rook-ceph-cluster-values.yaml 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767
  1. # From https://raw.githubusercontent.com/rook/rook/v1.13.10/deploy/charts/rook-ceph-cluster/values.yaml
  2. # KUBECONFIG=/etc/rancher/k3s/k3s.yaml helm upgrade --namespace rook-ceph rook-ceph-cluster --set operatorNamespace=rook-ceph rook-release/rook-ceph-cluster -f rook/rook-ceph-cluster-values.yaml --version 1.13.10
  3. # Default values for a single rook-ceph cluster
  4. # This is a YAML-formatted file.
  5. # Declare variables to be passed into your templates.
  6. # -- Namespace of the main rook operator
  7. operatorNamespace: rook-ceph
  8. # -- The metadata.name of the CephCluster CR
  9. # @default -- The same as the namespace
  10. clusterName:
  11. # -- Optional override of the target kubernetes version
  12. kubeVersion:
  13. # -- Cluster ceph.conf override
  14. configOverride:
  15. # configOverride: |
  16. # [global]
  17. # mon_allow_pool_delete = true
  18. # osd_pool_default_size = 3
  19. # osd_pool_default_min_size = 2
  20. # Installs a debugging toolbox deployment
  21. toolbox:
  22. # -- Enable Ceph debugging pod deployment. See [toolbox](../Troubleshooting/ceph-toolbox.md)
  23. enabled: true
  24. # -- Toolbox image, defaults to the image used by the Ceph cluster
  25. image: #quay.io/ceph/ceph:v18.2.2
  26. # -- Toolbox tolerations
  27. tolerations: []
  28. # -- Toolbox affinity
  29. affinity: {}
  30. # -- Toolbox container security context
  31. containerSecurityContext:
  32. runAsNonRoot: true
  33. runAsUser: 2016
  34. runAsGroup: 2016
  35. capabilities:
  36. drop: ["ALL"]
  37. # -- Toolbox resources
  38. resources:
  39. limits:
  40. memory: "1Gi"
  41. requests:
  42. cpu: "100m"
  43. memory: "128Mi"
  44. # -- Set the priority class for the toolbox if desired
  45. priorityClassName:
  46. monitoring:
  47. # -- Enable Prometheus integration, will also create necessary RBAC rules to allow Operator to create ServiceMonitors.
  48. # Monitoring requires Prometheus to be pre-installed
  49. enabled: true
  50. # -- Whether to create the Prometheus rules for Ceph alerts
  51. createPrometheusRules: true
  52. # -- The namespace in which to create the prometheus rules, if different from the rook cluster namespace.
  53. # If you have multiple rook-ceph clusters in the same k8s cluster, choose the same namespace (ideally, namespace with prometheus
  54. # deployed) to set rulesNamespaceOverride for all the clusters. Otherwise, you will get duplicate alerts with multiple alert definitions.
  55. rulesNamespaceOverride:
  56. # Monitoring settings for external clusters:
  57. # externalMgrEndpoints: <list of endpoints>
  58. # externalMgrPrometheusPort: <port>
  59. # Scrape interval for prometheus
  60. # interval: 10s
  61. # allow adding custom labels and annotations to the prometheus rule
  62. prometheusRule:
  63. # -- Labels applied to PrometheusRule
  64. labels: {}
  65. # -- Annotations applied to PrometheusRule
  66. annotations: {}
  67. # -- Create & use PSP resources. Set this to the same value as the rook-ceph chart.
  68. pspEnable: true
  69. # imagePullSecrets option allow to pull docker images from private docker registry. Option will be passed to all service accounts.
  70. # imagePullSecrets:
  71. # - name: my-registry-secret
  72. # All values below are taken from the CephCluster CRD
  73. # -- Cluster configuration.
  74. # @default -- See [below](#ceph-cluster-spec)
  75. cephClusterSpec:
  76. # This cluster spec example is for a converged cluster where all the Ceph daemons are running locally,
  77. # as in the host-based example (cluster.yaml). For a different configuration such as a
  78. # PVC-based cluster (cluster-on-pvc.yaml), external cluster (cluster-external.yaml),
  79. # or stretch cluster (cluster-stretched.yaml), replace this entire `cephClusterSpec`
  80. # with the specs from those examples.
  81. # For more details, check https://rook.io/docs/rook/v1.10/CRDs/Cluster/ceph-cluster-crd/
  82. cephVersion:
  83. # The container image used to launch the Ceph daemon pods (mon, mgr, osd, mds, rgw).
  84. # v17 is Quincy, v18 is Reef.
