Skip to content

Commit

Permalink
docs: Add section for external etcd about identity-allocation-mode
Browse files Browse the repository at this point in the history
Users have reported that they weren't aware of this option when using
external etcd. It is not required, but better to raise awareness.

Signed-off-by: Chris Tarazi <chris@isovalent.com>
  • Loading branch information
christarazi committed Jan 20, 2021
1 parent 004041f commit 3adec2a
Show file tree
Hide file tree
Showing 2 changed files with 14 additions and 1 deletion.
6 changes: 6 additions & 0 deletions Documentation/gettingstarted/k8s-install-etcd-operator.rst
Expand Up @@ -43,6 +43,12 @@ Deploy Cilium release via Helm:
--set etcd.managed=true \\
--set etcd.k8sService=true
If you do not want Cilium to store state in Kubernetes custom resources (CRDs),
consider setting ``identityAllocationMode``:

.. parsed-literal::
--set identityAllocationMode=kvstore
Validate the Installation
=========================
Expand Down
9 changes: 8 additions & 1 deletion Documentation/gettingstarted/k8s-install-external-etcd.rst
Expand Up @@ -61,6 +61,13 @@ Deploy Cilium release via Helm:
--set "etcd.endpoints[1]=http://etcd-endpoint2:2379" \\
--set "etcd.endpoints[2]=http://etcd-endpoint3:2379"
If you do not want Cilium to store state in Kubernetes custom resources (CRDs),
consider setting ``identityAllocationMode``:

.. parsed-literal::
--set identityAllocationMode=kvstore
Optional: Configure the SSL certificates
----------------------------------------
Expand Down Expand Up @@ -104,4 +111,4 @@ Verify that Cilium pods were started on each of your worker nodes
cilium-operator 2/2 2 2 2m6s
.. include:: namespace-kube-system.rst
.. include:: hubble-enable.rst
.. include:: hubble-enable.rst

0 comments on commit 3adec2a

Please sign in to comment.