12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379 |
- # helm upgrade --install postgres oci://registry-1.docker.io/bitnamicharts/postgresql -n postgres -f values.yaml --version 11.6.7
- # Dump a DB from a pod to disk
- # kubectl -n postgres exec -it postgres-postgresql-0 -- bash -c 'PGPASSWORD=<password> pg_dump -U <user> <db name>' > /path/to/db.pgdump
- ## @section Global parameters
- ## Please, note that this will override the parameters, including dependencies, configured to use the global value
- ##
- global:
- ## @param global.imageRegistry Global Docker image registry
- ##
- imageRegistry: ""
- ## @param global.imagePullSecrets Global Docker registry secret names as an array
- ## e.g.
- ## imagePullSecrets:
- ## - myRegistryKeySecretName
- ##
- imagePullSecrets: []
- ## @param global.storageClass Global StorageClass for Persistent Volume(s)
- ##
- storageClass: "ceph-block"
- postgresql:
- ## @param global.postgresql.auth.postgresPassword Password for the "postgres" admin user (overrides `auth.postgresPassword`)
- ## @param global.postgresql.auth.username Name for a custom user to create (overrides `auth.username`)
- ## @param global.postgresql.auth.password Password for the custom user to create (overrides `auth.password`)
- ## @param global.postgresql.auth.database Name for a custom database to create (overrides `auth.database`)
- ## @param global.postgresql.auth.existingSecret Name of existing secret to use for PostgreSQL credentials (overrides `auth.existingSecret`).
- ## @param global.postgresql.auth.secretKeys.adminPasswordKey Name of key in existing secret to use for PostgreSQL credentials (overrides `auth.secretKeys.adminPasswordKey`). Only used when `global.postgresql.auth.existingSecret` is set.
- ## @param global.postgresql.auth.secretKeys.userPasswordKey Name of key in existing secret to use for PostgreSQL credentials (overrides `auth.secretKeys.userPasswordKey`). Only used when `global.postgresql.auth.existingSecret` is set.
- ## @param global.postgresql.auth.secretKeys.replicationPasswordKey Name of key in existing secret to use for PostgreSQL credentials (overrides `auth.secretKeys.replicationPasswordKey`). Only used when `global.postgresql.auth.existingSecret` is set.
- ##
- auth:
- postgresPassword: ""
- username: ""
- password: ""
- database: ""
- existingSecret: ""
- secretKeys:
- adminPasswordKey: ""
- userPasswordKey: ""
- replicationPasswordKey: ""
- ## @param global.postgresql.service.ports.postgresql PostgreSQL service port (overrides `service.ports.postgresql`)
- ##
- service:
- ports:
- postgresql: ""
- ## @section Common parameters
- ##
- ## @param kubeVersion Override Kubernetes version
- ##
- kubeVersion: ""
- ## @param nameOverride String to partially override common.names.fullname template (will maintain the release name)
- ##
- nameOverride: ""
- ## @param fullnameOverride String to fully override common.names.fullname template
- ##
- fullnameOverride: ""
- ## @param clusterDomain Kubernetes Cluster Domain
- ##
- clusterDomain: cluster.local
- ## @param extraDeploy Array of extra objects to deploy with the release (evaluated as a template)
- ##
- extraDeploy: []
- ## @param commonLabels Add labels to all the deployed resources
- ##
- commonLabels: {}
- ## @param commonAnnotations Add annotations to all the deployed resources
- ##
- commonAnnotations: {}
- ## Enable diagnostic mode in the statefulset
- ##
- diagnosticMode:
- ## @param diagnosticMode.enabled Enable diagnostic mode (all probes will be disabled and the command will be overridden)
- ##
- enabled: false
- ## @param diagnosticMode.command Command to override all containers in the statefulset
- ##
- command:
- - sleep
- ## @param diagnosticMode.args Args to override all containers in the statefulset
- ##
- args:
- - infinity
- ## @section PostgreSQL common parameters
- ##
- ## Bitnami PostgreSQL image version
- ## ref: https://hub.docker.com/r/bitnami/postgresql/tags/
- ## @param image.registry PostgreSQL image registry
- ## @param image.repository PostgreSQL image repository
- ## @param image.tag PostgreSQL image tag (immutable tags are recommended)
- ## @param image.pullPolicy PostgreSQL image pull policy
- ## @param image.pullSecrets Specify image pull secrets
- ## @param image.debug Specify if debug values should be set
- ##
- image:
- registry: docker.io
- repository: bitnami/postgresql
- tag: 14.4.0-debian-11-r0
- ## Specify a imagePullPolicy
- ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
- ## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images
- ##
- pullPolicy: IfNotPresent
- ## Optionally specify an array of imagePullSecrets.
- ## Secrets must be manually created in the namespace.
- ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
- ## Example:
- ## pullSecrets:
- ## - myRegistryKeySecretName
- ##
- pullSecrets: []
- ## Set to true if you would like to see extra information on logs
- ##
- debug: false
- ## Authentication parameters
- ## ref: https://github.com/bitnami/bitnami-docker-postgresql/blob/master/README.md#setting-the-root-password-on-first-run
- ## ref: https://github.com/bitnami/bitnami-docker-postgresql/blob/master/README.md#creating-a-database-on-first-run
- ## ref: https://github.com/bitnami/bitnami-docker-postgresql/blob/master/README.md#creating-a-database-user-on-first-run
- ##
- auth:
- ## @param auth.enablePostgresUser Assign a password to the "postgres" admin user. Otherwise, remote access will be blocked for this user
- ##
- enablePostgresUser: true
- ## @param auth.postgresPassword Password for the "postgres" admin user. Ignored if `auth.existingSecret` with key `postgres-password` is provided
- ##
- postgresPassword: ""
- ## @param auth.username Name for a custom user to create
- ##
- username: ""
- ## @param auth.password Password for the custom user to create. Ignored if `auth.existingSecret` with key `password` is provided
- ##
- password: ""
- ## @param auth.database Name for a custom database to create
- ##
- database: ""
- ## @param auth.replicationUsername Name of the replication user
- ##
- replicationUsername: repl_user
- ## @param auth.replicationPassword Password for the replication user. Ignored if `auth.existingSecret` with key `replication-password` is provided
- ##
- replicationPassword: ""
- ## @param auth.existingSecret Name of existing secret to use for PostgreSQL credentials. `auth.postgresPassword`, `auth.password`, and `auth.replicationPassword` will be ignored and picked up from this secret. The secret might also contains the key `ldap-password` if LDAP is enabled. `ldap.bind_password` will be ignored and picked from this secret in this case.
- ##
- existingSecret: ""
- ## @param auth.secretKeys.adminPasswordKey Name of key in existing secret to use for PostgreSQL credentials. Only used when `auth.existingSecret` is set.
- ## @param auth.secretKeys.userPasswordKey Name of key in existing secret to use for PostgreSQL credentials. Only used when `auth.existingSecret` is set.
- ## @param auth.secretKeys.replicationPasswordKey Name of key in existing secret to use for PostgreSQL credentials. Only used when `auth.existingSecret` is set.
- ##
- secretKeys:
- adminPasswordKey: postgres-password
- userPasswordKey: password
- replicationPasswordKey: replication-password
- ## @param auth.usePasswordFiles Mount credentials as a files instead of using an environment variable
- ##
- usePasswordFiles: false
- ## @param architecture PostgreSQL architecture (`standalone` or `replication`)
- ##
- architecture: standalone
- ## Replication configuration
- ## Ignored if `architecture` is `standalone`
- ##
- replication:
- ## @param replication.synchronousCommit Set synchronous commit mode. Allowed values: `on`, `remote_apply`, `remote_write`, `local` and `off`
- ## @param replication.numSynchronousReplicas Number of replicas that will have synchronous replication. Note: Cannot be greater than `readReplicas.replicaCount`.
- ## ref: https://www.postgresql.org/docs/current/runtime-config-wal.html#GUC-SYNCHRONOUS-COMMIT
- ##
- synchronousCommit: "off"
- numSynchronousReplicas: 0
- ## @param replication.applicationName Cluster application name. Useful for advanced replication settings
- ##
- applicationName: my_application
- ## @param containerPorts.postgresql PostgreSQL container port
- ##
- containerPorts:
- postgresql: 5432
- ## Audit settings
- ## https://github.com/bitnami/bitnami-docker-postgresql#auditing
- ## @param audit.logHostname Log client hostnames
- ## @param audit.logConnections Add client log-in operations to the log file
- ## @param audit.logDisconnections Add client log-outs operations to the log file
- ## @param audit.pgAuditLog Add operations to log using the pgAudit extension
- ## @param audit.pgAuditLogCatalog Log catalog using pgAudit
- ## @param audit.clientMinMessages Message log level to share with the user
- ## @param audit.logLinePrefix Template for log line prefix (default if not set)
- ## @param audit.logTimezone Timezone for the log timestamps
- ##
- audit:
- logHostname: false
- logConnections: false
- logDisconnections: false
- pgAuditLog: ""
- pgAuditLogCatalog: "off"
- clientMinMessages: error
- logLinePrefix: ""
- logTimezone: ""
- ## LDAP configuration
- ## @param ldap.enabled Enable LDAP support
- ## DEPRECATED ldap.url It will removed in a future, please use 'ldap.uri' instead
- ## @param ldap.server IP address or name of the LDAP server.
- ## @param ldap.port Port number on the LDAP server to connect to
- ## @param ldap.prefix String to prepend to the user name when forming the DN to bind
- ## @param ldap.suffix String to append to the user name when forming the DN to bind
- ## DEPRECATED ldap.baseDN It will removed in a future, please use 'ldap.basedn' instead
- ## DEPRECATED ldap.bindDN It will removed in a future, please use 'ldap.binddn' instead
- ## DEPRECATED ldap.bind_password It will removed in a future, please use 'ldap.bindpw' instead
- ## @param ldap.basedn Root DN to begin the search for the user in
- ## @param ldap.binddn DN of user to bind to LDAP
- ## @param ldap.bindpw Password for the user to bind to LDAP
- ## DEPRECATED ldap.search_attr It will removed in a future, please use 'ldap.searchAttribute' instead
- ## DEPRECATED ldap.search_filter It will removed in a future, please use 'ldap.searchFilter' instead
- ## @param ldap.searchAttribute Attribute to match against the user name in the search
- ## @param ldap.searchFilter The search filter to use when doing search+bind authentication
- ## @param ldap.scheme Set to `ldaps` to use LDAPS
- ## DEPRECATED ldap.tls as string is deprecated,please use 'ldap.tls.enabled' instead
- ## @param ldap.tls.enabled Se to true to enable TLS encryption
- ##
- ldap:
- enabled: false
- server: ""
- port: ""
- prefix: ""
- suffix: ""
- basedn: ""
- binddn: ""
- bindpw: ""
- searchAttribute: ""
- searchFilter: ""
- scheme: ""
- tls:
- enabled: false
- ## @param ldap.uri LDAP URL beginning in the form `ldap[s]://host[:port]/basedn`. If provided, all the other LDAP parameters will be ignored.
- ## Ref: https://www.postgresql.org/docs/current/auth-ldap.html
- uri: ""
- ## @param postgresqlDataDir PostgreSQL data dir folder
- ##
- postgresqlDataDir: /bitnami/postgresql/data
- ## @param postgresqlSharedPreloadLibraries Shared preload libraries (comma-separated list)
- ##
- postgresqlSharedPreloadLibraries: "pgaudit"
- ## Start PostgreSQL pod(s) without limitations on shm memory.
- ## By default docker and containerd (and possibly other container runtimes) limit `/dev/shm` to `64M`
- ## ref: https://github.com/docker-library/postgres/issues/416
- ## ref: https://github.com/containerd/containerd/issues/3654
- ##
- shmVolume:
- ## @param shmVolume.enabled Enable emptyDir volume for /dev/shm for PostgreSQL pod(s)
- ##
- enabled: true
- ## @param shmVolume.sizeLimit Set this to enable a size limit on the shm tmpfs
- ## Note: the size of the tmpfs counts against container's memory limit
- ## e.g:
- ## sizeLimit: 1Gi
- ##
- sizeLimit: ""
- ## TLS configuration
- ##
- tls:
- ## @param tls.enabled Enable TLS traffic support
- ##
- enabled: false
- ## @param tls.autoGenerated Generate automatically self-signed TLS certificates
- ##
- autoGenerated: false
- ## @param tls.preferServerCiphers Whether to use the server's TLS cipher preferences rather than the client's
- ##
- preferServerCiphers: true
- ## @param tls.certificatesSecret Name of an existing secret that contains the certificates
- ##
- certificatesSecret: ""
- ## @param tls.certFilename Certificate filename
- ##
- certFilename: ""
- ## @param tls.certKeyFilename Certificate key filename
- ##
- certKeyFilename: ""
- ## @param tls.certCAFilename CA Certificate filename
- ## If provided, PostgreSQL will authenticate TLS/SSL clients by requesting them a certificate
- ## ref: https://www.postgresql.org/docs/9.6/auth-methods.html
- ##
- certCAFilename: ""
- ## @param tls.crlFilename File containing a Certificate Revocation List
- ##
- crlFilename: ""
- ## @section PostgreSQL Primary parameters
- ##
- primary:
- ## @param primary.configuration PostgreSQL Primary main configuration to be injected as ConfigMap
- ## ref: https://www.postgresql.org/docs/current/static/runtime-config.html
- ##
- configuration: ""
- ## @param primary.pgHbaConfiguration PostgreSQL Primary client authentication configuration
- ## ref: https://www.postgresql.org/docs/current/static/auth-pg-hba-conf.html
- ## e.g:#
- ## pgHbaConfiguration: |-
- ## local all all trust
- ## host all all localhost trust
- ## host mydatabase mysuser 192.168.0.0/24 md5
- ##
- pgHbaConfiguration: ""
- ## @param primary.existingConfigmap Name of an existing ConfigMap with PostgreSQL Primary configuration
- ## NOTE: `primary.configuration` and `primary.pgHbaConfiguration` will be ignored
- ##
- existingConfigmap: ""
- ## @param primary.extendedConfiguration Extended PostgreSQL Primary configuration (appended to main or default configuration)
- ## ref: https://github.com/bitnami/bitnami-docker-postgresql#allow-settings-to-be-loaded-from-files-other-than-the-default-postgresqlconf
- ##
- extendedConfiguration: ""
- ## @param primary.existingExtendedConfigmap Name of an existing ConfigMap with PostgreSQL Primary extended configuration
- ## NOTE: `primary.extendedConfiguration` will be ignored
- ##
- existingExtendedConfigmap: ""
- ## Initdb configuration
- ## ref: https://github.com/bitnami/bitnami-docker-postgresql/blob/master/README.md#specifying-initdb-arguments
- ##
- initdb:
- ## @param primary.initdb.args PostgreSQL initdb extra arguments
- ##
- args: ""
- ## @param primary.initdb.postgresqlWalDir Specify a custom location for the PostgreSQL transaction log
- ##
- postgresqlWalDir: ""
- ## @param primary.initdb.scripts Dictionary of initdb scripts
- ## Specify dictionary of scripts to be run at first boot
- ## e.g:
- ## scripts:
- ## my_init_script.sh: |
- ## #!/bin/sh
- ## echo "Do something."
- ##
- scripts: {}
- ## @param primary.initdb.scriptsConfigMap ConfigMap with scripts to be run at first boot
- ## NOTE: This will override `primary.initdb.scripts`
- ##
- scriptsConfigMap: ""
- ## @param primary.initdb.scriptsSecret Secret with scripts to be run at first boot (in case it contains sensitive information)
- ## NOTE: This can work along `primary.initdb.scripts` or `primary.initdb.scriptsConfigMap`
- ##
- scriptsSecret: ""
- ## @param primary.initdb.user Specify the PostgreSQL username to execute the initdb scripts
- ##
- user: ""
- ## @param primary.initdb.password Specify the PostgreSQL password to execute the initdb scripts
- ##
- password: ""
- ## Configure current cluster's primary server to be the standby server in other cluster.
- ## This will allow cross cluster replication and provide cross cluster high availability.
- ## You will need to configure pgHbaConfiguration if you want to enable this feature with local cluster replication enabled.
- ## @param primary.standby.enabled Whether to enable current cluster's primary as standby server of another cluster or not
- ## @param primary.standby.primaryHost The Host of replication primary in the other cluster
- ## @param primary.standby.primaryPort The Port of replication primary in the other cluster
- ##
- standby:
- enabled: false
- primaryHost: ""
- primaryPort: ""
- ## @param primary.extraEnvVars Array with extra environment variables to add to PostgreSQL Primary nodes
- ## e.g:
- ## extraEnvVars:
- ## - name: FOO
- ## value: "bar"
- ##
- extraEnvVars: []
- ## @param primary.extraEnvVarsCM Name of existing ConfigMap containing extra env vars for PostgreSQL Primary nodes
- ##
- extraEnvVarsCM: ""
- ## @param primary.extraEnvVarsSecret Name of existing Secret containing extra env vars for PostgreSQL Primary nodes
- ##
- extraEnvVarsSecret: ""
- ## @param primary.command Override default container command (useful when using custom images)
- ##
- command: []
- ## @param primary.args Override default container args (useful when using custom images)
- ##
- args: []
- ## Configure extra options for PostgreSQL Primary containers' liveness, readiness and startup probes
- ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes
- ## @param primary.livenessProbe.enabled Enable livenessProbe on PostgreSQL Primary containers
- ## @param primary.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe
- ## @param primary.livenessProbe.periodSeconds Period seconds for livenessProbe
- ## @param primary.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe
- ## @param primary.livenessProbe.failureThreshold Failure threshold for livenessProbe
- ## @param primary.livenessProbe.successThreshold Success threshold for livenessProbe
- ##
- livenessProbe:
- enabled: true
- initialDelaySeconds: 30
- periodSeconds: 10
- timeoutSeconds: 5
- failureThreshold: 6
- successThreshold: 1
- ## @param primary.readinessProbe.enabled Enable readinessProbe on PostgreSQL Primary containers
- ## @param primary.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe
- ## @param primary.readinessProbe.periodSeconds Period seconds for readinessProbe
- ## @param primary.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe
- ## @param primary.readinessProbe.failureThreshold Failure threshold for readinessProbe
- ## @param primary.readinessProbe.successThreshold Success threshold for readinessProbe
- ##
- readinessProbe:
- enabled: true
- initialDelaySeconds: 5
- periodSeconds: 10
- timeoutSeconds: 5
- failureThreshold: 6
- successThreshold: 1
- ## @param primary.startupProbe.enabled Enable startupProbe on PostgreSQL Primary containers
- ## @param primary.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe
- ## @param primary.startupProbe.periodSeconds Period seconds for startupProbe
- ## @param primary.startupProbe.timeoutSeconds Timeout seconds for startupProbe
- ## @param primary.startupProbe.failureThreshold Failure threshold for startupProbe
- ## @param primary.startupProbe.successThreshold Success threshold for startupProbe
- ##
- startupProbe:
- enabled: false
- initialDelaySeconds: 30
- periodSeconds: 10
- timeoutSeconds: 1
- failureThreshold: 15
- successThreshold: 1
- ## @param primary.customLivenessProbe Custom livenessProbe that overrides the default one
- ##
- customLivenessProbe: {}
- ## @param primary.customReadinessProbe Custom readinessProbe that overrides the default one
- ##
- customReadinessProbe: {}
- ## @param primary.customStartupProbe Custom startupProbe that overrides the default one
- ##
- customStartupProbe: {}
- ## @param primary.lifecycleHooks for the PostgreSQL Primary container to automate configuration before or after startup
- ##
- lifecycleHooks: {}
- ## PostgreSQL Primary resource requests and limits
- ## ref: https://kubernetes.io/docs/user-guide/compute-resources/
- ## @param primary.resources.limits The resources limits for the PostgreSQL Primary containers
- ## @param primary.resources.requests.memory The requested memory for the PostgreSQL Primary containers
- ## @param primary.resources.requests.cpu The requested cpu for the PostgreSQL Primary containers
- ##
- resources:
- limits: {}
- requests:
- memory: 256Mi
- cpu: 250m
- ## Pod Security Context
- ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
- ## @param primary.podSecurityContext.enabled Enable security context
- ## @param primary.podSecurityContext.fsGroup Group ID for the pod
- ##
- podSecurityContext:
- enabled: true
- fsGroup: 1001
- ## Container Security Context
- ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
- ## @param primary.containerSecurityContext.enabled Enable container security context
- ## @param primary.containerSecurityContext.runAsUser User ID for the container
- ##
- containerSecurityContext:
- enabled: true
- runAsUser: 1001
- ## @param primary.hostAliases PostgreSQL primary pods host aliases
- ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/
- ##
- hostAliases: []
- ## @param primary.hostNetwork Specify if host network should be enabled for PostgreSQL pod (postgresql primary)
- ##
- hostNetwork: false
- ## @param primary.hostIPC Specify if host IPC should be enabled for PostgreSQL pod (postgresql primary)
- ##
- hostIPC: false
- ## @param primary.labels Map of labels to add to the statefulset (postgresql primary)
- ##
- labels: {}
- ## @param primary.annotations Annotations for PostgreSQL primary pods
- ##
- annotations: {}
- ## @param primary.podLabels Map of labels to add to the pods (postgresql primary)
- ##
- podLabels: {}
- ## @param primary.podAnnotations Map of annotations to add to the pods (postgresql primary)
- ##
- podAnnotations: {}
- ## @param primary.podAffinityPreset PostgreSQL primary pod affinity preset. Ignored if `primary.affinity` is set. Allowed values: `soft` or `hard`
- ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity
- ##
- podAffinityPreset: ""
- ## @param primary.podAntiAffinityPreset PostgreSQL primary pod anti-affinity preset. Ignored if `primary.affinity` is set. Allowed values: `soft` or `hard`
- ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity
- ##
- podAntiAffinityPreset: soft
- ## PostgreSQL Primary node affinity preset
- ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity
- ##
- nodeAffinityPreset:
- ## @param primary.nodeAffinityPreset.type PostgreSQL primary node affinity preset type. Ignored if `primary.affinity` is set. Allowed values: `soft` or `hard`
- ##
- type: ""
- ## @param primary.nodeAffinityPreset.key PostgreSQL primary node label key to match Ignored if `primary.affinity` is set.
- ## E.g.
- ## key: "kubernetes.io/e2e-az-name"
- ##
- key: ""
- ## @param primary.nodeAffinityPreset.values PostgreSQL primary node label values to match. Ignored if `primary.affinity` is set.
- ## E.g.
- ## values:
- ## - e2e-az1
- ## - e2e-az2
- ##
- values: []
- ## @param primary.affinity Affinity for PostgreSQL primary pods assignment
- ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
- ## Note: primary.podAffinityPreset, primary.podAntiAffinityPreset, and primary.nodeAffinityPreset will be ignored when it's set
- ##
- affinity: {}
- ## @param primary.nodeSelector Node labels for PostgreSQL primary pods assignment
- ## ref: https://kubernetes.io/docs/user-guide/node-selection/
- ##
- nodeSelector: {}
- ## @param primary.tolerations Tolerations for PostgreSQL primary pods assignment
- ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
- ##
- tolerations: []
- ## @param primary.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template
- ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods
- ##
- topologySpreadConstraints: []
- ## @param primary.priorityClassName Priority Class to use for each pod (postgresql primary)
- ##
- priorityClassName: ""
- ## @param primary.schedulerName Use an alternate scheduler, e.g. "stork".
- ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
- ##
- schedulerName: ""
- ## @param primary.terminationGracePeriodSeconds Seconds PostgreSQL primary pod needs to terminate gracefully
- ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods
- ##
- terminationGracePeriodSeconds: ""
- ## @param primary.updateStrategy.type PostgreSQL Primary statefulset strategy type
- ## @param primary.updateStrategy.rollingUpdate PostgreSQL Primary statefulset rolling update configuration parameters
- ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies
- ##
- updateStrategy:
- type: RollingUpdate
- rollingUpdate: {}
- ## @param primary.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the PostgreSQL Primary container(s)
- ##
- extraVolumeMounts: []
- ## @param primary.extraVolumes Optionally specify extra list of additional volumes for the PostgreSQL Primary pod(s)
- ##
- extraVolumes: []
- ## @param primary.sidecars Add additional sidecar containers to the PostgreSQL Primary pod(s)
- ## For example:
- ## sidecars:
- ## - name: your-image-name
- ## image: your-image
- ## imagePullPolicy: Always
- ## ports:
- ## - name: portname
- ## containerPort: 1234
- ##
- sidecars: []
- ## @param primary.initContainers Add additional init containers to the PostgreSQL Primary pod(s)
- ## Example
- ##
- ## initContainers:
- ## - name: do-something
- ## image: busybox
- ## command: ['do', 'something']
- ##
- initContainers: []
- ## @param primary.extraPodSpec Optionally specify extra PodSpec for the PostgreSQL Primary pod(s)
- ##
- extraPodSpec: {}
- ## PostgreSQL Primary service configuration
- ##
- service:
- ## @param primary.service.type Kubernetes Service type
- ##
- type: ClusterIP
- ## @param primary.service.ports.postgresql PostgreSQL service port
- ##
- ports:
- postgresql: 5432
- ## Node ports to expose
- ## NOTE: choose port between <30000-32767>
- ## @param primary.service.nodePorts.postgresql Node port for PostgreSQL
- ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport
- ##
- nodePorts:
- postgresql: ""
- ## @param primary.service.clusterIP Static clusterIP or None for headless services
- ## e.g:
- ## clusterIP: None
- ##
- clusterIP: ""
- ## @param primary.service.annotations Annotations for PostgreSQL primary service
- ##
- annotations: {}
- ## @param primary.service.loadBalancerIP Load balancer IP if service type is `LoadBalancer`
- ## Set the LoadBalancer service type to internal only
- ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer
- ##
- loadBalancerIP: ""
- ## @param primary.service.externalTrafficPolicy Enable client source IP preservation
- ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip
- ##
- externalTrafficPolicy: Cluster
- ## @param primary.service.loadBalancerSourceRanges Addresses that are allowed when service is LoadBalancer
- ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service
- ##
- ## loadBalancerSourceRanges:
- ## - 10.10.10.0/24
- ##
- loadBalancerSourceRanges: []
- ## @param primary.service.extraPorts Extra ports to expose in the PostgreSQL primary service
- ##
- extraPorts: []
- ## @param primary.service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP"
- ## If "ClientIP", consecutive client requests will be directed to the same Pod
- ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies
- ##
- sessionAffinity: None
- ## @param primary.service.sessionAffinityConfig Additional settings for the sessionAffinity
- ## sessionAffinityConfig:
- ## clientIP:
- ## timeoutSeconds: 300
- ##
- sessionAffinityConfig: {}
- ## PostgreSQL Primary persistence configuration
- ##
- persistence:
- ## @param primary.persistence.enabled Enable PostgreSQL Primary data persistence using PVC
- ##
- enabled: true
- ## @param primary.persistence.existingClaim Name of an existing PVC to use
- ##
- existingClaim: ""
- ## @param primary.persistence.mountPath The path the volume will be mounted at
- ## Note: useful when using custom PostgreSQL images
- ##
- mountPath: /bitnami/postgresql
- ## @param primary.persistence.subPath The subdirectory of the volume to mount to
- ## Useful in dev environments and one PV for multiple services
- ##
- subPath: ""
- ## @param primary.persistence.storageClass PVC Storage Class for PostgreSQL Primary data volume
- ## If defined, storageClassName: <storageClass>
- ## If set to "-", storageClassName: "", which disables dynamic provisioning
- ## If undefined (the default) or set to null, no storageClassName spec is
- ## set, choosing the default provisioner. (gp2 on AWS, standard on
- ## GKE, AWS & OpenStack)
- ##
- storageClass: ""
- ## @param primary.persistence.accessModes PVC Access Mode for PostgreSQL volume
- ##
- accessModes:
- - ReadWriteOnce
- ## @param primary.persistence.size PVC Storage Request for PostgreSQL volume
- ##
- size: 200Gi
- ## @param primary.persistence.annotations Annotations for the PVC
- ##
- annotations: {}
- ## @param primary.persistence.selector Selector to match an existing Persistent Volume (this value is evaluated as a template)
- ## selector:
- ## matchLabels:
- ## app: my-app
- ##
- selector: {}
- ## @param primary.persistence.dataSource Custom PVC data source
- ##
- dataSource: {}
- ## @section PostgreSQL read only replica parameters
- ##
- readReplicas:
- ## @param readReplicas.replicaCount Number of PostgreSQL read only replicas
- ##
- replicaCount: 1
- ## @param readReplicas.extraEnvVars Array with extra environment variables to add to PostgreSQL read only nodes
- ## e.g:
- ## extraEnvVars:
- ## - name: FOO
- ## value: "bar"
- ##
- extraEnvVars: []
- ## @param readReplicas.extraEnvVarsCM Name of existing ConfigMap containing extra env vars for PostgreSQL read only nodes
- ##
- extraEnvVarsCM: ""
- ## @param readReplicas.extraEnvVarsSecret Name of existing Secret containing extra env vars for PostgreSQL read only nodes
- ##
- extraEnvVarsSecret: ""
- ## @param readReplicas.command Override default container command (useful when using custom images)
- ##
- command: []
- ## @param readReplicas.args Override default container args (useful when using custom images)
- ##
- args: []
- ## Configure extra options for PostgreSQL read only containers' liveness, readiness and startup probes
- ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes
- ## @param readReplicas.livenessProbe.enabled Enable livenessProbe on PostgreSQL read only containers
- ## @param readReplicas.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe
- ## @param readReplicas.livenessProbe.periodSeconds Period seconds for livenessProbe
- ## @param readReplicas.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe
- ## @param readReplicas.livenessProbe.failureThreshold Failure threshold for livenessProbe
- ## @param readReplicas.livenessProbe.successThreshold Success threshold for livenessProbe
- ##
- livenessProbe:
- enabled: true
- initialDelaySeconds: 30
- periodSeconds: 10
- timeoutSeconds: 5
- failureThreshold: 6
- successThreshold: 1
- ## @param readReplicas.readinessProbe.enabled Enable readinessProbe on PostgreSQL read only containers
- ## @param readReplicas.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe
- ## @param readReplicas.readinessProbe.periodSeconds Period seconds for readinessProbe
- ## @param readReplicas.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe
- ## @param readReplicas.readinessProbe.failureThreshold Failure threshold for readinessProbe
- ## @param readReplicas.readinessProbe.successThreshold Success threshold for readinessProbe
- ##
- readinessProbe:
- enabled: true
- initialDelaySeconds: 5
- periodSeconds: 10
- timeoutSeconds: 5
- failureThreshold: 6
- successThreshold: 1
- ## @param readReplicas.startupProbe.enabled Enable startupProbe on PostgreSQL read only containers
- ## @param readReplicas.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe
- ## @param readReplicas.startupProbe.periodSeconds Period seconds for startupProbe
- ## @param readReplicas.startupProbe.timeoutSeconds Timeout seconds for startupProbe
- ## @param readReplicas.startupProbe.failureThreshold Failure threshold for startupProbe
- ## @param readReplicas.startupProbe.successThreshold Success threshold for startupProbe
- ##
- startupProbe:
- enabled: false
- initialDelaySeconds: 30
- periodSeconds: 10
- timeoutSeconds: 1
- failureThreshold: 15
- successThreshold: 1
- ## @param readReplicas.customLivenessProbe Custom livenessProbe that overrides the default one
- ##
- customLivenessProbe: {}
- ## @param readReplicas.customReadinessProbe Custom readinessProbe that overrides the default one
- ##
- customReadinessProbe: {}
- ## @param readReplicas.customStartupProbe Custom startupProbe that overrides the default one
- ##
- customStartupProbe: {}
- ## @param readReplicas.lifecycleHooks for the PostgreSQL read only container to automate configuration before or after startup
- ##
- lifecycleHooks: {}
- ## PostgreSQL read only resource requests and limits
- ## ref: https://kubernetes.io/docs/user-guide/compute-resources/
- ## @param readReplicas.resources.limits The resources limits for the PostgreSQL read only containers
- ## @param readReplicas.resources.requests.memory The requested memory for the PostgreSQL read only containers
- ## @param readReplicas.resources.requests.cpu The requested cpu for the PostgreSQL read only containers
- ##
- resources:
- limits: {}
- requests:
- memory: 256Mi
- cpu: 250m
- ## Pod Security Context
- ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
- ## @param readReplicas.podSecurityContext.enabled Enable security context
- ## @param readReplicas.podSecurityContext.fsGroup Group ID for the pod
- ##
- podSecurityContext:
- enabled: true
- fsGroup: 1001
- ## Container Security Context
- ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
- ## @param readReplicas.containerSecurityContext.enabled Enable container security context
- ## @param readReplicas.containerSecurityContext.runAsUser User ID for the container
- ##
- containerSecurityContext:
- enabled: true
- runAsUser: 1001
- ## @param readReplicas.hostAliases PostgreSQL read only pods host aliases
- ## https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/
- ##
- hostAliases: []
- ## @param readReplicas.hostNetwork Specify if host network should be enabled for PostgreSQL pod (PostgreSQL read only)
- ##
- hostNetwork: false
- ## @param readReplicas.hostIPC Specify if host IPC should be enabled for PostgreSQL pod (postgresql primary)
- ##
- hostIPC: false
- ## @param readReplicas.labels Map of labels to add to the statefulset (PostgreSQL read only)
- ##
- labels: {}
- ## @param readReplicas.annotations Annotations for PostgreSQL read only pods
- ##
- annotations: {}
- ## @param readReplicas.podLabels Map of labels to add to the pods (PostgreSQL read only)
- ##
- podLabels: {}
- ## @param readReplicas.podAnnotations Map of annotations to add to the pods (PostgreSQL read only)
- ##
- podAnnotations: {}
- ## @param readReplicas.podAffinityPreset PostgreSQL read only pod affinity preset. Ignored if `primary.affinity` is set. Allowed values: `soft` or `hard`
- ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity
- ##
- podAffinityPreset: ""
- ## @param readReplicas.podAntiAffinityPreset PostgreSQL read only pod anti-affinity preset. Ignored if `primary.affinity` is set. Allowed values: `soft` or `hard`
- ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#inter-pod-affinity-and-anti-affinity
- ##
- podAntiAffinityPreset: soft
- ## PostgreSQL read only node affinity preset
- ## ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#node-affinity
- ##
- nodeAffinityPreset:
- ## @param readReplicas.nodeAffinityPreset.type PostgreSQL read only node affinity preset type. Ignored if `primary.affinity` is set. Allowed values: `soft` or `hard`
- ##
- type: ""
- ## @param readReplicas.nodeAffinityPreset.key PostgreSQL read only node label key to match Ignored if `primary.affinity` is set.
- ## E.g.
- ## key: "kubernetes.io/e2e-az-name"
- ##
- key: ""
- ## @param readReplicas.nodeAffinityPreset.values PostgreSQL read only node label values to match. Ignored if `primary.affinity` is set.
- ## E.g.
- ## values:
- ## - e2e-az1
- ## - e2e-az2
- ##
- values: []
- ## @param readReplicas.affinity Affinity for PostgreSQL read only pods assignment
- ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
- ## Note: primary.podAffinityPreset, primary.podAntiAffinityPreset, and primary.nodeAffinityPreset will be ignored when it's set
- ##
- affinity: {}
- ## @param readReplicas.nodeSelector Node labels for PostgreSQL read only pods assignment
- ## ref: https://kubernetes.io/docs/user-guide/node-selection/
- ##
- nodeSelector: {}
- ## @param readReplicas.tolerations Tolerations for PostgreSQL read only pods assignment
- ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
- ##
- tolerations: []
- ## @param readReplicas.topologySpreadConstraints Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template
- ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/#spread-constraints-for-pods
- ##
- topologySpreadConstraints: []
- ## @param readReplicas.priorityClassName Priority Class to use for each pod (PostgreSQL read only)
- ##
- priorityClassName: ""
- ## @param readReplicas.schedulerName Use an alternate scheduler, e.g. "stork".
- ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
- ##
- schedulerName: ""
- ## @param readReplicas.terminationGracePeriodSeconds Seconds PostgreSQL read only pod needs to terminate gracefully
- ## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods
- ##
- terminationGracePeriodSeconds: ""
- ## @param readReplicas.updateStrategy.type PostgreSQL read only statefulset strategy type
- ## @param readReplicas.updateStrategy.rollingUpdate PostgreSQL read only statefulset rolling update configuration parameters
- ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies
- ##
- updateStrategy:
- type: RollingUpdate
- rollingUpdate: {}
- ## @param readReplicas.extraVolumeMounts Optionally specify extra list of additional volumeMounts for the PostgreSQL read only container(s)
- ##
- extraVolumeMounts: []
- ## @param readReplicas.extraVolumes Optionally specify extra list of additional volumes for the PostgreSQL read only pod(s)
- ##
- extraVolumes: []
- ## @param readReplicas.sidecars Add additional sidecar containers to the PostgreSQL read only pod(s)
- ## For example:
- ## sidecars:
- ## - name: your-image-name
- ## image: your-image
- ## imagePullPolicy: Always
- ## ports:
- ## - name: portname
- ## containerPort: 1234
- ##
- sidecars: []
- ## @param readReplicas.initContainers Add additional init containers to the PostgreSQL read only pod(s)
- ## Example
- ##
- ## initContainers:
- ## - name: do-something
- ## image: busybox
- ## command: ['do', 'something']
- ##
- initContainers: []
- ## @param readReplicas.extraPodSpec Optionally specify extra PodSpec for the PostgreSQL read only pod(s)
- ##
- extraPodSpec: {}
- ## PostgreSQL read only service configuration
- ##
- service:
- ## @param readReplicas.service.type Kubernetes Service type
- ##
- type: ClusterIP
- ## @param readReplicas.service.ports.postgresql PostgreSQL service port
- ##
- ports:
- postgresql: 5432
- ## Node ports to expose
- ## NOTE: choose port between <30000-32767>
- ## @param readReplicas.service.nodePorts.postgresql Node port for PostgreSQL
- ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport
- ##
- nodePorts:
- postgresql: ""
- ## @param readReplicas.service.clusterIP Static clusterIP or None for headless services
- ## e.g:
- ## clusterIP: None
- ##
- clusterIP: ""
- ## @param readReplicas.service.annotations Annotations for PostgreSQL read only service
- ##
- annotations: {}
- ## @param readReplicas.service.loadBalancerIP Load balancer IP if service type is `LoadBalancer`
- ## Set the LoadBalancer service type to internal only
- ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer
- ##
- loadBalancerIP: ""
- ## @param readReplicas.service.externalTrafficPolicy Enable client source IP preservation
- ## ref https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip
- ##
- externalTrafficPolicy: Cluster
- ## @param readReplicas.service.loadBalancerSourceRanges Addresses that are allowed when service is LoadBalancer
- ## https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service
- ##
- ## loadBalancerSourceRanges:
- ## - 10.10.10.0/24
- ##
- loadBalancerSourceRanges: []
- ## @param readReplicas.service.extraPorts Extra ports to expose in the PostgreSQL read only service
- ##
- extraPorts: []
- ## @param readReplicas.service.sessionAffinity Session Affinity for Kubernetes service, can be "None" or "ClientIP"
- ## If "ClientIP", consecutive client requests will be directed to the same Pod
- ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies
- ##
- sessionAffinity: None
- ## @param readReplicas.service.sessionAffinityConfig Additional settings for the sessionAffinity
- ## sessionAffinityConfig:
- ## clientIP:
- ## timeoutSeconds: 300
- ##
- sessionAffinityConfig: {}
- ## PostgreSQL read only persistence configuration
- ##
- persistence:
- ## @param readReplicas.persistence.enabled Enable PostgreSQL read only data persistence using PVC
- ##
- enabled: true
- ## @param readReplicas.persistence.mountPath The path the volume will be mounted at
- ## Note: useful when using custom PostgreSQL images
- ##
- mountPath: /bitnami/postgresql
- ## @param readReplicas.persistence.subPath The subdirectory of the volume to mount to
- ## Useful in dev environments and one PV for multiple services
- ##
- subPath: ""
- ## @param readReplicas.persistence.storageClass PVC Storage Class for PostgreSQL read only data volume
- ## If defined, storageClassName: <storageClass>
- ## If set to "-", storageClassName: "", which disables dynamic provisioning
- ## If undefined (the default) or set to null, no storageClassName spec is
- ## set, choosing the default provisioner. (gp2 on AWS, standard on
- ## GKE, AWS & OpenStack)
- ##
- storageClass: ""
- ## @param readReplicas.persistence.accessModes PVC Access Mode for PostgreSQL volume
- ##
- accessModes:
- - ReadWriteOnce
- ## @param readReplicas.persistence.size PVC Storage Request for PostgreSQL volume
- ##
- size: 8Gi
- ## @param readReplicas.persistence.annotations Annotations for the PVC
- ##
- annotations: {}
- ## @param readReplicas.persistence.selector Selector to match an existing Persistent Volume (this value is evaluated as a template)
- ## selector:
- ## matchLabels:
- ## app: my-app
- ##
- selector: {}
- ## @param readReplicas.persistence.dataSource Custom PVC data source
- ##
- dataSource: {}
- ## @section NetworkPolicy parameters
- ## Add networkpolicies
- ##
- networkPolicy:
- ## @param networkPolicy.enabled Enable network policies
- ##
- enabled: false
- ## @param networkPolicy.metrics.enabled Enable network policies for metrics (prometheus)
- ## @param networkPolicy.metrics.namespaceSelector [object] Monitoring namespace selector labels. These labels will be used to identify the prometheus' namespace.
- ## @param networkPolicy.metrics.podSelector [object] Monitoring pod selector labels. These labels will be used to identify the Prometheus pods.
- ##
- metrics:
- enabled: false
- ## e.g:
- ## namespaceSelector:
- ## label: monitoring
- ##
- namespaceSelector: {}
- ## e.g:
- ## podSelector:
- ## label: monitoring
- ##
- podSelector: {}
- ## Ingress Rules
- ##
- ingressRules:
- ## @param networkPolicy.ingressRules.primaryAccessOnlyFrom.enabled Enable ingress rule that makes PostgreSQL primary node only accessible from a particular origin.
- ## @param networkPolicy.ingressRules.primaryAccessOnlyFrom.namespaceSelector [object] Namespace selector label that is allowed to access the PostgreSQL primary node. This label will be used to identified the allowed namespace(s).
- ## @param networkPolicy.ingressRules.primaryAccessOnlyFrom.podSelector [object] Pods selector label that is allowed to access the PostgreSQL primary node. This label will be used to identified the allowed pod(s).
- ## @param networkPolicy.ingressRules.primaryAccessOnlyFrom.customRules [object] Custom network policy for the PostgreSQL primary node.
- ##
- primaryAccessOnlyFrom:
- enabled: false
- ## e.g:
- ## namespaceSelector:
- ## label: ingress
- ##
- namespaceSelector: {}
- ## e.g:
- ## podSelector:
- ## label: access
- ##
- podSelector: {}
- ## custom ingress rules
- ## e.g:
- ## customRules:
- ## - from:
- ## - namespaceSelector:
- ## matchLabels:
- ## label: example
- customRules: {}
- ## @param networkPolicy.ingressRules.readReplicasAccessOnlyFrom.enabled Enable ingress rule that makes PostgreSQL read-only nodes only accessible from a particular origin.
