forked from istio/tools
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathvalues.yaml
53 lines (44 loc) · 1.25 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
# for client side setting, IP Ranges is server side service or pod
excludeOutboundIPRanges: ""
includeOutboundIPRanges: ""
appresources: {}
proxy:
cpu: "1000m"
memory: "512Mi"
image: ""
appresources1:
requests:
cpu: "1500m"
memory: "1000Mi"
fortioImage: fortio/fortio:latest_release
curlImage: cfmanteiga/alpine-bash-curl-jq:latest
nighthawkImage: envoyproxy/nighthawk-dev:59683b759eb8f8bd8cce282795c08f9e2b3313d4
domain: local
gateway: fortio-gateway
rbac:
# If true, generates random RBAC policies for the fortio service.
enabled: false
# Number of RBAC policies generated.
# Note: The generated policies will have a random name. One of the policies allows everyone to access fortioserver and
# the other policies allow a random non exist user to access it.
numPolicies: 3
server: # server overrides
#tlsmode: DISABLE
tlsmode: ISTIO_MUTUAL
expose: false
inject: "false"
injectL: "disabled" # "enabled" or "disabled"
replica: 1 # default value
client: # client overrides
#tlsmode: DISABLE
tlsmode: ISTIO_MUTUAL
expose: true
inject: "false"
injectL: "disabled" # "enabled" or "disabled"
replica: 1 # default value
cert:
client: false
server: false
interceptionMode: REDIRECT
namespace: ""
loadGenType: ""