1# "_internal_defaults_do_not_set" is a workaround for Helm limitations. Users should NOT set "._internal_defaults_do_not_set" explicitly, but rather directly set the fields internally.
2# For instance, instead of `--set _internal_defaults_do_not_set.foo=bar``, just set `--set foo=bar`.
3image: cgr.dev/chainguard-private/istio-pilot:1.29@sha256:b9c35817127bf7d3d8bfff473dbc4d9bd1ba488c7fb9cb2f3e88e26b1fb28241
6 image: cgr.dev/chainguard-private/istio-proxy:1.29@sha256:05022ce6bd59e104bce4ca101c5ff95a3ed1a9173e8dd64f2aeabf5b628f0383
8 image: cgr.dev/chainguard-private/istio-proxy:1.29@sha256:05022ce6bd59e104bce4ca101c5ff95a3ed1a9173e8dd64f2aeabf5b628f0383
9_internal_defaults_do_not_set:
10 autoscaleEnabled: true
16 rollingMaxUnavailable: 25%
20 # Can be a full hub/image:tag
23 # Resources for a small pilot install
28 # Set to `type: RuntimeDefault` to use the default profile if available.
30 # Whether to use an existing CNI installation
34 # Additional container arguments
35 extraContainerArgs: []
38 # Settings related to the untaint controller
39 # This controller will remove `cni.istio.io/not-ready` from nodes when the istio-cni pod becomes ready
40 # It should be noted that cluster operator/owner is responsible for having the taint set by their infrastructure provider when new nodes are added to the cluster; the untaint controller does not taint nodes
42 # Controls whether or not the untaint controller is active
44 # What namespace the untaint controller should watch for istio-cni pods. This is only required when istio-cni is running in a different namespace than istiod
49 targetAverageUtilization: 80
51 # targetAverageUtilization: 80
53 # Additional volumeMounts to the istiod container
55 # Additional volumes to the istiod pod
57 # Inject initContainers into the istiod pod
61 serviceAnnotations: {}
62 serviceAccountAnnotations: {}
63 sidecarInjectorWebhookAnnotations: {}
64 topologySpreadConstraints: []
65 # You can use jwksResolverExtraRootCA to provide a root certificate
66 # in PEM format. This will then be trusted by pilot when resolving
68 jwksResolverExtraRootCA: ""
69 # The following is used to limit how long a sidecar can be connected
70 # to a pilot. It balances out load across pilot instances at the cost of
71 # increasing system churn.
72 keepaliveMaxServerConnectionAge: 30m
73 # Additional labels to apply to the deployment.
75 # Annotations to apply to the istiod deployment.
76 deploymentAnnotations: {}
77 ## Mesh config settings
79 # Install the mesh config map, generated from values.yaml.
80 # If false, pilot wil use default values (by default) or user-supplied values.
82 # Additional labels to apply on the pod level for monitoring and logging configuration.
84 # Setup how istiod Service is configured. See https://kubernetes.io/docs/concepts/services-networking/dual-stack/#services
88 # Set this if you install ztunnel to a different namespace from `istiod`.
89 # If set, `istiod` will allow connections from trusted node proxy ztunnels
90 # in the provided namespace.
91 # If unset, `istiod` will assume the trusted node proxy ztunnel resides
92 # in the same namespace as itself.
93 trustedZtunnelNamespace: ""
94 # Set this if you install ztunnel with a name different from the default.
95 trustedZtunnelName: ""
96 sidecarInjectorWebhook:
97 # You can use the field called alwaysInjectSelector and neverInjectSelector which will always inject the sidecar or
98 # always skip the injection on pods that match that label selector, regardless of the global policy.
99 # See https://istio.io/docs/setup/kubernetes/additional-setup/sidecar-injection/#more-control-adding-exceptions
100 neverInjectSelector: []
101 alwaysInjectSelector: []
102 # injectedAnnotations are additional annotations that will be added to the pod spec after injection
103 # This is primarily to support PSP annotations. For example, if you defined a PSP with the annotations:
106 # apparmor.security.beta.kubernetes.io/allowedProfileNames: runtime/default
107 # apparmor.security.beta.kubernetes.io/defaultProfileName: runtime/default
109 # The PSP controller would add corresponding annotations to the pod spec for each container. However, this happens before
110 # the inject adds additional containers, so we must specify them explicitly here. With the above example, we could specify:
111 # injectedAnnotations:
112 # container.apparmor.security.beta.kubernetes.io/istio-init: runtime/default
113 # container.apparmor.security.beta.kubernetes.io/istio-proxy: runtime/default
114 injectedAnnotations: {}
115 # This enables injection of sidecar in all namespaces,
116 # with the exception of namespaces with "istio-injection:disabled" annotation
117 # Only one environment should have this enabled.
118 enableNamespacesByDefault: false
119 # Mutations that occur after the sidecar injector are not handled by default, as the Istio sidecar injector is only run
120 # once. For example, an OPA sidecar injected after the Istio sidecar will not have it's liveness/readiness probes rewritten.
121 # Setting this to `IfNeeded` will result in the sidecar injector being run again if additional mutations occur.
122 reinvocationPolicy: Never
123 rewriteAppHTTPProbe: true
124 # Templates defines a set of custom injection templates that can be used. For example, defining:
132 # Then starting a pod with the `inject.istio.io/templates: hello` annotation, will result in the pod
133 # being injected with the hello=world labels.
134 # This is intended for advanced configuration only; most users should use the built in template
136 # Default templates specifies a set of default templates that are used in sidecar injection.
137 # By default, a template `sidecar` is always provided, which contains the template of default sidecar.
138 # To inject other additional templates, define it using the `templates` option, and add it to
139 # the default templates list.
148 # defaultTemplates: ["sidecar", "hello"]
151 # If `true`, indicates that this cluster/install should consume a "remote istiod" installation,
152 # and istiod itself will NOT be installed in this cluster - only the support resources necessary
153 # to utilize a remote instance.
155 # If `true`, indicates that this cluster/install should consume a "local istiod" installation,
156 # local istiod inject sidecars
157 enabledLocalInjectorIstiod: false
158 # Sidecar injector mutating webhook configuration clientConfig.url value.
159 # For example: https://$remotePilotAddress:15017/inject
160 # The host should not refer to a service running in the cluster; use a service reference by specifying
161 # the clientConfig.service field instead.
163 # Sidecar injector mutating webhook configuration path value for the clientConfig.service field.
164 # Override to pass env variables, for example: /inject/cluster/remote/net/network2
165 injectionPath: "/inject"
166 injectionCABundle: ""
170 # For Null VM case now.
171 # This also enables metadata exchange.
173 # Indicate if prometheus stats filter is enabled or not
176 # stackdriver filter settings.
179 # Revision is set as 'version' label and part of the resource names when installing multiple control planes.
181 # Revision tags are aliases to Istio control plane revisions
183 # For Helm compatibility.
185 # meshConfig defines runtime configuration of components, including Istiod and istio-agent behavior
186 # See https://istio.io/docs/reference/config/istio.mesh.v1alpha1/ for all available options
188 enablePrometheusMerge: true
190 stableValidationPolicy: false
192 # Used to locate istiod.
193 istioNamespace: istio-system
194 # List of cert-signers to allow "approve" action in the istio cluster role
197 # - clusterissuers.cert-manager.io/istio-ca
199 # enable pod disruption budget for the control plane, which is used to
200 # ensure Istio control plane components are gradually upgraded or recovered.
201 defaultPodDisruptionBudget:
203 # The values aren't mutable due to a current PodDisruptionBudget limitation
205 # A minimal set of requested resources to applied to all deployments so that
206 # Horizontal Pod Autoscaler will be able to function (if set).
207 # Each component can overwrite these default values by adding its own resources
208 # block in the relevant section below and setting the desired resources values.
216 # Default hub for Istio images.
217 # Releases are published to docker hub under 'istio' project.
218 # Dev builds from prow are on gcr.io
219 hub: gcr.io/istio-testing
220 # Default tag for Istio images.
222 # Variant of the image to use.
223 # Currently supported are: [debug, distroless]
225 # Specify image pull policy if default behavior isn't desired.
226 # Default behavior: latest images will be Always else IfNotPresent.
228 # ImagePullSecrets for all ServiceAccount, list of secrets in the same namespace
229 # to use for pulling any images in pods that reference this ServiceAccount.
230 # For components that don't use ServiceAccounts (i.e. grafana, servicegraph, tracing)
231 # ImagePullSecrets will be added to the corresponding Deployment(StatefulSet) objects.
232 # Must be set for any cluster configured with private docker registry.
234 # - private-registry-key
236 # Enabled by default in master for maximising testing.
238 enableAnalysis: false
239 # To output all istio components logs in json format by adding --log_as_json argument to each container argument
241 # In order to use native nftable rules instead of iptable rules, set this flag to true.
242 nativeNftables: false
243 # Comma-separated minimum per-scope logging level of messages to output, in the form of <scope>:<level>,<scope>:<level>
244 # The control plane has different scopes depending on component, but can configure default log level across all components
245 # If empty, default scope and level will be used as configured in code
247 level: "default:info"
248 # When enabled, default NetworkPolicy resources will be created
251 omitSidecarInjectorConfigMap: false
252 # resourceScope controls what resources will be processed by helm.
253 # This is useful when installing Istio on a cluster where some resources need to be owned by a cluster administrator and some can be owned by the mesh administrator.
