# Default values for rancher-windows-exporter. # This is a YAML-formatted file. # Declare variables to be passed into your templates. # Configuration global: cattle: systemDefaultRegistry: "" rkeWindowsPathPrefix: "c:\\" ## One or more configurations for the wins server to be applied across all of the nodes based on the nodeSelector and tolerations provided ## winsConfigs: - name: default image: # TODO(aiyengar2): replace with an image that just contains wins repository: rancher/wins tag: v0.1.1 os: "windows" config: | debug: false listen: rancher_wins proxy: rancher_wins_proxy whiteList: processPaths: - {{ default "c:\\" .Values.global.cattle.rkeWindowsPathPrefix | replace "/" "\\" }}etc\rancher\wins\wins-upgrade.exe - {{ default "c:\\" .Values.global.cattle.rkeWindowsPathPrefix | replace "/" "\\" }}etc\windows-exporter\windows-exporter.exe - {{ default "c:\\" .Values.global.cattle.rkeWindowsPathPrefix | replace "/" "\\" }}etc\wmi-exporter\wmi-exporter.exe - {{ default "c:\\" .Values.global.cattle.rkeWindowsPathPrefix | replace "/" "\\" }}etc\kubernetes\bin\kube-proxy.exe - {{ default "c:\\" .Values.global.cattle.rkeWindowsPathPrefix | replace "/" "\\" }}etc\kubernetes\bin\kubelet.exe - {{ default "c:\\" .Values.global.cattle.rkeWindowsPathPrefix | replace "/" "\\" }}etc\nginx\nginx.exe - {{ default "c:\\" .Values.global.cattle.rkeWindowsPathPrefix | replace "/" "\\" }}opt\bin\flanneld.exe proxyPorts: - 9796 upgrade: mode: watching watchingPath: {{ default "c:\\" .Values.global.cattle.rkeWindowsPathPrefix | replace "/" "\\" }}etc\rancher\wins\wins.exe # By default, `kubernetes.io/os: windows` or `beta.kubernetes.io/os: windows` will be included nodeSelector: {} # If provided, these tolerations will be used. Otherwise, it defaults to `[ {operator: Exists} ]` tolerations: [] ## Masquerade is *only* meant as a hack to allow users who are currently operating on Windows clusters that do ## not support wins upgrades (e.g. those which have not whitelisted {{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe) ## to be able to masquerade the payload for this installer under another whitelisted process's name. ## ## Please read the README.md before trying to enable this option and, if applied, ensure that you immediately upgrade ## this chart with masquerade.enabled=false to avoid any unintentional consequences (e.g. failure to install the original ## process that you meant to whitelist on the host) ## ## TLDR: Use at your own risk. Here be dragons... ## masquerade: enabled: false # Why wmi_exporter? # wmi_exporter is the only default whitelisted process that may or may not be run on the host, since # it is only ever deployed if the Windows cluster is also using Prometheus-based Windows monitoring (e.g. Rancher Monitoring V1) # All of the other default whitelisted processes are required for the Kubernetes cluster to operate as: '{{ default "c:\\" .Values.global.cattle.rkeWindowsPathPrefix | replace "/" "\\" }}etc\wmi-exporter\wmi-exporter.exe'