1## Globally shared configuration
3 # -- Default priority class for all components
5 # -- Openshift compatibility options
8 adaptSecurityContext: auto
9## -- Image information for Redis HA
10## ref: http://kubernetes.io/docs/user-guide/compute-resources/
13 # -- Redis image repository
14 repository: cgr.dev/chainguard-private/redis
16 tag: latest@sha256:918d7c855dd24cefdac9f7552b8855a7a33f269ab19143e81e6bd5948632cc96
17 # -- Redis image pull policy
18 pullPolicy: IfNotPresent
19# -- Full name of the Redis HA Resources
21# -- Name override for Redis HA resources
23## Reference to one or more secrets to be used when pulling images
24## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
25## This imagePullSecrets is only for redis images
27# -- Reference to one or more secrets to be used when pulling redis images
29# - name: "image-pull-secret"
31# -- Number of redis master/slave
33## Customize the statefulset pod management policy:
34## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#pod-management-policies
35# -- The statefulset pod management policy
36podManagementPolicy: OrderedReady
38## indexed slaves get never promoted to be master
39## index starts with 0 - which is master on init
40## i.e. "8,9" means 8th and 9th slave will be replica with replica-priority=0
41## see also: https://redis.io/topics/sentinel
42# -- Comma separated list of slaves which never get promoted to be master.
43# Count starts with 0. Allowed values 1-9. i.e. 3,4 - 3th and 4th redis slave never make it to be master, where master is index 0.
45# -- Kubernetes priorityClass name for the redis-ha-server pod
47# -- Custom labels for the redis pod
49# -- Custom labels for redis service
51## Custom labels for the redis configmap
53 # -- Custom labels for the redis configmap
55## ConfigMap Test Parameters
57 # -- Image for redis-ha-configmap-test hook
59 # -- Repository of the configmap shellcheck test image.
60 repository: cgr.dev/chainguard-private/busybox
61 # -- Tag of the configmap shellcheck test image.
62 tag: latest@sha256:a4df82542624593a943071c90310653381295bb95494ff58a4650101aefeafaf
63 # -- Resources for the ConfigMap test pod
65## Pods Service Account
66## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/
68 # -- Specifies whether a ServiceAccount should be created
70 # -- The name of the ServiceAccount to use.
71 # If not set and create is true, a name is generated using the redis-ha.fullname template
73 # -- opt in/out of automounting API credentials into container.
74 # Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/
76 # -- Annotations to be added to the service account for the redis statefulset
78## Enables a HA Proxy for better LoadBalancing / Sentinel Master support. Automatically proxies to Redis master.
79## Recommend for externally exposed Redis clusters.
80## ref: https://cbonte.github.io/haproxy-dconv/1.9/intro.html
82 # -- Enabled HAProxy LoadBalancing/Proxy
84 # -- Modify HAProxy service port
86 # -- Modify HAProxy deployment container port
88 # -- Enable TLS termination on HAproxy, This will create a volume mount
90 # -- If "true" this will enable TLS termination on haproxy
92 # -- Secret containing the .pem file
93 # Supports templates like "{{ .Release.Name }}-haproxy-tls"
97 # -- Path to mount the secret that contains the certificates. haproxy
99 # -- Enable read-only redis-slaves
101 # -- Enable if you want a dedicated port in haproxy for redis-slaves
103 # -- Port for the read-only redis-slaves
105 # -- Additional ports to expose on HAProxy service and deployment
106 # Each port should have a name, containerPort, and optionally servicePort (defaults to containerPort)
110 # - name: custom-port
111 # containerPort: 8080
113 # - name: another-port
114 # containerPort: 9090
115 # -- Number of HAProxy instances
117 # -- Deployment strategy for the haproxy deployment
122 # maxUnavailable: 25%
124 # -- HAProxy Image Repository
125 repository: cgr.dev/chainguard-private/haproxy
126 # -- HAProxy Image Tag
127 tag: latest@sha256:ddeb5e875c03b09a7e4821e53c1398d6bc98fa139689434c175fecb7be9969d4
128 # -- HAProxy Image PullPolicy
129 pullPolicy: IfNotPresent
130 # -- Custom labels for the haproxy pod
132 # -- Reference to one or more secrets to be used when pulling images
133 # ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
135 # - name: "image-pull-secret"
137 # -- HAProxy template annotations
139 # -- HAProxy deployment annotations
140 deploymentAnnotations: {}
141 # -- Annotations to be added to the HAProxy deployment pods
143 # -- HAProxy resources
145 # -- Configuration of `emptyDir`
147 # -- Pod Disruption Budget
148 # ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/
149 podDisruptionBudget: {}
150 # Use only one of the two
154 ## Enable sticky sessions to Redis nodes via HAProxy
155 ## Very useful for long-living connections as in case of Sentry for example
156 # -- HAProxy sticky load balancing to Redis nodes. Helps with connections shutdown.
157 stickyBalancing: false
158 # -- Kubernetes priorityClass name for the haproxy pod
159 priorityClassName: ""
160 ## Service for HAProxy
162 # -- HAProxy service type "ClusterIP", "LoadBalancer" or "NodePort"
164 # -- (int) HAProxy service nodePort value (haproxy.service.type must be NodePort)
166 # -- HAProxy service loadbalancer IP
168 # -- (string) HAProxy service externalTrafficPolicy value (haproxy.service.type must be LoadBalancer)
169 externalTrafficPolicy: ~
170 # -- HAProxy external IPs
172 # -- HAProxy service labels
174 # -- HAProxy service annotations
176 # -- List of CIDR's allowed to connect to LoadBalancer
177 loadBalancerSourceRanges: []
178 # -- HAProxy serviceAccountName
179 serviceAccountName: redis-sa
181 # -- Specifies whether a ServiceAccount should be created
184 ## Official HAProxy embedded prometheus metrics settings.
185 ## Ref: https://github.com/haproxy/haproxy/tree/master/contrib/prometheus-exporter
188 # -- HAProxy enable prometheus metric scraping
190 # -- HAProxy prometheus metrics scraping port
192 # -- HAProxy metrics scraping port name
193 portName: http-exporter-port
194 # -- HAProxy prometheus metrics scraping path
197 # -- When set true then use a ServiceMonitor to configure scraping
199 # -- Set the namespace the ServiceMonitor should be deployed
200 # @default -- `.Release.Namespace`
202 # -- Set how frequently Prometheus should scrape (default is 30s)
204 # -- Set path to redis-exporter telemtery-path (default is /metrics)
206 # -- Set labels for the ServiceMonitor, use this to define your scrape label for Prometheus Operator
208 # -- Set timeout for scrape (default is 10s)
210 # -- Set additional properties for the ServiceMonitor endpoints such as relabeling, scrapeTimeout, tlsConfig, and more.
211 endpointAdditionalProperties: {}
212 # -- Disable API Check on ServiceMonitor
213 disableAPICheck: false
215 # -- Extra init resources
218 # -- haproxy.cfg `timeout connect` setting
220 # -- haproxy.cfg `timeout server` setting
222 # -- haproxy.cfg `timeout client` setting
224 # -- haproxy.cfg `timeout check` setting
226 # -- haproxy.cfg `timeout tunnel` setting
228 # -- haproxy.cfg `check inter` setting
230 # -- haproxy.cfg `check fall` setting
232 # -- Security context to be added to the HAProxy deployment.
237 # -- Security context to be added to the HAProxy containers.
238 containerSecurityContext:
240 allowPrivilegeEscalation: false
248 # -- Whether the haproxy pods should be forced to run on separate nodes.
249 hardAntiAffinity: true
250 # -- Additional affinities to add to the haproxy pods.
251 additionalAffinities: {}
252 # -- Override all other affinity settings for the haproxy pods with a string.
254 ## Custom config-haproxy.cfg files used to override default settings. If this file is
255 ## specified then the config-haproxy.cfg above will be ignored.
256 # -- (string) Allows for custom config-haproxy.cfg file to be applied. If this is used then default config will be overwriten
259 # Define configuration here
261 ## Place any additional configuration section to add to the default config-haproxy.cfg
262 # -- (string) Allows to place any additional configuration section to add to the default config-haproxy.cfg
265 # Define configuration here
267 # -- Container lifecycle hooks.
268 # Ref: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/
270 ## HAProxy test related options
272 # -- Pod resources for the tests against HAProxy.
274 ## Enable HAProxy parameters to bind and consume IPv6 addresses. Enabled by default.
276 # -- Enable HAProxy parameters to bind and consume IPv6 addresses. Enabled by default.
279 # -- whether NetworkPolicy for Haproxy should be created
281 # -- Annotations for Haproxy NetworkPolicy
283 # -- Labels for Haproxy NetworkPolicy
285 # -- user defined ingress rules that Haproxy should permit into.
286 # uses the format defined in https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors
289 # - namespaceSelector:
291 # name: my-redis-client-namespace
294 # application: redis-client
295 ## if ports is not defined then it defaults to the ports defined for enabled services (redis, sentinel)
302 # -- user can define egress rules too, uses the same structure as ingressRules
305## Ref: https://kubernetes.io/docs/admin/authorization/rbac/
308 # -- Create and use RBAC resources
310# NOT RECOMMENDED: Additional container in which you can execute arbitrary commands to update sysctl parameters
311# You can now use securityContext.sysctls to leverage this capability
312# Ref: https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/
315 # -- Enable an init container to modify Kernel settings
317 # -- sysctlImage command to execute
319 # -- sysctlImage Init container registry
321 # -- sysctlImage Init container name
322 repository: chainguard-private/busybox
323 # -- sysctlImage Init container tag
324 tag: latest@sha256:a4df82542624593a943071c90310653381295bb95494ff58a4650101aefeafaf
325 # -- sysctlImage Init container pull policy
327 # -- Mount the host `/sys` folder to `/host-sys`
329 # -- sysctlImage resources
331# -- Use an alternate scheduler, e.g. "stork".
332# ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
334## Redis specific configuration options
336 # -- Port to access the redis service
338 # -- Redis convention for naming the cluster group: must match `^[\\w-\\.]+$` and can be templated
339 masterGroupName: "mymaster" # must match ^[\\w-\\.]+$) and can be templated
340 # -- Allows overriding the redis container command
344 # -- Allows overriding the redis container arguments
346 # - "custom-startup.sh"
348 # -- Load environment variables from ConfigMap/Secret
351 # name: add-env-secret
353 # -- Configure the 'minReadySeconds' parameter to StatefulSet
354 # ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#minreadyseconds
356 ## Configures redis with tls-port parameter
357 # -- (int) TLS Port to access the redis service
361 # -- (bool) Configures redis with tls-replication parameter, if true sets "tls-replication yes" in redis.conf
363 # -- It is possible to disable client side certificates authentication when "authClients" is set to "no"
367 # -- Increase terminationGracePeriodSeconds to allow writing large RDB snapshots. (k8s default is 30s)
368 # ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#pod-termination-forced
369 terminationGracePeriodSeconds: 60
370 # -- Liveness probe parameters for redis container
372 # -- Enable the Liveness Probe
374 # -- Initial delay in seconds for liveness probe
375 initialDelaySeconds: 30
376 # -- Period in seconds after which liveness probe will be repeated
378 # -- Timeout seconds for liveness probe
380 # -- Success threshold for liveness probe
382 # -- Failure threshold for liveness probe
