,"backoffMaxDurationSeconds":120,"enabled":true}k8sClientExponentialBackoff.backoffBaseSeconds1k8sClientExponentialBackoff.backoffMaxDurationSeconds120k8sClientExponentialBackoff.enabledtruek8sClientRateLimit{"burst":null,"operator":{"burst":null,"qps":null},"qps":null}k8sClientRateLimit.burstk8sClientRateLimit.operator{"burst":null,"qps":null}k8sClientRateLimit.operator.burstk8sClientRateLimit.operator.qpsk8sClientRateLimit.qpsk8sNetworkPolicy.enabledtruek8sServiceHost""k8sServiceHostRefk8sServiceHost.{"key":null,"name":null}k8sServiceHostRef.keynilk8sServiceHostRef.namenilk8sServiceLookupConfigMapNamek8sServiceHost=auto\ , allows to customize the configMap name. It defaults to cluster-info.""k8sServiceLookupNamespacek8sServiceHost=auto\ , allows to customize the namespace that contains k8sServiceLookupConfigMapName. It defaults to kube-public.""k8sServicePort""keepDeprecatedLabelsfalsekeepDeprecatedProbesfalsekubeConfigPath"~/.kube/config"kubeProxyReplacement"false"kubeProxyReplacementHealthzBindAddr""l2NeighDiscovery.enabledfalsel2announcements{"enabled":false}l2announcements.enabledfalsel2podAnnouncements{"enabled":false,"interface":"eth0"}l2podAnnouncements.enabledfalsel2podAnnouncements.interface"eth0"l7ProxytruelivenessProbe.failureThreshold10livenessProbe.periodSeconds30livenessProbe.requireK8sConnectivityfalseloadBalancer{"acceleration":"disabled","l7":{"algorithm":"round_robin","backend":"disabled","ports":[]},"serviceTopology":false}loadBalancer.acceleration"disabled"loadBalancer.l7{"algorithm":"round_robin","backend":"disabled","ports":[]}loadBalancer.l7.algorithm"round_robin"loadBalancer.l7.backend"disabled"loadBalancer.l7.ports[]loadBalancer.serviceTopologyfalselocalRedirectPolicies.addressMatcherCIDRsnillocalRedirectPolicies.enabledfalselocalRedirectPolicyfalselogSystemLoadfalsemaglev{}monitor{"enabled":false}monitor.enabledfalsename"cilium"namespaceOverride""nat.mapStatsEntries32nat.mapStatsInterval"30s"nat46x64Gateway{"enabled":false}nat46x64Gateway.enabledfalsenodeIPAM.enabledfalsenodePort{"addresses":null,"autoProtectPortRange":true,"bindProtection":true,"enableHealthCheck":true,"enableHealthCheckLoadBalancerIP":false}nodePort.addressesnilnodePort.autoProtectPortRangetruenodePort.bindProtectiontruenodePort.enableHealthChecktruenodePort.enableHealthCheckLoadBalancerIPfalsenodeSelector{"kubernetes.io/os":"linux"}nodeSelectorLabelsfalsenodeinit.affinity{}nodeinit.annotations{}nodeinit.bootstrapFile"/tmp/cilium-bootstrap.d/cilium-bootstrap-time"nodeinit.enabledfalsenodeinit.extraEnv[]nodeinit.extraVolumeMounts[]nodeinit.extraVolumes[]nodeinit.image{"digest":"sha256:50b9cf9c280096b59b80d2fc8ee6638facef79ac18998a22f0cbc40d5d28c16f","override":null,"pullPolicy":"IfNotPresent","repository":"quay.io/cilium/startup-script","tag":"1763560095-8f36c34","useDigest":true}nodeinit.nodeSelector{"kubernetes.io/os":"linux"}nodeinit.podAnnotations{}nodeinit.podLabels{}nodeinit.podSecurityContext{"appArmorProfile":{"type":"Unconfined"}}nodeinit.podSecurityContext.appArmorProfilecilium-node-init and init containers{"type":"Unconfined"}nodeinit.prestop{"postScript":"","preScript":""}nodeinit.priorityClassName""nodeinit.resources{"requests":{"cpu":"100m","memory":"100Mi"}}nodeinit.securityContext{"allowPrivilegeEscalation":false,"capabilities":{"add":["SYS_MODULE","NET_ADMIN","SYS_ADMIN","SYS_CHROOT","SYS_PTRACE"]},"privileged":false,"seLinuxOptions":{"level":"s0","type":"spc_t"}}nodeinit.startup{"postScript":"","preScript":""}nodeinit.tolerations[{"operator":"Exists"}]nodeinit.updateStrategy{"type":"RollingUpdate"}nodeinit.waitForCloudInitfalseoperator.affinity{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"io.cilium/app":"operator"}},"topologyKey":"kubernetes.io/hostname"}]}}operator.annotations{}operator.dashboards{"annotations":{},"enabled":false,"label":"grafana_dashboard","labelValue":"1","namespace":null}operator.dnsPolicy""operator.enabledtrueoperator.endpointGCInterval"5m0s"operator.extraArgs[]operator.extraEnv[]operator.extraHostPathMounts[]operator.extraVolumeMounts[]operator.extraVolumes[]operator.hostNetworktrueoperator.identityGCInterval"15m0s"operator.identityHeartbeatTimeout"30m0s"operator.image{"alibabacloudDigest":"","awsDigest":"","azureDigest":"","genericDigest":"","override":null,"pullPolicy":"IfNotPresent","repository":"quay.io/cilium/operator","suffix":"","tag":"v1.19.3","useDigest":false}operator.nodeGCInterval"5m0s"operator.nodeSelector{"kubernetes.io/os":"linux"}operator.podAnnotations{}operator.podDisruptionBudget.enabledfalseoperator.podDisruptionBudget.maxUnavailable1operator.podDisruptionBudget.minAvailablemaxUnavailable: nullniloperator.podDisruptionBudget.unhealthyPodEvictionPolicyniloperator.podLabels{}operator.podSecurityContext{"seccompProfile":{"type":"RuntimeDefault"}}operator.pprof.address"localhost"operator.pprof.blockProfileRate0operator.pprof.enabledfalseoperator.pprof.mutexProfileFraction0operator.pprof.port6061operator.priorityClassName""operator.prometheus{"enabled":true,"metricsService":false,"port":9963,"serviceMonitor":{"annotations":{},"enabled":false,"interval":"10s","jobLabel":"","labels":{},"metricRelabelings":null,"relabelings":null,"scrapeTimeout":null},"tls":{"enabled":false,"server":{"existingSecret":"","mtls":{"enabled":false}}}}operator.prometheus.serviceMonitor.annotations{}operator.prometheus.serviceMonitor.enabledfalseoperator.prometheus.serviceMonitor.interval"10s"operator.prometheus.serviceMonitor.jobLabel""operator.prometheus.serviceMonitor.labels{}operator.prometheus.serviceMonitor.metricRelabelingsniloperator.prometheus.serviceMonitor.relabelingsniloperator.prometheus.serviceMonitor.scrapeTimeoutniloperator.prometheus.tls{"enabled":false,"server":{"existingSecret":"","mtls":{"enabled":false}}}operator.prometheus.tls.server.existingSecret""operator.removeNodeTaintstrueoperator.replicas2operator.resources{}operator.rollOutPodsfalseoperator.securityContext{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]}}operator.setNodeNetworkStatustrueoperator.setNodeTaintsoperator.skipCRDCreationfalseoperator.tolerations[{"key":"node-role.kubernetes.io/control-plane","operator":"Exists"},{"key":"node-role.kubernetes.io/master","operator":"Exists"},{"key":"node.kubernetes.io/not-ready","operator":"Exists"},{"key":"node.cloudprovider.kubernetes.io/uninitialized","operator":"Exists"}]operator.topologySpreadConstraints[]operator.unmanagedPodWatcher.intervalSeconds15operator.unmanagedPodWatcher.restarttrueoperator.unmanagedPodWatcher.selectorniloperator.updateStrategy{"rollingUpdate":{"maxSurge":"25%","maxUnavailable":"50%"},"type":"RollingUpdate"}pmtuDiscovery.enabledfalsepmtuDiscovery.packetizationLayerPMTUDMode"blackhole"podAnnotations{}podLabels{}podSecurityContext{"appArmorProfile":{"type":"Unconfined"},"seccompProfile":{"type":"Unconfined"}}podSecurityContext.appArmorProfilecilium-agent and init