Skip to content

Commit 14f850c

Browse files
author
Ted Avery
committed
OSDOCS-14402:YAML parameter additions
1 parent f055de4 commit 14f850c

File tree

1 file changed

+59
-8
lines changed

1 file changed

+59
-8
lines changed

modules/microshift-config-parameters-table.adoc

Lines changed: 59 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ The following table explains {microshift-short} configuration YAML parameters an
6363

6464
|`tls.minVersion`
6565
|`VersionTLS12` or `VersionTLS13`
66-
|Specifies the minimum version of TLS to serve from the API serve. Default is value is `VersionTLS12`. TLS 1.3 ciphers are preset and not configurable.
66+
|Specifies the minimum version of TLS to serve from the API server. Default is value is `VersionTLS12`. TLS 1.3 ciphers are preset and not configurable.
6767

6868
|`debugging.logLevel`
6969
|`Normal`, `Debug`, `Trace`, or `TraceAll`
@@ -77,15 +77,36 @@ The following table explains {microshift-short} configuration YAML parameters an
7777
|`number`
7878
|By default, `etcd` uses as much memory as needed to handle the load on the system. However, in memory constrained systems, it might be preferred or necessary to limit the amount of memory `etcd` can to use at a given time.
7979

80+
|`ingress.certificate.Secret`
81+
|`string`
82+
|A string that is a reference to a secret that contains the default certificate that is served by the Ingress Controller. When Routes do not specify their own certificate, `certificateSecret` is used.
83+
84+
The secret must contain the following keys and data:
85+
86+
* `tls.crt`: certificate file contents
87+
* `tls.key`: key file contents
88+
89+
If do not set one, a wildcard certificate is automatically generated and used. The certificate is valid for the Ingress Controller `domain` and `subdomains`, and the generated certificate's CA is automatically integrated with the cluster's truststore.
90+
91+
Any certificate in use is automatically integrated in the {microshift-short} OAth server.
92+
93+
|`ingress.clientTLS`
94+
|`spec.clientTLS.clientCertificatePolicy`, `spec.clientTLS.ClientCA`, `AllowedSubjectPatterns`
95+
|`clientTLS` authenticates client access to the cluster and services; as a result, mutual TLS authentication is enabled. If you do not set one, then client TLS is not enabled. `clientTLS` has the required subfields, `spec.clientTLS.clientCertificatePolicy` and `spec.clientTLS.ClientCA`.
96+
97+
The `ClientCertificatePolicy` subfield accepts one of the two values: `Required` or `Optional`. Note that the ingress controller only checks client certificates for edge-terminated and reencrypt TLS routes; it cannot check certificates for cleartext HTTP or passthrough TLS routes. The `ClientCA` subfield specifies a config map that is in the openshift-ingress namespace. The config map should contain a CA certificate bundle. A config map is required for this field.
98+
99+
The `AllowedSubjectPatterns` is an optional value that specifies a list of regular expressions, which are matched against the distinguished name on a valid client certificate to filter requests. The regular expressions must use PCRE syntax. This field must contain a valid expression or the MicroShift service will fail. At least one pattern must match a client certificate's distinguished name; otherwise, the Ingress Controller rejects the certificate and denies the connection. If you do not specify a value, the Ingress Controller does not reject certificates based on the distinguished name.
100+
80101
|`ingress.defaultHTTPVersion`
81102
|`number`
82103
|Determines the default HTTP version to be used for ingress. Default value is `1`, which is the HTTP/1.1 protocol.
83104

84105
|`ingress.forwardedHeaderPolicy`
85106
|`Append`, `Replace`, `IfNone`, `Never`
86-
|Specifies when and how the ingress router sets the `Forwarded`, `X-Forwarded-For`, `X-Forwarded-Host`, `X-Forwarded-Port`, `X-Forwarded-Proto`, and `X-Forwarded-Proto-Version` HTTP headers.
107+
|Specifies when and how the ingress router sets the `Forwarded`, `X-Forwarded-For`, `X-Forwarded-Host`, `X-Forwarded-Port`, `X-Forwarded-Proto`, and `X-Forwarded-Proto-Version` HTTP headers. The default value is `Append`.
87108

88-
* `Append` specifies that the ingress router appends existing headers. `Append` is the default value.
109+
* `Append` specifies that the ingress router appends existing headers.
89110
90111
* `Replace` specifies that the ingress router sets the headers and replaces any existing `Forwarded` or `X-Forwarded-*` headers.
91112
@@ -95,7 +116,7 @@ The following table explains {microshift-short} configuration YAML parameters an
95116
96117
|`ingress.httpCompression`
97118
|`object`
98-
|`httpCompression` defines a policy for HTTP traffic compression. There is no HTTP compression by default.
119+
|Defines a policy for HTTP traffic compression. There is no HTTP compression by default.
99120

100121
|`ingress.httpCompression.mimeTypes`
101122
|`array` or null
@@ -129,7 +150,7 @@ Not all MIME types benefit from compression, but `HAProxy` uses resources to try
129150

