Update calico to version 3.26.0
All checks were successful
continuous-integration/drone/push Build is passing
All checks were successful
continuous-integration/drone/push Build is passing
This commit is contained in:
parent
9014aa38d3
commit
d13e3b73a5
13 changed files with 213 additions and 12 deletions
|
|
@ -60,6 +60,13 @@ spec:
|
|||
connections. The only reason to disable it is for debugging purposes. [Default:
|
||||
true]'
|
||||
type: boolean
|
||||
bpfDSROptoutCIDRs:
|
||||
description: BPFDSROptoutCIDRs is a list of CIDRs which are excluded
|
||||
from DSR. That is, clients in those CIDRs will accesses nodeports
|
||||
as if BPFExternalServiceMode was set to Tunnel.
|
||||
items:
|
||||
type: string
|
||||
type: array
|
||||
bpfDataIfacePattern:
|
||||
description: BPFDataIfacePattern is a regular expression that controls
|
||||
which interfaces Felix should attach BPF programs to in order to
|
||||
|
|
@ -83,7 +90,7 @@ spec:
|
|||
description: 'BPFEnforceRPF enforce strict RPF on all host interfaces
|
||||
with BPF programs regardless of what is the per-interfaces or global
|
||||
setting. Possible values are Disabled, Strict or Loose. [Default:
|
||||
Strict]'
|
||||
Loose]'
|
||||
type: string
|
||||
bpfExtToServiceConnmark:
|
||||
description: 'BPFExtToServiceConnmark in BPF mode, control a 32bit
|
||||
|
|
@ -348,7 +355,7 @@ spec:
|
|||
type: integer
|
||||
healthTimeoutOverrides:
|
||||
description: HealthTimeoutOverrides allows the internal watchdog timeouts
|
||||
of individual subcomponents to be overriden. This is useful for
|
||||
of individual subcomponents to be overridden. This is useful for
|
||||
working around "false positive" liveness timeouts that can occur
|
||||
in particularly stressful workloads or if CPU is constrained. For
|
||||
a list of active subcomponents, see Felix's logs.
|
||||
|
|
@ -408,6 +415,12 @@ spec:
|
|||
type: string
|
||||
iptablesFilterAllowAction:
|
||||
type: string
|
||||
iptablesFilterDenyAction:
|
||||
description: IptablesFilterDenyAction controls what happens to traffic
|
||||
that is denied by network policy. By default Calico blocks traffic
|
||||
with an iptables "DROP" action. If you want to use "REJECT" action
|
||||
instead you can configure it in here.
|
||||
type: string
|
||||
iptablesLockFilePath:
|
||||
description: 'IptablesLockFilePath is the location of the iptables
|
||||
lock file. You may need to change this if the lock file is not in
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue