1## Globally shared configuration
3 # -- Default priority class for all components
5 # -- Openshift compatibility options
8 adaptSecurityContext: auto
9## -- Image information for Redis HA
10## ref: http://kubernetes.io/docs/user-guide/compute-resources/
13 # -- Redis image repository
14 repository: cgr.dev/chainguard-private/redis
16 tag: latest@sha256:918d7c855dd24cefdac9f7552b8855a7a33f269ab19143e81e6bd5948632cc96
17 # -- Redis image pull policy
18 pullPolicy: IfNotPresent
19# -- Full name of the Redis HA Resources
21# -- Name override for Redis HA resources
23## Reference to one or more secrets to be used when pulling images
24## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
25## This imagePullSecrets is only for redis images
27# -- Reference to one or more secrets to be used when pulling redis images
29# - name: "image-pull-secret"
31# -- Number of redis master/slave
33## Customize the statefulset pod management policy:
34## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#pod-management-policies
35# -- The statefulset pod management policy
36podManagementPolicy: OrderedReady
38## indexed slaves get never promoted to be master
39## index starts with 0 - which is master on init
40## i.e. "8,9" means 8th and 9th slave will be replica with replica-priority=0
41## see also: https://redis.io/topics/sentinel
42# -- Comma separated list of slaves which never get promoted to be master.
43# Count starts with 0. Allowed values 1-9. i.e. 3,4 - 3th and 4th redis slave never make it to be master, where master is index 0.
45# -- Kubernetes priorityClass name for the redis-ha-server pod
47# -- Custom labels for the redis pod
49# -- Custom labels for redis service
51## Custom labels for the redis configmap
53 # -- Custom labels for the redis configmap
55## ConfigMap Test Parameters
57 # -- Image for redis-ha-configmap-test hook
59 # -- Repository of the configmap shellcheck test image.
60 repository: cgr.dev/chainguard-private/busybox
61 # -- Tag of the configmap shellcheck test image.
62 tag: latest@sha256:a4df82542624593a943071c90310653381295bb95494ff58a4650101aefeafaf
63 # -- Resources for the ConfigMap test pod
65## Pods Service Account
66## ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/
68 # -- Specifies whether a ServiceAccount should be created
70 # -- The name of the ServiceAccount to use.
71 # If not set and create is true, a name is generated using the redis-ha.fullname template
73 # -- opt in/out of automounting API credentials into container.
74 # Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/
76 # -- Annotations to be added to the service account for the redis statefulset
78## Enables a HA Proxy for better LoadBalancing / Sentinel Master support. Automatically proxies to Redis master.
79## Recommend for externally exposed Redis clusters.
80## ref: https://cbonte.github.io/haproxy-dconv/1.9/intro.html
82 # -- Enabled HAProxy LoadBalancing/Proxy
84 # -- Modify HAProxy service port
86 # -- Modify HAProxy deployment container port
88 # -- Enable TLS termination on HAproxy, This will create a volume mount
90 # -- If "true" this will enable TLS termination on haproxy
92 # -- Secret containing the .pem file
93 # Supports templates like "{{ .Release.Name }}-haproxy-tls"
97 # -- Path to mount the secret that contains the certificates. haproxy
99 # -- Enable read-only redis-slaves
101 # -- Enable if you want a dedicated port in haproxy for redis-slaves
103 # -- Port for the read-only redis-slaves
105 # -- Additional ports to expose on HAProxy service and deployment
106 # Each port should have a name, containerPort, and optionally servicePort (defaults to containerPort)
110 # - name: custom-port
111 # containerPort: 8080
113 # - name: another-port
114 # containerPort: 9090
115 # -- Number of HAProxy instances
117 # -- Deployment strategy for the haproxy deployment
122 # maxUnavailable: 25%
124 # -- HAProxy Image Repository
125 repository: cgr.dev/chainguard-private/haproxy
126 # -- HAProxy Image Tag
127 tag: latest@sha256:10dbf137b6e6c493902dfaa60d873bd30342e1f4285c427aa7cf0933627d8426
128 # -- HAProxy Image PullPolicy
129 pullPolicy: IfNotPresent
130 # -- Custom labels for the haproxy pod
132 # -- Reference to one or more secrets to be used when pulling images
133 # ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
135 # - name: "image-pull-secret"
137 # -- HAProxy template annotations
139 # -- HAProxy deployment annotations
140 deploymentAnnotations: {}
141 # -- Annotations to be added to the HAProxy deployment pods
143 # -- HAProxy resources
145 # -- Configuration of `emptyDir`
147 # -- Pod Disruption Budget
148 # ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/
149 podDisruptionBudget: {}
150 # Use only one of the two
154 ## Enable sticky sessions to Redis nodes via HAProxy
155 ## Very useful for long-living connections as in case of Sentry for example
156 # -- HAProxy sticky load balancing to Redis nodes. Helps with connections shutdown.