130151
|`ingress.logEmptyRequests`
131152
|`Log` or `Ignore`
132-
|Default value is `Log`. Specifies how connections on which empty requests are received are logged. These connections typically come from the health probes of a load balancer service health or a web browser's speculative connections, such as a `preconnect`. Logging typical requests might be undesirable, but requests can also be caused by network errors or port scans, in which case logging can be useful for diagnosing errors and detecting intrusion attempts.
153+
|The default value is `Log`. Specifies how connections on which empty requests are received are logged. These connections typically come from the health probes of a load balancer service health or a web browser's speculative connections, such as a `preconnect`. Logging typical requests might be undesirable, but requests can also be caused by network errors or port scans, in which case logging can be useful for diagnosing errors and detecting intrusion attempts.
133154

134155
|`ingress.ports.http`
135156
|`80`
@@ -139,14 +160,44 @@ Not all MIME types benefit from compression, but `HAProxy` uses resources to try
139160
|`443`
140161
|Default port shown. Configurable. Valid value is a single, unique port in the `1-65535` range. The values of the `ports.http` and `ports.https` fields cannot be the same.
141162

142-
|`ingress.routeAdmissionPolicy.namespaceOwnership`
163+
//Has this parameter been renamed to 'ingress.routeAdmission'?
164+
165+
|`ingress.routeAdmissionPolicy`
143166
|`Strict` or `InterNamespaceAllowed`
144-
|Describes how hostname claims across namespaces are handled. By default, allows routes to claim different paths of the same hostname across namespaces. Specifying `Strict` prevents routes in different namespaces from claiming the same hostname. If the value is deleted in a customized {microshift-short} `config.yaml`, the `InterNamespaceAllowed` value is automatically set.
167+
|Defines a policy for handling new route claims, such as allowing or denying claims across namespaces. By default, allows routes to claim different paths of the same hostname across namespaces. Specifying `Strict` prevents routes in different namespaces from claiming the same hostname. If the value is deleted in a customized {microshift-short} `config.yaml`, the `InterNamespaceAllowed` value is automatically set.
168+
169+
|`ingress.routeAdmissionPolicy.wildcardPolicy`
170+
|`WildcardsAllowed`, `WildcardsDisallowed`
171+
|Describes how routes with wildcard policies are handled by the Ingress Controller.
172+
173+
* `WildcardsAllowed`: Indicates routes with any wildcard policy are admitted by the Ingress Controller.
174+
175+
* `WildcardsDisallowed`: Indicates only routes with a wildcard policy of `None` are admitted by the Ingress Controller. Updating `wildcardPolicy` from `WildcardsAllowed` to `WildcardsDisallowed` causes admitted routes with a wildcard policy of `Subdomain` to stop working. These routes must be recreated to a wildcard policy of `None` to be readmitted by the Ingress Controller. `WildcardsDisallowed` is the default setting.
145176
146177
|`ingress.status`
147178
|`Managed` or `Removed`
148179
|Router status. Default is `Managed`.
149180

181+
|`ingress.tlsSecurityProfile`
182+
|`object`
183+
|Specifies settings for TLS connections for Ingress Controllers. If you do not set one, the default value is based on the `apiservers.config.openshift.io/cluster` resource.
184+
185+
|`ingress.tlsSecurityProfile.type`
186+
|`Old`, `Intermediate`, `Modern`, 'Custom'
187+
|Specifies the profile type for the TLS Security.
188+
189+
When using the `Old`, `Intermediate`, and `Modern` profile types, the effective profile configuration is subject to change between releases. For example, given a specification to use the `Intermediate` profile deployed on release `X.Y.Z`, an upgrade to release `X.Y.Z+1` may cause a new profile configuration to be applied to the Ingress Controller, resulting in a rollout.
190+
191+
|`ingress.tlsSecurityProfile.minTLSVersion`
192+
|`number`
193+
|Specifies the TLS version for Ingress Controllers.
194+
195+
The minimum TLS version is `1.1`, and the maximum TLS version is `1.3`.
196+
197+
* Ciphers and the minimum TLS version of the configured security profile are reflected in the `TLSProfile` status.
198+
199+
* The Ingress Controller converts the TLS `1.0` of an `Old` or `Custom` profile to `1.1`.
200+
150201
|`ingress.tuningOptions`
151202
|Objects
152203
|Specifies options for tuning the performance of ingress controller pods.
@@ -259,7 +310,7 @@ container_memory_working_set_bytes{container=`router`,namespace=`openshift-ingre
259310

260311
|`network.serviceNodePortRange`
261312
|`range`
262-
|The port range allowed for Kubernetes services of type `NodePort`. If not specified, the default range of 30000-32767 is used. Services without a `NodePort` specified are automatically allocated one from this range. This parameter can be updated after {microshift-short} starts.
313+
|The port range allowed for Kubernetes services of type `NodePort`. If you do not specify the range, the default range of 30000-32767 is used. Services without a `NodePort` specified are automatically allocated one from this range. This parameter can be updated after {microshift-short} starts.
263314

264315
|`node.hostnameOverride`
265316
|`string`

0 commit comments

Comments
 (0)