Initial add of opensearch charts
This commit is contained in:
parent
29a3dde7ec
commit
e435dda713
23
opensearch-dashboards/.helmignore
Normal file
23
opensearch-dashboards/.helmignore
Normal file
@ -0,0 +1,23 @@
|
||||
# Patterns to ignore when building packages.
|
||||
# This supports shell glob matching, relative path matching, and
|
||||
# negation (prefixed with !). Only one pattern per line.
|
||||
.DS_Store
|
||||
# Common VCS dirs
|
||||
.git/
|
||||
.gitignore
|
||||
.bzr/
|
||||
.bzrignore
|
||||
.hg/
|
||||
.hgignore
|
||||
.svn/
|
||||
# Common backup files
|
||||
*.swp
|
||||
*.bak
|
||||
*.tmp
|
||||
*.orig
|
||||
*~
|
||||
# Various IDEs
|
||||
.project
|
||||
.idea/
|
||||
*.tmproj
|
||||
.vscode/
|
||||
334
opensearch-dashboards/CHANGELOG.md
Normal file
334
opensearch-dashboards/CHANGELOG.md
Normal file
@ -0,0 +1,334 @@
|
||||
# Changelog
|
||||
All notable changes to this project will be documented in this file.
|
||||
|
||||
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
|
||||
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
|
||||
|
||||
---
|
||||
## [Unreleased]
|
||||
### Added
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.16.0]
|
||||
### Added
|
||||
- Updated OpenSearch Dashboards appVersion to 2.12.0
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.15.1]
|
||||
### Added
|
||||
- Added support for pod topology spread constraints in Dashboards
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.15.0]
|
||||
### Added
|
||||
- Updated OpenSearch Dashboards appVersion to 2.11.1
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.14.0]
|
||||
### Added
|
||||
- Updated OpenSearch Dashboards appVersion to 2.11.0
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.13.0]
|
||||
### Added
|
||||
- Updated OpenSearch Dashboards appVersion to 2.10.0
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.12.0]
|
||||
### Added
|
||||
- Updated OpenSearch Dashboards appVersion to 2.9.0
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
|
||||
---
|
||||
## [2.11.1]
|
||||
### Added
|
||||
- Support string type for extraObjects
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.11.0]
|
||||
### Added
|
||||
- Updated OpenSearch Dashboards appVersion to 2.8.0
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.10.0]
|
||||
### Added
|
||||
- Updated OpenSearch Dashboards appVersion to 2.7.0
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.9.3]
|
||||
### Added
|
||||
- Added custom opensearch and dashboard annotations through values.yaml
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.9.2]
|
||||
### Added
|
||||
- Support setting ipFamilyPolicy on Service
|
||||
- Support setting ipFamilies on Service
|
||||
---
|
||||
## [2.9.1]
|
||||
### Added
|
||||
### Changed
|
||||
- Allow user-defined labels on ingress resource
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.9.0]
|
||||
### Added
|
||||
### Changed
|
||||
- Updated OpenSearch Dashboards appVersion to 2.6.0
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.8.0]
|
||||
### Added
|
||||
### Changed
|
||||
- Updated OpenSearch Dashboards appVersion to 2.5.0
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.7.0]
|
||||
### Added
|
||||
### Changed
|
||||
- Updated OpenSearch Dashboards appVersion to 2.4.1
|
||||
---
|
||||
## [2.6.1]
|
||||
### Added
|
||||
- Added the ability to define plugins on node startup via plugins.enabled option for opensearch-dashboards chart.
|
||||
- Added the ability to define defaultMode for the opensearch_dashboards.yml file which is mounted as configMap
|
||||
- Added documentation for new configurations
|
||||
### Changed
|
||||
- Updated version to 2.6.1
|
||||
---
|
||||
## [2.6.0]
|
||||
### Added
|
||||
### Changed
|
||||
- Updated OpenSearch Dashboards appVersion to 2.4.0
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.5.3]
|
||||
### Added
|
||||
- Startup, readiness and liveness probes for deployment
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.5.2]
|
||||
### Added
|
||||
- Template configmap content by tpl function
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.5.1]
|
||||
### Added
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
- ingress helm validation error fix by removing additional hyphen
|
||||
### Security
|
||||
---
|
||||
## [2.5.0]
|
||||
### Added
|
||||
### Changed
|
||||
- Updated version to 2.5.0 and appVersion to "2.3.0".
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.4.2]
|
||||
### Added
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
- OpenSearch Dashboards fixed failure when ingress service port is a string (named port)
|
||||
### Security
|
||||
---
|
||||
## [2.4.1]
|
||||
### Added
|
||||
- Helm chart-releaser parallel release issue, updated version to 2.4.1.
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.4.0]
|
||||
### Added
|
||||
- Updated version to 2.4.0 and appVersion to "2.2.1".
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.3.0]
|
||||
### Added
|
||||
- Updated version to 2.3.0 and appVersion to "2.2.0".
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.2.4]
|
||||
### Added
|
||||
- Add lifecycle hooks for opensearch-dashboards charts
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.2.3]
|
||||
### Added
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
- Opensearch dashboards ingress template to use values from provided config
|
||||
### Security
|
||||
---
|
||||
## [2.2.2]
|
||||
### Added
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
- Opensearch dashboard fix issue #295.
|
||||
- Opensearch dashboard config map support both string and map format.
|
||||
### Security
|
||||
---
|
||||
## [2.2.1]
|
||||
### Added
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
- Opensearch dashboard config map format is restored with backward support of string format
|
||||
### Security
|
||||
---
|
||||
## [2.2.0]
|
||||
### Added
|
||||
### Changed
|
||||
- Updated version to 2.2.0 and appVersion to "2.1.0".
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.1.0]
|
||||
### Added
|
||||
### Changed
|
||||
- Updated version to 2.1.0 and appVersion to "2.0.1".
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.0.1]
|
||||
### Added
|
||||
### Changed
|
||||
- Updated version to 2.0.1 and appVersion to "2.0.0".
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.0.0]
|
||||
### Added
|
||||
### Changed
|
||||
- Updated version to 2.0.0 and appVersion to "2.0.0-rc1".
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
|
||||
[Unreleased]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.16.0...HEAD
|
||||
[2.16.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.15.1...opensearch-dashboards-2.16.0
|
||||
[2.15.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.15.0...opensearch-dashboards-2.15.1
|
||||
[2.15.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.14.0...opensearch-dashboards-2.15.0
|
||||
[2.14.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.13.0...opensearch-dashboards-2.14.0
|
||||
[2.13.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.12.0...opensearch-dashboards-2.13.0
|
||||
[2.12.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.11.1...opensearch-dashboards-2.12.0
|
||||
[2.11.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.11.0...opensearch-dashboards-2.11.1
|
||||
[2.11.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.10.0...opensearch-dashboards-2.11.0
|
||||
[2.10.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.9.0...opensearch-dashboards-2.10.0
|
||||
[2.9.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.8.0...opensearch-dashboards-2.9.0
|
||||
[2.8.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.7.0...opensearch-dashboards-2.8.0
|
||||
[2.7.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.6.1...opensearch-dashboards-2.7.0
|
||||
[2.6.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.6.0...opensearch-dashboards-2.6.1
|
||||
[2.6.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.5.3...opensearch-dashboards-2.6.0
|
||||
[2.5.3]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.5.2...opensearch-dashboards-2.5.3
|
||||
[2.5.2]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.5.1...opensearch-dashboards-2.5.2
|
||||
[2.5.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.5.0...opensearch-dashboards-2.5.1
|
||||
[2.5.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.4.1...opensearch-dashboards-2.5.0
|
||||
[2.4.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.4.0...opensearch-dashboards-2.4.1
|
||||
[2.4.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.3.0...opensearch-dashboards-2.4.0
|
||||
[2.3.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.2.4...opensearch-dashboards-2.3.0
|
||||
[2.2.4]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.2.3...opensearch-dashboards-2.2.4
|
||||
[2.2.3]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.2.2...opensearch-dashboards-2.2.3
|
||||
[2.2.2]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.2.1...opensearch-dashboards-2.2.2
|
||||
[2.2.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.2.0...opensearch-dashboards-2.2.1
|
||||
[2.2.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.1.0...opensearch-dashboards-2.2.0
|
||||
[2.1.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.0.1...opensearch-dashboards-2.1.0
|
||||
[2.0.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-dashboards-2.0.0...opensearch-dashboards-2.0.1
|
||||
13
opensearch-dashboards/Chart.yaml
Normal file
13
opensearch-dashboards/Chart.yaml
Normal file
@ -0,0 +1,13 @@
|
||||
apiVersion: v2
|
||||
appVersion: 2.12.0
|
||||
description: A Helm chart for OpenSearch Dashboards
|
||||
maintainers:
|
||||
- name: DandyDeveloper
|
||||
- name: bbarani
|
||||
- name: gaiksaya
|
||||
- name: peterzhuamazon
|
||||
- name: prudhvigodithi
|
||||
- name: TheAlgo
|
||||
name: opensearch-dashboards
|
||||
type: application
|
||||
version: 2.16.0
|
||||
96
opensearch-dashboards/README.md
Normal file
96
opensearch-dashboards/README.md
Normal file
@ -0,0 +1,96 @@
|
||||
# OpenSearch Dashboards Helm Chart
|
||||
|
||||
This Helm chart installs [OpenSearch Dashboards](https://github.com/opensearch-project/OpenSearch-Dashboards) with configurable TLS, RBAC and much more configurations. This chart caters to a number of different use cases and setups.
|
||||
|
||||
- [Requirements](#requirements)
|
||||
- [Installing](#installing)
|
||||
- [Uninstalling](#uninstalling)
|
||||
|
||||
## Requirements
|
||||
|
||||
* Kubernetes >= 1.14
|
||||
* Helm >= 2.17.0
|
||||
* We recommend you to have 8 GiB of memory available for this deployment, or at least 4 GiB for the minimum requirement. Else, the deployment is expected to fail.
|
||||
|
||||
## Installing
|
||||
|
||||
Once you've added this Helm repository as per the repository-level [README](../../README.md#installing)
|
||||
then you can install the chart as follows:
|
||||
|
||||
```shell
|
||||
helm install my-release opensearch/opensearch-dashboards
|
||||
```
|
||||
|
||||
The command deploys OpenSearch Dashboards with its associated components on the Kubernetes cluster in the default configuration.
|
||||
|
||||
**NOTE:** If using Helm 2 then you'll need to add the [`--name`](https://v2.helm.sh/docs/helm/#options-21) command line argument. If unspecified, Helm 2 will autogenerate a name for you.
|
||||
|
||||
## Uninstalling
|
||||
To delete/uninstall the chart with the release name `my-release`:
|
||||
|
||||
```shell
|
||||
helm uninstall my-release
|
||||
```
|
||||
|
||||
## Configuration
|
||||
|
||||
| Parameter | Description | Default |
|
||||
|------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------|
|
||||
| `envFrom` | Templatable string to be passed to the [environment from variables][] which will be appended to the `envFrom:` definition for the container | `[]` |
|
||||
| `config` | Allows you to add any config files in `/usr/share/opensearch-dashboards/` such as `opensearch_dashboards.yml`. String or map format may be used for specifying content of each configuration file. In case of string format, the whole content of the config file will be replaced by new config file value when in case of using map format content of configuration file will be a result of merge. In both cases content passed through tpl. See [values.yaml][] for an example of the formatting | `{}` |
|
||||
| `extraContainers` | Array of extra containers | `""` |
|
||||
| `extraEnvs` | Extra environments variables to be passed to OpenSearch services | `[]` |
|
||||
| `extraInitContainers` | Array of extra init containers | `[]` |
|
||||
| `extraVolumeMounts` | Array of extra volume mounts | `[] ` |
|
||||
| `extraVolumes` | Array of extra volumes to be added | `[]` |
|
||||
| `fullnameOverride` | Overrides the `clusterName` and `nodeGroup` when used in the naming of resources. This should only be used when using a single `nodeGroup`, otherwise you will have name conflicts | `""` |
|
||||
| `hostAliases` | Configurable [hostAliases][] | `[]` |
|
||||
| `image.pullPolicy` | The Kubernetes [imagePullPolicy][] value | `IfNotPresent` |
|
||||
| `imagePullSecrets` | Configuration for [imagePullSecrets][] so that you can use a private registry for your image | `[]` |
|
||||
| `image.tag` | The OpenSearch Docker image tag | `1.0.0` |
|
||||
| `image.repository` | The OpenSearch Docker image | `opensearchproject/opensearch` |
|
||||
| `ingress` | Configurable [ingress][] to expose the OpenSearch service. See [values.yaml][] for an example | see [values.yaml][] |
|
||||
| `labels` | Configurable [labels][] applied to all OpenSearch pods | `{}` |
|
||||
| `lifecycle` | Allows you to add [lifecycle hooks](https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/). See [values.yaml][] for an example | `{}` |
|
||||
| `nameOverride` | Overrides the `clusterName` when used in the naming of resources | `""` |
|
||||
| `nodeSelector` | Configurable [nodeSelector][] so that you can target specific nodes for your OpenSearch cluster | `{}` |
|
||||
| `podAnnotations` | Configurable [annotations][] applied to all OpenSearch pods | `{}` |
|
||||
| `podSecurityContext` | Allows you to set the [securityContext][] for the pod | see [values.yaml][] |
|
||||
| `priorityClassName` | The name of the [PriorityClass][]. No default is supplied as the PriorityClass must be created first | `""` |
|
||||
| `rbac` | Configuration for creating a role, role binding and ServiceAccount as part of this Helm chart with `create: true`. Also can be used to reference an external ServiceAccount with `serviceAccountName: "externalServiceAccountName"` | see [values.yaml][] |
|
||||
| `resources` | Allows you to set the [resources][] for the StatefulSet | see [values.yaml][] |
|
||||
| `secretMounts` | Allows you easily mount a secret as a file inside the StatefulSet. Useful for mounting certificates and other secrets. See [values.yaml][] for an example | `[]` |
|
||||
| `securityContext` | Allows you to set the [securityContext][] for the container | see [values.yaml][] |
|
||||
| `service.annotations` | [LoadBalancer annotations][] that Kubernetes will use for the service. This will configure load balancer if `service.type` is `LoadBalancer` | `{}` |
|
||||
| `service.headless.annotations` | Allow you to set annotations on the headless service | `{}` |
|
||||
| `service.externalTrafficPolicy` | Some cloud providers allow you to specify the [LoadBalancer externalTrafficPolicy][]. Kubernetes will use this to preserve the client source IP. This will configure load balancer if `service.type` is `LoadBalancer` | `""` |
|
||||
| `service.httpPortName` | The name of the http port within the service | `http` |
|
||||
| `service.labelsHeadless` | Labels to be added to headless service | `{}` |
|
||||
| `service.labels` | Labels to be added to non-headless service | `{}` |
|
||||
| `service.loadBalancerIP` | Some cloud providers allow you to specify the [loadBalancer][] IP. If the `loadBalancerIP` field is not specified, the IP is dynamically assigned. If you specify a `loadBalancerIP` but your cloud provider does not support the feature, it is ignored. | `""` |
|
||||
| `service.loadBalancerSourceRanges` | The IP ranges that are allowed to access | `[]` |
|
||||
| `service.nodePort` | Custom [nodePort][] port that can be set if you are using `service.type: nodePort` | `""` |
|
||||
| `service.transportPortName` | The name of the transport port within the service | `transport` |
|
||||
| `service.type` | OpenSearch [Service Types][] | `ClusterIP` |
|
||||
| `service.ipFamilyPolicy` | This sets the preferred ip addresses in case of a dual-stack server, there are three options [PreferDualStack, SingleStack, RequireDualStack], [more information on dual stack](https://kubernetes.io/docs/concepts/services-networking/dual-stack/) | `""` |
|
||||
| `service.ipFamilies` | Sets the preferred IP variants and in which order they are preferred, the first family you list is used for the legacy .spec.ClusterIP field, [more information on dual stack](https://kubernetes.io/docs/concepts/services-networking/dual-stack/) | `""` |
|
||||
| `tolerations` | Configurable [tolerations][] | `[]` |
|
||||
| `topologySpreadConstraints` | Configuration for pod [topologySpreadConstraints][] | `[]` |
|
||||
| `updateStrategy` | The [updateStrategy][] for the StatefulSet. By default Kubernetes will wait for the cluster to be green after upgrading each pod. Setting this to `OnDelete` will allow you to manually delete each pod during upgrades | `RollingUpdate` |
|
||||
| `extraObjects` | Array of extra K8s manifests to deploy | list `[]` |
|
||||
| `autoscaling` | Prerequisite: Install/Configure metrics server, to install use `kubectl apply -f https://github.com/kubernetes-sigs/metrics-server/releases/latest/download/components.yaml`, See https://github.com/kubernetes-sigs/metrics-server. Configurable pod autoscaling stratergy to scale based on `targetCPUUtilizationPercentage`, configure `minReplicas` and `maxReplicas` for desired scaling | false |
|
||||
| `livenessProbe` | Configuration fields for the liveness [probe][] | see [exampleLiveness][] in `values.yaml`|
|
||||
| `readinessProbe` | Configuration fields for the readiness [probe][] | see [exampleReadiness][] in `values.yaml`|
|
||||
| `startupProbe` | Configuration fields for the startup [probe][] | see [exampleStartup][] in `values.yaml` |
|
||||
| `plugins.enabled` | Allow/disallow to add 3rd Party / Custom plugins not offered in the default OpenSearchDashboards image | false |
|
||||
| `plugins.installList` | Array containing the Opensearch Dashboards plugins to be installed in container | [] |
|
||||
| `opensearchDashboardsYml.defaultMode` | Allow you to set the defaultMode for the opensearch_dashboards.yml mounted as configMap | |
|
||||
| `dashboardAnnotations` | Allows you to configure custom annotation in the deployement of the OpenSearchDashboards container | {} |
|
||||
|
||||
[probe]: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#define-readiness-probes
|
||||
|
||||
|
||||
[exampleStartup]: https://github.com/opensearch-project/helm-charts/blob/main/charts/opensearch-dashboards/values.yaml#17
|
||||
[exampleLiveness]: https://github.com/opensearch-project/helm-charts/blob/main/charts/opensearch-dashboards/values.yaml#27
|
||||
[exampleReadiness]: https://github.com/opensearch-project/helm-charts/blob/main/charts/opensearch-dashboards/values.yaml#37
|
||||
[topologySpreadConstraints]: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints
|
||||
22
opensearch-dashboards/templates/NOTES.txt
Normal file
22
opensearch-dashboards/templates/NOTES.txt
Normal file
@ -0,0 +1,22 @@
|
||||
1. Get the application URL by running these commands:
|
||||
{{- if .Values.ingress.enabled }}
|
||||
{{- range $host := .Values.ingress.hosts }}
|
||||
{{- range .paths }}
|
||||
http{{ if $.Values.ingress.tls }}s{{ end }}://{{ $host.host }}{{ .path }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- else if contains "NodePort" .Values.service.type }}
|
||||
export NODE_PORT=$(kubectl get --namespace {{ .Release.Namespace }} -o jsonpath="{.spec.ports[0].nodePort}" services {{ include "opensearch-dashboards.fullname" . }})
|
||||
export NODE_IP=$(kubectl get nodes --namespace {{ .Release.Namespace }} -o jsonpath="{.items[0].status.addresses[0].address}")
|
||||
echo http://$NODE_IP:$NODE_PORT
|
||||
{{- else if contains "LoadBalancer" .Values.service.type }}
|
||||
NOTE: It may take a few minutes for the LoadBalancer IP to be available.
|
||||
You can watch the status of by running 'kubectl get --namespace {{ .Release.Namespace }} svc -w {{ include "opensearch-dashboards.fullname" . }}'
|
||||
export SERVICE_IP=$(kubectl get svc --namespace {{ .Release.Namespace }} {{ include "opensearch-dashboards.fullname" . }} --template "{{"{{ range (index .status.loadBalancer.ingress 0) }}{{.}}{{ end }}"}}")
|
||||
echo http://$SERVICE_IP:{{ .Values.service.port }}
|
||||
{{- else if contains "ClusterIP" .Values.service.type }}
|
||||
export POD_NAME=$(kubectl get pods --namespace {{ .Release.Namespace }} -l "app.kubernetes.io/name={{ include "opensearch-dashboards.name" . }},app.kubernetes.io/instance={{ .Release.Name }}" -o jsonpath="{.items[0].metadata.name}")
|
||||
export CONTAINER_PORT=$(kubectl get pod --namespace {{ .Release.Namespace }} $POD_NAME -o jsonpath="{.spec.containers[0].ports[0].containerPort}")
|
||||
echo "Visit http://127.0.0.1:8080 to use your application"
|
||||
kubectl --namespace {{ .Release.Namespace }} port-forward $POD_NAME 8080:$CONTAINER_PORT
|
||||
{{- end }}
|
||||
88
opensearch-dashboards/templates/_helpers.tpl
Normal file
88
opensearch-dashboards/templates/_helpers.tpl
Normal file
@ -0,0 +1,88 @@
|
||||
{{/*
|
||||
Expand the name of the chart.
|
||||
*/}}
|
||||
{{- define "opensearch-dashboards.name" -}}
|
||||
{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
Create a default fully qualified app name.
|
||||
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
|
||||
If release name contains chart name it will be used as a full name.
|
||||
*/}}
|
||||
{{- define "opensearch-dashboards.fullname" -}}
|
||||
{{- if .Values.fullnameOverride }}
|
||||
{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" }}
|
||||
{{- else }}
|
||||
{{- $name := default .Chart.Name .Values.nameOverride }}
|
||||
{{- if contains $name .Release.Name }}
|
||||
{{- .Release.Name | trunc 63 | trimSuffix "-" }}
|
||||
{{- else }}
|
||||
{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
Create chart name and version as used by the chart label.
|
||||
*/}}
|
||||
{{- define "opensearch-dashboards.chart" -}}
|
||||
{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
Common labels
|
||||
*/}}
|
||||
{{- define "opensearch-dashboards.labels" -}}
|
||||
helm.sh/chart: {{ include "opensearch-dashboards.chart" . }}
|
||||
{{ include "opensearch-dashboards.selectorLabels" . }}
|
||||
{{- if .Chart.AppVersion }}
|
||||
app.kubernetes.io/version: {{ .Chart.AppVersion | quote }}
|
||||
{{- end }}
|
||||
app.kubernetes.io/managed-by: {{ .Release.Service }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
Selector labels
|
||||
*/}}
|
||||
{{- define "opensearch-dashboards.selectorLabels" -}}
|
||||
app.kubernetes.io/name: {{ include "opensearch-dashboards.name" . }}
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
Create the name of the service account to use
|
||||
*/}}
|
||||
{{- define "opensearch-dashboards.serviceAccountName" -}}
|
||||
{{- if .Values.serviceAccount.create }}
|
||||
{{- default (include "opensearch-dashboards.fullname" .) .Values.serviceAccount.name }}-dashboards
|
||||
{{- else }}
|
||||
{{- default "default" .Values.serviceAccount.name }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
Return the appropriate apiVersion for ingress.
|
||||
*/}}
|
||||
{{- define "opensearch-dashboards.ingress.apiVersion" -}}
|
||||
{{- if and (.Capabilities.APIVersions.Has "networking.k8s.io/v1") (semverCompare ">= 1.19-0" .Capabilities.KubeVersion.Version) -}}
|
||||
{{- print "networking.k8s.io/v1" -}}
|
||||
{{- else if .Capabilities.APIVersions.Has "networking.k8s.io/v1beta1" -}}
|
||||
{{- print "networking.k8s.io/v1beta1" -}}
|
||||
{{- else -}}
|
||||
{{- print "extensions/v1beta1" -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Return if ingress is stable.
|
||||
*/}}
|
||||
{{- define "opensearch-dashboards.ingress.isStable" -}}
|
||||
{{- eq (include "opensearch-dashboards.ingress.apiVersion" .) "networking.k8s.io/v1" -}}
|
||||
{{- end -}}
|
||||
{{/*
|
||||
Return if ingress supports ingressClassName.
|
||||
*/}}
|
||||
{{- define "opensearch-dashboards.ingress.supportsIngressClassName" -}}
|
||||
{{- or (eq (include "opensearch-dashboards.ingress.isStable" .) "true") (and (eq (include "opensearch-dashboards.ingress.apiVersion" .) "networking.k8s.io/v1beta1") (semverCompare ">= 1.18-0" .Capabilities.KubeVersion.Version)) -}}
|
||||
{{- end -}}
|
||||
15
opensearch-dashboards/templates/autoscaler.yaml
Normal file
15
opensearch-dashboards/templates/autoscaler.yaml
Normal file
@ -0,0 +1,15 @@
|
||||
{{- if .Values.autoscaling.enabled -}}
|
||||
apiVersion: autoscaling/v1
|
||||
kind: HorizontalPodAutoscaler
|
||||
metadata:
|
||||
name: {{ template "opensearch-dashboards.fullname" . }}-hpa
|
||||
labels: {{- include "opensearch-dashboards.labels" . | nindent 4 }}
|
||||
spec:
|
||||
maxReplicas: {{ .Values.autoscaling.maxReplicas }}
|
||||
minReplicas: {{ .Values.autoscaling.minReplicas }}
|
||||
scaleTargetRef:
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
name: {{ template "opensearch-dashboards.fullname" . }}
|
||||
targetCPUUtilizationPercentage: {{ .Values.autoscaling.targetCPUUtilizationPercentage }}
|
||||
{{- end }}
|
||||
16
opensearch-dashboards/templates/configmap.yaml
Normal file
16
opensearch-dashboards/templates/configmap.yaml
Normal file
@ -0,0 +1,16 @@
|
||||
{{- if .Values.config -}}
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: {{ template "opensearch-dashboards.fullname" . }}-config
|
||||
labels: {{ include "opensearch-dashboards.labels" . | nindent 4 }}
|
||||
data:
|
||||
{{- range $configName, $configYaml := .Values.config }}
|
||||
{{ $configName }}: |
|
||||
{{- if eq (kindOf $configYaml) "map" }}
|
||||
{{- tpl (toYaml $configYaml) $ | nindent 4 }}
|
||||
{{- else }}
|
||||
{{- tpl $configYaml $ | nindent 4 -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
215
opensearch-dashboards/templates/deployment.yaml
Normal file
215
opensearch-dashboards/templates/deployment.yaml
Normal file
@ -0,0 +1,215 @@
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: {{ template "opensearch-dashboards.fullname" . }}
|
||||
labels: {{- include "opensearch-dashboards.labels" . | nindent 4 }}
|
||||
{{- with .Values.dashboardAnnotations }}
|
||||
annotations:
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end }}
|
||||
spec:
|
||||
replicas: {{ .Values.replicaCount }}
|
||||
strategy:
|
||||
{{ toYaml .Values.updateStrategy | indent 4 }}
|
||||
selector:
|
||||
matchLabels:
|
||||
app: {{ .Chart.Name }}
|
||||
release: {{ .Release.Name | quote }}
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
app: {{ .Chart.Name }}
|
||||
release: {{ .Release.Name | quote }}
|
||||
{{- range $key, $value := .Values.labels }}
|
||||
{{ $key }}: {{ $value | quote }}
|
||||
{{- end }}
|
||||
annotations:
|
||||
{{- range $key, $value := .Values.podAnnotations }}
|
||||
{{ $key }}: {{ $value | quote }}
|
||||
{{- end }}
|
||||
{{- /* This forces a restart if the configmap has changed */}}
|
||||
{{- if .Values.config }}
|
||||
configchecksum: {{ include (print .Template.BasePath "/configmap.yaml") . | sha256sum | trunc 63 }}
|
||||
{{- end }}
|
||||
spec:
|
||||
{{- if .Values.priorityClassName }}
|
||||
priorityClassName: {{ .Values.priorityClassName }}
|
||||
{{- end }}
|
||||
securityContext:
|
||||
{{ toYaml .Values.podSecurityContext | indent 8 }}
|
||||
serviceAccountName: {{ template "opensearch-dashboards.serviceAccountName" . }}
|
||||
{{- if .Values.hostAliases }}
|
||||
hostAliases: {{ toYaml .Values.hostAliases | nindent 6 }}
|
||||
{{- end }}
|
||||
volumes:
|
||||
{{- range .Values.secretMounts }}
|
||||
- name: {{ .name }}
|
||||
secret:
|
||||
secretName: {{ .secretName }}
|
||||
{{- end }}
|
||||
{{- if .Values.config }}
|
||||
- name: config
|
||||
configMap:
|
||||
name: {{ template "opensearch-dashboards.fullname" . }}-config
|
||||
{{- if .Values.opensearchDashboardsYml.defaultMode }}
|
||||
defaultMode: {{ .Values.opensearchDashboardsYml.defaultMode }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if .Values.extraVolumes }}
|
||||
# Currently some extra blocks accept strings
|
||||
# to continue with backwards compatibility this is being kept
|
||||
# whilst also allowing for yaml to be specified too.
|
||||
{{- if eq "string" (printf "%T" .Values.extraVolumes) }}
|
||||
{{ tpl .Values.extraVolumes . | indent 8 }}
|
||||
{{- else }}
|
||||
{{ toYaml .Values.extraVolumes | indent 8 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- with .Values.nodeSelector }}
|
||||
nodeSelector:
|
||||
{{ toYaml . | indent 8 }}
|
||||
{{- end }}
|
||||
{{- with .Values.affinity }}
|
||||
affinity:
|
||||
{{ toYaml . | indent 8 }}
|
||||
{{- end }}
|
||||
{{- with .Values.tolerations }}
|
||||
tolerations:
|
||||
{{ toYaml . | indent 8 }}
|
||||
{{- end }}
|
||||
{{- if .Values.topologySpreadConstraints }}
|
||||
topologySpreadConstraints:
|
||||
{- toYaml .Values.topologySpreadConstraints | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- if .Values.imagePullSecrets }}
|
||||
imagePullSecrets:
|
||||
{{ toYaml .Values.imagePullSecrets | indent 8 }}
|
||||
{{- end }}
|
||||
{{- if .Values.extraInitContainers }}
|
||||
# Currently some extra blocks accept strings
|
||||
# to continue with backwards compatibility this is being kept
|
||||
# whilst also allowing for yaml to be specified too.
|
||||
initContainers:
|
||||
{{- if eq "string" (printf "%T" .Values.extraInitContainers) }}
|
||||
{{ tpl .Values.extraInitContainers . | indent 6 }}
|
||||
{{- else }}
|
||||
{{ toYaml .Values.extraInitContainers | indent 6 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
containers:
|
||||
- name: dashboards
|
||||
securityContext:
|
||||
{{ toYaml .Values.securityContext | indent 10 }}
|
||||
image: "{{ .Values.image.repository }}:{{ .Values.image.tag | default .Chart.AppVersion }}"
|
||||
imagePullPolicy: "{{ .Values.image.pullPolicy }}"
|
||||
{{- if .Values.readinessProbe }}
|
||||
readinessProbe:
|
||||
{{ toYaml .Values.readinessProbe | indent 10 }}
|
||||
{{- end }}
|
||||
{{- if .Values.livenessProbe }}
|
||||
livenessProbe:
|
||||
{{ toYaml .Values.livenessProbe | indent 10 }}
|
||||
{{- end }}
|
||||
{{- if semverCompare ">=1.16-0" .Capabilities.KubeVersion.Version }}
|
||||
{{- if .Values.readinessProbe }}
|
||||
startupProbe:
|
||||
{{ toYaml .Values.startupProbe | indent 10 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
env:
|
||||
{{- if .Values.opensearchURL }}
|
||||
- name: OPENSEARCH_URL
|
||||
value: "{{ .Values.opensearchURL }}"
|
||||
{{- else if .Values.opensearchHosts }}
|
||||
- name: OPENSEARCH_HOSTS
|
||||
value: "{{ .Values.opensearchHosts }}"
|
||||
{{- end }}
|
||||
- name: SERVER_HOST
|
||||
value: "{{ .Values.serverHost }}"
|
||||
{{- if .Values.opensearchAccount.secret }}
|
||||
- name: OPENSEARCH_USERNAME
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: {{ .Values.opensearchAccount.secret }}
|
||||
key: username
|
||||
- name: OPENSEARCH_PASSWORD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: {{ .Values.opensearchAccount.secret }}
|
||||
key: password
|
||||
{{- if and .Values.opensearchAccount.keyPassphrase.enabled }}
|
||||
- name: KEY_PASSPHRASE
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: {{ .Values.opensearchAccount.secret }}
|
||||
key: keypassphrase
|
||||
# 32-character random string to be used as cookie password by security plugin
|
||||
{{- end }}
|
||||
- name: COOKIE_PASS
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: {{ .Values.opensearchAccount.secret }}
|
||||
key: cookie
|
||||
{{- end }}
|
||||
{{- if .Values.extraEnvs }}
|
||||
{{ toYaml .Values.extraEnvs | indent 8 }}
|
||||
{{- end }}
|
||||
{{- if .Values.envFrom }}
|
||||
envFrom:
|
||||
{{ toYaml .Values.envFrom | indent 10 }}
|
||||
{{- end }}
|
||||
ports:
|
||||
- containerPort: {{ .Values.service.port }}
|
||||
name: {{ .Values.service.httpPortName | default "http" }}
|
||||
protocol: TCP
|
||||
{{- if .Values.plugins.enabled }}
|
||||
command:
|
||||
- sh
|
||||
- -c
|
||||
- |
|
||||
#!/usr/bin/bash
|
||||
set -e
|
||||
{{- range $plugin := .Values.plugins.installList }}
|
||||
./bin/opensearch-dashboards-plugin install {{ $plugin }}
|
||||
{{- end }}
|
||||
bash opensearch-dashboards-docker-entrypoint.sh opensearch-dashboards
|
||||
{{- end }}
|
||||
{{- if .Values.lifecycle }}
|
||||
lifecycle:
|
||||
{{ toYaml .Values.lifecycle | indent 10 }}
|
||||
{{- end }}
|
||||
resources:
|
||||
{{ toYaml .Values.resources | indent 10 }}
|
||||
volumeMounts:
|
||||
{{- range .Values.secretMounts }}
|
||||
- name: {{ .name }}
|
||||
mountPath: {{ .path }}
|
||||
{{- if .subPath }}
|
||||
subPath: {{ .subPath }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- range $path, $config := .Values.config }}
|
||||
- name: config
|
||||
mountPath: /usr/share/opensearch-dashboards/config/{{ $path }}
|
||||
subPath: {{ $path }}
|
||||
{{- end }}
|
||||
{{- if .Values.extraVolumeMounts }}
|
||||
# Currently some extra blocks accept strings
|
||||
# to continue with backwards compatibility this is being kept
|
||||
# whilst also allowing for yaml to be specified too.
|
||||
{{- if eq "string" (printf "%T" .Values.extraVolumeMounts) }}
|
||||
{{ tpl .Values.extraVolumeMounts . | indent 10 }}
|
||||
{{- else }}
|
||||
{{ toYaml .Values.extraVolumeMounts | indent 10 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if .Values.extraContainers }}
|
||||
# Currently some extra blocks accept strings
|
||||
# to continue with backwards compatibility this is being kept
|
||||
# whilst also allowing for yaml to be specified too.
|
||||
{{- if eq "string" (printf "%T" .Values.extraContainers) }}
|
||||
{{ tpl .Values.extraContainers . | indent 6 }}
|
||||
{{- else }}
|
||||
{{ toYaml .Values.extraContainers | indent 6 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
8
opensearch-dashboards/templates/extraManifests.yaml
Normal file
8
opensearch-dashboards/templates/extraManifests.yaml
Normal file
@ -0,0 +1,8 @@
|
||||
{{ range .Values.extraObjects }}
|
||||
---
|
||||
{{- if typeIs "string" . }}
|
||||
{{- tpl . $ }}
|
||||
{{- else }}
|
||||
{{- tpl (toYaml .) $ }}
|
||||
{{- end }}
|
||||
{{ end }}
|
||||
72
opensearch-dashboards/templates/ingress.yaml
Normal file
72
opensearch-dashboards/templates/ingress.yaml
Normal file
@ -0,0 +1,72 @@
|
||||
{{- if .Values.ingress.enabled -}}
|
||||
{{- $fullName := include "opensearch-dashboards.fullname" . -}}
|
||||
{{- $ingressApiIsStable := eq (include "opensearch-dashboards.ingress.isStable" .) "true" -}}
|
||||
{{- $ingressSupportsIngressClassName := eq (include "opensearch-dashboards.ingress.supportsIngressClassName" .) "true" -}}
|
||||
{{- $svcPort := .Values.service.port -}}
|
||||
{{- if semverCompare ">=1.19-0" .Capabilities.KubeVersion.GitVersion -}}
|
||||
apiVersion: networking.k8s.io/v1
|
||||
{{- else if semverCompare ">=1.14-0" .Capabilities.KubeVersion.GitVersion -}}
|
||||
apiVersion: networking.k8s.io/v1beta1
|
||||
{{- else -}}
|
||||
apiVersion: extensions/v1beta1
|
||||
{{- end }}
|
||||
kind: Ingress
|
||||
metadata:
|
||||
name: {{ $fullName }}
|
||||
labels:
|
||||
{{- include "opensearch-dashboards.labels" . | nindent 4 }}
|
||||
{{- with .Values.ingress.labels }}
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- with .Values.ingress.annotations }}
|
||||
annotations:
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end }}
|
||||
spec:
|
||||
{{- if and $ingressSupportsIngressClassName .Values.ingress.ingressClassName }}
|
||||
ingressClassName: {{ .Values.ingress.ingressClassName }}
|
||||
{{- end -}}
|
||||
{{- if .Values.ingress.tls }}
|
||||
tls:
|
||||
{{- range .Values.ingress.tls }}
|
||||
- hosts:
|
||||
{{- range .hosts }}
|
||||
- {{ . | quote }}
|
||||
{{- end }}
|
||||
secretName: {{ .secretName }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
rules:
|
||||
{{- if semverCompare ">=1.19-0" .Capabilities.KubeVersion.Version -}}
|
||||
{{- range .Values.ingress.hosts }}
|
||||
- host: {{ .host | quote }}
|
||||
http:
|
||||
paths:
|
||||
{{- range .paths }}
|
||||
- path: {{ .path }}
|
||||
pathType: Prefix
|
||||
backend:
|
||||
service:
|
||||
name: {{ .backend.serviceName | default $fullName }}
|
||||
port:
|
||||
{{- if and .backend.servicePort (kindIs "string" .backend.servicePort) }}
|
||||
name: {{ .backend.servicePort }}
|
||||
{{- else }}
|
||||
number: {{ .backend.servicePort | default $svcPort }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- else -}}
|
||||
{{- range .Values.ingress.hosts }}
|
||||
- host: {{ .host | quote }}
|
||||
http:
|
||||
paths:
|
||||
{{- range .paths }}
|
||||
- path: {{ .path }}
|
||||
backend:
|
||||
serviceName: {{ .backend.serviceName | default $fullName }}
|
||||
servicePort: {{ .backend.servicePort | default $svcPort }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
15
opensearch-dashboards/templates/rolebinding.yaml
Normal file
15
opensearch-dashboards/templates/rolebinding.yaml
Normal file
@ -0,0 +1,15 @@
|
||||
{{- if .Values.rbac.create -}}
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
labels: {{- include "opensearch-dashboards.labels" . | nindent 4 }}
|
||||
name: {{ template "opensearch-dashboards.fullname" . }}-dashboards-rolebinding
|
||||
roleRef:
|
||||
kind: Role
|
||||
name: {{ template "opensearch-dashboards.serviceAccountName" . }}
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: {{ template "opensearch-dashboards.serviceAccountName" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
{{- end }}
|
||||
41
opensearch-dashboards/templates/service.yaml
Normal file
41
opensearch-dashboards/templates/service.yaml
Normal file
@ -0,0 +1,41 @@
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: {{ template "opensearch-dashboards.fullname" . }}
|
||||
labels: {{- include "opensearch-dashboards.labels" . | nindent 4 }}
|
||||
{{- if .Values.service.labels }}
|
||||
{{ toYaml .Values.service.labels | indent 4}}
|
||||
{{- end }}
|
||||
{{- with .Values.service.annotations }}
|
||||
annotations:
|
||||
{{ toYaml . | indent 4 }}
|
||||
{{- end }}
|
||||
spec:
|
||||
type: {{ .Values.service.type }}
|
||||
{{- if (semverCompare ">= 1.23-0" .Capabilities.KubeVersion.Version) }}
|
||||
{{- if .Values.service.ipFamilyPolicy }}
|
||||
ipFamilyPolicy: {{ .Values.service.ipFamilyPolicy }}
|
||||
{{- end }}
|
||||
{{- if .Values.service.ipFamilies }}
|
||||
ipFamilies: {{ .Values.service.ipFamilies }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if .Values.service.loadBalancerIP }}
|
||||
loadBalancerIP: {{ .Values.service.loadBalancerIP }}
|
||||
{{- end }}
|
||||
{{- with .Values.service.loadBalancerSourceRanges }}
|
||||
loadBalancerSourceRanges:
|
||||
{{ toYaml . | indent 4 }}
|
||||
{{- end }}
|
||||
ports:
|
||||
- port: {{ .Values.service.port }}
|
||||
{{- if .Values.service.nodePort }}
|
||||
nodePort: {{ .Values.service.nodePort }}
|
||||
{{- end }}
|
||||
protocol: TCP
|
||||
name: {{ .Values.service.httpPortName | default "http" }}
|
||||
targetPort: {{ .Values.service.port }}
|
||||
selector:
|
||||
app: {{ .Chart.Name }}
|
||||
release: {{ .Release.Name | quote }}
|
||||
12
opensearch-dashboards/templates/serviceaccount.yaml
Normal file
12
opensearch-dashboards/templates/serviceaccount.yaml
Normal file
@ -0,0 +1,12 @@
|
||||
{{- if .Values.serviceAccount.create -}}
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: {{ include "opensearch-dashboards.serviceAccountName" . }}
|
||||
labels:
|
||||
{{- include "opensearch-dashboards.labels" . | nindent 4 }}
|
||||
{{- with .Values.serviceAccount.annotations }}
|
||||
annotations:
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
276
opensearch-dashboards/values.yaml
Normal file
276
opensearch-dashboards/values.yaml
Normal file
@ -0,0 +1,276 @@
|
||||
# Copyright OpenSearch Contributors
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
# Default values for opensearch-dashboards.
|
||||
# This is a YAML-formatted file.
|
||||
# Declare variables to be passed into your templates.
|
||||
|
||||
opensearchHosts: "https://opensearch-cluster-master:9200"
|
||||
replicaCount: 1
|
||||
|
||||
image:
|
||||
repository: "opensearchproject/opensearch-dashboards"
|
||||
# override image tag, which is .Chart.AppVersion by default
|
||||
tag: ""
|
||||
pullPolicy: "IfNotPresent"
|
||||
|
||||
startupProbe:
|
||||
tcpSocket:
|
||||
port: 5601
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 5
|
||||
failureThreshold: 20
|
||||
successThreshold: 1
|
||||
initialDelaySeconds: 10
|
||||
|
||||
livenessProbe:
|
||||
tcpSocket:
|
||||
port: 5601
|
||||
periodSeconds: 20
|
||||
timeoutSeconds: 5
|
||||
failureThreshold: 10
|
||||
successThreshold: 1
|
||||
initialDelaySeconds: 10
|
||||
|
||||
readinessProbe:
|
||||
tcpSocket:
|
||||
port: 5601
|
||||
periodSeconds: 20
|
||||
timeoutSeconds: 5
|
||||
failureThreshold: 10
|
||||
successThreshold: 1
|
||||
initialDelaySeconds: 10
|
||||
|
||||
imagePullSecrets: []
|
||||
nameOverride: ""
|
||||
fullnameOverride: ""
|
||||
|
||||
serviceAccount:
|
||||
# Specifies whether a service account should be created
|
||||
create: true
|
||||
# Annotations to add to the service account
|
||||
annotations: {}
|
||||
# The name of the service account to use.
|
||||
# If not set and create is true, a name is generated using the fullname template
|
||||
name: ""
|
||||
|
||||
rbac:
|
||||
create: true
|
||||
|
||||
# A list of secrets and their paths to mount inside the pod
|
||||
# This is useful for mounting certificates for security and for mounting
|
||||
# the X-Pack license
|
||||
secretMounts: []
|
||||
# - name: certs
|
||||
# secretName: dashboard-certs
|
||||
# path: /usr/share/dashboards/certs
|
||||
|
||||
podAnnotations: {}
|
||||
|
||||
# Deployment annotations
|
||||
dashboardAnnotations: {}
|
||||
|
||||
extraEnvs: []
|
||||
# - name: "NODE_OPTIONS"
|
||||
# value: "--max-old-space-size=1800"
|
||||
|
||||
envFrom: []
|
||||
|
||||
extraVolumes: []
|
||||
# - name: extras
|
||||
# emptyDir: {}
|
||||
|
||||
extraVolumeMounts: []
|
||||
# - name: extras
|
||||
# mountPath: /usr/share/extras
|
||||
# readOnly: true
|
||||
|
||||
extraInitContainers: ""
|
||||
|
||||
extraContainers: ""
|
||||
|
||||
podSecurityContext: {}
|
||||
|
||||
securityContext:
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
# readOnlyRootFilesystem: true
|
||||
runAsNonRoot: true
|
||||
runAsUser: 1000
|
||||
|
||||
config: {}
|
||||
# Default OpenSearch Dashboards configuration from docker image of Dashboards
|
||||
|
||||
# opensearch_dashboards.yml: |
|
||||
# server:
|
||||
# name: dashboards
|
||||
# host: "{{ .Values.serverHost }}"
|
||||
|
||||
# opensearch_dashboards.yml:
|
||||
# server:
|
||||
# name: dashboards
|
||||
# host: "{{ .Values.serverHost }}"
|
||||
|
||||
|
||||
# Dashboards TLS Config (Ensure the cert files are present before enabling SSL
|
||||
# ssl:
|
||||
# enabled: true
|
||||
# key: /usr/share/opensearch-dashboards/certs/dashboards-key.pem
|
||||
# certificate: /usr/share/opensearch-dashboards/certs/dashboards-crt.pem
|
||||
|
||||
# determines how dashboards will verify certificates (needs to be none for default opensearch certificates to work)
|
||||
# opensearch:
|
||||
# ssl:
|
||||
# certificateAuthorities: /usr/share/opensearch-dashboards/certs/dashboards-root-ca.pem
|
||||
# if utilizing custom CA certs for connection to opensearch, provide the CA here
|
||||
|
||||
opensearchDashboardsYml:
|
||||
defaultMode:
|
||||
# value should be 0-0777
|
||||
|
||||
priorityClassName: ""
|
||||
|
||||
opensearchAccount:
|
||||
secret: ""
|
||||
keyPassphrase:
|
||||
enabled: false
|
||||
|
||||
labels: {}
|
||||
|
||||
hostAliases: []
|
||||
# - ip: "127.0.0.1"
|
||||
# hostnames:
|
||||
# - "foo.local"
|
||||
# - "bar.local"
|
||||
|
||||
serverHost: "0.0.0.0"
|
||||
|
||||
service:
|
||||
type: ClusterIP
|
||||
# The IP family and IP families options are to set the behaviour in a dual-stack environment
|
||||
# Omitting these values will let the service fall back to whatever the CNI dictates the defaults
|
||||
# should be
|
||||
#
|
||||
# ipFamilyPolicy: SingleStack
|
||||
# ipFamilies:
|
||||
# - IPv4
|
||||
port: 5601
|
||||
loadBalancerIP: ""
|
||||
nodePort: ""
|
||||
labels: {}
|
||||
annotations: {}
|
||||
loadBalancerSourceRanges: []
|
||||
# 0.0.0.0/0
|
||||
httpPortName: http
|
||||
|
||||
ingress:
|
||||
enabled: false
|
||||
# For Kubernetes >= 1.18 you should specify the ingress-controller via the field ingressClassName
|
||||
# See https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/#specifying-the-class-of-an-ingress
|
||||
# ingressClassName: nginx
|
||||
annotations: {}
|
||||
# kubernetes.io/ingress.class: nginx
|
||||
# kubernetes.io/tls-acme: "true"
|
||||
labels: {}
|
||||
hosts:
|
||||
- host: chart-example.local
|
||||
paths:
|
||||
- path: /
|
||||
backend:
|
||||
serviceName: ""
|
||||
servicePort: ""
|
||||
tls: []
|
||||
# - secretName: chart-example-tls
|
||||
# hosts:
|
||||
# - chart-example.local
|
||||
|
||||
resources:
|
||||
requests:
|
||||
cpu: "100m"
|
||||
memory: "512M"
|
||||
limits:
|
||||
cpu: "100m"
|
||||
memory: "512M"
|
||||
|
||||
autoscaling:
|
||||
# This requires metrics server to be installed, to install use kubectl apply -f https://github.com/kubernetes-sigs/metrics-server/releases/latest/download/components.yaml
|
||||
# See https://github.com/kubernetes-sigs/metrics-server
|
||||
enabled: false
|
||||
minReplicas: 1
|
||||
maxReplicas: 10
|
||||
targetCPUUtilizationPercentage: 80
|
||||
|
||||
updateStrategy:
|
||||
type: "Recreate"
|
||||
|
||||
nodeSelector: {}
|
||||
|
||||
tolerations: []
|
||||
|
||||
affinity: {}
|
||||
|
||||
# This is the pod topology spread constraints
|
||||
# https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
|
||||
topologySpreadConstraints: []
|
||||
|
||||
# -- Array of extra K8s manifests to deploy
|
||||
extraObjects: []
|
||||
# - apiVersion: secrets-store.csi.x-k8s.io/v1
|
||||
# kind: SecretProviderClass
|
||||
# metadata:
|
||||
# name: argocd-secrets-store
|
||||
# spec:
|
||||
# provider: aws
|
||||
# parameters:
|
||||
# objects: |
|
||||
# - objectName: "argocd"
|
||||
# objectType: "secretsmanager"
|
||||
# jmesPath:
|
||||
# - path: "client_id"
|
||||
# objectAlias: "client_id"
|
||||
# - path: "client_secret"
|
||||
# objectAlias: "client_secret"
|
||||
# secretObjects:
|
||||
# - data:
|
||||
# - key: client_id
|
||||
# objectName: client_id
|
||||
# - key: client_secret
|
||||
# objectName: client_secret
|
||||
# secretName: argocd-secrets-store
|
||||
# type: Opaque
|
||||
# labels:
|
||||
# app.kubernetes.io/part-of: argocd
|
||||
# - |
|
||||
# apiVersion: policy/v1
|
||||
# kind: PodDisruptionBudget
|
||||
# metadata:
|
||||
# name: {{ template "opensearch-dashboards.fullname" . }}
|
||||
# labels:
|
||||
# {{- include "opensearch-dashboards.labels" . | nindent 4 }}
|
||||
# spec:
|
||||
# minAvailable: 1
|
||||
# selector:
|
||||
# matchLabels:
|
||||
# {{- include "opensearch-dashboards.selectorLabels" . | nindent 6 }}
|
||||
|
||||
# pod lifecycle policies as outlined here:
|
||||
# https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks
|
||||
lifecycle: {}
|
||||
# preStop:
|
||||
# exec:
|
||||
# command: ["/bin/sh", "-c", "echo Hello from the postStart handler > /usr/share/message"]
|
||||
# postStart:
|
||||
# exec:
|
||||
# command:
|
||||
# - bash
|
||||
# - -c
|
||||
# - |
|
||||
# #!/bin/bash
|
||||
# curl -I "http://admin:admin@127.0.0.1:5601/status -H "kbn-xsrf: true" -H 'kbn-xsrf: true' -H "Content-Type: application/json"
|
||||
|
||||
## Enable to add 3rd Party / Custom plugins not offered in the default OpenSearchDashboards image.
|
||||
plugins:
|
||||
enabled: false
|
||||
installList: []
|
||||
# - example-fake-plugin-downloadable-url
|
||||
23
opensearch/.helmignore
Normal file
23
opensearch/.helmignore
Normal file
@ -0,0 +1,23 @@
|
||||
# Patterns to ignore when building packages.
|
||||
# This supports shell glob matching, relative path matching, and
|
||||
# negation (prefixed with !). Only one pattern per line.
|
||||
.DS_Store
|
||||
# Common VCS dirs
|
||||
.git/
|
||||
.gitignore
|
||||
.bzr/
|
||||
.bzrignore
|
||||
.hg/
|
||||
.hgignore
|
||||
.svn/
|
||||
# Common backup files
|
||||
*.swp
|
||||
*.bak
|
||||
*.tmp
|
||||
*.orig
|
||||
*~
|
||||
# Various IDEs
|
||||
.project
|
||||
.idea/
|
||||
*.tmproj
|
||||
.vscode/
|
||||
440
opensearch/CHANGELOG.md
Normal file
440
opensearch/CHANGELOG.md
Normal file
@ -0,0 +1,440 @@
|
||||
# Changelog
|
||||
All notable changes to this project will be documented in this file.
|
||||
|
||||
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
|
||||
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
|
||||
|
||||
---
|
||||
## [Unreleased]
|
||||
### Added
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
|
||||
---
|
||||
|
||||
## [2.18.0]
|
||||
### Added
|
||||
### Breaking
|
||||
- Requires an initial admin password to be setup starting from App Version OpenSearch 2.12.0. Refer this github issue: https://github.com/opensearch-project/security/issues/3622
|
||||
- Updated OpenSearch appVersion to 2.12.0
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
|
||||
---
|
||||
## [2.17.3]
|
||||
### Added
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
- Bug `opensearch.yml` configMap Read-only file system error.
|
||||
### Security
|
||||
---
|
||||
## [2.17.2]
|
||||
### Added
|
||||
- - Allow user-defined labels on ingress resource
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.17.1]
|
||||
### Added
|
||||
- Added ability to specify custom pod anti-affinity and pod affinity
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.17.0]
|
||||
### Added
|
||||
- Updated OpenSearch appVersion to 2.11.1
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.16.1]
|
||||
### Added
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
- Fixed missing lifecycle parameter in README for opensearch chart
|
||||
### Security
|
||||
---
|
||||
## [2.16.0]
|
||||
### Added
|
||||
- Updated OpenSearch appVersion to 2.11.0
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.15.0]
|
||||
### Added
|
||||
- Updated OpenSearch appVersion to 2.10.0
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.14.1]
|
||||
### Added
|
||||
- Add homepage and source urls to chart
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.14.0]
|
||||
### Added
|
||||
- Updated OpenSearch appVersion to 2.9.0
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.13.3]
|
||||
### Added
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
- Correct variable name in keystore import
|
||||
### Security
|
||||
---
|
||||
## [2.13.2]
|
||||
### Added
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
- Avoid CrashLoop when keystore secret has no data
|
||||
### Security
|
||||
---
|
||||
## [2.13.1]
|
||||
### Added
|
||||
- Support string type for extraObjects
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.13.0]
|
||||
### Added
|
||||
- Updated OpenSearch appVersion to 2.8.0
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.12.2]
|
||||
### Added
|
||||
- Support for toggling automountServiceAccountToken to comply with strict Kubernetes Policies
|
||||
### Changed
|
||||
- if/else logic for serviceAccountName to be more intelligent
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
- Whitespace under Resources blocks that was causing linting errors
|
||||
### Security
|
||||
---
|
||||
## [2.12.1]
|
||||
### Added
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
- Add imagePullPolicy to fsgroup-volume init container
|
||||
### Security
|
||||
---
|
||||
## [2.12.0]
|
||||
### Added
|
||||
- Updated OpenSearch appVersion to 2.7.0
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
- Add imagePullPolicy to fsgroup-volume init container
|
||||
### Security
|
||||
---
|
||||
## [2.11.5]
|
||||
### Added
|
||||
- Update the Readme and comments section.
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.11.4]
|
||||
### Added
|
||||
- Added custom opensearch deployment annotation through values.yaml
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.11.3]
|
||||
### Added
|
||||
- Support setting ipFamilyPolicy on Service
|
||||
- Support setting ipFamilies on Service
|
||||
---
|
||||
## [2.11.2]
|
||||
### Added
|
||||
- Service ports for performance analyzer
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.11.1]
|
||||
### Added
|
||||
- Support for lifecycle in the opensearch container in the StatefulSet
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.11.0]
|
||||
### Added
|
||||
### Changed
|
||||
- Updated OpenSearch appVersion to 2.6.0
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.10.0]
|
||||
### Added
|
||||
### Changed
|
||||
- Updated OpenSearch appVersion to 2.5.0
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.9.1]
|
||||
### Added
|
||||
- Support for http- and transport-hostPort
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.9.0]
|
||||
### Added
|
||||
### Changed
|
||||
- Updated OpenSearch appVersion to 2.4.1
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.8.2]
|
||||
### Added
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
- Fix path in securityConfig section, it was changed in ver.2. See: [Issue #127](https://github.com/opensearch-project/opensearch-plugins/issues/127)
|
||||
### Security
|
||||
---
|
||||
## [2.8.1]
|
||||
### Added
|
||||
- added "plugins.enabled" and "plugins.installList" to the readme
|
||||
### Changed
|
||||
- Bumped version to 2.8.1
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.8.0]
|
||||
### Added
|
||||
### Changed
|
||||
- Updated OpenSearch appVersion to 2.4.0
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.7.0]
|
||||
### Added
|
||||
- Add option to enable the use of `sysctlInit` to set sysctl vm.max_map_count through privileged `initContainer`. See: [Issue #87](https://github.com/opensearch-project/helm-charts/issues/87)
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.6.2]
|
||||
### Added
|
||||
- Liveness probe for statefulset
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.6.1]
|
||||
### Added
|
||||
- Template configmap content by tpl function
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.6.0]
|
||||
### Added
|
||||
### Changed
|
||||
- Updated version to 2.6.0 and appVersion to "2.3.0".
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.5.1]
|
||||
### Added
|
||||
- Helm chart-releaser parallel release issue, updated version to 2.5.1.
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.5.0]
|
||||
### Added
|
||||
- Updated version to 2.5.0 and appVersion to "2.2.1".
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.4.1]
|
||||
### Added
|
||||
- Add "singleNode" feature to disable the "cluster.initial_master_nodes" env var
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.4.0]
|
||||
### Added
|
||||
- Updated version to 2.4.0 and appVersion to "2.2.0".
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.3.0]
|
||||
### Added
|
||||
- Updated version to 2.3.0 and appVersion to "2.1.0".
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.2.0]
|
||||
### Added
|
||||
- Add feature for readinessProbe and startupProbe
|
||||
### Changed
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.1.0]
|
||||
### Added
|
||||
### Changed
|
||||
- Updated version to 2.1.0 and appVersion to "2.0.1".
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.0.1]
|
||||
### Added
|
||||
### Changed
|
||||
- Updated version to 2.0.1 and appVersion to "2.0.0".