157 stickyBalancing: false
158 # -- Kubernetes priorityClass name for the haproxy pod
159 priorityClassName: ""
160 ## Service for HAProxy
162 # -- HAProxy service type "ClusterIP", "LoadBalancer" or "NodePort"
164 # -- (int) HAProxy service nodePort value (haproxy.service.type must be NodePort)
166 # -- HAProxy service loadbalancer IP
168 # -- (string) HAProxy service externalTrafficPolicy value (haproxy.service.type must be LoadBalancer)
169 externalTrafficPolicy: ~
170 # -- HAProxy external IPs
172 # -- HAProxy service labels
174 # -- HAProxy service annotations
176 # -- List of CIDR's allowed to connect to LoadBalancer
177 loadBalancerSourceRanges: []
178 # -- HAProxy serviceAccountName
179 serviceAccountName: redis-sa
181 # -- Specifies whether a ServiceAccount should be created
184 ## Official HAProxy embedded prometheus metrics settings.
185 ## Ref: https://github.com/haproxy/haproxy/tree/master/contrib/prometheus-exporter
188 # -- HAProxy enable prometheus metric scraping
190 # -- HAProxy prometheus metrics scraping port
192 # -- HAProxy metrics scraping port name
193 portName: http-exporter-port
194 # -- HAProxy prometheus metrics scraping path
197 # -- When set true then use a ServiceMonitor to configure scraping
199 # -- Set the namespace the ServiceMonitor should be deployed
200 # @default -- `.Release.Namespace`
202 # -- Set how frequently Prometheus should scrape (default is 30s)
204 # -- Set path to redis-exporter telemtery-path (default is /metrics)
206 # -- Set labels for the ServiceMonitor, use this to define your scrape label for Prometheus Operator
208 # -- Set timeout for scrape (default is 10s)
210 # -- Set additional properties for the ServiceMonitor endpoints such as relabeling, scrapeTimeout, tlsConfig, and more.
211 endpointAdditionalProperties: {}
212 # -- Disable API Check on ServiceMonitor
213 disableAPICheck: false
215 # -- Extra init resources
218 # -- haproxy.cfg `timeout connect` setting
220 # -- haproxy.cfg `timeout server` setting
222 # -- haproxy.cfg `timeout client` setting
224 # -- haproxy.cfg `timeout check` setting
226 # -- haproxy.cfg `timeout tunnel` setting
228 # -- haproxy.cfg `check inter` setting
230 # -- haproxy.cfg `check fall` setting
232 # -- Security context to be added to the HAProxy deployment.
237 # -- Security context to be added to the HAProxy containers.
238 containerSecurityContext:
240 allowPrivilegeEscalation: false
246 # -- Whether the haproxy pods should be forced to run on separate nodes.
247 hardAntiAffinity: true
248 # -- Additional affinities to add to the haproxy pods.
249 additionalAffinities: {}
250 # -- Override all other affinity settings for the haproxy pods with a string.
252 ## Custom config-haproxy.cfg files used to override default settings. If this file is
253 ## specified then the config-haproxy.cfg above will be ignored.
254 # -- (string) Allows for custom config-haproxy.cfg file to be applied. If this is used then default config will be overwriten
257 # Define configuration here
259 ## Place any additional configuration section to add to the default config-haproxy.cfg
260 # -- (string) Allows to place any additional configuration section to add to the default config-haproxy.cfg
263 # Define configuration here
265 # -- Container lifecycle hooks.
266 # Ref: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/
268 ## HAProxy test related options
270 # -- Pod resources for the tests against HAProxy.
272 ## Enable HAProxy parameters to bind and consume IPv6 addresses. Enabled by default.
274 # -- Enable HAProxy parameters to bind and consume IPv6 addresses. Enabled by default.
277 # -- whether NetworkPolicy for Haproxy should be created
279 # -- Annotations for Haproxy NetworkPolicy
281 # -- Labels for Haproxy NetworkPolicy
283 # -- user defined ingress rules that Haproxy should permit into.
284 # uses the format defined in https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors
287 # - namespaceSelector:
289 # name: my-redis-client-namespace
292 # application: redis-client
293 ## if ports is not defined then it defaults to the ports defined for enabled services (redis, sentinel)
300 # -- user can define egress rules too, uses the same structure as ingressRules
303## Ref: https://kubernetes.io/docs/admin/authorization/rbac/
306 # -- Create and use RBAC resources
308# NOT RECOMMENDED: Additional container in which you can execute arbitrary commands to update sysctl parameters
309# You can now use securityContext.sysctls to leverage this capability
310# Ref: https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/
313 # -- Enable an init container to modify Kernel settings
315 # -- sysctlImage command to execute
317 # -- sysctlImage Init container registry
319 # -- sysctlImage Init container name
320 repository: chainguard-private/busybox
321 # -- sysctlImage Init container tag
322 tag: latest@sha256:a4df82542624593a943071c90310653381295bb95494ff58a4650101aefeafaf
323 # -- sysctlImage Init container pull policy
325 # -- Mount the host `/sys` folder to `/host-sys`
327 # -- sysctlImage resources
329# -- Use an alternate scheduler, e.g. "stork".
330# ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
332## Redis specific configuration options
334 # -- Port to access the redis service
336 # -- Redis convention for naming the cluster group: must match `^[\\w-\\.]+$` and can be templated
337 masterGroupName: "mymaster" # must match ^[\\w-\\.]+$) and can be templated
338 # -- Allows overriding the redis container command
342 # -- Allows overriding the redis container arguments
344 # - "custom-startup.sh"
346 # -- Load environment variables from ConfigMap/Secret
349 # name: add-env-secret
351 # -- Configure the 'minReadySeconds' parameter to StatefulSet
352 # ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#minreadyseconds
354 ## Configures redis with tls-port parameter
355 # -- (int) TLS Port to access the redis service
359 # -- (bool) Configures redis with tls-replication parameter, if true sets "tls-replication yes" in redis.conf
361 # -- It is possible to disable client side certificates authentication when "authClients" is set to "no"
365 # -- Increase terminationGracePeriodSeconds to allow writing large RDB snapshots. (k8s default is 30s)
366 # ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#pod-termination-forced
367 terminationGracePeriodSeconds: 60
368 # -- Liveness probe parameters for redis container
370 # -- Enable the Liveness Probe
372 # -- Initial delay in seconds for liveness probe
373 initialDelaySeconds: 30
374 # -- Period in seconds after which liveness probe will be repeated
376 # -- Timeout seconds for liveness probe
378 # -- Success threshold for liveness probe
380 # -- Failure threshold for liveness probe
382 # -- Readiness probe parameters for redis container
384 # -- Enable the Readiness Probe
386 # -- Initial delay in seconds for readiness probe
387 initialDelaySeconds: 30
388 # -- Period in seconds after which readiness probe will be repeated
390 # -- Timeout seconds for readiness probe
392 # -- Success threshold for readiness probe
394 # -- Failure threshold for readiness probe
396 # -- Startup probe parameters for redis container
398 # -- Enable Startup Probe
400 # -- Initial delay in seconds for startup probe
401 initialDelaySeconds: 30
402 # -- Period in seconds after which startup probe will be repeated
404 # -- Timeout seconds for startup probe
406 # -- Success threshold for startup probe
408 # -- Failure threshold for startup probe
410 # -- Array with commands to disable
414 # -- Any valid redis config options in this section will be applied to each server, For multi-value configs use list instead of string (for example loadmodule) (see below)
415 # @default -- see values.yaml
417 ## -- Additional redis conf options can be added below
418 ## -- For all available options see http://download.redis.io/redis-stable/redis.conf
419 min-replicas-to-write: 1
420 # -- Value in seconds
421 min-replicas-max-lag: 5
422 # -- Max memory to use for each redis instance. Default is unlimited.
424 # -- Max memory policy to use for each redis instance. Default is volatile-lru.
425 maxmemory-policy: "volatile-lru"
426 # -- Determines if scheduled RDB backups are created. Default is false.
427 # -- Please note that local (on-disk) RDBs will still be created when re-syncing with a new slave. The only way to prevent this is to enable diskless replication.
429 # -- When enabled, directly sends the RDB over the wire to slaves, without using the disk as intermediate storage. Default is false.
430 repl-diskless-sync: "yes"
431 rdbcompression: "yes"
433 # -- (string) Allows for custom redis.conf files to be applied. If this is used then `redis.config` is ignored
436 # Define configuration here
438 # -- CPU/Memory for master/slave nodes resource requests/limits
446 # -- Container Lifecycle Hooks for redis container
447 # Ref: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/
448 # @default -- see values.yaml
452 command: ["/bin/sh", "/readonly-config/trigger-failover-if-master.sh"]
453 # -- Annotations for the redis statefulset
455 # -- Annotations to be added to the redis statefulset pods
457 # -- Update strategy for Redis StatefulSet
458 ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#update-strategies
461 # -- additional volumeMounts for Redis container
462 extraVolumeMounts: []
465## Sentinel specific configuration options
467 # -- Port to access the sentinel service
469 ## Configure the 'bind' directive to bind to a list of network interfaces
473 ## Configures sentinel with tls-port parameter
474 # -- (int) TLS Port to access the sentinel service
478 # -- (bool) Configures sentinel with tls-replication parameter, if true sets "tls-replication yes" in sentinel.conf
480 # tlsReplication: true
482 # -- It is possible to disable client side certificates authentication when "authClients" is set to "no"
486 ## Configures sentinel with AUTH (requirepass params)
487 # -- Enables or disables sentinel AUTH (Requires `sentinel.password` to be set)
489 # -- (string) A password that configures a `requirepass` in the conf parameters (Requires `sentinel.auth: enabled`)
493 # -- (bool) Configures sentinel with resolve-hostnames parameter, if true sets "resolve-hostnames yes" in sentinel.conf
495 # resolveHostnames: true
497 # -- (bool) Configures sentinel with announce-hostnames parameter, if true sets "announce-hostnames yes" in sentinel.conf
499 # announceHostnames: true
501 # -- An existing secret containing a key defined by `sentinel.authKey` that configures `requirepass`
502 # in the conf parameters (Requires `sentinel.auth: enabled`, cannot be used in conjunction with `.Values.sentinel.password`)
503 # Supports templates like "{{ .Release.Name }}-sentinel-creds"
505 ## Defines the key holding the sentinel password in existing secret.
506 # -- The key holding the sentinel password in an existing secret.
507 authKey: sentinel-password
510 # liveness probe parameters for sentinel container
513 # -- Initial delay in seconds for liveness probe
514 initialDelaySeconds: 30
515 # -- Period in seconds after which liveness probe will be repeated
517 # -- Timeout seconds for liveness probe
519 # -- Success threshold for liveness probe
521 # -- Failure threshold for liveness probe
523 # readiness probe parameters for sentinel container
526 # -- Initial delay in seconds for readiness probe
527 initialDelaySeconds: 30
528 # -- Period in seconds after which readiness probe will be repeated
530 # -- Timeout seconds for readiness probe
532 # -- Success threshold for readiness probe
534 # -- Failure threshold for readiness probe
536 # -- Startup probe parameters for redis container
538 # -- Enable Startup Probe
540 # -- Initial delay in seconds for startup probe
541 initialDelaySeconds: 5
542 # -- Period in seconds after which startup probe will be repeated
544 # -- Timeout seconds for startup probe
546 # -- Success threshold for startup probe
548 # -- Failure threshold for startup probe
550 # -- Minimum number of nodes expected to be live.
552 # -- Valid sentinel config options in this section will be applied as config options to each sentinel (see below)
553 # @default -- see values.yaml
555 ## Additional sentinel conf options can be added below. Only options that
556 ## are expressed in the format simialar to 'sentinel xxx mymaster xxx' will
557 ## be properly templated expect maxclients option.
558 ## For available options see http://download.redis.io/redis-stable/sentinel.conf
559 down-after-milliseconds: 10000
560 ## Failover timeout value in milliseconds
561 failover-timeout: 180000
564 ## Custom sentinel.conf files used to override default settings. If this file is
565 ## specified then the sentinel.config above will be ignored.
566 # -- Allows for custom sentinel.conf files to be applied. If this is used then `sentinel.config` is ignored
569 # Define configuration here
571 # -- CPU/Memory for sentinel node resource requests/limits
579 # -- Container Lifecycle Hooks for sentinel container.
580 # Ref: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/
582 # -- additional volumeMounts for Sentinel container
583 extraVolumeMounts: []
586# -- Security context to be added to the Redis StatefulSet.
591 ## Assuming your kubelet allows it, you can the following instructions to configure
592 ## specific sysctl parameters
595 # - name: net.core.somaxconn
597# -- Security context to be added to the Redis containers.
598containerSecurityContext:
601 allowPrivilegeEscalation: false
607## Node labels, affinity, and tolerations for pod assignment
608## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector
609## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#taints-and-tolerations-beta-feature
610## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
611# -- Node labels for pod assignment
613## -- Tolerations for pod assignment
614## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
616# -- Whether the Redis server pods should be forced to run on separate nodes.
617## This is accomplished by setting their AntiAffinity with requiredDuringSchedulingIgnoredDuringExecution as opposed to preferred.
618## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#inter-pod-affinity-and-anti-affinity-beta-feature
619hardAntiAffinity: true
620# -- Additional affinities to add to the Redis server pods.
621## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
622additionalAffinities: {}
626## preferredDuringSchedulingIgnoredDuringExecution:
636# -- Override all other affinity settings for the Redis server pods with a string.
