Last modified November 27, 2024
cluster chart reference
The cluster
chart is the main entry point for the Giant Swarm platform. It is the first app that is installed on a new cluster. It is responsible for setting up the basic infrastructure and installing the necessary components to make the cluster operational.
Chart Configuration Reference
Components
Advanced configuration of components that are running on all nodes.
Endpoints and credentials configuration for container registries.
Base64-encoded string from the concatenation of the username, a colon, and the password.
Used to authenticate the user and obtain an access token for the registry.
Used to authenticate for the registry with username/password.
Used to authenticate for the registry with username/password.
Connectivity
Configuration of connectivity and networking options.
IPv4 address range for kubernetes services, in CIDR notation.
To be passed to the HTTP_PROXY environment variable in all hosts.
To be passed to the HTTPS_PROXY environment variable in all hosts.
Comma-separated addresses to be passed to the NO_PROXY environment variable in all hosts.
Control plane
Configuration of the control plane.
The API server Load Balancer port. This option sets the Spec.ClusterNetwork.APIServerPort field on the Cluster CR. In CAPI this field isn't used currently. It is instead used in providers. In CAPA this sets only the public facing port of the Load Balancer. In CAPZ both the public facing and the destination port are set to this value. CAPV and CAPVCD do not use it.
Determines how long a machine health check should wait for a node to join the cluster, before considering a machine unhealthy.
If a node is not in condition 'Ready' after this timeout, it will be considered unhealthy.
If a node is in 'Unknown' condition after this timeout, it will be considered unhealthy.
Internal
For Giant Swarm internal use only, not stable, or not supported by UIs.
Advanced configuration of cluster components, to be configured by Giant Swarm staff only.
Kubernetes API bind port used for API server pod.
The prefix to prepend to all resource paths in etcd. If nothing is specified, the API server uses '/registry' prefix by default.
A map with the additional CLI flags that are appended to the default flags. Use with caution, as there is no validation for these values, so you can set incorrect or duplicate flags.
The additional certificate SANs that are appended to the default SANs. Use with caution, as there is no validation for these values, so you can set incorrect or duplicate certificates.
Skip verification of SAN field in client certificate for peer connections.
Initial cluster configuration for bootstrapping.
Raise the etcd default backend bytes limit up to 16GiB.
Custom cluster-specific files that are deployed to control plane nodes.
It specifies where the file content is coming from.
Kubernetes Secret resource with the file content.
Secret key where the file content is.
Name of the Secret resource.
Extra commands to run after kubeadm runs.
Extra commands to run before kubeadm runs.
It specifies where the file content is coming from.
Kubernetes Secret resource with the file content.
Secret key where the file content is.
Custom cluster-specific files that are deployed to worker nodes.
It specifies where the file content is coming from.
Kubernetes Secret resource with the file content.
Secret key where the file content is.
Name of the Secret resource.
Extra commands to run after kubeadm runs.
Extra commands to run before kubeadm runs.
Metadata
These annotations are added to all Kubernetes resources defining this cluster.
Setting this to true will set giantswarm.io/prevent-deletion label to true, which will block cluster deletion.
Node pools
These annotations are added to all Kubernetes resources defining this node pool.
These labels are added to all Kubernetes resources defining this node pool.
Other global
Pod Security Standards
Provider integration
Provider-specific properties that can be set by cluster-$provider chart in order to render correct templates for the provider.
Additional configuration to be merged with the Ignition. More info: https://coreos.github.io/ignition/operator-notes/#config-merging.
It describes the desired state of the system’s storage devices.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories
The list of directories to be created.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*]
The directory to be created.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].filesystem
The internal identifier of the filesystem in which to create the directory. This matches the last filesystem with the given identifier.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].group
It specifies the group of the owner.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].group.id
The group ID of the owner.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].group.name
The group name of the owner.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].mode
The directory’s permission mode.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].overwrite
Whether to delete preexisting nodes at the path.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].path
The absolute path to the directory.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].user
It specifies the directory’s owner.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].user.id
The user ID of the owner.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].user.name
The user name of the owner.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems
The list of filesystems to be configured and/or used in the “files” section. Either “mount” or “path” needs to be specified.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*]
The filesystem to be configured and/or used in the “files” section. Either “mount” or “path” needs to be specified.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount
It contains the set of mount and formatting options for the filesystem. A non-null entry indicates that the filesystem should be mounted before it is used by Ignition.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.device
The absolute path to the device. Devices are typically referenced by the "/dev/disk/by-*" symlinks.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.format
The filesystem format (ext4, btrfs, or xfs).
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.label
The label of the filesystem.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.options
Any additional options to be passed to the format-specific mkfs utility.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.options[*]
An additional option to be passed to the format-specific mkfs utility.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.uuid
The uuid of the filesystem.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.wipeFilesystem
Whether or not to wipe the device before filesystem creation, see Ignition’s documentation on filesystems for more information https://github.com/coreos/ignition/blob/main/docs/operator-notes.md#filesystem-reuse-semantics.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].name
The identifier for the filesystem, internal to Ignition. This is only required if the filesystem needs to be referenced in the “files” section.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].path
The mount-point of the filesystem. A non-null entry indicates that the filesystem has already been mounted by the system at the specified path. This is really only useful for “/sysroot”.
It describes the desired state of the systemd units.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*]
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents
The contents of the unit.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.install
Configuration of the [Install] section.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.install.wantedBy
Units with (weak) requirement dependencies on this unit.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.install.wantedBy[*]
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.mount
Configuration of the [Mount] section.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.mount.type
A file system type to mount.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.mount.what
An absolute path of a device node, file or other resource to mount.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.mount.where
An absolute path of a file or directory for the mount point; in particular, the destination cannot be a symbolic link.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.unit
Configuration of the [Unit] section.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.unit.defaultDependencies
Flag that indicates if this systemd unit should have the default systemd unit dependencies.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.unit.description
systemd unit description.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].dropins
The list of drop-ins for the unit
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].dropins[*]
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].dropins[*].contents
The contents of the drop-in.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].dropins[*].name
The name of the drop-in. This must be suffixed with “.conf”
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].enabled
Whether or not the service shall be enabled. When true, the service is enabled. When false, the service is disabled. When omitted, the service is unmodified. In order for this to have any effect, the unit must have an install section.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].mask
Whether or not the service shall be masked. When true, the service is masked by symlinking it to /dev/null.
.providerIntegration.bastion.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].name
The name of the unit. This must be suffixed with a valid unit type (e.g. “thing.service”).
It controls if AdditionalConfig should be strictly parsed. If so, warnings are treated as errors.
Extra commands to run before kubeadm runs.
The name of the template that renders provider-specific annotations for the Cluster resource
Internal configuration of various components that form the Kubernetes cluster.
The image used by sandbox / pause container
Whether/how outgoing traffic is routed through proxy servers.
To be passed to the NO_PROXY environment variable in all hosts.
Name of Helm template that renders a YAML array with NO_PROXY addresses.
Configuration of Kubernetes components.
Configuration of API server.
.providerIntegration.controlPlane.kubeadmConfig.clusterConfiguration.apiServer.additionalAdmissionPlugins
A list of plugins to enable, in addition to the default ones that include DefaultStorageClass, DefaultTolerationSeconds, LimitRanger, MutatingAdmissionWebhook, NamespaceLifecycle, PersistentVolumeClaimResize, Priority, ResourceQuota, ServiceAccount and ValidatingAdmissionWebhook.
.providerIntegration.controlPlane.kubeadmConfig.clusterConfiguration.apiServer.additionalAdmissionPlugins[*]
Identifiers of the API. The service account token authenticator will validate that tokens used against the API are bound to at least one of these audiences. If the --service-account-issuer flag is configured and this flag is not, 'api-audiences' field defaults to a single element list containing the issuer URL.
.providerIntegration.controlPlane.kubeadmConfig.clusterConfiguration.apiServer.featureGates[*].enabled
Configuration of the identifier of the service account token issuer. You must specify either URL or clusterDomainPrefix (only one, not both).
Provider-specific files that are deployed to control plane nodes. They are specified in the cluster- apps.
It specifies where the file content is coming from.
Kubernetes Secret resource with the file content.
Secret key where the file content is.
Name of the Secret resource.
Additional configuration to be merged with the Ignition. More info: https://coreos.github.io/ignition/operator-notes/#config-merging.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage
It describes the desired state of the system’s storage devices.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories
The list of directories to be created.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*]
The directory to be created.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].filesystem
The internal identifier of the filesystem in which to create the directory. This matches the last filesystem with the given identifier.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].group
It specifies the group of the owner.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].group.id
The group ID of the owner.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].group.name
The group name of the owner.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].mode
The directory’s permission mode.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].overwrite
Whether to delete preexisting nodes at the path.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].path
The absolute path to the directory.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].user
It specifies the directory’s owner.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].user.id
The user ID of the owner.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].user.name
The user name of the owner.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems
The list of filesystems to be configured and/or used in the “files” section. Either “mount” or “path” needs to be specified.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*]
The filesystem to be configured and/or used in the “files” section. Either “mount” or “path” needs to be specified.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount
It contains the set of mount and formatting options for the filesystem. A non-null entry indicates that the filesystem should be mounted before it is used by Ignition.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.device
The absolute path to the device. Devices are typically referenced by the "/dev/disk/by-*" symlinks.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.format
The filesystem format (ext4, btrfs, or xfs).
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.label
The label of the filesystem.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.options
Any additional options to be passed to the format-specific mkfs utility.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.options[*]
An additional option to be passed to the format-specific mkfs utility.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.uuid
The uuid of the filesystem.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.wipeFilesystem
Whether or not to wipe the device before filesystem creation, see Ignition’s documentation on filesystems for more information https://github.com/coreos/ignition/blob/main/docs/operator-notes.md#filesystem-reuse-semantics.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].name
The identifier for the filesystem, internal to Ignition. This is only required if the filesystem needs to be referenced in the “files” section.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].path
The mount-point of the filesystem. A non-null entry indicates that the filesystem has already been mounted by the system at the specified path. This is really only useful for “/sysroot”.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd
It describes the desired state of the systemd units.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*]
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents
The contents of the unit.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.install
Configuration of the [Install] section.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.install.wantedBy
Units with (weak) requirement dependencies on this unit.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.install.wantedBy[*]
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.mount
Configuration of the [Mount] section.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.mount.type
A file system type to mount.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.mount.what
An absolute path of a device node, file or other resource to mount.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.mount.where
An absolute path of a file or directory for the mount point; in particular, the destination cannot be a symbolic link.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.unit
Configuration of the [Unit] section.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.unit.defaultDependencies
Flag that indicates if this systemd unit should have the default systemd unit dependencies.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.unit.description
systemd unit description.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].dropins
The list of drop-ins for the unit
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].dropins[*]
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].dropins[*].contents
The contents of the drop-in.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].dropins[*].name
The name of the drop-in. This must be suffixed with “.conf”
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].enabled
Whether or not the service shall be enabled. When true, the service is enabled. When false, the service is disabled. When omitted, the service is unmodified. In order for this to have any effect, the unit must have an install section.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].mask
Whether or not the service shall be masked. When true, the service is masked by symlinking it to /dev/null.
.providerIntegration.controlPlane.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].name
The name of the unit. This must be suffixed with a valid unit type (e.g. “thing.service”).
It controls if AdditionalConfig should be strictly parsed. If so, warnings are treated as errors.
Extra commands to run after kubeadm runs.
Extra commands to run before kubeadm runs.
It can be used to specify which CustomResourceDefinition is used.
Group, version and kind of provider-specific infrastructure Machine template resource.
The name of Helm template that renders Infrastructure Machine template spec.
If specified, this token is used as a salt to the hash suffix of some resource names. Can be used to force-recreate some resources.
Provider-specific kubeadm config that is common for all nodes, including both control plane and workers.
Provider-specific files that are deployed to all nodes. They are specified in the cluster- apps.
It specifies where the file content is coming from.
Kubernetes Secret resource with the file content.
Secret key where the file content is.
Additional configuration to be merged with the Ignition. More info: https://coreos.github.io/ignition/operator-notes/#config-merging.
It describes the desired state of the system’s storage devices.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories
The list of directories to be created.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*]
The directory to be created.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].filesystem
The internal identifier of the filesystem in which to create the directory. This matches the last filesystem with the given identifier.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].group
It specifies the group of the owner.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].group.id
The group ID of the owner.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].group.name
The group name of the owner.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].mode
The directory’s permission mode.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].overwrite
Whether to delete preexisting nodes at the path.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].path
The absolute path to the directory.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].user
It specifies the directory’s owner.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].user.id
The user ID of the owner.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].user.name
The user name of the owner.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems
The list of filesystems to be configured and/or used in the “files” section. Either “mount” or “path” needs to be specified.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*]
The filesystem to be configured and/or used in the “files” section. Either “mount” or “path” needs to be specified.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount
It contains the set of mount and formatting options for the filesystem. A non-null entry indicates that the filesystem should be mounted before it is used by Ignition.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.device
The absolute path to the device. Devices are typically referenced by the "/dev/disk/by-*" symlinks.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.format
The filesystem format (ext4, btrfs, or xfs).
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.label
The label of the filesystem.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.options
Any additional options to be passed to the format-specific mkfs utility.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.options[*]
An additional option to be passed to the format-specific mkfs utility.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.uuid
The uuid of the filesystem.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.wipeFilesystem
Whether or not to wipe the device before filesystem creation, see Ignition’s documentation on filesystems for more information https://github.com/coreos/ignition/blob/main/docs/operator-notes.md#filesystem-reuse-semantics.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].name
The identifier for the filesystem, internal to Ignition. This is only required if the filesystem needs to be referenced in the “files” section.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].path
The mount-point of the filesystem. A non-null entry indicates that the filesystem has already been mounted by the system at the specified path. This is really only useful for “/sysroot”.
It describes the desired state of the systemd units.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents
The contents of the unit.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.install
Configuration of the [Install] section.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.install.wantedBy
Units with (weak) requirement dependencies on this unit.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.install.wantedBy[*]
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.mount
Configuration of the [Mount] section.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.mount.type
A file system type to mount.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.mount.what
An absolute path of a device node, file or other resource to mount.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.mount.where
An absolute path of a file or directory for the mount point; in particular, the destination cannot be a symbolic link.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.unit
Configuration of the [Unit] section.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.unit.defaultDependencies
Flag that indicates if this systemd unit should have the default systemd unit dependencies.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.unit.description
systemd unit description.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].dropins
The list of drop-ins for the unit
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].dropins[*]
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].dropins[*].contents
The contents of the drop-in.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].dropins[*].name
The name of the drop-in. This must be suffixed with “.conf”
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].enabled
Whether or not the service shall be enabled. When true, the service is enabled. When false, the service is disabled. When omitted, the service is unmodified. In order for this to have any effect, the unit must have an install section.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].mask
Whether or not the service shall be masked. When true, the service is masked by symlinking it to /dev/null.
.providerIntegration.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].name
The name of the unit. This must be suffixed with a valid unit type (e.g. “thing.service”).
It controls if AdditionalConfig should be strictly parsed. If so, warnings are treated as errors.
A map of property names and their values that will affect setting pause annotation
The name of the Cluster API provider. The name here must match the name of the provider in cluster- app name.
Group, version and kind configuration that is required and used by a specific Cluster API provider.
Flag that indicates if the Bastion resource is enabled and templated. This is meant only for the initial development purposes for the sake of incrementally integrating cluster chart into cluster-$provider apps.
Flag that indicates if the Cluster resource is enabled and templated. This is meant only for the initial development purposes for the sake of incrementally integrating cluster chart into cluster-$provider apps.
Flag that indicates if the control plane resource is enabled and templated. This is meant only for the initial development purposes for the sake of incrementally integrating cluster chart into cluster-$provider apps.
Group, version and kind of provider-specific infrastructure cluster resource.
Flag that indicates if the MachineHealthCheck resource is enabled and templated. This is meant only for the initial development purposes for the sake of incrementally integrating cluster chart into cluster-$provider apps.
Flag that indicates if the machine pool resources are enabled and templated. This is meant only for the initial development purposes for the sake of incrementally integrating cluster chart into cluster-$provider apps.
Provider-specific files that are deployed to worker nodes. They are specified in the cluster- apps.
It specifies where the file content is coming from.
Kubernetes Secret resource with the file content.
Secret key where the file content is.
Name of the Secret resource.
Additional configuration to be merged with the Ignition. More info: https://coreos.github.io/ignition/operator-notes/#config-merging.
It describes the desired state of the system’s storage devices.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories
The list of directories to be created.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*]
The directory to be created.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].filesystem
The internal identifier of the filesystem in which to create the directory. This matches the last filesystem with the given identifier.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].group
It specifies the group of the owner.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].group.id
The group ID of the owner.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].group.name
The group name of the owner.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].mode
The directory’s permission mode.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].overwrite
Whether to delete preexisting nodes at the path.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].path
The absolute path to the directory.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].user
It specifies the directory’s owner.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].user.id
The user ID of the owner.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.directories[*].user.name
The user name of the owner.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems
The list of filesystems to be configured and/or used in the “files” section. Either “mount” or “path” needs to be specified.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*]
The filesystem to be configured and/or used in the “files” section. Either “mount” or “path” needs to be specified.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount
It contains the set of mount and formatting options for the filesystem. A non-null entry indicates that the filesystem should be mounted before it is used by Ignition.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.device
The absolute path to the device. Devices are typically referenced by the "/dev/disk/by-*" symlinks.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.format
The filesystem format (ext4, btrfs, or xfs).
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.label
The label of the filesystem.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.options
Any additional options to be passed to the format-specific mkfs utility.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.options[*]
An additional option to be passed to the format-specific mkfs utility.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.uuid
The uuid of the filesystem.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].mount.wipeFilesystem
Whether or not to wipe the device before filesystem creation, see Ignition’s documentation on filesystems for more information https://github.com/coreos/ignition/blob/main/docs/operator-notes.md#filesystem-reuse-semantics.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].name
The identifier for the filesystem, internal to Ignition. This is only required if the filesystem needs to be referenced in the “files” section.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.storage.filesystems[*].path
The mount-point of the filesystem. A non-null entry indicates that the filesystem has already been mounted by the system at the specified path. This is really only useful for “/sysroot”.
It describes the desired state of the systemd units.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*]
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents
The contents of the unit.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.install
Configuration of the [Install] section.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.install.wantedBy
Units with (weak) requirement dependencies on this unit.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.install.wantedBy[*]
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.mount
Configuration of the [Mount] section.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.mount.type
A file system type to mount.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.mount.what
An absolute path of a device node, file or other resource to mount.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.mount.where
An absolute path of a file or directory for the mount point; in particular, the destination cannot be a symbolic link.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.unit
Configuration of the [Unit] section.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.unit.defaultDependencies
Flag that indicates if this systemd unit should have the default systemd unit dependencies.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].contents.unit.description
systemd unit description.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].dropins
The list of drop-ins for the unit
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].dropins[*]
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].dropins[*].contents
The contents of the drop-in.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].dropins[*].name
The name of the drop-in. This must be suffixed with “.conf”
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].enabled
Whether or not the service shall be enabled. When true, the service is enabled. When false, the service is disabled. When omitted, the service is unmodified. In order for this to have any effect, the unit must have an install section.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].mask
Whether or not the service shall be masked. When true, the service is masked by symlinking it to /dev/null.
.providerIntegration.workers.kubeadmConfig.ignition.containerLinuxConfig.additionalConfig.systemd.units[*].name
The name of the unit. This must be suffixed with a valid unit type (e.g. “thing.service”).
It controls if AdditionalConfig should be strictly parsed. If so, warnings are treated as errors.
Extra commands to run after kubeadm runs.
Extra commands to run before kubeadm runs.
Further reading
Need help, got feedback?
We listen to your Slack support channel. You can also reach us at support@giantswarm.io. And of course, we welcome your pull requests!