Last active
December 1, 2016 14:46
-
-
Save sallyom/797ced77ad89337018c438f134ea2ca8 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
admissionConfig: | |
pluginConfig: null | |
apiLevels: | |
- v1 | |
apiVersion: v1 | |
assetConfig: | |
extensionDevelopment: false | |
extensionProperties: null | |
extensionScripts: | |
- /etc/origin/master/online-extensions.js | |
- /etc/origin/master/intercom-widget-extensions.js | |
extensionStylesheets: | |
- /etc/origin/master/online-extensions.css | |
extensions: null | |
loggingPublicURL: "" | |
logoutURL: "" | |
masterPublicURL: https://${IP_ADDR}:8443 | |
metricsPublicURL: "" | |
publicURL: https://${IP_ADDR}:8443/console/ | |
servingInfo: | |
bindAddress: 0.0.0.0:8443 | |
bindNetwork: tcp4 | |
certFile: master.server.crt | |
clientCA: "" | |
keyFile: master.server.key | |
maxRequestsInFlight: 0 | |
namedCertificates: null | |
requestTimeoutSeconds: 0 | |
auditConfig: | |
enabled: false | |
controllerConfig: | |
serviceServingCert: | |
signer: | |
certFile: service-signer.crt | |
keyFile: service-signer.key | |
controllerLeaseTTL: 0 | |
controllers: '*' | |
corsAllowedOrigins: | |
- 127.0.0.1 | |
- ${IP_ADDR}:8443 | |
- localhost | |
disabledFeatures: null | |
dnsConfig: | |
allowRecursiveQueries: true | |
bindAddress: 0.0.0.0:8053 | |
bindNetwork: tcp4 | |
etcdClientInfo: | |
ca: ca.crt | |
certFile: master.etcd-client.crt | |
keyFile: master.etcd-client.key | |
urls: | |
- https://${IP_ADDR}:4001 | |
etcdConfig: | |
address: ${IP_ADDR}:4001 | |
peerAddress: ${IP_ADDR}:7001 | |
peerServingInfo: | |
bindAddress: 0.0.0.0:7001 | |
bindNetwork: tcp4 | |
certFile: etcd.server.crt | |
clientCA: ca.crt | |
keyFile: etcd.server.key | |
namedCertificates: null | |
servingInfo: | |
bindAddress: 0.0.0.0:4001 | |
bindNetwork: tcp4 | |
certFile: etcd.server.crt | |
clientCA: ca.crt | |
keyFile: etcd.server.key | |
namedCertificates: null | |
storageDirectory: /root/gowork/src/github.com/openshift/openshift.local.etcd | |
etcdStorageConfig: | |
kubernetesStoragePrefix: kubernetes.io | |
kubernetesStorageVersion: v1 | |
openShiftStoragePrefix: openshift.io | |
openShiftStorageVersion: v1 | |
imageConfig: | |
format: registry.qe.openshift.com/openshift3/ose-${component}:${version} | |
latest: false | |
imagePolicyConfig: | |
disableScheduledImport: false | |
maxImagesBulkImportedPerRepository: 5 | |
maxScheduledImageImportsPerMinute: 60 | |
scheduledImageImportMinimumIntervalSeconds: 900 | |
jenkinsPipelineConfig: | |
enabled: true | |
parameters: null | |
serviceName: jenkins | |
templateName: jenkins | |
templateNamespace: openshift | |
kind: MasterConfig | |
kubeletClientInfo: | |
ca: ca.crt | |
certFile: master.kubelet-client.crt | |
keyFile: master.kubelet-client.key | |
port: 10250 | |
kubernetesMasterConfig: | |
admissionConfig: | |
pluginConfig: null | |
apiLevels: null | |
apiServerArguments: null | |
controllerArguments: null | |
disabledAPIGroupVersions: {} | |
masterCount: 1 | |
masterIP: ${IP_ADDR} | |
podEvictionTimeout: 5m | |
proxyClientInfo: | |
certFile: master.proxy-client.crt | |
keyFile: master.proxy-client.key | |
schedulerConfigFile: "" | |
servicesNodePortRange: 30000-32767 | |
servicesSubnet: 172.30.0.0/16 | |
staticNodeNames: null | |
masterClients: | |
externalKubernetesKubeConfig: "" | |
openshiftLoopbackKubeConfig: openshift-master.kubeconfig | |
masterPublicURL: https://${IP_ADDR}:8443 | |
networkConfig: | |
clusterNetworkCIDR: 10.128.0.0/14 | |
externalIPNetworkCIDRs: null | |
hostSubnetLength: 9 | |
networkPluginName: "" | |
serviceNetworkCIDR: 172.30.0.0/16 | |
oauthConfig: | |
alwaysShowProviderSelection: false | |
assetPublicURL: https://${IP_ADDR}:8443/console/ | |
grantConfig: | |
method: auto | |
serviceAccountMethod: prompt | |
identityProviders: | |
- challenge: true | |
login: true | |
mappingMethod: claim | |
name: anypassword | |
provider: | |
apiVersion: v1 | |
kind: AllowAllPasswordIdentityProvider | |
masterCA: ca-bundle.crt | |
masterPublicURL: https://${IP_ADDR}:8443 | |
masterURL: https://${IP_ADDR}:8443 | |
sessionConfig: | |
sessionMaxAgeSeconds: 300 | |
sessionName: ssn | |
sessionSecretsFile: "" | |
templates: null | |
tokenConfig: | |
accessTokenMaxAgeSeconds: 86400 | |
authorizeTokenMaxAgeSeconds: 300 | |
pauseControllers: false | |
policyConfig: | |
bootstrapPolicyFile: policy.json | |
openshiftInfrastructureNamespace: openshift-infra | |
openshiftSharedResourcesNamespace: openshift | |
userAgentMatchingConfig: | |
defaultRejectionMessage: "" | |
deniedClients: null | |
requiredClients: null | |
projectConfig: | |
defaultNodeSelector: "" | |
projectRequestMessage: "" | |
projectRequestTemplate: "default/project-request" | |
securityAllocator: | |
mcsAllocatorRange: s0:/2 | |
mcsLabelsPerProject: 5 | |
uidAllocatorRange: 1000000000-1999999999/10000 | |
routingConfig: | |
subdomain: router.default.svc.cluster.local | |
serviceAccountConfig: | |
limitSecretReferences: false | |
managedNames: | |
- default | |
- builder | |
- deployer | |
masterCA: ca-bundle.crt | |
privateKeyFile: serviceaccounts.private.key | |
publicKeyFiles: | |
- serviceaccounts.public.key | |
servingInfo: | |
bindAddress: 0.0.0.0:8443 | |
bindNetwork: tcp4 | |
certFile: master.server.crt | |
clientCA: ca.crt | |
keyFile: master.server.key | |
maxRequestsInFlight: 1000 | |
namedCertificates: null | |
requestTimeoutSeconds: 3600 | |
volumeConfig: | |
dynamicProvisioningEnabled: true |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment