Automated Manifest Update (#3741)

This PR contains newly rendered Kubernetes manifests automatically generated by the CI workflow.

Reviewed-on: #3741
Co-authored-by: gitea-bot <gitea-bot@alexlebens.net>
Co-committed-by: gitea-bot <gitea-bot@alexlebens.net>
This commit was merged in pull request #3741.
This commit is contained in:
2026-02-05 18:29:41 +00:00
committed by Alex Lebens
parent cdea8999c1
commit f8a652bc25
14 changed files with 57 additions and 106 deletions

View File

@@ -58,13 +58,11 @@ data:
tunnel-protocol: "vxlan"
tunnel-source-port-range: "0-0"
service-no-backend-response: "reject"
policy-deny-response: "none"
enable-l7-proxy: "true"
enable-ipv4-masquerade: "true"
enable-ipv4-big-tcp: "false"
enable-ipv6-big-tcp: "false"
enable-ipv6-masquerade: "true"
enable-tunnel-big-tcp: "false"
enable-tcx: "true"
datapath-mode: "veth"
enable-masquerade-to-route-source: "false"
@@ -76,7 +74,6 @@ data:
devices: "end0 enp6s0"
kube-proxy-replacement: "true"
kube-proxy-replacement-healthz-bind-address: ""
enable-no-service-endpoints-routable: "true"
bpf-lb-sock: "true"
bpf-lb-sock-hostns-only: "true"
enable-health-check-nodeport: "true"
@@ -84,6 +81,7 @@ data:
node-port-bind-protection: "true"
enable-auto-protect-node-port-range: "true"
bpf-lb-acceleration: "disabled"
enable-svc-source-range-check: "true"
enable-l2-neigh-discovery: "false"
k8s-require-ipv4-pod-cidr: "false"
k8s-require-ipv6-pod-cidr: "false"
@@ -116,7 +114,7 @@ data:
vtep-cidr: ""
vtep-mask: ""
vtep-mac: ""
packetization-layer-pmtud-mode: "blackhole"
enable-k8s-endpoint-slice: "true"
procfs: "/host/proc"
bpf-root: "/sys/fs/bpf"
cgroup-root: "/sys/fs/cgroup"
@@ -129,7 +127,7 @@ data:
remove-cilium-node-taints: "true"
set-cilium-node-taints: "true"
set-cilium-is-up-condition: "true"
unmanaged-pod-watcher-interval: "15s"
unmanaged-pod-watcher-interval: "15"
dnsproxy-enable-transparent-mode: "true"
dnsproxy-socket-linger-timeout: "10"
tofqdns-dns-reject-response-code: "refused"
@@ -140,7 +138,7 @@ data:
tofqdns-proxy-response-max-delay: "100ms"
tofqdns-preallocate-identities: "true"
agent-not-ready-taint-key: "node.cilium.io/agent-not-ready"
mesh-auth-enabled: "false"
mesh-auth-enabled: "true"
mesh-auth-queue-size: "1024"
mesh-auth-rotated-identities-queue-size: "1024"
mesh-auth-gc-interval: "5m0s"
@@ -148,14 +146,10 @@ data:
proxy-xff-num-trusted-hops-egress: "0"
proxy-connect-timeout: "2"
proxy-initial-fetch-timeout: "30"
proxy-max-active-downstream-connections: "50000"
proxy-max-requests-per-connection: "0"
proxy-max-connection-duration-seconds: "0"
proxy-idle-timeout-seconds: "60"
proxy-max-concurrent-retries: "128"
proxy-use-original-source-address: "true"
proxy-cluster-max-connections: "1024"
proxy-cluster-max-requests: "1024"
http-retry-count: "3"
http-stream-idle-timeout: "300"
external-envoy-proxy: "true"
@@ -163,13 +157,12 @@ data:
envoy-access-log-buffer-size: "4096"
envoy-keep-cap-netbindservice: "true"
max-connected-clusters: "255"
clustermesh-cache-ttl: "0s"
clustermesh-enable-endpoint-sync: "false"
clustermesh-enable-mcs-api: "false"
clustermesh-mcs-api-install-crds: "true"
policy-default-local-cluster: "true"
policy-default-local-cluster: "false"
nat-map-stats-entries: "32"
nat-map-stats-interval: "30s"
enable-internal-traffic-policy: "true"
enable-lb-ipam: "true"
enable-non-default-deny-policies: "true"
enable-source-ip-verification: "true"