  85. # RECOMMENDATION: In production, use a specific version tag instead of the general v18 flag, which pulls the latest release and could result in different
  86. # versions running within the cluster. See tags available at https://hub.docker.com/r/ceph/ceph/tags/.
  87. # If you want to be more precise, you can always use a timestamp tag such as quay.io/ceph/ceph:v18.2.2-20240311
  88. # This tag might not contain a new Ceph version, just security fixes from the underlying operating system, which will reduce vulnerabilities
  89. image: quay.io/ceph/ceph:v18.2.4
  90. # Whether to allow unsupported versions of Ceph. Currently `quincy`, and `reef` are supported.
  91. # Future versions such as `squid` (v19) would require this to be set to `true`.
  92. # Do not set to true in production.
  93. allowUnsupported: false
  94. # The path on the host where configuration files will be persisted. Must be specified.
  95. # Important: if you reinstall the cluster, make sure you delete this directory from each host or else the mons will fail to start on the new cluster.
  96. # In Minikube, the '/data' directory is configured to persist across reboots. Use "/data/rook" in Minikube environment.
  97. dataDirHostPath: /var/lib/rook
  98. # Whether or not upgrade should continue even if a check fails
  99. # This means Ceph's status could be degraded and we don't recommend upgrading but you might decide otherwise
  100. # Use at your OWN risk
  101. # To understand Rook's upgrade process of Ceph, read https://rook.io/docs/rook/v1.10/Upgrade/ceph-upgrade/
  102. skipUpgradeChecks: false
  103. # Whether or not continue if PGs are not clean during an upgrade
  104. continueUpgradeAfterChecksEvenIfNotHealthy: false
  105. # WaitTimeoutForHealthyOSDInMinutes defines the time (in minutes) the operator would wait before an OSD can be stopped for upgrade or restart.
  106. # If the timeout exceeds and OSD is not ok to stop, then the operator would skip upgrade for the current OSD and proceed with the next one
  107. # if `continueUpgradeAfterChecksEvenIfNotHealthy` is `false`. If `continueUpgradeAfterChecksEvenIfNotHealthy` is `true`, then operator would
  108. # continue with the upgrade of an OSD even if its not ok to stop after the timeout. This timeout won't be applied if `skipUpgradeChecks` is `true`.
  109. # The default wait timeout is 10 minutes.
  110. waitTimeoutForHealthyOSDInMinutes: 10
  111. mon:
  112. # Set the number of mons to be started. Generally recommended to be 3.
  113. # For highest availability, an odd number of mons should be specified.
  114. count: 3
  115. # The mons should be on unique nodes. For production, at least 3 nodes are recommended for this reason.
  116. # Mons should only be allowed on the same node for test environments where data loss is acceptable.
  117. allowMultiplePerNode: false
  118. mgr:
  119. # When higher availability of the mgr is needed, increase the count to 2.
  120. # In that case, one mgr will be active and one in standby. When Ceph updates which
  121. # mgr is active, Rook will update the mgr services to match the active mgr.
  122. count: 2
  123. allowMultiplePerNode: false
  124. modules:
  125. # Several modules should not need to be included in this list. The "dashboard" and "monitoring" modules
  126. # are already enabled by other settings in the cluster CR.
  127. - name: pg_autoscaler
  128. enabled: true
  129. - name: rook
  130. enabled: true
  131. # enable the ceph dashboard for viewing cluster status
  132. dashboard:
  133. enabled: true
  134. # serve the dashboard under a subpath (useful when you are accessing the dashboard via a reverse proxy)
  135. # urlPrefix: /ceph-dashboard
  136. # serve the dashboard at the given port.
  137. port: 8080
  138. # Serve the dashboard using SSL (if using ingress to expose the dashboard and `ssl: true` you need to set
  139. # the corresponding "backend protocol" annotation(s) for your ingress controller of choice)
  140. ssl: false
  141. # Network configuration, see: https://github.com/rook/rook/blob/master/Documentation/CRDs/ceph-cluster-crd.md#network-configuration-settings
  142. network:
  143. connections:
  144. # Whether to encrypt the data in transit across the wire to prevent eavesdropping the data on the network.
  145. # The default is false. When encryption is enabled, all communication between clients and Ceph daemons, or between Ceph daemons will be encrypted.
  146. # When encryption is not enabled, clients still establish a strong initial authentication and data integrity is still validated with a crc check.
  147. # IMPORTANT: Encryption requires the 5.11 kernel for the latest nbd and cephfs drivers. Alternatively for testing only,
  148. # you can set the "mounter: rbd-nbd" in the rbd storage class, or "mounter: fuse" in the cephfs storage class.
  149. # The nbd and fuse drivers are *not* recommended in production since restarting the csi driver pod will disconnect the volumes.
  150. encryption:
  151. enabled: false
  152. # Whether to compress the data in transit across the wire. The default is false.
  153. # Requires Ceph Quincy (v17) or newer. Also see the kernel requirements above for encryption.
  154. compression:
  155. enabled: false
  156. # Whether to require communication over msgr2. If true, the msgr v1 port (6789) will be disabled
  157. # and clients will be required to connect to the Ceph cluster with the v2 port (3300).
  158. # Requires a kernel that supports msgr v2 (kernel 5.11 or CentOS 8.4 or newer).
  159. requireMsgr2: false
  160. # enable host networking
  161. provider: host
  162. # # EXPERIMENTAL: enable the Multus network provider
  163. # provider: multus
  164. # selectors:
  165. # # The selector keys are required to be `public` and `cluster`.
  166. # # Based on the configuration, the operator will do the following:
  167. # # 1. if only the `public` selector key is specified both public_network and cluster_network Ceph settings will listen on that interface
  168. # # 2. if both `public` and `cluster` selector keys are specified the first one will point to 'public_network' flag and the second one to 'cluster_network'
  169. # #
  170. # # In order to work, each selector value must match a NetworkAttachmentDefinition object in Multus
  171. # #
  172. # # public: public-conf --> NetworkAttachmentDefinition object name in Multus
  173. # # cluster: cluster-conf --> NetworkAttachmentDefinition object name in Multus
  174. # # Provide internet protocol version. IPv6, IPv4 or empty string are valid options. Empty string would mean IPv4
  175. # ipFamily: "IPv6"
  176. # # Ceph daemons to listen on both IPv4 and Ipv6 networks
  177. # dualStack: false
  178. # enable the crash collector for ceph daemon crash collection
  179. crashCollector:
  180. disable: false
  181. # Uncomment daysToRetain to prune ceph crash entries older than the
  182. # specified number of days.
  183. # daysToRetain: 30
  184. # enable log collector, daemons will log on files and rotate
  185. logCollector:
  186. enabled: false
  187. periodicity: daily # one of: hourly, daily, weekly, monthly
  188. maxLogSize: 500M # SUFFIX may be 'M' or 'G'. Must be at least 1M.
  189. # automate [data cleanup process](https://github.com/rook/rook/blob/master/Documentation/Storage-Configuration/ceph-teardown.md#delete-the-data-on-hosts) in cluster destruction.
  190. cleanupPolicy:
  191. # Since cluster cleanup is destructive to data, confirmation is required.
  192. # To destroy all Rook data on hosts during uninstall, confirmation must be set to "yes-really-destroy-data".
  193. # This value should only be set when the cluster is about to be deleted. After the confirmation is set,
  194. # Rook will immediately stop configuring the cluster and only wait for the delete command.
  195. # If the empty string is set, Rook will not destroy any data on hosts during uninstall.
  196. confirmation: ""
  197. # sanitizeDisks represents settings for sanitizing OSD disks on cluster deletion
  198. sanitizeDisks:
  199. # method indicates if the entire disk should be sanitized or simply ceph's metadata
  200. # in both case, re-install is possible
  201. # possible choices are 'complete' or 'quick' (default)
  202. method: quick
  203. # dataSource indicate where to get random bytes from to write on the disk
  204. # possible choices are 'zero' (default) or 'random'
  205. # using random sources will consume entropy from the system and will take much more time then the zero source
  206. dataSource: zero
  207. # iteration overwrite N times instead of the default (1)
  208. # takes an integer value
  209. iteration: 1
  210. # allowUninstallWithVolumes defines how the uninstall should be performed
  211. # If set to true, cephCluster deletion does not wait for the PVs to be deleted.
  212. allowUninstallWithVolumes: false
  213. # To control where various services will be scheduled by kubernetes, use the placement configuration sections below.
  214. # The example under 'all' would have all services scheduled on kubernetes nodes labeled with 'role=storage-node' and
  215. # tolerate taints with a key of 'storage-node'.
  216. placement:
  217. all:
  218. nodeAffinity:
  219. requiredDuringSchedulingIgnoredDuringExecution:
  220. nodeSelectorTerms:
  221. - matchExpressions:
  222. - key: storage-node
  223. operator: In
  224. values:
  225. - "true"
  226. podAffinity:
  227. podAntiAffinity:
  228. topologySpreadConstraints:
  229. tolerations:
  230. - key: storage-node
  231. operator: Equal
  232. value: "true"
  233. effect: PreferNoSchedule
  234. # # The above placement information can also be specified for mon, osd, and mgr components
  235. # mon:
  236. # # Monitor deployments may contain an anti-affinity rule for avoiding monitor
  237. # # collocation on the same node. This is a required rule when host network is used
  238. # # or when AllowMultiplePerNode is false. Otherwise this anti-affinity rule is a
  239. # # preferred rule with weight: 50.
  240. # osd:
  241. # mgr:
  242. # cleanup:
  243. # annotations:
  244. # all:
  245. # mon:
  246. # osd:
  247. # cleanup:
  248. # prepareosd:
  249. # # If no mgr annotations are set, prometheus scrape annotations will be set by default.
  250. # mgr:
  251. # labels:
  252. # all:
  253. # mon:
  254. # osd:
  255. # cleanup:
  256. # mgr:
  257. # prepareosd:
  258. # # monitoring is a list of key-value pairs. It is injected into all the monitoring resources created by operator.
  259. # # These labels can be passed as LabelSelector to Prometheus
  260. # monitoring:
  261. resources:
  262. mgr:
  263. limits:
  264. cpu: 0
  265. memory: "1Gi"
  266. requests:
  267. cpu: 0
  268. memory: "512Mi"
  269. mon:
  270. limits:
  271. cpu: 0
  272. memory: "2Gi"
  273. requests:
  274. cpu: 0
  275. memory: "1Gi"
  276. osd:
  277. limits:
  278. cpu: 0
  279. memory: "4Gi"
  280. requests:
  281. cpu: 0
  282. memory: "1Gi"
  283. prepareosd:
  284. # limits: It is not recommended to set limits on the OSD prepare job
  285. # since it's a one-time burst for memory that must be allowed to
  286. # complete without an OOM kill. Note however that if a k8s
  287. # limitRange guardrail is defined external to Rook, the lack of
  288. # a limit here may result in a sync failure, in which case a
  289. # limit should be added. 1200Mi may suffice for up to 15Ti
  290. # OSDs ; for larger devices 2Gi may be required.
  291. # cf. https://github.com/rook/rook/pull/11103
  292. requests:
  293. cpu: 0
  294. memory: "500Mi"
  295. mgr-sidecar:
  296. limits:
  297. cpu: 0
  298. memory: "100Mi"
  299. requests:
  300. cpu: 0
  301. memory: "40Mi"
  302. crashcollector:
  303. limits:
  304. cpu: 0
  305. memory: "60Mi"
  306. requests:
  307. cpu: 0
  308. memory: "60Mi"
  309. logcollector:
  310. limits:
  311. cpu: 0
  312. memory: "1Gi"
  313. requests:
  314. cpu: 0
  315. memory: "100Mi"
  316. cleanup:
  317. limits:
  318. cpu: 0
  319. memory: "1Gi"
  320. requests:
  321. cpu: 0
  322. memory: "100Mi"
  323. exporter:
  324. limits:
  325. cpu: 0
  326. memory: "128Mi"
  327. requests:
  328. cpu: 0
  329. memory: "50Mi"
  330. # The option to automatically remove OSDs that are out and are safe to destroy.
  331. removeOSDsIfOutAndSafeToRemove: false
  332. # priority classes to apply to ceph resources
  333. priorityClassNames:
  334. mon: system-node-critical
  335. osd: system-node-critical
  336. mgr: system-cluster-critical
  337. storage: # cluster level storage configuration and selection
  338. useAllNodes: true
  339. useAllDevices: true
  340. # deviceFilter:
  341. # config:
  342. # crushRoot: "custom-root" # specify a non-default root label for the CRUSH map
  343. # metadataDevice: "md0" # specify a non-rotational storage so ceph-volume will use it as block db device of bluestore.
  344. # databaseSizeMB: "1024" # uncomment if the disks are smaller than 100 GB
  345. # osdsPerDevice: "1" # this value can be overridden at the node or device level
  346. # encryptedDevice: "true" # the default value for this option is "false"
  347. # # Individual nodes and their config can be specified as well, but 'useAllNodes' above must be set to false. Then, only the named
  348. # # nodes below will be used as storage resources. Each node's 'name' field should match their 'kubernetes.io/hostname' label.
  349. # nodes:
  350. # - name: "172.17.4.201"
  351. # devices: # specific devices to use for storage can be specified for each node
  352. # - name: "sdb"
  353. # - name: "nvme01" # multiple osds can be created on high performance devices
  354. # config:
  355. # osdsPerDevice: "5"
  356. # - name: "/dev/disk/by-id/ata-ST4000DM004-XXXX" # devices can be specified using full udev paths
  357. # config: # configuration can be specified at the node level which overrides the cluster level config
  358. # - name: "172.17.4.301"
  359. # deviceFilter: "^sd."
  360. # The section for configuring management of daemon disruptions during upgrade or fencing.
  361. disruptionManagement:
  362. # If true, the operator will create and manage PodDisruptionBudgets for OSD, Mon, RGW, and MDS daemons. OSD PDBs are managed dynamically
  363. # via the strategy outlined in the [design](https://github.com/rook/rook/blob/master/design/ceph/ceph-managed-disruptionbudgets.md). The operator will
  364. # block eviction of OSDs by default and unblock them safely when drains are detected.
  365. managePodBudgets: true
  366. # A duration in minutes that determines how long an entire failureDomain like `region/zone/host` will be held in `noout` (in addition to the
  367. # default DOWN/OUT interval) when it is draining. This is only relevant when `managePodBudgets` is `true`. The default value is `30` minutes.
  368. osdMaintenanceTimeout: 30
  369. # A duration in minutes that the operator will wait for the placement groups to become healthy (active+clean) after a drain was completed and OSDs came back up.
  370. # Operator will continue with the next drain if the timeout exceeds. It only works if `managePodBudgets` is `true`.
  371. # No values or 0 means that the operator will wait until the placement groups are healthy before unblocking the next drain.
  372. pgHealthCheckTimeout: 0
  373. # Configure the healthcheck and liveness probes for ceph pods.
  374. # Valid values for daemons are 'mon', 'osd', 'status'
  375. healthCheck:
  376. daemonHealth:
  377. mon:
  378. disabled: false
  379. interval: 45s
  380. osd:
  381. disabled: false
  382. interval: 60s
  383. status:
  384. disabled: false
  385. interval: 60s
  386. # Change pod liveness probe, it works for all mon, mgr, and osd pods.
  387. livenessProbe:
  388. mon:
  389. disabled: false
  390. mgr:
  391. disabled: false
  392. osd:
  393. disabled: false
  394. ingress:
  395. # -- Enable an ingress for the ceph-dashboard
  396. dashboard:
  397. {}
  398. # annotations:
  399. # external-dns.alpha.kubernetes.io/hostname: dashboard.example.com
  400. # nginx.ingress.kubernetes.io/rewrite-target: /ceph-dashboard/$2
  401. # If the dashboard has ssl: true the following will make sure the NGINX Ingress controller can expose the dashboard correctly
  402. # nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
  403. # nginx.ingress.kubernetes.io/server-snippet: |
  404. # proxy_ssl_verify off;
  405. # host:
  406. # name: dashboard.example.com
  407. # path: "/ceph-dashboard(/|$)(.*)"
  408. # tls:
  409. # - hosts:
  410. # - dashboard.example.com
  411. # secretName: testsecret-tls
  412. ## Note: Only one of ingress class annotation or the `ingressClassName:` can be used at a time
  413. ## to set the ingress class
  414. # ingressClassName: nginx
  415. # -- A list of CephBlockPool configurations to deploy
  416. # @default -- See [below](#ceph-block-pools)
  417. cephBlockPools:
  418. - name: ceph-blockpool
  419. # see https://github.com/rook/rook/blob/master/Documentation/CRDs/Block-Storage/ceph-block-pool-crd.md#spec for available configuration
  420. spec:
  421. failureDomain: host
  422. replicated:
  423. size: 3
  424. deviceClass: hdd
  425. # Enables collecting RBD per-image IO statistics by enabling dynamic OSD performance counters. Defaults to false.
  426. # For reference: https://docs.ceph.com/docs/latest/mgr/prometheus/#rbd-io-statistics
  427. enableRBDStats: true
  428. storageClass:
  429. enabled: true
  430. name: ceph-block
  431. isDefault: true
  432. reclaimPolicy: Delete
  433. allowVolumeExpansion: true
  434. volumeBindingMode: "Immediate"
  435. mountOptions: []
  436. # see https://kubernetes.io/docs/concepts/storage/storage-classes/#allowed-topologies
  437. allowedTopologies: []
  438. # - matchLabelExpressions:
  439. # - key: rook-ceph-role
  440. # values:
  441. # - storage-node
  442. # see https://github.com/rook/rook/blob/master/Documentation/Storage-Configuration/Block-Storage-RBD/block-storage.md#provision-storage for available configuration
  443. parameters:
  444. # (optional) mapOptions is a comma-separated list of map options.
  445. # For krbd options refer
  446. # https://docs.ceph.com/docs/latest/man/8/rbd/#kernel-rbd-krbd-options
  447. # For nbd options refer
  448. # https://docs.ceph.com/docs/latest/man/8/rbd-nbd/#options
  449. # mapOptions: lock_on_read,queue_depth=1024
  450. # (optional) unmapOptions is a comma-separated list of unmap options.
  451. # For krbd options refer
  452. # https://docs.ceph.com/docs/latest/man/8/rbd/#kernel-rbd-krbd-options
  453. # For nbd options refer
  454. # https://docs.ceph.com/docs/latest/man/8/rbd-nbd/#options
  455. # unmapOptions: force
  456. # RBD image format. Defaults to "2".
  457. imageFormat: "2"
  458. # RBD image features, equivalent to OR'd bitfield value: 63
  459. # Available for imageFormat: "2". Older releases of CSI RBD
  460. # support only the `layering` feature. The Linux kernel (KRBD) supports the
  461. # full feature complement as of 5.4
  462. imageFeatures: layering
  463. # These secrets contain Ceph admin credentials.
  464. csi.storage.k8s.io/provisioner-secret-name: rook-csi-rbd-provisioner
  465. csi.storage.k8s.io/provisioner-secret-namespace: "{{ .Release.Namespace }}"
  466. csi.storage.k8s.io/controller-expand-secret-name: rook-csi-rbd-provisioner
  467. csi.storage.k8s.io/controller-expand-secret-namespace: "{{ .Release.Namespace }}"
  468. csi.storage.k8s.io/node-stage-secret-name: rook-csi-rbd-node
  469. csi.storage.k8s.io/node-stage-secret-namespace: "{{ .Release.Namespace }}"
  470. # Specify the filesystem type of the volume. If not specified, csi-provisioner
  471. # will set default as `ext4`. Note that `xfs` is not recommended due to potential deadlock
  472. # in hyperconverged settings where the volume is mounted on the same node as the osds.
  473. csi.storage.k8s.io/fstype: ext4
  474. - name: ceph-blockpool-ssd
  475. spec:
  476. failureDomain: host
  477. replicated:
  478. size: 3
  479. deviceClass: ssd
  480. enableRBDStats: true
  481. storageClass:
  482. enabled: true
  483. name: ceph-block-ssd
  484. isDefault: false
  485. reclaimPolicy: Delete
  486. allowVolumeExpansion: true
  487. volumeBindingMode: "Immediate"
  488. mountOptions: []
  489. allowedTopologies: []
  490. parameters:
  491. imageFormat: "2"
  492. imageFeatures: layering
  493. # These secrets contain Ceph admin credentials.
  494. csi.storage.k8s.io/provisioner-secret-name: rook-csi-rbd-provisioner
  495. csi.storage.k8s.io/provisioner-secret-namespace: "{{ .Release.Namespace }}"
  496. csi.storage.k8s.io/controller-expand-secret-name: rook-csi-rbd-provisioner
  497. csi.storage.k8s.io/controller-expand-secret-namespace: "{{ .Release.Namespace }}"
  498. csi.storage.k8s.io/node-stage-secret-name: rook-csi-rbd-node
  499. csi.storage.k8s.io/node-stage-secret-namespace: "{{ .Release.Namespace }}"
  500. csi.storage.k8s.io/fstype: ext4
  501. # -- A list of CephFileSystem configurations to deploy
  502. # @default -- See [below](#ceph-file-systems)
  503. cephFileSystems:
  504. - name: ceph-filesystem
  505. # see https://github.com/rook/rook/blob/master/Documentation/CRDs/Shared-Filesystem/ceph-filesystem-crd.md#filesystem-settings for available configuration
  506. spec:
  507. metadataPool:
  508. replicated:
  509. size: 3
  510. deviceClass: ssd
  511. dataPools:
  512. - failureDomain: host
  513. replicated:
  514. size: 3
  515. # Optional and highly recommended, 'data0' by default, see https://github.com/rook/rook/blob/master/Documentation/CRDs/Shared-Filesystem/ceph-filesystem-crd.md#pools
  516. name: data0
  517. deviceClass: hdd
  518. metadataServer:
  519. activeCount: 1
  520. activeStandby: true
  521. resources:
  522. limits:
  523. cpu: "500m"
  524. memory: "2Gi"
  525. requests:
  526. cpu: "250m"
  527. memory: "1Gi"
  528. placement:
  529. nodeAffinity:
  530. requiredDuringSchedulingIgnoredDuringExecution:
  531. nodeSelectorTerms:
  532. - matchExpressions:
  533. - key: storage-node
  534. operator: In
  535. values:
  536. - "true"
  537. podAffinity:
  538. podAntiAffinity:
  539. topologySpreadConstraints:
  540. tolerations:
  541. - key: storage-node
  542. operator: Equal
  543. value: "true"
  544. effect: PreferNoSchedule
  545. priorityClassName: system-cluster-critical
  546. storageClass:
  547. enabled: true
  548. isDefault: false
  549. name: ceph-filesystem
  550. # (Optional) specify a data pool to use, must be the name of one of the data pools above, 'data0' by default
  551. pool: data0
  552. reclaimPolicy: Delete
  553. allowVolumeExpansion: true
  554. volumeBindingMode: "Immediate"
  555. mountOptions: []
  556. # see https://github.com/rook/rook/blob/master/Documentation/Storage-Configuration/Shared-Filesystem-CephFS/filesystem-storage.md#provision-storage for available configuration
  557. parameters:
  558. # The secrets contain Ceph admin credentials.