- ## @param networkPolicy.ingressRules.readReplicasAccessOnlyFrom.namespaceSelector [object] Namespace selector label that is allowed to access the PostgreSQL read-only nodes. This label will be used to identified the allowed namespace(s).
- ## @param networkPolicy.ingressRules.readReplicasAccessOnlyFrom.podSelector [object] Pods selector label that is allowed to access the PostgreSQL read-only nodes. This label will be used to identified the allowed pod(s).
- ## @param networkPolicy.ingressRules.readReplicasAccessOnlyFrom.customRules [object] Custom network policy for the PostgreSQL read-only nodes.
- ##
- readReplicasAccessOnlyFrom:
- enabled: false
- ## e.g:
- ## namespaceSelector:
- ## label: ingress
- ##
- namespaceSelector: {}
- ## e.g:
- ## podSelector:
- ## label: access
- ##
- podSelector: {}
- ## custom ingress rules
- ## e.g:
- ## CustomRules:
- ## - from:
- ## - namespaceSelector:
- ## matchLabels:
- ## label: example
- customRules: {}
- ## @param networkPolicy.egressRules.denyConnectionsToExternal Enable egress rule that denies outgoing traffic outside the cluster, except for DNS (port 53).
- ## @param networkPolicy.egressRules.customRules [object] Custom network policy rule
- ##
- egressRules:
- # Deny connections to external. This is not compatible with an external database.
- denyConnectionsToExternal: false
- ## Additional custom egress rules
- ## e.g:
- ## customRules:
- ## - to:
- ## - namespaceSelector:
- ## matchLabels:
- ## label: example
- customRules: {}
- ## @section Volume Permissions parameters
- ## Init containers parameters:
- ## volumePermissions: Change the owner and group of the persistent volume(s) mountpoint(s) to 'runAsUser:fsGroup' on each node
- ##
- volumePermissions:
- ## @param volumePermissions.enabled Enable init container that changes the owner and group of the persistent volume
- ##
- enabled: false
- ## @param volumePermissions.image.registry Init container volume-permissions image registry
- ## @param volumePermissions.image.repository Init container volume-permissions image repository
- ## @param volumePermissions.image.tag Init container volume-permissions image tag (immutable tags are recommended)
- ## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy
- ## @param volumePermissions.image.pullSecrets Init container volume-permissions image pull secrets
- ##
- image:
- registry: docker.io
- repository: bitnami/bitnami-shell
- tag: 11-debian-11-r5
- pullPolicy: IfNotPresent
- ## Optionally specify an array of imagePullSecrets.
- ## Secrets must be manually created in the namespace.
- ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
- ## Example:
- ## pullSecrets:
- ## - myRegistryKeySecretName
- ##
- pullSecrets: []
- ## Init container resource requests and limits
- ## ref: https://kubernetes.io/docs/user-guide/compute-resources/
- ## @param volumePermissions.resources.limits Init container volume-permissions resource limits
- ## @param volumePermissions.resources.requests Init container volume-permissions resource requests
- ##
- resources:
- limits: {}
- requests: {}
- ## Init container' Security Context
- ## Note: the chown of the data folder is done to containerSecurityContext.runAsUser
- ## and not the below volumePermissions.containerSecurityContext.runAsUser
- ## @param volumePermissions.containerSecurityContext.runAsUser User ID for the init container
- ##
- containerSecurityContext:
- runAsUser: 0
- ## @section Other Parameters
- ## Service account for PostgreSQL to use.
- ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/
- ##
- serviceAccount:
- ## @param serviceAccount.create Enable creation of ServiceAccount for PostgreSQL pod
- ##
- create: false
- ## @param serviceAccount.name The name of the ServiceAccount to use.
- ## If not set and create is true, a name is generated using the common.names.fullname template
- ##
- name: ""
- ## @param serviceAccount.automountServiceAccountToken Allows auto mount of ServiceAccountToken on the serviceAccount created
- ## Can be set to false if pods using this serviceAccount do not need to use K8s API
- ##
- automountServiceAccountToken: true
- ## @param serviceAccount.annotations Additional custom annotations for the ServiceAccount
- ##
- annotations: {}
- ## Creates role for ServiceAccount
- ## @param rbac.create Create Role and RoleBinding (required for PSP to work)
- ##
- rbac:
- create: false
- ## @param rbac.rules Custom RBAC rules to set
- ## e.g:
- ## rules:
- ## - apiGroups:
- ## - ""
- ## resources:
- ## - pods
- ## verbs:
- ## - get
- ## - list
- ##
- rules: []
- ## Pod Security Policy
- ## ref: https://kubernetes.io/docs/concepts/policy/pod-security-policy/
- ## @param psp.create Whether to create a PodSecurityPolicy. WARNING: PodSecurityPolicy is deprecated in Kubernetes v1.21 or later, unavailable in v1.25 or later
- ##
- psp:
- create: false
- ## @section Metrics Parameters
- metrics:
- ## @param metrics.enabled Start a prometheus exporter
- ##
- enabled: false
- ## @param metrics.image.registry PostgreSQL Prometheus Exporter image registry
- ## @param metrics.image.repository PostgreSQL Prometheus Exporter image repository
- ## @param metrics.image.tag PostgreSQL Prometheus Exporter image tag (immutable tags are recommended)
- ## @param metrics.image.pullPolicy PostgreSQL Prometheus Exporter image pull policy
- ## @param metrics.image.pullSecrets Specify image pull secrets
- ##
- image:
- registry: docker.io
- repository: bitnami/postgres-exporter
- tag: 0.10.1-debian-11-r6
- pullPolicy: IfNotPresent
- ## Optionally specify an array of imagePullSecrets.
- ## Secrets must be manually created in the namespace.
- ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
- ## Example:
- ## pullSecrets:
- ## - myRegistryKeySecretName
- ##
- pullSecrets: []
- ## @param metrics.customMetrics Define additional custom metrics
- ## ref: https://github.com/wrouesnel/postgres_exporter#adding-new-metrics-via-a-config-file
- ## customMetrics:
- ## pg_database:
- ## query: "SELECT d.datname AS name, CASE WHEN pg_catalog.has_database_privilege(d.datname, 'CONNECT') THEN pg_catalog.pg_database_size(d.datname) ELSE 0 END AS size_bytes FROM pg_catalog.pg_database d where datname not in ('template0', 'template1', 'postgres')"
- ## metrics:
- ## - name:
- ## usage: "LABEL"
- ## description: "Name of the database"
- ## - size_bytes:
- ## usage: "GAUGE"
- ## description: "Size of the database in bytes"
- ##
- customMetrics: {}
- ## @param metrics.extraEnvVars Extra environment variables to add to PostgreSQL Prometheus exporter
- ## see: https://github.com/wrouesnel/postgres_exporter#environment-variables
- ## For example:
- ## extraEnvVars:
- ## - name: PG_EXPORTER_DISABLE_DEFAULT_METRICS
- ## value: "true"
- ##
- extraEnvVars: []
- ## PostgreSQL Prometheus exporter containers' Security Context
- ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
- ## @param metrics.containerSecurityContext.enabled Enable PostgreSQL Prometheus exporter containers' Security Context
- ## @param metrics.containerSecurityContext.runAsUser Set PostgreSQL Prometheus exporter containers' Security Context runAsUser
- ## @param metrics.containerSecurityContext.runAsNonRoot Set PostgreSQL Prometheus exporter containers' Security Context runAsNonRoot
- ##
- containerSecurityContext:
- enabled: true
- runAsUser: 1001
- runAsNonRoot: true
- ## Configure extra options for PostgreSQL Prometheus exporter containers' liveness, readiness and startup probes
- ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#configure-probes
- ## @param metrics.livenessProbe.enabled Enable livenessProbe on PostgreSQL Prometheus exporter containers
- ## @param metrics.livenessProbe.initialDelaySeconds Initial delay seconds for livenessProbe
- ## @param metrics.livenessProbe.periodSeconds Period seconds for livenessProbe
- ## @param metrics.livenessProbe.timeoutSeconds Timeout seconds for livenessProbe
- ## @param metrics.livenessProbe.failureThreshold Failure threshold for livenessProbe
- ## @param metrics.livenessProbe.successThreshold Success threshold for livenessProbe
- ##
- livenessProbe:
- enabled: true
- initialDelaySeconds: 5
- periodSeconds: 10
- timeoutSeconds: 5
- failureThreshold: 6
- successThreshold: 1
- ## @param metrics.readinessProbe.enabled Enable readinessProbe on PostgreSQL Prometheus exporter containers
- ## @param metrics.readinessProbe.initialDelaySeconds Initial delay seconds for readinessProbe
- ## @param metrics.readinessProbe.periodSeconds Period seconds for readinessProbe
- ## @param metrics.readinessProbe.timeoutSeconds Timeout seconds for readinessProbe
- ## @param metrics.readinessProbe.failureThreshold Failure threshold for readinessProbe
- ## @param metrics.readinessProbe.successThreshold Success threshold for readinessProbe
- ##
- readinessProbe:
- enabled: true
- initialDelaySeconds: 5
- periodSeconds: 10
- timeoutSeconds: 5
- failureThreshold: 6
- successThreshold: 1
- ## @param metrics.startupProbe.enabled Enable startupProbe on PostgreSQL Prometheus exporter containers
- ## @param metrics.startupProbe.initialDelaySeconds Initial delay seconds for startupProbe
- ## @param metrics.startupProbe.periodSeconds Period seconds for startupProbe
- ## @param metrics.startupProbe.timeoutSeconds Timeout seconds for startupProbe
- ## @param metrics.startupProbe.failureThreshold Failure threshold for startupProbe
- ## @param metrics.startupProbe.successThreshold Success threshold for startupProbe
- ##
- startupProbe:
- enabled: false
- initialDelaySeconds: 10
- periodSeconds: 10
- timeoutSeconds: 1
- failureThreshold: 15
- successThreshold: 1
- ## @param metrics.customLivenessProbe Custom livenessProbe that overrides the default one
- ##
- customLivenessProbe: {}
- ## @param metrics.customReadinessProbe Custom readinessProbe that overrides the default one
- ##
- customReadinessProbe: {}
- ## @param metrics.customStartupProbe Custom startupProbe that overrides the default one
- ##
- customStartupProbe: {}
- ## @param metrics.containerPorts.metrics PostgreSQL Prometheus exporter metrics container port
- ##
- containerPorts:
- metrics: 9187
- ## PostgreSQL Prometheus exporter resource requests and limits
- ## ref: https://kubernetes.io/docs/user-guide/compute-resources/
- ## @param metrics.resources.limits The resources limits for the PostgreSQL Prometheus exporter container
- ## @param metrics.resources.requests The requested resources for the PostgreSQL Prometheus exporter container
- ##
- resources:
- limits: {}
- requests: {}
- ## Service configuration
- ##
- service:
- ## @param metrics.service.ports.metrics PostgreSQL Prometheus Exporter service port
- ##
- ports:
- metrics: 9187
- ## @param metrics.service.clusterIP Static clusterIP or None for headless services
- ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#choosing-your-own-ip-address
- ##
- clusterIP: ""
- ## @param metrics.service.sessionAffinity Control where client requests go, to the same pod or round-robin
- ## Values: ClientIP or None
- ## ref: https://kubernetes.io/docs/user-guide/services/
- ##
- sessionAffinity: None
- ## @param metrics.service.annotations [object] Annotations for Prometheus to auto-discover the metrics endpoint
- ##
- annotations:
- prometheus.io/scrape: "true"
- prometheus.io/port: "{{ .Values.metrics.service.ports.metrics }}"
- ## Prometheus Operator ServiceMonitor configuration
- ##
- serviceMonitor:
- ## @param metrics.serviceMonitor.enabled Create ServiceMonitor Resource for scraping metrics using Prometheus Operator
- ##
- enabled: false
- ## @param metrics.serviceMonitor.namespace Namespace for the ServiceMonitor Resource (defaults to the Release Namespace)
- ##
- namespace: ""
- ## @param metrics.serviceMonitor.interval Interval at which metrics should be scraped.
- ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint
- ##
- interval: ""
- ## @param metrics.serviceMonitor.scrapeTimeout Timeout after which the scrape is ended
- ## ref: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#endpoint
- ##
- scrapeTimeout: ""
- ## @param metrics.serviceMonitor.labels Additional labels that can be used so ServiceMonitor will be discovered by Prometheus
- ##
- labels: {}
- ## @param metrics.serviceMonitor.selector Prometheus instance selector labels
- ## ref: https://github.com/bitnami/charts/tree/master/bitnami/prometheus-operator#prometheus-configuration
- ##
- selector: {}
- ## @param metrics.serviceMonitor.relabelings RelabelConfigs to apply to samples before scraping
- ##
- relabelings: []
- ## @param metrics.serviceMonitor.metricRelabelings MetricRelabelConfigs to apply to samples before ingestion
- ##
- metricRelabelings: []
- ## @param metrics.serviceMonitor.honorLabels Specify honorLabels parameter to add the scrape endpoint
- ##
- honorLabels: false
- ## @param metrics.serviceMonitor.jobLabel The name of the label on the target service to use as the job name in prometheus.
- ##
- jobLabel: ""
- ## Custom PrometheusRule to be defined
- ## The value is evaluated as a template, so, for example, the value can depend on .Release or .Chart
- ## ref: https://github.com/coreos/prometheus-operator#customresourcedefinitions
- ##
- prometheusRule:
- ## @param metrics.prometheusRule.enabled Create a PrometheusRule for Prometheus Operator
- ##
- enabled: false
- ## @param metrics.prometheusRule.namespace Namespace for the PrometheusRule Resource (defaults to the Release Namespace)
- ##
- namespace: ""
- ## @param metrics.prometheusRule.labels Additional labels that can be used so PrometheusRule will be discovered by Prometheus
- ##
- labels: {}
- ## @param metrics.prometheusRule.rules PrometheusRule definitions
- ## Make sure to constraint the rules to the current postgresql service.
- ## rules:
- ## - alert: HugeReplicationLag
- ## expr: pg_replication_lag{service="{{ printf "%s-metrics" (include "common.names.fullname" .) }}"} / 3600 > 1
- ## for: 1m
- ## labels:
- ## severity: critical
- ## annotations:
- ## description: replication for {{ include "common.names.fullname" . }} PostgreSQL is lagging by {{ "{{ $value }}" }} hour(s).
- ## summary: PostgreSQL replication is lagging by {{ "{{ $value }}" }} hour(s).
- ##
- rules: []
|