642## requiredDuringSchedulingIgnoredDuringExecution:
645## app: {{ template "redis-ha.name" . }}
646## release: {{ .Release.Name }}
647## topologyKey: kubernetes.io/hostname
648## preferredDuringSchedulingIgnoredDuringExecution:
653## app: {{ template "redis-ha.name" . }}
654## release: {{ .Release.Name }}
655## topologyKey: failure-domain.beta.kubernetes.io/zone
658## https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
659topologySpreadConstraints:
660 # -- Enable topology spread constraints
662 # -- Max skew of pods tolerated
664 # -- Topology key for spread constraints
666 # -- Enforcement policy, hard or soft
667 whenUnsatisfiable: ""
668# Prometheus exporter specific configuration options
670 # -- If `true`, the prometheus exporter sidecar is enabled
673 image: cgr.dev/chainguard-private/prometheus-redis-exporter
674 # -- Exporter image tag
675 tag: latest@sha256:a728f1ed4fb5a901ea79dbc564f0e7e71c00bc80d9f3f5e0b170852b83ce49c0
676 # -- Exporter image pullPolicy
677 pullPolicy: IfNotPresent
679 port: &exporter_port 9121
680 # -- Exporter port name
681 portName: exporter-port
682 # -- Exporter scrape path
683 scrapePath: &exporter_scrapePath /metrics
684 # -- Address/Host for Redis instance.
685 # Exists to circumvent issues with IPv6 dns resolution that occurs on certain environments
687 ## Set this to true if you want to connect to redis tls port
690 # -- cpu/memory resource limits/requests
692 # -- Additional args for redis exporter
694 # -- A custom custom Lua script that will be mounted to exporter for collection of custom metrics.
695 # Creates a ConfigMap and sets env var `REDIS_EXPORTER_SCRIPT`.
697 # Used to mount a LUA-Script via config map and use it for metrics-collection
699 # -- Example script copied from: https://github.com/oliver006/redis_exporter/blob/master/contrib/sample_collect_script.lua
700 # -- Example collect script for -script option
701 # -- This returns a Lua table with alternating keys and values.
702 # -- Both keys and values must be strings, similar to a HGETALL result.
703 # -- More info about Redis Lua scripting: https://redis.io/commands/eval
707 # -- Add all keys and values from some hash in db 5
708 # redis.call("SELECT", 5)
709 # local r = redis.call("HGETALL", "some-hash-with-stats")
711 # for _,v in ipairs(r) do
712 # table.insert(result, v) -- alternating keys and values
717 # table.insert(result, "foo")
718 # table.insert(result, "42") -- note the string, use tostring() if needed
723 # -- When set true then use a ServiceMonitor to configure scraping
725 # -- Set the namespace the ServiceMonitor should be deployed
726 # @default -- `.Release.Namespace`
728 # -- Set how frequently Prometheus should scrape (default is 30s)
730 # -- Set path to redis-exporter telemtery-path (default is /metrics)
732 # -- Set labels for the ServiceMonitor, use this to define your scrape label for Prometheus Operator
734 # -- Set timeout for scrape (default is 10s)
736 # -- Set additional properties for the ServiceMonitor endpoints such as relabeling, scrapeTimeout, tlsConfig, and more.
737 endpointAdditionalProperties: {}
738 # -- Disable API Check on ServiceMonitor
739 disableAPICheck: false
740 # RelabelConfigs to apply to samples before scraping.
742 # - sourceLabels: [__meta_kubernetes_pod_node_name]
745 # targetLabel: nodename
749 # MetricRelabelConfigs to apply to samples after scraping, but before ingestion.
750 metricRelabelings: []
752 # regex: 'kube_(daemonset|deployment|pod|namespace|node|statefulset).+'
753 # sourceLabels: [__name__]
754 # prometheus exporter SCANS redis db which can take some time
755 # allow different probe settings to not let container crashloop
758 # -- Exporter liveness probe httpGet path
759 path: *exporter_scrapePath
760 # -- Exporter liveness probe httpGet port
762 # -- Initial delay in seconds for liveness probe of exporter
763 initialDelaySeconds: 15
764 # -- Timeout seconds for liveness probe of exporter
766 # -- Period in seconds after which liveness probe will be repeated
770 # -- Exporter readiness probe httpGet path
771 path: *exporter_scrapePath
772 # -- Exporter readiness probe httpGet port
774 # -- Initial delay in seconds for readiness probe of exporter
775 initialDelaySeconds: 15
776 # -- Timeout seconds for readiness probe of exporter
778 # -- Period in seconds after which readiness probe will be repeated
780 # -- Success threshold for readiness probe of exporter
782# -- Pod Disruption Budget rules
783podDisruptionBudget: {}
784# Use only one of the two
788# -- Configures redis with AUTH (requirepass & masterauth conf params)
790# -- (string) A password that configures a `requirepass` and `masterauth` in the conf parameters (Requires `auth: enabled`)
792# -- Annotations for auth secret
793authSecretAnnotations: {}
794## Use existing secret containing key `authKey` (ignores redisPassword)
795## Can also store AWS S3 or SSH secrets in this secret
796## Supports templates like "{{ .Release.Name }}-creds"
797# -- An existing secret containing a key defined by `authKey` that configures `requirepass` and `masterauth` in the conf
798# parameters (Requires `auth: enabled`, cannot be used in conjunction with `.Values.redisPassword`)
800# -- Defines the key holding the redis password in existing secret.
