{{- if or (not (eq .Values.architecture "replication")) (not .Values.sentinel.enabled) }} apiVersion: {{ include "common.capabilities.statefulset.apiVersion" . }} kind: {{ .Values.master.kind }} metadata: name: {{ printf "%s-master" (include "common.names.fullname" .) }} namespace: {{ .Release.Namespace }} labels: {{- include "common.labels.standard" . | nindent 4 }} app.kubernetes.io/component: master {{- if .Values.commonLabels }} {{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }} {{- end }} {{- if .Values.commonAnnotations }} annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }} {{- end }} spec: replicas: {{ .Values.master.count }} selector: matchLabels: {{- include "common.labels.matchLabels" . | nindent 6 }} app.kubernetes.io/component: master {{- if (eq .Values.master.kind "StatefulSet") }} serviceName: {{ printf "%s-headless" (include "common.names.fullname" .) }} {{- end }} {{- if .Values.master.updateStrategy }} {{- if (eq .Values.master.kind "Deployment") }} strategy: {{- toYaml .Values.master.updateStrategy | nindent 4 }} {{- else }} updateStrategy: {{- toYaml .Values.master.updateStrategy | nindent 4 }} {{- end }} {{- end }} template: metadata: labels: {{- include "common.labels.standard" . | nindent 8 }} app.kubernetes.io/component: master {{- if .Values.master.podLabels }} {{- include "common.tplvalues.render" ( dict "value" .Values.master.podLabels "context" $ ) | nindent 8 }} {{- end }} {{- if and .Values.metrics.enabled .Values.metrics.podLabels }} {{- include "common.tplvalues.render" ( dict "value" .Values.metrics.podLabels "context" $ ) | nindent 8 }} {{- end }} annotations: {{- if (include "redis.createConfigmap" .) }} checksum/configmap: {{ include (print $.Template.BasePath "/configmap.yaml") . | sha256sum }} {{- end }} checksum/health: {{ include (print $.Template.BasePath "/health-configmap.yaml") . | sha256sum }} checksum/scripts: {{ include (print $.Template.BasePath "/scripts-configmap.yaml") . | sha256sum }} checksum/secret: {{ include (print $.Template.BasePath "/secret.yaml") . | sha256sum }} {{- if .Values.master.podAnnotations }} {{- include "common.tplvalues.render" ( dict "value" .Values.master.podAnnotations "context" $ ) | nindent 8 }} {{- end }} {{- if and .Values.metrics.enabled .Values.metrics.podAnnotations }} {{- include "common.tplvalues.render" ( dict "value" .Values.metrics.podAnnotations "context" $ ) | nindent 8 }} {{- end }} spec: {{- include "redis.imagePullSecrets" . | nindent 6 }} {{- if .Values.master.hostAliases }} hostAliases: {{- include "common.tplvalues.render" (dict "value" .Values.master.hostAliases "context" $) | nindent 8 }} {{- end }} {{- if .Values.master.podSecurityContext.enabled }} securityContext: {{- omit .Values.master.podSecurityContext "enabled" | toYaml | nindent 8 }} {{- end }} serviceAccountName: {{ template "redis.serviceAccountName" . }} {{- if .Values.master.priorityClassName }} priorityClassName: {{ .Values.master.priorityClassName | quote }} {{- end }} {{- if .Values.master.affinity }} affinity: {{- include "common.tplvalues.render" (dict "value" .Values.master.affinity "context" $) | nindent 8 }} {{- else }} affinity: podAffinity: {{- include "common.affinities.pods" (dict "type" .Values.master.podAffinityPreset "component" "master" "context" $) | nindent 10 }} podAntiAffinity: {{- include "common.affinities.pods" (dict "type" .Values.master.podAntiAffinityPreset "component" "master" "context" $) | nindent 10 }} nodeAffinity: {{- include "common.affinities.nodes" (dict "type" .Values.master.nodeAffinityPreset.type "key" .Values.master.nodeAffinityPreset.key "values" .Values.master.nodeAffinityPreset.values) | nindent 10 }} {{- end }} {{- if .Values.master.nodeSelector }} nodeSelector: {{- include "common.tplvalues.render" (dict "value" .Values.master.nodeSelector "context" $) | nindent 8 }} {{- end }} {{- if .Values.master.tolerations }} tolerations: {{- include "common.tplvalues.render" (dict "value" .Values.master.tolerations "context" $) | nindent 8 }} {{- end }} {{- if .Values.master.topologySpreadConstraints }} topologySpreadConstraints: {{- include "common.tplvalues.render" (dict "value" .Values.master.topologySpreadConstraints "context" $) | nindent 8 }} {{- end }} {{- if .Values.master.shareProcessNamespace }} shareProcessNamespace: {{ .Values.master.shareProcessNamespace }} {{- end }} {{- if .Values.master.schedulerName }} schedulerName: {{ .Values.master.schedulerName | quote }} {{- end }} {{- if .Values.master.dnsPolicy }} dnsPolicy: {{ .Values.master.dnsPolicy }} {{- end }} {{- if .Values.master.dnsConfig }} dnsConfig: {{- include "common.tplvalues.render" (dict "value" .Values.master.dnsConfig "context" $) | nindent 8 }} {{- end }} terminationGracePeriodSeconds: {{ .Values.master.terminationGracePeriodSeconds }} containers: - name: redis image: {{ template "redis.image" . }} imagePullPolicy: {{ .Values.image.pullPolicy | quote }} {{- if .Values.master.lifecycleHooks }} lifecycle: {{- include "common.tplvalues.render" (dict "value" .Values.master.lifecycleHooks "context" $) | nindent 12 }} {{- end }} {{- if .Values.master.containerSecurityContext.enabled }} securityContext: {{- omit .Values.master.containerSecurityContext "enabled" | toYaml | nindent 12 }} {{- end }} {{- if .Values.diagnosticMode.enabled }} command: {{- include "common.tplvalues.render" (dict "value" .Values.diagnosticMode.command "context" $) | nindent 12 }} {{- else if .Values.master.command }} command: {{- include "common.tplvalues.render" (dict "value" .Values.master.command "context" $) | nindent 12 }} {{- else }} command: - /bin/bash {{- end }} {{- if .Values.diagnosticMode.enabled }} args: {{- include "common.tplvalues.render" (dict "value" .Values.diagnosticMode.args "context" $) | nindent 12 }} {{- else if .Values.master.args }} args: {{- include "common.tplvalues.render" (dict "value" .Values.master.args "context" $) | nindent 12 }} {{- else }} args: - -c - /opt/bitnami/scripts/start-scripts/start-master.sh {{- end }} env: - name: BITNAMI_DEBUG value: {{ ternary "true" "false" (or .Values.image.debug .Values.diagnosticMode.enabled) | quote }} - name: REDIS_REPLICATION_MODE value: master - name: ALLOW_EMPTY_PASSWORD value: {{ ternary "no" "yes" .Values.auth.enabled | quote }} {{- if .Values.auth.enabled }} {{- if .Values.auth.usePasswordFiles }} - name: REDIS_PASSWORD_FILE value: "/opt/bitnami/redis/secrets/redis-password" {{- else }} - name: REDIS_PASSWORD valueFrom: secretKeyRef: name: {{ template "redis.secretName" . }} key: {{ template "redis.secretPasswordKey" . }} {{- end }} {{- end }} - name: REDIS_TLS_ENABLED value: {{ ternary "yes" "no" .Values.tls.enabled | quote }} {{- if .Values.tls.enabled }} - name: REDIS_TLS_PORT value: {{ .Values.master.containerPorts.redis | quote }} - name: REDIS_TLS_AUTH_CLIENTS value: {{ ternary "yes" "no" .Values.tls.authClients | quote }} - name: REDIS_TLS_CERT_FILE value: {{ template "redis.tlsCert" . }} - name: REDIS_TLS_KEY_FILE value: {{ template "redis.tlsCertKey" . }} - name: REDIS_TLS_CA_FILE value: {{ template "redis.tlsCACert" . }} {{- if .Values.tls.dhParamsFilename }} - name: REDIS_TLS_DH_PARAMS_FILE value: {{ template "redis.tlsDHParams" . }} {{- end }} {{- else }} - name: REDIS_PORT value: {{ .Values.master.containerPorts.redis | quote }} {{- end }} {{- if .Values.master.extraEnvVars }} {{- include "common.tplvalues.render" (dict "value" .Values.master.extraEnvVars "context" $) | nindent 12 }} {{- end }} {{- if or .Values.master.extraEnvVarsCM .Values.master.extraEnvVarsSecret }} envFrom: {{- if .Values.master.extraEnvVarsCM }} - configMapRef: name: {{ .Values.master.extraEnvVarsCM }} {{- end }} {{- if .Values.master.extraEnvVarsSecret }} - secretRef: name: {{ .Values.master.extraEnvVarsSecret }} {{- end }} {{- end }} ports: - name: redis containerPort: {{ .Values.master.containerPorts.redis }} {{- if not .Values.diagnosticMode.enabled }} {{- if .Values.master.startupProbe.enabled }} startupProbe: {{- include "common.tplvalues.render" (dict "value" (omit .Values.master.startupProbe "enabled") "context" $) | nindent 12 }} tcpSocket: port: redis {{- else if .Values.master.customStartupProbe }} startupProbe: {{- include "common.tplvalues.render" (dict "value" .Values.master.customStartupProbe "context" $) | nindent 12 }} {{- end }} {{- if .Values.master.livenessProbe.enabled }} livenessProbe: initialDelaySeconds: {{ .Values.master.livenessProbe.initialDelaySeconds }} periodSeconds: {{ .Values.master.livenessProbe.periodSeconds }} # One second longer than command timeout should prevent generation of zombie processes. timeoutSeconds: {{ add1 .Values.master.livenessProbe.timeoutSeconds }} successThreshold: {{ .Values.master.livenessProbe.successThreshold }} failureThreshold: {{ .Values.master.livenessProbe.failureThreshold }} exec: command: - sh - -c - /health/ping_liveness_local.sh {{ .Values.master.livenessProbe.timeoutSeconds }} {{- else if .Values.master.customLivenessProbe }} livenessProbe: {{- include "common.tplvalues.render" (dict "value" .Values.master.customLivenessProbe "context" $) | nindent 12 }} {{- end }} {{- if .Values.master.readinessProbe.enabled }} readinessProbe: initialDelaySeconds: {{ .Values.master.readinessProbe.initialDelaySeconds }} periodSeconds: {{ .Values.master.readinessProbe.periodSeconds }} timeoutSeconds: {{ add1 .Values.master.readinessProbe.timeoutSeconds }} successThreshold: {{ .Values.master.readinessProbe.successThreshold }} failureThreshold: {{ .Values.master.readinessProbe.failureThreshold }} exec: command: - sh - -c - /health/ping_readiness_local.sh {{ .Values.master.readinessProbe.timeoutSeconds }} {{- else if .Values.master.customReadinessProbe }} readinessProbe: {{- include "common.tplvalues.render" (dict "value" .Values.master.customReadinessProbe "context" $) | nindent 12 }} {{- end }} {{- end }} {{- if .Values.master.resources }} resources: {{- toYaml .Values.master.resources | nindent 12 }} {{- end }} volumeMounts: - name: start-scripts mountPath: /opt/bitnami/scripts/start-scripts - name: health mountPath: /health {{- if .Values.auth.usePasswordFiles }} - name: redis-password mountPath: /opt/bitnami/redis/secrets/ {{- end }} - name: redis-data mountPath: {{ .Values.master.persistence.path }} subPath: {{ .Values.master.persistence.subPath }} - name: config mountPath: /opt/bitnami/redis/mounted-etc - name: redis-tmp-conf mountPath: /opt/bitnami/redis/etc/ - name: tmp mountPath: /tmp {{- if .Values.tls.enabled }} - name: redis-certificates mountPath: /opt/bitnami/redis/certs readOnly: true {{- end }} {{- if .Values.master.extraVolumeMounts }} {{- include "common.tplvalues.render" ( dict "value" .Values.master.extraVolumeMounts "context" $ ) | nindent 12 }} {{- end }} {{- if .Values.metrics.enabled }} - name: metrics image: {{ include "redis.metrics.image" . }} imagePullPolicy: {{ .Values.metrics.image.pullPolicy | quote }} {{- if .Values.metrics.containerSecurityContext.enabled }} securityContext: {{- omit .Values.metrics.containerSecurityContext "enabled" | toYaml | nindent 12 }} {{- end }} {{- if .Values.diagnosticMode.enabled }} command: {{- include "common.tplvalues.render" (dict "value" .Values.diagnosticMode.command "context" $) | nindent 12 }} {{- else }} command: - /bin/bash - -c - | if [[ -f '/secrets/redis-password' ]]; then export REDIS_PASSWORD=$(cat /secrets/redis-password) fi redis_exporter{{- range $key, $value := .Values.metrics.extraArgs }} --{{ $key }}={{ $value }}{{- end }} {{- end }} {{- if .Values.diagnosticMode.enabled }} args: {{- include "common.tplvalues.render" (dict "value" .Values.diagnosticMode.args "context" $) | nindent 12 }} {{- end }} env: - name: REDIS_ALIAS value: {{ template "common.names.fullname" . }} {{- if .Values.auth.enabled }} - name: REDIS_USER value: default {{- if (not .Values.auth.usePasswordFiles) }} - name: REDIS_PASSWORD valueFrom: secretKeyRef: name: {{ template "redis.secretName" . }} key: {{ template "redis.secretPasswordKey" . }} {{- end }} {{- end }} {{- if .Values.tls.enabled }} - name: REDIS_ADDR value: rediss://{{ .Values.metrics.redisTargetHost }}:{{ .Values.master.containerPorts.redis }} {{- if .Values.tls.authClients }} - name: REDIS_EXPORTER_TLS_CLIENT_KEY_FILE value: {{ template "redis.tlsCertKey" . }} - name: REDIS_EXPORTER_TLS_CLIENT_CERT_FILE value: {{ template "redis.tlsCert" . }} {{- end }} - name: REDIS_EXPORTER_TLS_CA_CERT_FILE value: {{ template "redis.tlsCACert" . }} {{- end }} {{- if .Values.metrics.extraEnvVars }} {{- include "common.tplvalues.render" (dict "value" .Values.metrics.extraEnvVars "context" $) | nindent 12 }} {{- end }} ports: - name: metrics containerPort: 9121 {{- if .Values.metrics.resources }} resources: {{- toYaml .Values.metrics.resources | nindent 12 }} {{- end }} volumeMounts: {{- if .Values.auth.usePasswordFiles }} - name: redis-password mountPath: /secrets/ {{- end }} {{- if .Values.tls.enabled }} - name: redis-certificates mountPath: /opt/bitnami/redis/certs readOnly: true {{- end }} {{- if .Values.metrics.extraVolumeMounts }} {{- include "common.tplvalues.render" ( dict "value" .Values.metrics.extraVolumeMounts "context" $ ) | nindent 12 }} {{- end }} {{- end }} {{- if .Values.master.sidecars }} {{- include "common.tplvalues.render" (dict "value" .Values.master.sidecars "context" $) | nindent 8 }} {{- end }} {{- $needsVolumePermissions := and .Values.volumePermissions.enabled .Values.master.persistence.enabled .Values.master.podSecurityContext.enabled .Values.master.containerSecurityContext.enabled }} {{- if or .Values.master.initContainers $needsVolumePermissions .Values.sysctl.enabled }} initContainers: {{- if .Values.master.initContainers }} {{- include "common.tplvalues.render" (dict "value" .Values.master.initContainers "context" $) | nindent 8 }} {{- end }} {{- if $needsVolumePermissions }} - name: volume-permissions image: {{ include "redis.volumePermissions.image" . }} imagePullPolicy: {{ .Values.volumePermissions.image.pullPolicy | quote }} command: - /bin/bash - -ec - | {{- if eq ( toString ( .Values.volumePermissions.containerSecurityContext.runAsUser )) "auto" }} chown -R `id -u`:`id -G | cut -d " " -f2` {{ .Values.master.persistence.path }} {{- else }} chown -R {{ .Values.master.containerSecurityContext.runAsUser }}:{{ .Values.master.podSecurityContext.fsGroup }} {{ .Values.master.persistence.path }} {{- end }} {{- if eq ( toString ( .Values.volumePermissions.containerSecurityContext.runAsUser )) "auto" }} securityContext: {{- omit .Values.volumePermissions.containerSecurityContext "runAsUser" | toYaml | nindent 12 }} {{- else }} securityContext: {{- .Values.volumePermissions.containerSecurityContext | toYaml | nindent 12 }} {{- end }} {{- if .Values.volumePermissions.resources }} resources: {{- toYaml .Values.volumePermissions.resources | nindent 12 }} {{- end }} volumeMounts: - name: redis-data mountPath: {{ .Values.master.persistence.path }} subPath: {{ .Values.master.persistence.subPath }} {{- end }} {{- if .Values.sysctl.enabled }} - name: init-sysctl image: {{ include "redis.sysctl.image" . }} imagePullPolicy: {{ default "" .Values.sysctl.image.pullPolicy | quote }} securityContext: privileged: true runAsUser: 0 {{- if .Values.sysctl.command }} command: {{- include "common.tplvalues.render" (dict "value" .Values.sysctl.command "context" $) | nindent 12 }} {{- end }} {{- if .Values.sysctl.resources }} resources: {{- toYaml .Values.sysctl.resources | nindent 12 }} {{- end }} {{- if .Values.sysctl.mountHostSys }} volumeMounts: - name: host-sys mountPath: /host-sys {{- end }} {{- end }} {{- end }} volumes: - name: start-scripts configMap: name: {{ printf "%s-scripts" (include "common.names.fullname" .) }} defaultMode: 0755 - name: health configMap: name: {{ printf "%s-health" (include "common.names.fullname" .) }} defaultMode: 0755 {{- if .Values.auth.usePasswordFiles }} - name: redis-password secret: secretName: {{ template "redis.secretName" . }} items: - key: {{ template "redis.secretPasswordKey" . }} path: redis-password {{- end }} - name: config configMap: name: {{ include "redis.configmapName" . }} {{- if .Values.sysctl.mountHostSys }} - name: host-sys hostPath: path: /sys {{- end }} - name: redis-tmp-conf {{- if .Values.master.persistence.medium }} emptyDir: medium: {{ .Values.master.persistence.medium | quote }} {{- if .Values.master.persistence.sizeLimit }} sizeLimit: {{ .Values.master.persistence.sizeLimit | quote }} {{- end }} {{- else }} emptyDir: {} {{- end }} - name: tmp {{- if .Values.master.persistence.medium }} emptyDir: medium: {{ .Values.master.persistence.medium | quote }} {{- if .Values.master.persistence.sizeLimit }} sizeLimit: {{ .Values.master.persistence.sizeLimit | quote }} {{- end }} {{- else }} emptyDir: {} {{- end }} {{- if .Values.tls.enabled }} - name: redis-certificates secret: secretName: {{ include "redis.tlsSecretName" . }} defaultMode: 256 {{- end }} {{- if .Values.master.extraVolumes }} {{- include "common.tplvalues.render" ( dict "value" .Values.master.extraVolumes "context" $ ) | nindent 8 }} {{- end }} {{- if .Values.metrics.extraVolumes }} {{- include "common.tplvalues.render" ( dict "value" .Values.metrics.extraVolumes "context" $ ) | nindent 8 }} {{- end }} {{- if not .Values.master.persistence.enabled }} - name: redis-data {{- if .Values.master.persistence.medium }} emptyDir: { medium: {{ .Values.master.persistence.medium | quote }} } {{- else }} emptyDir: {} {{- end }} {{- else if .Values.master.persistence.existingClaim }} - name: redis-data persistentVolumeClaim: claimName: {{ printf "%s" (tpl .Values.master.persistence.existingClaim .) }} {{- else if (eq .Values.master.kind "Deployment") }} - name: redis-data persistentVolumeClaim: claimName: {{ printf "redis-data-%s-master" (include "common.names.fullname" .) }} {{- else }} volumeClaimTemplates: - metadata: name: redis-data labels: {{- include "common.labels.matchLabels" . | nindent 10 }} app.kubernetes.io/component: master {{- if .Values.master.persistence.annotations }} annotations: {{- toYaml .Values.master.persistence.annotations | nindent 10 }} {{- end }} spec: accessModes: {{- range .Values.master.persistence.accessModes }} - {{ . | quote }} {{- end }} resources: requests: storage: {{ .Values.master.persistence.size | quote }} {{- if .Values.master.persistence.selector }} selector: {{- include "common.tplvalues.render" (dict "value" .Values.master.persistence.selector "context" $) | nindent 10 }} {{- end }} {{- if .Values.master.persistence.dataSource }} dataSource: {{- include "common.tplvalues.render" (dict "value" .Values.master.persistence.dataSource "context" $) | nindent 10 }} {{- end }} {{- include "common.storage.class" (dict "persistence" .Values.master.persistence "global" .Values.global) | nindent 8 }} {{- end }} {{- end }}