255 # - all: all resources are processed
256 # - cluster: only cluster-scoped resources are processed
257 # - namespace: only namespace-scoped resources are processed
259 # Configure whether Operator manages webhook configurations. The current behavior
260 # of Istiod is to manage its own webhook configurations.
261 # When this option is set as true, Istio Operator, instead of webhooks, manages the
262 # webhook configurations. When this option is set as false, webhooks manage their
263 # own webhook configurations.
264 operatorManageWebhooks: false
265 # Custom DNS config for the pod to resolve names of services in other
266 # clusters. Use this to add additional search domains, and other settings.
268 # https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#dns-config
269 # This does not apply to gateway pods as they typically need a different
270 # set of DNS settings than the normal application pods (e.g., in
271 # multicluster scenarios).
272 # NOTE: If using templates, follow the pattern in the commented example below.
273 #podDNSSearchNamespaces:
275 #- "{{ valueOrDefault .DeploymentMeta.Namespace \"default\" }}.global"
277 # Kubernetes >=v1.11.0 will create two PriorityClass, including system-cluster-critical and
278 # system-node-critical, it is better to configure this in order to make sure your Istio pods
279 # will not be killed because of low priority class.
280 # Refer to https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass
282 priorityClassName: ""
285 # This controls the 'policy' in the sidecar injector.
287 # CAUTION: It is important to ensure that all Istio helm charts specify the same clusterDomain value
288 # cluster domain. Default value is "cluster.local".
289 clusterDomain: "cluster.local"
290 # Per Component log level for proxy, applies to gateways and sidecars. If a component level is
291 # not set, then the global "logLevel" will be used.
292 componentLogLevel: "misc:error"
293 # istio ingress capture allowlist
295 # Redirect only selected ports: --includeInboundPorts="80,8080"
296 excludeInboundPorts: ""
297 includeInboundPorts: "*"
298 # istio egress capture allowlist
299 # https://istio.io/docs/tasks/traffic-management/egress.html#calling-external-services-directly
300 # example: includeIPRanges: "172.30.0.0/16,172.20.0.0/16"
301 # would only capture egress traffic on those two IP Ranges, all other outbound traffic would
302 # be allowed by the sidecar
305 includeOutboundPorts: ""
306 excludeOutboundPorts: ""
307 # Log level for proxy, applies to gateways and sidecars.
308 # Expected values are: trace|debug|info|warning|error|critical|off
310 # Specify the path to the outlier event log.
311 # Example: /dev/stdout
313 #If set to true, istio-proxy container will have privileged securityContext
316 # The number of successive failed probes before indicating readiness failure.
317 readinessFailureThreshold: 4
318 # The initial delay for readiness probes in seconds.
319 readinessInitialDelaySeconds: 0
320 # The period between readiness probes.
321 readinessPeriodSeconds: 15
322 # Enables or disables a startup probe.
323 # For optimal startup times, changing this should be tied to the readiness probe values.
325 # If the probe is enabled, it is recommended to have delay=0s,period=15s,failureThreshold=4.
326 # This ensures the pod is marked ready immediately after the startup probe passes (which has a 1s poll interval),
327 # and doesn't spam the readiness endpoint too much
329 # If the probe is disabled, it is recommended to have delay=1s,period=2s,failureThreshold=30.
330 # This ensures the startup is reasonable fast (polling every 2s). 1s delay is used since the startup is not often ready instantly.
333 failureThreshold: 600 # 10 minutes
334 # Resources for the sidecar.
342 # Default port for Pilot agent health checks. A value of 0 will disable health checking.
344 # Specify which tracer to use. One of: zipkin, lightstep, datadog, stackdriver, none.
345 # If using stackdriver tracer outside GCP, set env GOOGLE_APPLICATION_CREDENTIALS to the GCP credential file.
348 # Base name for the proxy_init container, used to configure iptables.
350 # Bypasses iptables idempotency handling, and attempts to apply iptables rules regardless of table state, which may cause unrecoverable failures.
351 # Do not use unless you need to work around an issue of the idempotency handling. This flag will be removed in future releases.
352 forceApplyIptables: false
353 # configure remote pilot and istiod service and endpoint
354 remotePilotAddress: ""
355 ##############################################################################################
356 # The following values are found in other charts. To effectively modify these values, make #
357 # make sure they are consistent across your Istio helm charts #
358 ##############################################################################################
360 # The customized CA address to retrieve certificates for the pods in the cluster.
361 # CSR clients such as the Istio Agent and ingress gateways can use this to specify the CA endpoint.
362 # If not set explicitly, default to the Istio discovery address.
364 # Enable control of remote clusters.
365 externalIstiod: false
366 # Configure a remote cluster as the config cluster for an external istiod.
368 # configValidation enables the validation webhook for Istio configuration.