  559. csi.storage.k8s.io/provisioner-secret-name: rook-csi-cephfs-provisioner
  560. csi.storage.k8s.io/provisioner-secret-namespace: "{{ .Release.Namespace }}"
  561. csi.storage.k8s.io/controller-expand-secret-name: rook-csi-cephfs-provisioner
  562. csi.storage.k8s.io/controller-expand-secret-namespace: "{{ .Release.Namespace }}"
  563. csi.storage.k8s.io/node-stage-secret-name: rook-csi-cephfs-node
  564. csi.storage.k8s.io/node-stage-secret-namespace: "{{ .Release.Namespace }}"
  565. # Specify the filesystem type of the volume. If not specified, csi-provisioner
  566. # will set default as `ext4`. Note that `xfs` is not recommended due to potential deadlock
  567. # in hyperconverged settings where the volume is mounted on the same node as the osds.
  568. csi.storage.k8s.io/fstype: ext4
  569. # -- Settings for the filesystem snapshot class
  570. # @default -- See [CephFS Snapshots](../Storage-Configuration/Ceph-CSI/ceph-csi-snapshot.md#cephfs-snapshots)
  571. cephFileSystemVolumeSnapshotClass:
  572. enabled: false
  573. name: ceph-filesystem
  574. isDefault: true
  575. deletionPolicy: Delete
  576. annotations: {}
  577. labels: {}
  578. # see https://rook.io/docs/rook/v1.10/Storage-Configuration/Ceph-CSI/ceph-csi-snapshot/#cephfs-snapshots for available configuration
  579. parameters: {}
  580. # -- Settings for the block pool snapshot class
  581. # @default -- See [RBD Snapshots](../Storage-Configuration/Ceph-CSI/ceph-csi-snapshot.md#rbd-snapshots)
  582. cephBlockPoolsVolumeSnapshotClass:
  583. enabled: false
  584. name: ceph-block
  585. isDefault: false
  586. deletionPolicy: Delete
  587. annotations: {}
  588. labels: {}
  589. # see https://rook.io/docs/rook/v1.10/Storage-Configuration/Ceph-CSI/ceph-csi-snapshot/#rbd-snapshots for available configuration
  590. parameters: {}
  591. # -- A list of CephObjectStore configurations to deploy
  592. # @default -- See [below](#ceph-object-stores)
  593. cephObjectStores:
  594. # - name: ceph-objectstore
  595. # # see https://github.com/rook/rook/blob/master/Documentation/CRDs/Object-Storage/ceph-object-store-crd.md#object-store-settings for available configuration
  596. # spec:
  597. # metadataPool:
  598. # failureDomain: host
  599. # replicated:
  600. # size: 3
  601. # deviceClass: ssd
  602. # dataPool:
  603. # failureDomain: host
  604. # replicated:
  605. # size: 3
  606. # # erasureCoded:
  607. # # dataChunks: 2
  608. # # codingChunks: 1
  609. # deviceClass: hdd
  610. # preservePoolsOnDelete: true
  611. # gateway:
  612. # placement:
  613. # nodeAffinity:
  614. # requiredDuringSchedulingIgnoredDuringExecution:
  615. # nodeSelectorTerms:
  616. # - matchExpressions:
  617. # - key: storage-node
  618. # operator: In
  619. # values:
  620. # - "true"
  621. # podAffinity:
  622. # podAntiAffinity:
  623. # topologySpreadConstraints:
  624. # tolerations:
  625. # #- key: storage-node
  626. # # operator: Exists
  627. # port: 6980
  628. # resources:
  629. # limits:
  630. # cpu: "500m"
  631. # memory: "2Gi"
  632. # requests:
  633. # cpu: "250m"
  634. # memory: "1Gi"
  635. # # securePort: 443
  636. # # sslCertificateRef:
  637. # instances: 1
  638. # priorityClassName: system-cluster-critical
  639. # healthCheck:
  640. # bucket:
  641. # interval: 60s
  642. # storageClass:
  643. # enabled: true
  644. # name: ceph-bucket
  645. # reclaimPolicy: Delete
  646. # volumeBindingMode: "Immediate"
  647. # # see https://github.com/rook/rook/blob/master/Documentation/Storage-Configuration/Object-Storage-RGW/ceph-object-bucket-claim.md#storageclass for available configuration
