@@ -6,16 +6,13 @@ replicaCount: 2
6
6
7
7
image :
8
8
repository : 602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon/aws-load-balancer-controller
9
- tag : v2.2.0
9
+ tag : v2.4.4
10
10
pullPolicy : IfNotPresent
11
11
12
12
imagePullSecrets : []
13
13
nameOverride : " "
14
14
fullnameOverride : " "
15
15
16
- # The name of the Kubernetes cluster. A non-empty value is required
17
- clusterName : test-cluster
18
-
19
16
serviceAccount :
20
17
# Specifies whether a service account should be created
21
18
create : true
@@ -26,6 +23,9 @@ serviceAccount:
26
23
name :
27
24
# Automount API credentials for a Service Account.
28
25
automountServiceAccountToken : true
26
+ # List of image pull secrets to add to the Service Account.
27
+ imagePullSecrets :
28
+ # - name: docker
29
29
30
30
rbac :
31
31
# Specifies whether rbac resources should be created
@@ -61,30 +61,70 @@ nodeSelector: {}
61
61
62
62
tolerations : []
63
63
64
+ # affinity specifies a custom affinity for the controller pods
64
65
affinity : {}
65
66
67
+ # configureDefaultAffinity specifies whether to configure a default affinity for the controller pods to prevent
68
+ # co-location on the same node. This will get ignored if you specify a custom affinity configuration.
69
+ configureDefaultAffinity : true
70
+
66
71
# topologySpreadConstraints is a stable feature of k8s v1.19 which provides the ability to
67
72
# control how Pods are spread across your cluster among failure-domains such as regions, zones,
68
73
# nodes, and other user-defined topology domains.
69
- #
74
+ #
70
75
# more details here: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
71
76
topologySpreadConstraints : {}
72
77
78
+ updateStrategy :
79
+ type : RollingUpdate
80
+ rollingUpdate :
81
+ maxSurge : 1
82
+ maxUnavailable : 1
83
+
84
+ # serviceAnnotations contains annotations to be added to the provisioned webhook service resource
85
+ serviceAnnotations : {}
86
+
87
+ # deploymentAnnotations contains annotations for the controller deployment
73
88
deploymentAnnotations : {}
74
89
75
90
podAnnotations : {}
76
91
77
92
podLabels : {}
78
93
94
+ # additionalLabels -- Labels to add to each object of the chart.
79
95
additionalLabels : {}
80
96
81
97
# Enable cert-manager
82
98
enableCertManager : false
83
99
100
+ # The name of the Kubernetes cluster. A non-empty value is required
101
+ clusterName : test-cluster
102
+
103
+ # cluster contains configurations specific to the kubernetes cluster
104
+ cluster :
105
+ # Cluster DNS domain (required for requesting TLS certificates)
106
+ dnsDomain : cluster.local
107
+
84
108
# The ingress class this controller will satisfy. If not specified, controller will match all
85
109
# ingresses without ingress class annotation and ingresses of type alb
86
110
ingressClass : alb
87
111
112
+ # ingressClassParams specify the IngressCLassParams that enforce settings for a set of Ingresses when using with ingress Controller.
113
+ ingressClassParams :
114
+ create : true
115
+ # The name of ingressClassParams resource will be referred in ingressClass
116
+ name :
117
+ spec : {}
118
+ # You always can set specifications in `helm install` command through `--set` or `--set-string`
119
+ # If you do want to specify specifications in values.yaml, uncomment the following
120
+ # lines, adjust them as necessary, and remove the curly braces after 'spec:'.
121
+ # namespaceSelector:
122
+ # matchLabels:
123
+ # group:
124
+ # scheme:
125
+ # ipAddressType:
126
+ # tags:
127
+
88
128
# To use IngressClass resource instead of annotation, before you need to install the IngressClass resource pointing to controller.
89
129
# If specified as true, the IngressClass resource will be created.
90
130
createIngressClassResource : true
@@ -95,9 +135,19 @@ region:
95
135
# The VPC ID for the Kubernetes cluster. Set this manually when your pods are unable to use the metadata service to determine this automatically
96
136
vpcId :
97
137
138
+ # Custom AWS API Endpoints (serviceID1=URL1,serviceID2=URL2)
139
+ awsApiEndpoints :
140
+
141
+ # awsApiThrottle specifies custom AWS API throttle settings (serviceID1:operationRegex1=rate:burst,serviceID2:operationRegex2=rate:burst)
142
+ # example: --set awsApiThrottle="{Elastic Load Balancing v2:RegisterTargets|DeregisterTargets=4:20,Elastic Load Balancing v2:.*=10:40}"
143
+ awsApiThrottle :
144
+
98
145
# Maximum retries for AWS APIs (default 10)
99
146
awsMaxRetries :
100
147
148
+
149
+
150
+
101
151
# If enabled, targetHealth readiness gate will get injected to the pod spec for the matching endpoint pods (default true)
102
152
enablePodReadinessGateInject :
103
153
@@ -122,12 +172,31 @@ metricsBindAddr: ""
122
172
# The TCP port the Webhook server binds to. (default 9443)
123
173
webhookBindPort :
124
174
175
+ # webhookTLS specifies TLS cert/key for the webhook
176
+ webhookTLS :
177
+ caCert :
178
+ cert :
179
+ key :
180
+
181
+ # array of namespace selectors for the webhook
182
+ webhookNamespaceSelectors :
183
+ - key : elbv2.k8s.aws/pod-readiness-gate-inject
184
+ operator : In
185
+ values :
186
+ - enabled
187
+
188
+ # keepTLSSecret specifies whether to reuse existing TLS secret for chart upgrade
189
+ keepTLSSecret : true
190
+
125
191
# Maximum number of concurrently running reconcile loops for service (default 3)
126
192
serviceMaxConcurrentReconciles :
127
193
128
194
# Maximum number of concurrently running reconcile loops for targetGroupBinding
129
195
targetgroupbindingMaxConcurrentReconciles :
130
196
197
+ # Maximum duration of exponential backoff for targetGroupBinding reconcile failures
198
+ targetgroupbindingMaxExponentialBackoffDelay :
199
+
131
200
# Period at which the controller forces the repopulation of its local object stores. (default 1h0m0s)
132
201
syncPeriod :
133
202
@@ -157,6 +226,8 @@ livenessProbe:
157
226
# We strongly discourage programming access credentials in the controller environment. You should setup IRSA or
158
227
# comparable solutions like kube2iam, kiam etc instead.
159
228
env :
229
+ # ENV_1: ""
230
+ # ENV_2: ""
160
231
161
232
# Specifies if aws-load-balancer-controller should be started in hostNetwork mode.
162
233
#
@@ -174,20 +245,20 @@ dnsPolicy:
174
245
175
246
# extraVolumeMounts are the additional volume mounts. This enables setting up IRSA on non-EKS Kubernetes cluster
176
247
extraVolumeMounts :
177
- - name : aws-iam-token
178
- mountPath : /var/run/secrets/eks.amazonaws.com/serviceaccount
179
- readOnly : true
248
+ - name : aws-iam-token
249
+ mountPath : /var/run/secrets/eks.amazonaws.com/serviceaccount
250
+ readOnly : true
180
251
181
252
# extraVolumes for the extraVolumeMounts. Useful to mount a projected service account token for example.
182
253
extraVolumes :
183
- - name : aws-iam-token
184
- projected :
185
- defaultMode : 420
186
- sources :
187
- - serviceAccountToken :
188
- audience : sts.amazonaws.com
189
- expirationSeconds : 86400
190
- path : token
254
+ - name : aws-iam-token
255
+ projected :
256
+ defaultMode : 420
257
+ sources :
258
+ - serviceAccountToken :
259
+ audience : sts.amazonaws.com
260
+ expirationSeconds : 86400
261
+ path : token
191
262
192
263
# defaultTags are the tags to apply to all AWS resources managed by this controller
193
264
defaultTags :
@@ -201,3 +272,55 @@ podDisruptionBudget:
201
272
202
273
# externalManagedTags is the list of tag keys on AWS resources that will be managed externally
203
274
externalManagedTags : []
275
+
276
+ # enableEndpointSlices enables k8s EndpointSlices for IP targets instead of Endpoints (default false)
277
+ enableEndpointSlices :
278
+
279
+ # enableBackendSecurityGroup enables shared security group for backend traffic (default true)
280
+ enableBackendSecurityGroup :
281
+
282
+ # backendSecurityGroup specifies backend security group id (default controller auto create backend security group)
283
+ backendSecurityGroup :
284
+
285
+ # disableRestrictedSecurityGroupRules specifies whether to disable creating port-range restricted security group rules for traffic
286
+ disableRestrictedSecurityGroupRules :
287
+
288
+ # controllerConfig specifies controller configuration
289
+ controllerConfig :
290
+ # featureGates set of key: value pairs that describe AWS load balance controller features
291
+ featureGates : {}
292
+ # ServiceTypeLoadBalancerOnly: true
293
+ # EndpointsFailOpen: true
294
+
295
+ # objectSelector for webhook
296
+ objectSelector :
297
+ matchExpressions :
298
+ # - key: <key>
299
+ # operator: <operator>
300
+ # values:
301
+ # - <value>
302
+ matchLabels :
303
+ # key: value
304
+
305
+ serviceMonitor :
306
+ # Specifies whether a service monitor should be created
307
+ enabled : false
308
+ # Labels to add to the service account
309
+ additionalLabels : {}
310
+ # Prometheus scrape interval
311
+ interval : 1m
312
+ # Namespace to create the service monitor in
313
+ namespace :
314
+
315
+ # clusterSecretsPermissions lets you configure RBAC permissions for secret resources
316
+ # Access to secrets resource is required only if you use the OIDC feature, and instead of
317
+ # enabling access to all secrets, we recommend configuring namespaced role/rolebinding.
318
+ # This option is for backwards compatibility only, and will potentially be deprecated in future.
319
+ clusterSecretsPermissions :
320
+ # allowAllSecrets allows the controller to access all secrets in the cluster.
321
+ # This is to get backwards compatible behavior, but *NOT* recommended for security reasons
322
+ allowAllSecrets : false
323
+
324
+ # ingressClassConfig contains configurations specific to the ingress class
325
+ ingressClassConfig :
326
+ default : false
0 commit comments