369 configValidation: true
370 # Mesh ID means Mesh Identifier. It should be unique within the scope where
371 # meshes will interact with each other, but it is not required to be
372 # globally/universally unique. For example, if any of the following are true,
373 # then two meshes must have different Mesh IDs:
374 # - Meshes will have their telemetry aggregated in one place
375 # - Meshes will be federated together
376 # - Policy will be written referencing one mesh from the other
378 # If an administrator expects that any of these conditions may become true in
379 # the future, they should ensure their meshes have different Mesh IDs
382 # Within a multicluster mesh, each cluster must be (manually or auto)
383 # configured to have the same Mesh ID value. If an existing cluster 'joins' a
384 # multicluster mesh, it will need to be migrated to the new mesh ID. Details
385 # of migration TBD, and it may be a disruptive operation to change the Mesh
388 # If the mesh admin does not specify a value, Istio will use the value of the
389 # mesh's Trust Domain. The best practice is to select a proper Trust Domain
392 # Configure the mesh networks to be used by the Split Horizon EDS.
394 # The following example defines two networks with different endpoints association methods.
395 # For `network1` all endpoints that their IP belongs to the provided CIDR range will be
396 # mapped to network1. The gateway for this network example is specified by its public IP
398 # The second network, `network2`, in this example is defined differently with all endpoints
399 # retrieved through the specified Multi-Cluster registry being mapped to network2. The
400 # gateway is also defined differently with the name of the gateway service on the remote
401 # cluster. The public IP for the gateway will be determined from that remote service (only
402 # LoadBalancer gateway service type is currently supported, for a NodePort type gateway service,
403 # it still need to be configured manually).
408 # - fromCidr: "192.168.0.1/24"
414 # - fromRegistry: reg1
416 # - registryServiceName: istio-ingressgateway.istio-system.svc.cluster.local
420 # Use the user-specified, secret volume mounted key and certs for Pilot and workloads.
421 mountMtlsCerts: false
423 # Should be set to the name of the cluster this installation will run in. This is required for sidecar injection
424 # to properly label proxies
426 # Network defines the network this cluster belong to. This name
427 # corresponds to the networks in the map of mesh networks.
429 # Configure the certificate provider for control plane communication.
430 # Currently, two providers are supported: "kubernetes" and "istiod".
431 # As some platforms may not have kubernetes signing APIs,
432 # Istiod is the default
433 pilotCertProvider: istiod
435 # The JWT token for SDS and the aud field of such JWT. See RFC 7519, section 4.1.3.
436 # When a CSR is sent from Istio Agent to the CA (e.g. Istiod), this aud is to make sure the
437 # JWT is intended for the CA.
441 # The service port used by Security Token Service (STS) server to handle token exchange requests.
442 # Setting this port to a non-zero value enables STS server.
444 # The name of the CA for workload certificates.
445 # For example, when caName=GkeWorkloadCertificate, GKE workload certificates
446 # will be used as the certificates for workloads.
447 # The default value is "" and when caName="", the CA will be configured by other
448 # mechanisms (e.g., environmental variable CA_PROVIDER).
451 # Resources for the waypoint proxy.
459 # If specified, affinity defines the scheduling constraints of waypoint pods.
461 # Topology Spread Constraints for the waypoint proxy.
462 topologySpreadConstraints: []
463 # Node labels for the waypoint proxy.
465 # Tolerations for the waypoint proxy.
468 # For istioctl usage to disable istio config crds in base
469 enableIstioConfigCRDs: true
470 # Override the failurePolicy for the validation webhook.
471 # By default, the webhook starts with "Ignore" and istiod flips it to "Fail" once ready.
472 # Set to "Fail" to avoid the flip-flop, which is useful for server-side apply tools
473 # that do not support .Release.IsUpgrade (e.g. helm template | kubectl apply --server-side).
474 # validationFailurePolicy: Fail
477 # Define the security context for the pod.
478 # If unset, this will be automatically set to the minimum privileges required to bind to port 80 and 443.
479 # On Kubernetes 1.22+, this only requires the `net.ipv4.ip_unprivileged_port_start` sysctl.
481 # Set to `type: RuntimeDefault` to use the default profile for templated gateways, if your container runtime supports it
483 # gatewayClasses allows customizing the configuration of the default deployment of Gateways per GatewayClass.
490 # Per-Gateway configuration can also be set in the `Gateway.spec.infrastructure.parametersRef` field.
493 # -- Minimum available pods set in PodDisruptionBudget.
494 # Define either 'minAvailable' or 'maxUnavailable', never both.
496 # -- Maximum unavailable pods set in PodDisruptionBudget. If set, 'minAvailable' is ignored.
498 # -- Eviction policy for unhealthy pods guarded by PodDisruptionBudget.
499 # Ref: https://kubernetes.io/blog/2023/01/06/unhealthy-pod-eviction-policy-for-pdbs/
500 unhealthyPodEvictionPolicy: ""