-
Notifications
You must be signed in to change notification settings - Fork 63
/
egress-sample.yaml
92 lines (81 loc) · 2.16 KB
/
egress-sample.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
replicaCount: 1
# Suggested value for gracefully terminate the pod: 1 hour
terminationGracePeriodSeconds: 3600
egress:
api_key: "server-api-key"
api_secret: "server-api-secret"
ws_url: "ws://livekit-host:<port>"
log_level: info
health_port: 8080
prometheus_port: 9090
enable_chrome_sandbox: true
# template_base: "https://your-custom-template.com"
redis:
address: <redis_host:port>
# db: 0
# username:
# password:
# use_tls: false
s3:
access_key: "access_key"
secret: "secret"
region: "us-west-2"
# endpoint:
bucket: "my-egress"
# azure:
# account_name:
# account_key:
# container_name:
# gcp:
# credentials_json:
# bucket:
# cpu_cost:
# room_composite_cpu_cost: 3
# track_composite_cpu_cost: 2
# track_cpu_cost: 1
# autoscaling requires resources to be defined
autoscaling:
# set to true to enable autoscaling. when set, ignores replicaCount
enabled: false
minReplicas: 1
maxReplicas: 5
targetCPUUtilizationPercentage: 60
# targetMemoryUtilizationPercentage: 60
# for use with prometheus adapter - the egress service outputs a prometheus metric called livekit_egress_available
# this can be used to ensure a certain number or percentage of instances are available
# custom:
# metricName: my_metric_name
# targetAverageValue: 70
# if egress should run only on specific nodes
# this can be used to isolate designated nodes
nodeSelector: {}
# node.kubernetes.io/instance-type: c5.2xlarge
resources: {}
# requests:
# cpu: 5000m
# memory: 1024Mi
# limits:
# cpu: 8000m
# memory: 2048Mi
serviceAccount:
# Specifies whether a service account should be created
create: false
# Annotations to add to the service account
annotations: {}
# The name of the service account to use.
# If not set and create is true, a name is generated using the fullname template
name: ""
podAnnotations:
sidecar.istio.io/inject: "false"
linkerd.io/inject: disabled
podSecurityContext: {}
# fsGroup: 2000
securityContext: {}
# capabilities:
# drop:
# - ALL
# readOnlyRootFilesystem: true
# runAsNonRoot: true
# runAsUser: 1000
tolerations: []
affinity: {}