You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A Helm chart for managing a wireguard vpn in kubernetes
6
6
@@ -29,7 +29,10 @@ A Helm chart for managing a wireguard vpn in kubernetes
29
29
| disablePrivateKeyManagement | bool |`false`| Disable creation and any mounting of a private key, this assumes another mechanism is provided/used at the container level to fetch the private key |
30
30
| disruptionBudget.enabled | bool |`true`||
31
31
| disruptionBudget.minAvailable | int |`2`||
32
+
| extraConfigMaps | list |`[]`| Create additional configmaps that may be used in sidecars |
32
33
| extraEnv | object |`{}`| Provide additional environment variables to the wireguard container |
34
+
| extraSideCars | list |`[]`| Provide additional sidecars to the wireguard pod, these are directly attached to the pod and must be well formed ContainerSpec |
35
+
| extraStorage | list |`[]`| Create storage claims that can be used by side cars |
33
36
| healthSideCar.enabled | bool |`false`| Opt in side car to expose a http health end point for external load balancers that are not kubernetes aware, in most cases this is not needed |
34
37
| healthSideCar.hostPort | int |`13000`| When useHostPort is true this is the host port defined |
35
38
| healthSideCar.image.pullPolicy | string |`"Always"`| Pull Policy always to avoid cached rolling tags, if you change this you should use a non rolling tag |
@@ -103,6 +106,7 @@ A Helm chart for managing a wireguard vpn in kubernetes
103
106
| resources.limits.memory | string |`"256Mi"`||
104
107
| resources.requests.cpu | string |`"100m"`||
105
108
| resources.requests.memory | string |`"256Mi"`||
109
+
| runPodOnHostNetwork | bool |`false`| Run pod on host network |
106
110
| runtimeClassName | string |`nil`| Override the default runtime class of the container, if not provided `runc` will most likely be used |
107
111
| secretName | string |`nil`| Name of a secret with a wireguard private key on key privatekey, if not provided on first install a hook generates one. |
| service.enabled | bool |`true`| Whether the service will be created or not |
115
119
| service.externalTrafficPolicy | string |`""`| External Traffic Policy for the service |
120
+
| service.extraPorts | list |`[]`| Extra ports that can be attached to the service object, these are passed directly to the port array on the service and must be well formed to the specification |
116
121
| service.loadBalancerIP | string |`""`| IP to assign to the LoadBalancer service |
117
122
| service.nodePort | int |`31820`| Node port, only valid with service type: NodePort |
118
123
| service.port | int |`51820`| Service port, default is 51820 UDP |
Copy file name to clipboardExpand all lines: helm/wireguard/values.yaml
+20Lines changed: 20 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -30,6 +30,8 @@ keygenJob:
30
30
extraEnv: {}
31
31
podAnnotations: {}
32
32
labels: {}
33
+
# -- Run pod on host network
34
+
runPodOnHostNetwork: false
33
35
# -- Expose VPN service on hostPort
34
36
useHostPort: false
35
37
# -- Host port to expose the VPN service on
@@ -72,6 +74,8 @@ service:
72
74
loadBalancerIP: ""
73
75
# -- Annotations
74
76
annotations: {}
77
+
# -- Extra ports that can be attached to the service object, these are passed directly to the port array on the service and must be well formed to the specification
78
+
extraPorts: []
75
79
# -- Name of a secret with a wireguard private key on key privatekey, if not provided on first install a hook generates one.
76
80
secretName: ~
77
81
replicaCount: 3
@@ -100,6 +104,22 @@ autoscaling:
100
104
# -- Provide additional environment variables to the wireguard container
101
105
extraEnv: {}
102
106
# TEST_ENV_VAR: test-value
107
+
# -- Provide additional sidecars to the wireguard pod, these are directly attached to the pod and must be well formed ContainerSpec
108
+
extraSideCars: []
109
+
# -- Create storage claims that can be used by side cars
110
+
extraStorage: []
111
+
# - name: conf
112
+
# storageClassName: default
113
+
# storage: 8Gi
114
+
# accessModes:
115
+
# - ReadWriteMany
116
+
# volumeMode: Filesystem
117
+
# -- Create additional configmaps that may be used in sidecars
118
+
extraConfigMaps: []
119
+
# - name: some-config
120
+
# data:
121
+
# key1: |
122
+
# some config file data
103
123
# -- If provided, this secret will be used instead of the config created from the helm value scope
104
124
configSecretName: ~
105
125
# -- The property/key on the secret holding the wireguard configuration file
0 commit comments