384 # -- Readiness probe parameters for redis container
386 # -- Enable the Readiness Probe
388 # -- Initial delay in seconds for readiness probe
389 initialDelaySeconds: 30
390 # -- Period in seconds after which readiness probe will be repeated
392 # -- Timeout seconds for readiness probe
394 # -- Success threshold for readiness probe
396 # -- Failure threshold for readiness probe
398 # -- Startup probe parameters for redis container
400 # -- Enable Startup Probe
402 # -- Initial delay in seconds for startup probe
403 initialDelaySeconds: 30
404 # -- Period in seconds after which startup probe will be repeated
406 # -- Timeout seconds for startup probe
408 # -- Success threshold for startup probe
410 # -- Failure threshold for startup probe
412 # -- Array with commands to disable
416 # -- Any valid redis config options in this section will be applied to each server, For multi-value configs use list instead of string (for example loadmodule) (see below)
417 # @default -- see values.yaml
419 ## -- Additional redis conf options can be added below
420 ## -- For all available options see http://download.redis.io/redis-stable/redis.conf
421 min-replicas-to-write: 1
422 # -- Value in seconds
423 min-replicas-max-lag: 5
424 # -- Max memory to use for each redis instance. Default is unlimited.
426 # -- Max memory policy to use for each redis instance. Default is volatile-lru.
427 maxmemory-policy: "volatile-lru"
428 # -- Determines if scheduled RDB backups are created. Default is false.
429 # -- Please note that local (on-disk) RDBs will still be created when re-syncing with a new slave. The only way to prevent this is to enable diskless replication.
431 # -- When enabled, directly sends the RDB over the wire to slaves, without using the disk as intermediate storage. Default is false.
432 repl-diskless-sync: "yes"
433 rdbcompression: "yes"
435 # -- (string) Allows for custom redis.conf files to be applied. If this is used then `redis.config` is ignored
438 # Define configuration here
440 # -- CPU/Memory for master/slave nodes resource requests/limits
448 # -- Container Lifecycle Hooks for redis container
449 # Ref: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/
450 # @default -- see values.yaml
454 command: ["/bin/sh", "/readonly-config/trigger-failover-if-master.sh"]
455 # -- Annotations for the redis statefulset
457 # -- Annotations to be added to the redis statefulset pods
459 # -- Update strategy for Redis StatefulSet
460 ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies
463 # -- additional volumeMounts for Redis container
464 extraVolumeMounts: []
467## Sentinel specific configuration options
469 # -- Port to access the sentinel service
471 ## Configure the 'bind' directive to bind to a list of network interfaces
475 ## Configures sentinel with tls-port parameter
476 # -- (int) TLS Port to access the sentinel service
480 # -- (bool) Configures sentinel with tls-replication parameter, if true sets "tls-replication yes" in sentinel.conf
482 # tlsReplication: true
484 # -- It is possible to disable client side certificates authentication when "authClients" is set to "no"
488 ## Configures sentinel with AUTH (requirepass params)
489 # -- Enables or disables sentinel AUTH (Requires `sentinel.password` to be set)
491 # -- (string) A password that configures a `requirepass` in the conf parameters (Requires `sentinel.auth: enabled`)
495 # -- (bool) Configures sentinel with resolve-hostnames parameter, if true sets "resolve-hostnames yes" in sentinel.conf
497 # resolveHostnames: true
499 # -- (bool) Configures sentinel with announce-hostnames parameter, if true sets "announce-hostnames yes" in sentinel.conf
501 # announceHostnames: true
503 # -- An existing secret containing a key defined by `sentinel.authKey` that configures `requirepass`
504 # in the conf parameters (Requires `sentinel.auth: enabled`, cannot be used in conjunction with `.Values.sentinel.password`)
505 # Supports templates like "{{ .Release.Name }}-sentinel-creds"
507 ## Defines the key holding the sentinel password in existing secret.
508 # -- The key holding the sentinel password in an existing secret.
509 authKey: sentinel-password
512 # liveness probe parameters for sentinel container
515 # -- Initial delay in seconds for liveness probe
516 initialDelaySeconds: 30
517 # -- Period in seconds after which liveness probe will be repeated
519 # -- Timeout seconds for liveness probe
521 # -- Success threshold for liveness probe
523 # -- Failure threshold for liveness probe
525 # readiness probe parameters for sentinel container
528 # -- Initial delay in seconds for readiness probe
529 initialDelaySeconds: 30
530 # -- Period in seconds after which readiness probe will be repeated
532 # -- Timeout seconds for readiness probe
534 # -- Success threshold for readiness probe
536 # -- Failure threshold for readiness probe
538 # -- Startup probe parameters for redis container
540 # -- Enable Startup Probe
542 # -- Initial delay in seconds for startup probe
543 initialDelaySeconds: 5
544 # -- Period in seconds after which startup probe will be repeated
546 # -- Timeout seconds for startup probe
548 # -- Success threshold for startup probe
550 # -- Failure threshold for startup probe
552 # -- Minimum number of nodes expected to be live.
554 # -- Valid sentinel config options in this section will be applied as config options to each sentinel (see below)
555 # @default -- see values.yaml
557 ## Additional sentinel conf options can be added below. Only options that
558 ## are expressed in the format simialar to 'sentinel xxx mymaster xxx' will
559 ## be properly templated expect maxclients option.
560 ## For available options see http://download.redis.io/redis-stable/sentinel.conf
561 down-after-milliseconds: 10000
562 ## Failover timeout value in milliseconds
563 failover-timeout: 180000
566 ## Custom sentinel.conf files used to override default settings. If this file is
567 ## specified then the sentinel.config above will be ignored.
568 # -- Allows for custom sentinel.conf files to be applied. If this is used then `sentinel.config` is ignored
571 # Define configuration here
573 # -- CPU/Memory for sentinel node resource requests/limits
581 # -- Container Lifecycle Hooks for sentinel container.
582 # Ref: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/
584 # -- additional volumeMounts for Sentinel container
585 extraVolumeMounts: []
588# -- Security context to be added to the Redis StatefulSet.
593 ## Assuming your kubelet allows it, you can the following instructions to configure
594 ## specific sysctl parameters
597 # - name: net.core.somaxconn
599# -- Security context to be added to the Redis containers.
600containerSecurityContext:
603 allowPrivilegeEscalation: false
609## Node labels, affinity, and tolerations for pod assignment
610## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector
611## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#taints-and-tolerations-beta-feature
612## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
613# -- Node labels for pod assignment
615## -- Tolerations for pod assignment
616## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
618# -- Whether the Redis server pods should be forced to run on separate nodes.
619## This is accomplished by setting their AntiAffinity with requiredDuringSchedulingIgnoredDuringExecution as opposed to preferred.
620## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#inter-pod-affinity-and-anti-affinity-beta-feature
621hardAntiAffinity: true
622# -- Additional affinities to add to the Redis server pods.
623## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
624additionalAffinities: {}
628## preferredDuringSchedulingIgnoredDuringExecution:
638# -- Override all other affinity settings for the Redis server pods with a string.
644## requiredDuringSchedulingIgnoredDuringExecution:
647## app: {{ template "redis-ha.name" . }}
648## release: {{ .Release.Name }}
649## topologyKey: kubernetes.io/hostname
650## preferredDuringSchedulingIgnoredDuringExecution:
655## app: {{ template "redis-ha.name" . }}
656## release: {{ .Release.Name }}
657## topologyKey: failure-domain.beta.kubernetes.io/zone
660## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
661topologySpreadConstraints:
662 # -- Enable topology spread constraints
664 # -- Max skew of pods tolerated
666 # -- Topology key for spread constraints
668 # -- Enforcement policy, hard or soft
669 whenUnsatisfiable: ""
670# Prometheus exporter specific configuration options
672 # -- If `true`, the prometheus exporter sidecar is enabled
675 image: cgr.dev/chainguard-private/prometheus-redis-exporter
676 # -- Exporter image tag
677 tag: latest@sha256:a728f1ed4fb5a901ea79dbc564f0e7e71c00bc80d9f3f5e0b170852b83ce49c0
678 # -- Exporter image pullPolicy
679 pullPolicy: IfNotPresent
681 port: &exporter_port 9121
682 # -- Exporter port name
683 portName: exporter-port
684 # -- Exporter scrape path
685 scrapePath: &exporter_scrapePath /metrics
686 # -- Address/Host for Redis instance.
687 # Exists to circumvent issues with IPv6 dns resolution that occurs on certain environments
689 ## Set this to true if you want to connect to redis tls port
692 # -- cpu/memory resource limits/requests
694 # -- Additional args for redis exporter
696 # -- A custom custom Lua script that will be mounted to exporter for collection of custom metrics.
697 # Creates a ConfigMap and sets env var `REDIS_EXPORTER_SCRIPT`.
699 # Used to mount a LUA-Script via config map and use it for metrics-collection
701 # -- Example script copied from: https://github.com/oliver006/redis_exporter/blob/master/contrib/sample_collect_script.lua
702 # -- Example collect script for -script option
703 # -- This returns a Lua table with alternating keys and values.
704 # -- Both keys and values must be strings, similar to a HGETALL result.
705 # -- More info about Redis Lua scripting: https://redis.io/commands/eval
709 # -- Add all keys and values from some hash in db 5
710 # redis.call("SELECT", 5)
711 # local r = redis.call("HGETALL", "some-hash-with-stats")
713 # for _,v in ipairs(r) do
714 # table.insert(result, v) -- alternating keys and values
719 # table.insert(result, "foo")
720 # table.insert(result, "42") -- note the string, use tostring() if needed
725 # -- When set true then use a ServiceMonitor to configure scraping
727 # -- Set the namespace the ServiceMonitor should be deployed
728 # @default -- `.Release.Namespace`
730 # -- Set how frequently Prometheus should scrape (default is 30s)
732 # -- Set path to redis-exporter telemtery-path (default is /metrics)
734 # -- Set labels for the ServiceMonitor, use this to define your scrape label for Prometheus Operator
736 # -- Set timeout for scrape (default is 10s)
738 # -- Set additional properties for the ServiceMonitor endpoints such as relabeling, scrapeTimeout, tlsConfig, and more.
739 endpointAdditionalProperties: {}
740 # -- Disable API Check on ServiceMonitor
741 disableAPICheck: false
742 # RelabelConfigs to apply to samples before scraping.
744 # - sourceLabels: [__meta_kubernetes_pod_node_name]
747 # targetLabel: nodename
751 # MetricRelabelConfigs to apply to samples after scraping, but before ingestion.
752 metricRelabelings: []
754 # regex: 'kube_(daemonset|deployment|pod|namespace|node|statefulset).+'
755 # sourceLabels: [__name__]
756 # prometheus exporter SCANS redis db which can take some time
757 # allow different probe settings to not let container crashloop
760 # -- Exporter liveness probe httpGet path
761 path: *exporter_scrapePath
762 # -- Exporter liveness probe httpGet port
764 # -- Initial delay in seconds for liveness probe of exporter
765 initialDelaySeconds: 15
766 # -- Timeout seconds for liveness probe of exporter
768 # -- Period in seconds after which liveness probe will be repeated
772 # -- Exporter readiness probe httpGet path
773 path: *exporter_scrapePath
774 # -- Exporter readiness probe httpGet port
776 # -- Initial delay in seconds for readiness probe of exporter
777 initialDelaySeconds: 15
778 # -- Timeout seconds for readiness probe of exporter
780 # -- Period in seconds after which readiness probe will be repeated
782 # -- Success threshold for readiness probe of exporter
784# -- Pod Disruption Budget rules
785podDisruptionBudget: {}
786# Use only one of the two
790# -- Configures redis with AUTH (requirepass & masterauth conf params)
792# -- (string) A password that configures a `requirepass` and `masterauth` in the conf parameters (Requires `auth: enabled`)
794# -- Annotations for auth secret
795authSecretAnnotations: {}
796## Use existing secret containing key `authKey` (ignores redisPassword)
797## Can also store AWS S3 or SSH secrets in this secret
798## Supports templates like "{{ .Release.Name }}-creds"
799# -- An existing secret containing a key defined by `authKey` that configures `requirepass` and `masterauth` in the conf
800# parameters (Requires `auth: enabled`, cannot be used in conjunction with `.Values.redisPassword`)
802# -- Defines the key holding the redis password in existing secret.
805 # -- Enable persistent volume
807 ## redis-ha data Persistent Volume Storage Class
808 ## If defined, storageClassName: <storageClass>
809 ## If set to "-", storageClassName: "", which disables dynamic provisioning
810 ## If undefined (the default) or set to null, no storageClassName spec is
811 ## set, choosing the default provisioner. (gp2 on AWS, standard on
812 ## GKE, AWS & OpenStack)
815 # -- redis-ha data Persistent Volume Storage Class
817 # -- Persistent volume access modes
820 # -- Persistent volume size
822 # -- Annotations for the volume
824 # -- Labels for the volume
827 # -- Extra init resources
829# To use a hostPath for data, set persistentVolume.enabled to false
830# and define hostPath.path.
831# Warning: this might overwrite existing folders on the host system!
833 # -- Use this path on the host for data storage.
834 # path is evaluated as template so placeholders are replaced
836 # path: "/data/{{ .Release.Name }}"
838 # -- if chown is true, an init-container with root permissions is launched to
839 # change the owner of the hostPath folder to the user defined in the
842# -- Configuration of `emptyDir`, used only if persistentVolume is disabled and no hostPath specified
845 ## Fill the name of secret if you want to use your own TLS certificates.
846 ## The secret should contains keys named by "tls.certFile" - the certificate, "tls.keyFile" - the private key, "tls.caCertFile" - the certificate of CA and "tls.dhParamsFile" - the dh parameter file
847 ## Supports templates like "{{ .Release.Name }}-tls"
848 ## This secret will be generated using files from certs folder if the secretName is not set and redis.tlsPort is set
849 # secretName: tls-secret
851 # -- Name of certificate file
853 # -- Name of key file
855 # -- (string) Name of Diffie-Hellman (DH) key exchange parameters file (Example: redis.dh)
857 # -- Name of CA certificate file
859# restore init container is executed if restore.[s3|ssh].source is not false
860# restore init container creates /data/dump.rdb_ from original if exists
861# restore init container overrides /data/dump.rdb
862# secrets are stored into environment of init container - stored encoded on k8s
863# REQUIRED for s3 restore: AWS 'access_key' and 'secret_key' or stored in existingSecret
864# EXAMPLE source for s3 restore: 's3://bucket/dump.rdb'
865# REQUIRED for ssh restore: 'key' should be in one line including CR i.e. '-----BEGIN RSA PRIVATE KEY-----\n...\n...\n...\n-----END RSA PRIVATE KEY-----'
866# EXAMPLE source for ssh restore: 'user@server:/path/dump.rdb'
867# REQUIRED for redis restore: 'source' should be in form of redis connection uri: 'redis://[username:password@]host:port[/db]'
868# EXAMPLE source for redis restore: 'redis://username:password@localhost:6379'
870 # -- Timeout for the restore
872 # -- Set existingSecret to true to use secret specified in existingSecret above
873 existingSecret: false
875 # -- Restore init container - AWS S3 location of dump - i.e. s3://bucket/dump.rdb or false
877 # If using existingSecret, that secret must contain:
878 # AWS_SECRET_ACCESS_KEY: <YOUR_ACCESS_KEY:>
879 # AWS_ACCESS_KEY_ID: <YOUR_KEY_ID>
880 # If not set the key and ID as strings below:
881 # -- Restore init container - AWS AWS_ACCESS_KEY_ID to access restore.s3.source
883 # -- Restore init container - AWS AWS_SECRET_ACCESS_KEY to access restore.s3.source
885 # -- Restore init container - AWS AWS_REGION to access restore.s3.source
888 # -- Restore init container - SSH scp location of dump - i.e. user@server:/path/dump.rdb or false
890 # -- Restore init container - SSH private key to scp restore.ssh.source to init container.
891 # Key should be in one line separated with \n.
892 # i.e. `-----BEGIN RSA PRIVATE KEY-----\n...\n...\n-----END RSA PRIVATE KEY-----`
896## Custom PrometheusRule to be defined
897## The value is evaluated as a template, so, for example, the value can depend on .Release or .Chart
898## ref: https://github.com/coreos/prometheus-operator#customresourcedefinitions
900 # -- If true, creates a Prometheus Operator PrometheusRule.
902 # -- Additional labels to be set in metadata.
904 # -- Namespace which Prometheus is running in.
906 # -- How often rules in the group are evaluated (falls back to `global.evaluation_interval` if not set).
908 # -- Rules spec template (see https://github.com/prometheus-operator/prometheus-operator/blob/master/Documentation/api.md#rule).
911 # - alert: RedisPodDown
913 # redis_up{job="{{ include "redis-ha.fullname" . }}"} == 0
918 # description: Redis pod {{ "{{ $labels.pod }}" }} is down
919 # summary: Redis pod {{ "{{ $labels.pod }}" }} is down
920# -- Extra init containers to include in StatefulSet
921extraInitContainers: []
925# -- Extra containers to include in StatefulSet
930# -- Extra volumes to include in StatefulSet
935# -- Labels added here are applied to all created resources
938 # -- whether NetworkPolicy for Redis StatefulSets should be created.
939 # when enabled, inter-Redis connectivity is created
941 # -- Annotations for NetworkPolicy
943 # -- Labels for NetworkPolicy
945 # -- User defined ingress rules that Redis should permit into.
946 # Uses the format defined in https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors
949 # - namespaceSelector:
951 # name: my-redis-client-namespace
954 # application: redis-client
955 ## if ports is not defined then it defaults to the ports defined for enabled services (redis, sentinel)
962 # -- user can define egress rules too, uses the same structure as ingressRules
965 # -- Allow all destinations for DNS traffic
966 - namespaceSelector: {}
968 # Cloud Provider often uses the local link local range to host managed DNS resolvers.
969 # We need to allow this range to ensure that the Redis pods can resolve DNS.
970 # Example architecture for GCP Cloud DNS: https://cloud.google.com/kubernetes-engine/docs/how-to/cloud-dns#architecture
978 # -- Interval between redis sentinel and server split brain checks (in seconds)
981 # -- splitBrainDetection resources
983 # liveness probe parameters for split brain container
985 # -- Initial delay in seconds for liveness probe
986 initialDelaySeconds: 30
987 # -- Period in seconds after which liveness probe will be repeated
989 # -- Timeout seconds for liveness probe
991 # -- Success threshold for liveness probe
993 # -- Failure threshold for liveness probe
998 - /readonly-config/redis.conf
999 # readiness probe parameters for split brain container
1001 # -- Initial delay in seconds for readiness probe
1002 initialDelaySeconds: 30
1003 # -- Period in seconds after which readiness probe will be repeated
1005 # -- Timeout seconds for readiness probe
1007 # -- Success threshold for readiness probe
1009 # -- Failure threshold for readiness probe