You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
efs_storage_class_enabled=false# to enable EBS storage class
56
-
efs_version="2.3.2"
56
+
efs_version="3.1.8"
57
57
58
58
## SERVICE-MONITORING-CRDs
59
59
service_monitor_crd_enabled=false# enable service monitor along with K8S-dashboard (required CRD) or when require service monitor in reloader and cert-manager
60
60
61
61
## METRIC-SERVER
62
62
metrics_server_enabled=false# to enable metrics server
Copy file name to clipboardExpand all lines: modules/aws-ebs-csi-driver/main.tf
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ module "helm_addon" {
36
36
name = local.name
37
37
description ="The Amazon Elastic Block Store Container Storage Interface (CSI) Driver provides a CSI interface used by Container Orchestrators to manage the lifecycle of Amazon EBS volumes."
| <aname="input_chart_version"></a> [chart\_version](#input\_chart\_version)| aws efs addons helm version |`string`|`"3.1.8"`| no |
36
36
| <aname="input_helm_config"></a> [helm\_config](#input\_helm\_config)| Helm provider config for the aws\_efs\_csi\_driver. |`any`|`{}`| no |
37
37
| <aname="input_irsa_policies"></a> [irsa\_policies](#input\_irsa\_policies)| Additional IAM policies for a IAM role for service accounts |`list(string)`|`[]`| no |
38
38
| <aname="input_manage_via_gitops"></a> [manage\_via\_gitops](#input\_manage\_via\_gitops)| Determines if the add-on should be managed via GitOps. |`bool`|`false`| no |
# Allows people to override tag if they don't want to use the app version
17
26
tag:
18
27
pullPolicy: Always
@@ -121,22 +130,18 @@ rbac:
121
130
create: true
122
131
123
132
serviceAccount:
124
-
# Specifies whether a service account should be created
125
-
create: true
126
-
# The name of the service account to use.
127
-
# If not set and create is true, a name is generated using the fullname template
128
-
name: keda-operator
129
-
# Specifies whether a service account should automount API-Credentials
130
-
automountServiceAccountToken: true
131
-
# Annotations to add to the service account
132
-
annotations: {}
133
+
operator:
134
+
# Specifies whether a service account should be created
135
+
create: true
136
+
# The name of the service account to use.
137
+
# If not set and create is true, a name is generated using the fullname template
138
+
name: keda-operator
139
+
# Specifies whether a service account should automount API-Credentials
140
+
automountServiceAccountToken: true
141
+
# Annotations to add to the service account
142
+
annotations: {}
133
143
134
144
podIdentity:
135
-
activeDirectory:
136
-
# Set to the value of the Azure Active Directory Pod Identity
137
-
# See https://keda.sh/docs/concepts/authentication/#azure-pod-identity
138
-
# This will be set as a label on the KEDA Pod(s)
139
-
identity: ""
140
145
azureWorkload:
141
146
# Set to true to enable Azure Workload Identity usage.
142
147
# See https://keda.sh/docs/concepts/authentication/#azure-workload-identity
@@ -166,7 +171,6 @@ podIdentity:
166
171
# Set to the value of the service account token expiration duration.
167
172
# This will be set as an annotation on the KEDA service account.
168
173
tokenExpiration: 86400
169
-
170
174
# Set this if you are using an external scaler and want to communicate
171
175
# over TLS (recommended). This variable holds the name of the secret that
172
176
# will be mounted to the /grpccerts path on the Pod
@@ -255,8 +259,6 @@ podSecurityContext:
255
259
256
260
service:
257
261
type: ClusterIP
258
-
portHttp: 80
259
-
portHttpTarget: 8080
260
262
portHttps: 443
261
263
portHttpsTarget: 6443
262
264
@@ -292,7 +294,6 @@ resources:
292
294
nodeSelector: {}
293
295
294
296
tolerations: []
295
-
296
297
# -- Pod Topology Constraints https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
297
298
topologySpreadConstraints: {}
298
299
# operator: []
@@ -349,7 +350,7 @@ volumes:
349
350
prometheus:
350
351
metricServer:
351
352
enabled: false
352
-
port: 9022
353
+
port: 8080
353
354
portName: metrics
354
355
path: /metrics
355
356
serviceMonitor:
@@ -359,17 +360,23 @@ prometheus:
359
360
targetLabels: []
360
361
podTargetLabels: []
361
362
port: metrics
362
-
targetPort:
363
-
interval:
364
-
scrapeTimeout:
363
+
# -- Name or number of the target port of the Pod behind the Service, the port must be specified with container port property. Mutually exclusive with port
364
+
targetPort: ""
365
+
# -- Interval at which metrics should be scraped If not specified Prometheus’ global scrape interval is used.
366
+
interval: ""
367
+
# -- Timeout after which the scrape is ended If not specified, the Prometheus global scrape timeout is used unless it is less than Interval in which the latter is used
368
+
scrapeTimeout: ""
365
369
relabellings: []
366
370
additionalLabels: {}
367
371
podMonitor:
368
372
# Enables PodMonitor creation for the Prometheus Operator
369
373
enabled: false
370
-
interval:
371
-
scrapeTimeout:
372
-
namespace:
374
+
# -- Scraping interval for metric server using podMonitor crd (prometheus operator)
375
+
interval: ""
376
+
# -- Scraping timeout for metric server using podMonitor crd (prometheus operator)
377
+
scrapeTimeout: ""
378
+
# -- Scraping namespace for metric server using podMonitor crd (prometheus operator)
379
+
namespace: ""
373
380
additionalLabels: {}
374
381
relabelings: []
375
382
operator:
@@ -382,17 +389,24 @@ prometheus:
382
389
targetLabels: []
383
390
podTargetLabels: []
384
391
port: metrics
385
-
targetPort:
386
-
interval:
387
-
scrapeTimeout:
392
+
# -- Name or number of the target port of the Pod behind the Service,
393
+
# the port must be specified with container port property. Mutually exclusive with port
394
+
targetPort: ""
395
+
# -- Interval at which metrics should be scraped If not specified Prometheus’ global scrape interval is used.
396
+
interval: ""
397
+
# -- Timeout after which the scrape is ended If not specified, the Prometheus global scrape timeout is used unless it is less than Interval in which the latter is used
398
+
scrapeTimeout: ""
388
399
relabellings: []
389
400
additionalLabels: {}
390
401
podMonitor:
391
402
# Enables PodMonitor creation for the Prometheus Operator
392
403
enabled: false
393
-
interval:
394
-
scrapeTimeout:
395
-
namespace:
404
+
# -- Scraping interval for KEDA Operator using podMonitor crd (prometheus operator)
405
+
interval: ""
406
+
# -- Scraping timeout for KEDA Operator using podMonitor crd (prometheus operator)
407
+
scrapeTimeout: ""
408
+
# -- Scraping namespace for KEDA Operator using podMonitor crd (prometheus operator)
409
+
namespace: ""
396
410
additionalLabels: {}
397
411
relabelings: []
398
412
prometheusRules:
@@ -419,9 +433,12 @@ prometheus:
419
433
targetLabels: []
420
434
podTargetLabels: []
421
435
port: metrics
422
-
targetPort:
423
-
interval:
424
-
scrapeTimeout:
436
+
# -- Name or number of the target port of the Pod behind the Service, the port must be specified with container port property. Mutually exclusive with port
437
+
targetPort: ""
438
+
# -- Interval at which metrics should be scraped If not specified Prometheus’ global scrape interval is used.
439
+
interval: ""
440
+
# -- Timeout after which the scrape is ended If not specified, the Prometheus global scrape timeout is used unless it is less than Interval in which the latter is used
0 commit comments