803 # -- Enable persistent volume
805 ## redis-ha data Persistent Volume Storage Class
806 ## If defined, storageClassName: <storageClass>
807 ## If set to "-", storageClassName: "", which disables dynamic provisioning
808 ## If undefined (the default) or set to null, no storageClassName spec is
809 ## set, choosing the default provisioner. (gp2 on AWS, standard on
810 ## GKE, AWS & OpenStack)
813 # -- redis-ha data Persistent Volume Storage Class
815 # -- Persistent volume access modes
818 # -- Persistent volume size
820 # -- Annotations for the volume
822 # -- Labels for the volume
825 # -- Extra init resources
827# To use a hostPath for data, set persistentVolume.enabled to false
828# and define hostPath.path.
829# Warning: this might overwrite existing folders on the host system!
831 # -- Use this path on the host for data storage.
832 # path is evaluated as template so placeholders are replaced
834 # path: "/data/{{ .Release.Name }}"
836 # -- if chown is true, an init-container with root permissions is launched to
837 # change the owner of the hostPath folder to the user defined in the
840# -- Configuration of `emptyDir`, used only if persistentVolume is disabled and no hostPath specified
843 ## Fill the name of secret if you want to use your own TLS certificates.
844 ## The secret should contains keys named by "tls.certFile" - the certificate, "tls.keyFile" - the private key, "tls.caCertFile" - the certificate of CA and "tls.dhParamsFile" - the dh parameter file
845 ## Supports templates like "{{ .Release.Name }}-tls"
846 ## This secret will be generated using files from certs folder if the secretName is not set and redis.tlsPort is set
847 # secretName: tls-secret
849 # -- Name of certificate file
851 # -- Name of key file
853 # -- (string) Name of Diffie-Hellman (DH) key exchange parameters file (Example: redis.dh)
855 # -- Name of CA certificate file
857# restore init container is executed if restore.[s3|ssh].source is not false
858# restore init container creates /data/dump.rdb_ from original if exists
859# restore init container overrides /data/dump.rdb
860# secrets are stored into environment of init container - stored encoded on k8s
861# REQUIRED for s3 restore: AWS 'access_key' and 'secret_key' or stored in existingSecret
862# EXAMPLE source for s3 restore: 's3://bucket/dump.rdb'
863# REQUIRED for ssh restore: 'key' should be in one line including CR i.e. '-----BEGIN RSA PRIVATE KEY-----\n...\n...\n...\n-----END RSA PRIVATE KEY-----'
864# EXAMPLE source for ssh restore: 'user@server:/path/dump.rdb'
865# REQUIRED for redis restore: 'source' should be in form of redis connection uri: 'redis://[username:password@]host:port[/db]'
866# EXAMPLE source for redis restore: 'redis://username:password@localhost:6379'
868 # -- Timeout for the restore
870 # -- Set existingSecret to true to use secret specified in existingSecret above
871 existingSecret: false
873 # -- Restore init container - AWS S3 location of dump - i.e. s3://bucket/dump.rdb or false
875 # If using existingSecret, that secret must contain:
876 # AWS_SECRET_ACCESS_KEY: <YOUR_ACCESS_KEY:>
877 # AWS_ACCESS_KEY_ID: <YOUR_KEY_ID>
878 # If not set the key and ID as strings below:
879 # -- Restore init container - AWS AWS_ACCESS_KEY_ID to access restore.s3.source
881 # -- Restore init container - AWS AWS_SECRET_ACCESS_KEY to access restore.s3.source
883 # -- Restore init container - AWS AWS_REGION to access restore.s3.source
886 # -- Restore init container - SSH scp location of dump - i.e. user@server:/path/dump.rdb or false
888 # -- Restore init container - SSH private key to scp restore.ssh.source to init container.
889 # Key should be in one line separated with \n.
890 # i.e. `-----BEGIN RSA PRIVATE KEY-----\n...\n...\n-----END RSA PRIVATE KEY-----`
894## Custom PrometheusRule to be defined
895## The value is evaluated as a template, so, for example, the value can depend on .Release or .Chart
896## ref: https://github.com/coreos/prometheus-operator#customresourcedefinitions
898 # -- If true, creates a Prometheus Operator PrometheusRule.
900 # -- Additional labels to be set in metadata.
902 # -- Namespace which Prometheus is running in.
904 # -- How often rules in the group are evaluated (falls back to `global.evaluation_interval` if not set).
906 # -- Rules spec template (see https://github.com/prometheus-operator/prometheus-operator/blob/master/Documentation/api.md#rule).
909 # - alert: RedisPodDown
911 # redis_up{job="{{ include "redis-ha.fullname" . }}"} == 0
916 # description: Redis pod {{ "{{ $labels.pod }}" }} is down
917 # summary: Redis pod {{ "{{ $labels.pod }}" }} is down
918# -- Extra init containers to include in StatefulSet
919extraInitContainers: []
923# -- Extra containers to include in StatefulSet
928# -- Extra volumes to include in StatefulSet
933# -- Labels added here are applied to all created resources
936 # -- whether NetworkPolicy for Redis StatefulSets should be created.
937 # when enabled, inter-Redis connectivity is created
939 # -- Annotations for NetworkPolicy
941 # -- Labels for NetworkPolicy
943 # -- User defined ingress rules that Redis should permit into.
944 # Uses the format defined in https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors
947 # - namespaceSelector:
949 # name: my-redis-client-namespace
952 # application: redis-client
953 ## if ports is not defined then it defaults to the ports defined for enabled services (redis, sentinel)
960 # -- user can define egress rules too, uses the same structure as ingressRules
963 # -- Allow all destinations for DNS traffic
964 - namespaceSelector: {}
966 # Cloud Provider often uses the local link local range to host managed DNS resolvers.
967 # We need to allow this range to ensure that the Redis pods can resolve DNS.
968 # Example architecture for GCP Cloud DNS: https://cloud.google.com/kubernetes-engine/docs/how-to/cloud-dns#architecture
976 # -- Interval between redis sentinel and server split brain checks (in seconds)
979 # -- splitBrainDetection resources
981 # liveness probe parameters for split brain container
983 # -- Initial delay in seconds for liveness probe
984 initialDelaySeconds: 30
985 # -- Period in seconds after which liveness probe will be repeated
987 # -- Timeout seconds for liveness probe
989 # -- Success threshold for liveness probe
991 # -- Failure threshold for liveness probe
996 - /readonly-config/redis.conf
997 # readiness probe parameters for split brain container
999 # -- Initial delay in seconds for readiness probe
1000 initialDelaySeconds: 30
1001 # -- Period in seconds after which readiness probe will be repeated
1003 # -- Timeout seconds for readiness probe
1005 # -- Success threshold for readiness probe
1007 # -- Failure threshold for readiness probe