-
Notifications
You must be signed in to change notification settings - Fork 9
/
Copy pathvalues.yaml
187 lines (180 loc) · 5.16 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
global:
# Uncomment and set these if you need to use privileged
# service accounts for s6-overlay's UID/GID switching
# at initialization time
# serviceAccount: "default"
shardCount: 1
ingress:
enabled: true
hosts: []
# class:
tls:
enabled: true
secretName: jitsi-tls
# certManagerClusterIssuer
annotations: {}
extraPaths: []
extraLabels: {}
haproxy:
image: haproxy:2.4
extraPodSpec: {}
extraLabels: {}
jicofo:
imagePullPolicy: Always
resources:
requests:
cpu: 400m
memory: 400Mi
extraEnvs: []
extraPodSpec: {}
extraLabels: {}
extraAnnotations: {}
extraContainerSpec: {}
extraVolumes: []
extraVolumeMounts: []
jvb:
replicas: 2
# Specify hostPort to use hostPort and not nodePort
# Nodeports 30XXX will be used by default
# you can use this variable to have several Jitsi cluster running on a cluster
# specifying "31" will use ports 31XXX
nodeportPrefix: "30"
# For https://github.com/jitsi/docker-jitsi-meet/pull/1379
# This can go back to upstream in the next Jitsi release as it has been merged
imagePullPolicy: Always
monitoringEnable: true
monitoring:
resources:
limits:
memory: 100Mi
requests:
cpu: 100m
memory: 100Mi
service:
extraAnnotations:
prometheus.io/scrape: "true"
prometheus.io/port: "9888"
prometheus.io/path: "/metrics"
extraLabels: {}
image: systemli/prometheus-jitsi-meet-exporter:1.2.0
imagePullPolicy: Always
extraContainerSpec: {}
sysctlDaemonSetEnable: true
# In most k8s environments this will be a private IP and in most deployments, users will connect to a public ip
# so this won't provide a usable IP for users to connect to.
# Will rely on STUN providing the correct public IP if set to false.
provideNodeAddressAsPublicIP: false
# If you want to force an IP to advertise, enter an IP in advertiseIP
# mutually exclusive with provideNodeAddressAsPublicIP
advertiseIP:
advertisePrivateCandidates: false
resources:
requests:
cpu: 3000m
memory: 3000Mi
# change to /k8s if using matrix.org/docker-jitsi-meet openshift images
entryPointMountPath: "/entrypoint"
# change to /entrypoint if using matrix.org/docker-jitsi-meet openshift images
entryPointWorkDir: "/init"
entryPointConfigMap:
enable: true
create: true
# name - will have `-jvb-entrypoint` as the suffix on the common prefix (Chart Name if no nameOverride set)
gracefulShutdownConfigMap:
enable: true
create: true
# name - will have `-jvb-shutdown` as the suffix on the common prefix (Chart Name if no nameOverride set)
# change to /usr/bin/graceful_shutdown if using matrix.org/docker-jitsi-meet openshift images
shutdownScriptPath: "/shutdown/graceful_shutdown.sh"
extraEnvs: []
extraContainerSpec: {}
extraPodSpec: {}
extraLabels: {}
extraAnnotations: {}
prosody:
imagePullPolicy: Always
monitoringEnable: true
resources:
requests:
memory: 300Mi
cpu: 300m
extraEnvs: []
extraPodSpec: {}
extraVolumes: []
extraVolumeMounts: []
extraContainerSpec: {}
globalModules: []
globalConfig: []
extraLabels: {}
extraAnnotations: {}
uvs:
enable: false
canQueryPrivateIps: false
syncPowerLevels: true
image: matrixdotorg/matrix-user-verification-service:v3.0.0
imagePullPolicy: Always
replicas: 2
resources:
requests:
memory: 100Mi
cpu: 50m
limits:
memory: 300Mi
extraEnvs: []
extraPodSpec: {}
extraVolumes: []
extraVolumeMounts: []
extraContainerSpec: {}
extraLabels: {}
extraAnnotations: {}
# homeserverUrl - URL of the Synapse to verify room membership with
secrets: {}
# ACCESS_TOKEN - provides access to Synapse
# accessTokenSecretName - the above in a separate secret with the key UVS_ACCESS_TOKEN present
# AUTH_TOKEN - protects requests to this API
web:
replicas: 2
imagePullPolicy: Always
## kubectl create configmap -n <namespace> custom-config --from-file=custom-config.js
customConfig:
name: custom-config
## kubectl create configmap -n <namespace> custom-ui --from-file=custom-interface_config.js
customUi:
name: custom-ui
pluginHead: false
## kubectl create configmap -n <namespace> plugin-head --from-file=plugin.head.html
# pluginHead:
# name: plugin-head
welcomePageFooter: false
## kubectl create configmap -n <namespace> welcome-page-footer --from-file=welcomePageAdditionalContent.html
# welcomePageFooter
# name: welcome-page-footer
customWatermark: false
## kubectl create configmap -n <namespace> watermark --from-file=watermark.png
# customWatermark:
# name: watermark
resources:
requests:
cpu: 400m
memory: 300Mi
httpPort: 80
extraEnvs: []
extraPodSpec: {}
extraVolumes: []
extraContainerSpec: {}
extraVolumeMounts: []
extraLabels: {}
extraAnnotations: {}
sysctljvb:
image: alpine:3.15
imagePullPolicy: Always
extraPodSpec: {}
extraContainerSpec: {}
extraLabels: {}
extraAnnotations: {}
createSecret: true
JICOFO_AUTH_PASSWORD: ""
JICOFO_COMPONENT_SECRET: ""
JVB_AUTH_PASSWORD: ""
TZ: Europe/London
JVB_STUN_SERVERS: stun.l.google.com:19302,stun1.l.google.com:19302,stun2.l.google.com:19302