  648. # parameters:
  649. # # note: objectStoreNamespace and objectStoreName are configured by the chart
  650. # region: us-east-1
  651. # ingress:
  652. # # Enable an ingress for the ceph-objectstore
  653. # enabled: false
  654. # # annotations: {}
  655. # # host:
  656. # # name: objectstore.example.com
  657. # # path: /
  658. # # tls:
  659. # # - hosts:
  660. # # - objectstore.example.com
  661. # # secretName: ceph-objectstore-tls
  662. # # ingressClassName: nginx
  663. # cephECBlockPools are disabled by default, please remove the comments and set desired values to enable it
  664. #cephECBlockPools:
  665. # # For erasure coded a replicated metadata pool is required.
  666. # # https://rook.io/docs/rook/latest/CRDs/Shared-Filesystem/ceph-filesystem-crd/#erasure-coded
  667. # - name: ec-metadata-pool
  668. # # see https://github.com/rook/rook/blob/master/Documentation/CRDs/Block-Storage/ceph-block-pool-crd.md#spec for available configuration
  669. # spec:
  670. # replicated:
  671. # size: 2
  672. # - name: ec-data-pool
  673. # spec:
  674. # failureDomain: osd
  675. # erasureCoded:
  676. # dataChunks: 2
  677. # codingChunks: 1
  678. # deviceClass: hdd
  679. # cephECStorageClass also is disabled by default, please remove the comments and set desired values to enable it
  680. # if cephECBlockPools are uncommented you must remove the comments of cephEcStorageClass as well
  681. #cephECStorageClass:
  682. # name: rook-ceph-block
  683. # parameters:
  684. # # clusterID is the namespace where the rook cluster is running
  685. # # If you change this namespace, also change the namespace below where the secret namespaces are defined
  686. # clusterID: rook-ceph # namespace:cluster
  687. #
  688. # # If you want to use erasure coded pool with RBD, you need to create
  689. # # two pools. one erasure coded and one replicated.
  690. # # You need to specify the replicated pool here in the `pool` parameter, it is
  691. # # used for the metadata of the images.
  692. # # The erasure coded pool must be set as the `dataPool` parameter below.
  693. # dataPool: ec-data-pool
  694. # pool: ec-metadata-pool
  695. #
  696. # # (optional) mapOptions is a comma-separated list of map options.
  697. # # For krbd options refer
  698. # # https://docs.ceph.com/docs/latest/man/8/rbd/#kernel-rbd-krbd-options
  699. # # For nbd options refer
  700. # # https://docs.ceph.com/docs/latest/man/8/rbd-nbd/#options
  701. # # mapOptions: lock_on_read,queue_depth=1024
  702. #
  703. # # (optional) unmapOptions is a comma-separated list of unmap options.
  704. # # For krbd options refer
  705. # # https://docs.ceph.com/docs/latest/man/8/rbd/#kernel-rbd-krbd-options
  706. # # For nbd options refer
  707. # # https://docs.ceph.com/docs/latest/man/8/rbd-nbd/#options
  708. # # unmapOptions: force
  709. #
  710. # # RBD image format. Defaults to "2".
  711. # imageFormat: "2"
  712. #
  713. # # RBD image features, equivalent to OR'd bitfield value: 63
  714. # # Available for imageFormat: "2". Older releases of CSI RBD
  715. # # support only the `layering` feature. The Linux kernel (KRBD) supports the
  716. # # full feature complement as of 5.4
  717. # # imageFeatures: layering,fast-diff,object-map,deep-flatten,exclusive-lock
  718. # imageFeatures: layering
  719. # allowVolumeExpansion: true
  720. # reclaimPolicy: Delete
  721. # -- CSI driver name prefix for cephfs, rbd and nfs.
  722. # @default -- `namespace name where rook-ceph operator is deployed`
  723. csiDriverNamePrefix: