-
-
Save nanomad/a55e725b93284fc77fcad154508fa5fc to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
admissionConfig: | |
apiLevels: | |
- v1 | |
apiVersion: v1 | |
assetConfig: | |
logoutURL: "" | |
masterPublicURL: https://openshift.techgap.it:8443 | |
publicURL: https://openshift.techgap.it:8443/console/ | |
metricsPublicURL: https://hawkular-metrics.openshift.techgap.it/hawkular/metrics | |
servingInfo: | |
bindAddress: 0.0.0.0:8443 | |
bindNetwork: tcp4 | |
certFile: master.server.crt | |
clientCA: "" | |
keyFile: master.server.key | |
maxRequestsInFlight: 0 | |
requestTimeoutSeconds: 0 | |
controllerConfig: | |
serviceServingCert: | |
signer: | |
certFile: service-signer.crt | |
keyFile: service-signer.key | |
controllers: '*' | |
corsAllowedOrigins: | |
- 127.0.0.1 | |
- localhost | |
- 148.251.176.74 | |
- kubernetes.default | |
- kubernetes.default.svc.cluster.local | |
- kubernetes | |
- openshift.default | |
- openshift.default.svc | |
- kubernetes.default.svc | |
- 172.30.0.1 | |
- openshift.default.svc.cluster.local | |
- openshift.techgap.it | |
- openshift | |
dnsConfig: | |
bindAddress: 0.0.0.0:8053 | |
bindNetwork: tcp4 | |
etcdClientInfo: | |
ca: ca.crt | |
certFile: master.etcd-client.crt | |
keyFile: master.etcd-client.key | |
urls: | |
- https://openshift.techgap.it:4001 | |
etcdConfig: | |
address: openshift.techgap.it:4001 | |
peerAddress: openshift.techgap.it:7001 | |
peerServingInfo: | |
bindAddress: 0.0.0.0:7001 | |
certFile: etcd.server.crt | |
clientCA: ca.crt | |
keyFile: etcd.server.key | |
servingInfo: | |
bindAddress: 0.0.0.0:4001 | |
certFile: etcd.server.crt | |
clientCA: ca.crt | |
keyFile: etcd.server.key | |
storageDirectory: /var/lib/origin/openshift.local.etcd | |
etcdStorageConfig: | |
kubernetesStoragePrefix: kubernetes.io | |
kubernetesStorageVersion: v1 | |
openShiftStoragePrefix: openshift.io | |
openShiftStorageVersion: v1 | |
imageConfig: | |
format: openshift/origin-${component}:${version} | |
latest: false | |
kind: MasterConfig | |
kubeletClientInfo: | |
ca: ca.crt | |
certFile: master.kubelet-client.crt | |
keyFile: master.kubelet-client.key | |
port: 10250 | |
kubernetesMasterConfig: | |
apiServerArguments: | |
controllerArguments: | |
masterCount: 1 | |
masterIP: 148.251.176.74 | |
podEvictionTimeout: | |
proxyClientInfo: | |
certFile: master.proxy-client.crt | |
keyFile: master.proxy-client.key | |
schedulerArguments: | |
schedulerConfigFile: /etc/origin/master/scheduler.json | |
servicesNodePortRange: "" | |
servicesSubnet: 172.30.0.0/16 | |
staticNodeNames: [] | |
masterClients: | |
externalKubernetesClientConnectionOverrides: | |
acceptContentTypes: application/vnd.kubernetes.protobuf,application/json | |
contentType: application/vnd.kubernetes.protobuf | |
burst: 400 | |
qps: 200 | |
externalKubernetesKubeConfig: "" | |
openshiftLoopbackClientConnectionOverrides: | |
acceptContentTypes: application/vnd.kubernetes.protobuf,application/json | |
contentType: application/vnd.kubernetes.protobuf | |
burst: 600 | |
qps: 300 | |
openshiftLoopbackKubeConfig: openshift-master.kubeconfig | |
masterPublicURL: https://openshift.techgap.it:8443 | |
networkConfig: | |
clusterNetworkCIDR: 10.1.0.0/16 | |
hostSubnetLength: 8 | |
networkPluginName: redhat/openshift-ovs-subnet | |
# serviceNetworkCIDR must match kubernetesMasterConfig.servicesSubnet | |
serviceNetworkCIDR: 172.30.0.0/16 | |
externalIPNetworkCIDRs: | |
- 0.0.0.0/0 | |
oauthConfig: | |
assetPublicURL: https://openshift.techgap.it:8443/console/ | |
grantConfig: | |
method: auto | |
identityProviders: | |
- challenge: true | |
login: true | |
mappingMethod: claim | |
name: htpasswd_auth | |
provider: | |
apiVersion: v1 | |
kind: HTPasswdPasswordIdentityProvider | |
file: /etc/origin/master/htpasswd | |
masterCA: ca-bundle.crt | |
masterPublicURL: https://openshift.techgap.it:8443 | |
masterURL: https://openshift.techgap.it:8443 | |
sessionConfig: | |
sessionMaxAgeSeconds: 3600 | |
sessionName: ssn | |
sessionSecretsFile: /etc/origin/master/session-secrets.yaml | |
tokenConfig: | |
accessTokenMaxAgeSeconds: 86400 | |
authorizeTokenMaxAgeSeconds: 500 | |
pauseControllers: false | |
policyConfig: | |
bootstrapPolicyFile: /etc/origin/master/policy.json | |
openshiftInfrastructureNamespace: openshift-infra | |
openshiftSharedResourcesNamespace: openshift | |
projectConfig: | |
defaultNodeSelector: "" | |
projectRequestMessage: "" | |
projectRequestTemplate: "" | |
securityAllocator: | |
mcsAllocatorRange: "s0:/2" | |
mcsLabelsPerProject: 5 | |
uidAllocatorRange: "1000000000-1999999999/10000" | |
routingConfig: | |
subdomain: "openshift.techgap.it" | |
serviceAccountConfig: | |
limitSecretReferences: false | |
managedNames: | |
- default | |
- builder | |
- deployer | |
masterCA: ca-bundle.crt | |
privateKeyFile: serviceaccounts.private.key | |
publicKeyFiles: | |
- serviceaccounts.public.key | |
servingInfo: | |
bindAddress: 0.0.0.0:8443 | |
bindNetwork: tcp4 | |
certFile: master.server.crt | |
clientCA: ca.crt | |
keyFile: master.server.key | |
maxRequestsInFlight: 500 | |
requestTimeoutSeconds: 3600 | |
volumeConfig: | |
dynamicProvisioningEnabled: True |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment