yk8s.miscellaneous
This section contains various configuration options for special use cases. You won’t need to enable and adjust any of these under normal circumstances.
yk8s.miscellaneous.apt_proxy_url
APT Proxy Configuration As a secondary effect, https repositories are not used, since those don’t work with caching proxies like apt-cacher-ng.
Type::
null or non-empty string
Default::
null
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.check_openstack_credentials
OpenStack credential checks Terrible things will happen when certain tasks are run and OpenStack credentials are not sourced. Okay, maybe not so terrible after all, but the templates do not check if certain values exist. Hence config files with empty credentials are written. The LCM will execute a simple check to see if you provided valid credentials as a sanity check iff you’re on openstack and the flag below is set to True.
Type::
boolean
Default::
true
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.cluster_behind_proxy
Whether to enable the cluster will be placed behind a HTTP proxy. If unconfigured images will be used to setup the cluster, the updates of package sources, the download of docker images and the initial cluster setup will fail. NOTE: These chances are currently only tested for Debian-based operating systems and not for RHEL-based! .
Type::
boolean
Default::
false
Example::
true
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.container_mirror_default_host
Type::
non-empty string
Default::
"install-node"
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.container_mirrors
Type::
list of (submodule)
Default::
[ ]
Example::
[
{
name = "docker.io";
port = 5000;
upstream = "https://registry-1.docker.io/";
}
{
mirrors = [
"https://install-node:8000"
];
name = "gitlab.cloudandheat.com";
upstream = "https://registry.gitlab.cloudandheat.com/";
}
]
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.container_mirrors.*.mirrors
Type::
list of non-empty string
Default::
[ ]
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.container_mirrors.*.name
Type::
non-empty string
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.container_mirrors.*.port
Type::
null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default::
null
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.container_mirrors.*.upstream
Type::
non-empty string
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.custom_chrony_configuration
Whether to enable custom Chrony configration The ntp servers used by chrony can be customized if it should be necessary or wanted. A list of pools and/or servers can be specified. Chrony treats both similarily but it expects that a pool will resolve to several ntp servers. .
Type::
boolean
Default::
false
Example::
true
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.custom_ntp_pools
A list of NTP pools.
Type::
list of non-empty string
Default::
[ ]
Example::
[
"0.pool.ntp.example.org"
"1.pool.ntp.example.org"
]
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.custom_ntp_servers
A list of NTP servers.
Type::
list of non-empty string
Default::
[ ]
Example::
[
"0.server.ntp.example.org"
"1.server.ntp.example.org"
]
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.docker_insecure_registries
Custom Docker Configuration A list of insecure registries that can be accessed without TLS verification.
Type::
list of non-empty string
Default::
[ ]
Example::
[
"0.docker-registry.example.org"
"1.docker-registry.example.org"
]
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.docker_registry_mirrors
Custom Docker Configuration A list of registry mirrors can be configured as a pull through cache to reduce external network traffic and the amount of docker pulls from dockerhub.
Type::
list of non-empty string
Default::
[ ]
Example::
[
"https://0.docker-mirror.example.org"
"https://1.docker-mirror.example.org"
]
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.haproxy_frontend_k8s_api_maxconn
Type::
positive integer, meaning >0
Default::
2000
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.haproxy_frontend_nodeport_maxconn
Type::
positive integer, meaning >0
Default::
2000
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.hosts_file
A custom hosts file in case terraform is disabled
Type::
null or path in the Nix store
Default::
null
Example::
"hosts_file = ./hosts;"
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.http_proxy
Set the approriate HTTP proxy settings for your cluster here. E.g. the address of the proxy or internal docker repositories can be added to the no_proxy config entry Important note: Settings for the yaook-k8s cluster itself (like the service subnet or the pod subnet) will be set automagically and do not have to set manually here.
Type::
null or non-empty string
Default::
null
Example::
"http://proxy.example.com:8889"
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.https_proxy
Set the approriate HTTP proxy settings for your cluster here. E.g. the address of the proxy or internal docker repositories can be added to the no_proxy config entry Important note: Settings for the yaook-k8s cluster itself (like the service subnet or the pod subnet) will be set automagically and do not have to set manually here.
Type::
null or non-empty string
Default::
null
Example::
"https://proxy.example.com:8889"
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.no_proxy
Set the approriate HTTP proxy settings for your cluster here. E.g. the address of the proxy or internal docker repositories can be added to the no_proxy config entry Important note: Settings for the yaook-k8s cluster itself (like the service subnet or the pod subnet) will be set automagically and do not have to set manually here.
Type::
null or non-empty string
Default::
null
Example::
"localhost,127.0.0.0/8"
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.openstack_connect_use_helm
Use the helm chart to deploy the CCM and the cinder csi plugin. If openstack_connect_use_helm is false the deployment will be done with the help of the deprecated manifest code. This will be enforced for clusters with Kubernetes >= v1.29 and the deprecated manifest code will be dropped along with Kubernetes v1.28
Type::
boolean
Default::
true
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.openstack_network_name
Name of the internal OpenStack network. This field becomes important if a VM is attached to two networks but the controller-manager should only pick up one. If you don’t understand the purpose of this field, there’s a very high chance you won’t need to touch it/uncomment it. Note: This network name isn’t fetched automagically (by terraform) on purpose because there might be situations where the CCM should not pick the managed network.
Type::
null or non-empty string
Default::
null
Example::
"\${config.yk8s.terraform.cluster_name}-network"
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.subnet_cidr
In case it is not set via terraform
Type::
null or string matching the pattern ^((25[0-5]|(2[0-4]|1[0-9]|[1-9]|)[0-9]).){3}(25[0-5]|(2[0-4]|1[0-9]|[1-9]|)[0-9])/([0-9]|[12][0-9]|3[0-2])$
Default::
null
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.vm_max_map_count
Value for the kernel parameter vm.max_map_count on k8s nodes. Modifications might be required depending on the software running on the nodes (e.g., ElasticSearch). If you leave the value commented out you’re fine and the system’s default will be kept.
Type::
signed integer
Default::
262144
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix
yk8s.miscellaneous.wireguard_on_workers
Whether to enable to install wireguard on all workers (without setting up any server-side stuff) so that it can be used from within Pods. .
Type::
boolean
Default::
false
Example::
true
Declared by https://gitlab.com/yaook/k8s/-/tree/devel/nix/yk8s/miscellaneous.nix