Authorizations
Token API are generated by Qovery to manage machine to machine interaction and do not have a TTL. Prefix your token with "Token ". Curl Example: curl https://console.qovery.com/organization -H "Authorization: Token $qovery_token"
Response
Default cluster advanced settings
Set the number of retention days for EKS Cloudwatch logs
Enable flow logs for on the VPC and store them in an S3 bucket
Set the number of retention days for flow logs. Disable with value "0"
For how long in week loki is going to keep logs of your applications
Configure the number of seconds before cleaning images in the registry
Add additional tags on the cluster dedicated registry
Enable the AWS ALB controller to manage the load balancer for the cluster. Note: Changing this feature will create a 10 min max downtime on your application's public access (time to delete, replace and propagate DNS of the new load balancer) and will requiere to update all services with TCP/UDP open ports.
Select the size of the main load_balancer (only effective for Scaleway)
Deny public access to any PostgreSQL database
List of CIDRs allowed to access the PostgreSQL database
Deny public access to any MySql database
List of CIDRs allowed to access the MySql database
Deny public access to any MongoDB/DocumentDB database
List of CIDRs allowed to access the MongoDB/DocumentDB database
Deny public access to any Redis database
List of CIDRs allowed to access the Redis database
AWS IAM group name with cluster access
Mirroring mode when deploying a service from a container registry
- Cluster: This is not available on Scaleway. Images within the mirroring registry are organized by "Qovery cluster", meaning that the application deployed on the same cluster are all mirrored on the same repository.
- Service: Images within the mirroring registry are organized by "Qovery service", each service has its own repository
Cluster, Service vcpu request in millicores
vcpu limit in millicores
memory request in MiB
memory limit in MiB
hpa cpu threshold in percentage
hpa minimum number of instances
hpa maximum number of instances
storage class name to use to provision pvc
To limit public access from the internet to your Kubernetes cluster endpoint. You can define whitelisted CIDR in k8s.api.allowed_public_access_cidrs.
Set custom sources to public access endpoint. Use CIDR notation to specify an IP address range (for example, ['203.0.113.5/32','203.0.100/32'])