containers{"type":"Unconfined"}policyCIDRMatchModenilpolicyDenyResponse"none"policyEnforcementMode"default"pprof.address"localhost"pprof.blockProfileRate0pprof.enabledfalsepprof.mutexProfileFraction0pprof.port6060preflight.affinity{"podAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"k8s-app":"cilium"}},"topologyKey":"kubernetes.io/hostname"}]}}preflight.annotations{}preflight.enabledfalsepreflight.envoy.image{"digest":"sha256:ba0ab8adac082d50d525fd2c5ba096c8facea3a471561b7c61c7a5b9c2e0de0d","override":null,"pullPolicy":"IfNotPresent","repository":"quay.io/cilium/cilium-envoy","tag":"v1.36.6-1776000132-2437d2edeaf4d9b56ef279bd0d71127440c067aa","useDigest":true}preflight.extraEnv[]preflight.extraVolumeMounts[]preflight.extraVolumes[]preflight.image{"digest":"","override":null,"pullPolicy":"IfNotPresent","repository":"quay.io/cilium/cilium","tag":"v1.19.3","useDigest":false}preflight.nodeSelector{"kubernetes.io/os":"linux"}preflight.podAnnotations{}preflight.podDisruptionBudget.enabledfalsepreflight.podDisruptionBudget.maxUnavailable1preflight.podDisruptionBudget.minAvailablemaxUnavailable: nullnilpreflight.podDisruptionBudget.unhealthyPodEvictionPolicynilpreflight.podLabels{}preflight.podSecurityContext{}preflight.priorityClassName""preflight.readinessProbe.initialDelaySeconds5preflight.readinessProbe.periodSeconds5preflight.resources{}preflight.securityContext{"allowPrivilegeEscalation":false}preflight.terminationGracePeriodSeconds1preflight.tofqdnsPreCache--tofqdns-pre-cache file to.""preflight.tolerations[{"operator":"Exists"}]preflight.updateStrategy{"type":"RollingUpdate"}preflight.validateCNPstruepriorityClassName""prometheus{"controllerGroupMetrics":["write-cni-file","sync-host-ips","sync-lb-maps-with-k8s-services"],"enabled":false,"metrics":null,"metricsService":false,"port":9962,"serviceMonitor":{"annotations":{},"enabled":false,"interval":"10s","jobLabel":"","labels":{},"metricRelabelings":null,"relabelings":[{"action":"replace","replacement":"${1}","sourceLabels":["__meta_kubernetes_pod_node_name"],"targetLabel":"node"}],"scrapeTimeout":null,"trustCRDsExist":false}}prometheus.controllerGroupMetrics["write-cni-file","sync-host-ips","sync-lb-maps-with-k8s-services"]prometheus.metricsnilprometheus.serviceMonitor.annotations{}prometheus.serviceMonitor.enabledfalseprometheus.serviceMonitor.interval"10s"prometheus.serviceMonitor.jobLabel""prometheus.serviceMonitor.labels{}prometheus.serviceMonitor.metricRelabelingsnilprometheus.serviceMonitor.relabelings[{"action":"replace","replacement":"${1}","sourceLabels":["__meta_kubernetes_pod_node_name"],"targetLabel":"node"}]prometheus.serviceMonitor.scrapeTimeoutnilprometheus.serviceMonitor.trustCRDsExisttrue and helm will not check for monitoring.coreos.com/v1 CRDs before deployingfalserbac.createtruereadinessProbe.failureThreshold3readinessProbe.periodSeconds30resourceQuotas{"cilium":{"hard":{"pods":"10k"}},"enabled":false,"operator":{"hard":{"pods":"15"}}}resources{}rollOutCiliumPodsfalseroutingMode"tunnel"scheduling{"mode":"anti-affinity"}scheduling.modeanti-affinity mode applies a pod anti-affinity rule to the cilium daemonset. Pod anti-affinity may significantly impact scheduling throughput for large clusters. See: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity kube-scheduler mode forgoes the anti-affinity rule for full scheduling throughput. Kube-scheduler avoids host port conflict when scheduling pods.anti-affinitysctp{"enabled":false}sctp.enabledfalsesecretsNamespaceAnnotations{}secretsNamespaceLabels{}securityContext.allowPrivilegeEscalationfalsesecurityContext.capabilities.applySysctlOverwritesapply-sysctl-overwrites init container["SYS_ADMIN","SYS_CHROOT","SYS_PTRACE"]securityContext.capabilities.ciliumAgentcilium-agent container["CHOWN","KILL","NET_ADMIN","NET_RAW","IPC_LOCK","SYS_MODULE","SYS_ADMIN","SYS_RESOURCE","DAC_OVERRIDE","FOWNER","SETGID","SETUID","SYSLOG"]securityContext.capabilities.cleanCiliumStateclean-cilium-state init container["NET_ADMIN","SYS_MODULE","SYS_ADMIN","SYS_RESOURCE"]securityContext.capabilities.mountCgroupmount-cgroup init container["SYS_ADMIN","SYS_CHROOT","SYS_PTRACE"]securityContext.privilegedfalsesecurityContext.seLinuxOptionscilium-agent and init containers{"level":"s0","type":"spc_t"}serviceAccountsserviceAccounts.clustermeshcertgen{"annotations":{},"automount":true,"create":true,"name":"clustermesh-apiserver-generate-certs"}serviceAccounts.corednsMCSAPI{"annotations":{},"automount":true,"create":true,"name":"cilium-coredns-mcsapi-autoconfig"}serviceAccounts.hubblecertgen{"annotations":{},"automount":true,"create":true,"name":"hubble-generate-certs"}serviceAccounts.nodeinit.enabledfalseserviceAccounts.ztunnel{"annotations":{},"automount":false,"create":true,"name":"ztunnel-cilium"}serviceNoBackendResponse"reject"sleepAfterInitfalsesocketLB{"enabled":false}socketLB.enabledfalsestandaloneDnsProxy{"annotations":{},"automountServiceAccountToken":false,"debug":false,"enabled":false,"image":{"digest":"","override":null,"pullPolicy":"IfNotPresent","repository":"","tag":"","useDigest":false},"nodeSelector":{"kubernetes.io/os":"linux"},"rollOutPods":false,"serverPort":10095,"tolerations":[],"updateStrategy":{"rollingUpdate":{"maxSurge":2,"maxUnavailable":0},"type":"RollingUpdate"}}standaloneDnsProxy.annotations{}standaloneDnsProxy.automountServiceAccountTokenfalsestandaloneDnsProxy.debugfalsestandaloneDnsProxy.enabledfalsestandaloneDnsProxy.image{"digest":"","override":null,"pullPolicy":"IfNotPresent","repository":"","tag":"","useDigest":false}standaloneDnsProxy.nodeSelector{"kubernetes.io/os":"linux"}standaloneDnsProxy.rollOutPodsfalsestandaloneDnsProxy.serverPort10095standaloneDnsProxy.tolerations[]standaloneDnsProxy.updateStrategy{"rollingUpdate":{"maxSurge":2,"maxUnavailable":0},"type":"RollingUpdate"}startupProbe.failureThreshold300startupProbe.periodSeconds2synchronizeK8sNodestruesysctlfix{"enabled":true}sysctlfix.enabledsysctlfix utility can execute.trueterminationGracePeriodSeconds1tls{"ca":{"cert":"","certValidityDuration":1095,"key":""},"caBundle":{"enabled":false,"key":"ca.crt","name":"cilium-root-ca.crt","useSecret":false},"readSecretsOnlyFromSecretsNamespace":null,"secretSync":{"enabled":null},"secretsBackend":null,"secretsNamespace":{"create":true,"name":"cilium-secrets"}}tls.ca{"cert":"","certValidityDuration":1095,"key":""}tls.ca.cert""tls.ca.certValidityDuration1095tls.ca.key""tls.caBundle{"enabled":false,"key":"ca.crt","name":"cilium-root-ca.crt","useSecret":false}tls.caBundle.enabledfalsetls.caBundle.key"ca.crt"tls.caBundle.name"cilium-root-ca.crt"tls.caBundle.useSecretfalsetls.readSecretsOnlyFromSecretsNamespacetls.secretsNamespace for CiliumNetworkPolicy relevant Secrets. If false, the Cilium Agent will be granted READ (GET/LIST/WATCH) access to all secrets in the entire cluster. This is not recommended and is included for backwards compatibility. This value obsoletes tls.secretsBackend\ , with true == local in the old setting, and false == k8s.niltls.secretSync{"enabled":null}tls.secretSync.enabledniltls.secretsBackendtls.readSecretsOnlyFromSecretsNamespace instead. Possible values: - local - k8sniltls.secretsNamespace{"create":true,"name":"cilium-secrets"}tls.secretsNamespace.createtruetls.secretsNamespace.name"cilium-secrets"tmpVolume{}tolerations[{"operator":"Exists"}]tunnelPorttunnelProtocol"vxlan"tunnelSourcePortRangeunderlayProtocol"ipv4"updateStrategy{"rollingUpdate":{"maxUnavailable":2},"type":"RollingUpdate"}upgradeCompatibilitynilvtep.cidr""vtep.enabledfalsevtep.endpoint""vtep.mac""vtep.mask""waitForKubeProxyfalsewellKnownIdentities.enabledfalse