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
---
|
||||
## [2.0.0]
|
||||
### Added
|
||||
### Changed
|
||||
- Updated version to 2.0.0 and appVersion to "2.0.0-rc1".
|
||||
### Deprecated
|
||||
### Removed
|
||||
### Fixed
|
||||
### Security
|
||||
|
||||
|
||||
[Unreleased]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.18.0...HEAD
|
||||
[2.18.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.17.3...opensearch-2.18.0
|
||||
[2.17.3]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.17.2...opensearch-2.17.3
|
||||
[2.17.2]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.17.1...opensearch-2.17.2
|
||||
[2.17.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.17.0...opensearch-2.17.1
|
||||
[2.17.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.16.1...opensearch-2.17.0
|
||||
[2.16.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.16.0...opensearch-2.16.1
|
||||
[2.16.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.15.0...opensearch-2.16.0
|
||||
[2.15.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.14.1...opensearch-2.15.0
|
||||
[2.14.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.14.0...opensearch-2.14.1
|
||||
[2.14.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.13.3...opensearch-2.14.0
|
||||
[2.13.3]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.13.1...opensearch-2.13.3
|
||||
[2.13.2]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.13.1...opensearch-2.13.2
|
||||
[2.13.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.13.0...opensearch-2.13.1
|
||||
[2.13.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.12.0...opensearch-2.13.0
|
||||
[2.12.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.11.5...opensearch-2.12.0
|
||||
[2.11.5]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.11.4...opensearch-2.11.5
|
||||
[2.11.4]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.11.3...opensearch-2.11.4
|
||||
[2.11.3]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.11.2...opensearch-2.11.3
|
||||
[2.11.2]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.11.1...opensearch-2.11.2
|
||||
[2.11.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.11.0...opensearch-2.11.1
|
||||
[2.11.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.10.0...opensearch-2.11.0
|
||||
[2.10.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.9.1...opensearch-2.10.0
|
||||
[2.9.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.9.0...opensearch-2.9.1
|
||||
[2.9.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.8.2...opensearch-2.9.0
|
||||
[2.8.2]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.8.1...opensearch-2.8.2
|
||||
[2.8.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.8.0...opensearch-2.8.1
|
||||
[2.8.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.7.0...opensearch-2.8.0
|
||||
[2.7.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.6.1...opensearch-2.7.0
|
||||
[2.6.2]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.6.1...opensearch-2.6.2
|
||||
[2.6.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.6.0...opensearch-2.6.1
|
||||
[2.6.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.5.0...opensearch-2.6.0
|
||||
[2.5.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.5.0...opensearch-2.5.1
|
||||
[2.5.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.4.1...opensearch-2.5.0
|
||||
[2.4.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.4.0...opensearch-2.4.1
|
||||
[2.4.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.3.0...opensearch-2.4.0
|
||||
[2.3.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.2.0...opensearch-2.3.0
|
||||
[2.2.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.1.0...opensearch-2.2.0
|
||||
[2.1.0]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.0.1...opensearch-2.1.0
|
||||
[2.0.1]: https://github.com/opensearch-project/helm-charts/compare/opensearch-2.0.0...opensearch-2.0.1
|
||||
|
||||
17
opensearch/Chart.yaml
Normal file
17
opensearch/Chart.yaml
Normal file
@ -0,0 +1,17 @@
|
||||
apiVersion: v2
|
||||
appVersion: 2.12.0
|
||||
description: A Helm chart for OpenSearch
|
||||
home: https://opensearch.org
|
||||
maintainers:
|
||||
- name: DandyDeveloper
|
||||
- name: bbarani
|
||||
- name: gaiksaya
|
||||
- name: peterzhuamazon
|
||||
- name: prudhvigodithi
|
||||
- name: TheAlgo
|
||||
name: opensearch
|
||||
sources:
|
||||
- https://github.com/opensearch-project/opensearch
|
||||
- https://github.com/opensearch-project/helm-charts
|
||||
type: application
|
||||
version: 2.18.0
|
||||
188
opensearch/README.md
Normal file
188
opensearch/README.md
Normal file
@ -0,0 +1,188 @@
|
||||
# OpenSearch Helm Chart
|
||||
|
||||
This Helm chart installs [OpenSearch](https://github.com/opensearch-project/OpenSearch) with configurable TLS, RBAC and much more configurations. This chart caters a number of different use cases and setups.
|
||||
|
||||
- [OpenSearch Helm Chart](#opensearch-helm-chart)
|
||||
- [Requirements](#requirements)
|
||||
- [Installing](#installing)
|
||||
- [Uninstalling](#uninstalling)
|
||||
- [Configuration](#configuration)
|
||||
|
||||
## Requirements
|
||||
|
||||
* Kubernetes >= 1.14
|
||||
* Helm >= 2.17.0
|
||||
* We recommend you to have 8 GiB of memory available for this deployment, or at least 4 GiB for the minimum requirement. Else, the deployment is expected to fail.
|
||||
|
||||
## Installing
|
||||
|
||||
Once you've added this Helm repository as per the repository-level [README](../../README.md#installing) then you can install the chart as follows:
|
||||
|
||||
```shell
|
||||
helm install my-release opensearch/opensearch
|
||||
```
|
||||
|
||||
The command deploys OpenSearch with its associated components (data statefulsets, masters, clients) on the Kubernetes cluster in the default configuration.
|
||||
|
||||
**NOTE:** If using Helm 2 then you'll need to add the [`--name`](https://v2.helm.sh/docs/helm/#options-21) command line argument. If unspecified, Helm 2 will autogenerate a name for you.
|
||||
|
||||
## Uninstalling
|
||||
To delete/uninstall the chart with the release name `my-release`:
|
||||
|
||||
```shell
|
||||
helm uninstall my-release
|
||||
```
|
||||
|
||||
## Configuration
|
||||
|
||||
| Parameter | Description | Default |
|
||||
| ----------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------- |
|
||||
| `antiAffinityTopologyKey` | The [anti-affinity][] topology key. By default this will prevent multiple Opensearch nodes from running on the same Kubernetes node | `kubernetes.io/hostname` |
|
||||
| `antiAffinity` | Setting this to `hard` enforces the [anti-affinity][] rules. If it is set to `soft` it will be done "best effort". Setting it to `custom` will use whatever is set in the `customAntiAffinity` parameter. Other values will be ignored. | `hard` |
|
||||
| `clusterName` | This will be used as the OpenSearch cluster name and should be unique per cluster in the namespace | `opensearch-cluster` |
|
||||
| `customAntiAffinity` | Allows passing in custom anti-affinity settings as defined in the [anti-affinity][] rules. Using this parameter requires setting the `antiAffinity` parameter to `custom`. | `{}` |
|
||||
| `enableServiceLinks` | Set to false to disabling service links, which can cause slow pod startup times when there are many services in the current namespace. | `true` |
|
||||
| `envFrom` | Templatable string to be passed to the [environment from variables][] which will be appended to the `envFrom:` definition for the container | `[]` |
|
||||
| `config` | Allows you to add any config files in `/usr/share/opensearch/config/` such as `opensearch.yml` and `log4j2.properties`. String or map format may be used for specifying content of each configuration file. In case of string format, the whole content of the config file will be replaced by new config file value when in case of using map format content of configuration file will be a result of merge. In both cases content passed through tpl. See [values.yaml][] for an example of the formatting (passed through tpl) | `{}` |
|
||||
| `opensearchJavaOpts` | Java options for OpenSearch. This is where you should configure the jvm heap size | `-Xmx1g -Xms1g` |
|
||||
| `majorVersion` | Used to set major version specific configuration. If you are using a custom image and not running the default OpenSearch version you will need to set this to the version you are running (e.g. `majorVersion: 1`) | `""` |
|
||||
| `global.dockerRegistry` | Set if you want to change the default docker registry, e.g. a private one. | `""` |
|
||||
| `extraContainers` | Array of extra containers | `""` |
|
||||
| `extraEnvs` | Extra environments variables to be passed to OpenSearch services | `[]` |
|
||||
| `extraInitContainers` | Array of extra init containers | `[]` |
|
||||
| `extraVolumeMounts` | Array of extra volume mounts | `[]` |
|
||||
| `extraVolumes` | Array of extra volumes to be added | `[]` |
|
||||
| `fullnameOverride` | Overrides the `clusterName` and `nodeGroup` when used in the naming of resources. This should only be used when using a single `nodeGroup`, otherwise you will have name conflicts | `""` |
|
||||
| `hostAliases` | Configurable [hostAliases][] | `[]` |
|
||||
| `httpHostPort` | Expose another http-port as hostPort. Refer to documentation for more information and requirements about using hostPorts. | `""` |
|
||||
| `httpPort` | The http port that Kubernetes will use for the healthchecks and the service. If you change this you will also need to set `http.port` in `extraEnvs` | `9200` |
|
||||
| `image.pullPolicy` | The Kubernetes [imagePullPolicy][] value | `IfNotPresent` |
|
||||
| `imagePullSecrets` | Configuration for [imagePullSecrets][] so that you can use a private registry for your image | `[]` |
|
||||
| `image.tag` | The OpenSearch Docker image tag | `1.0.0` |
|
||||
| `image.repository` | The OpenSearch Docker image | `opensearchproject/opensearch` |
|
||||
| `ingress` | Configurable [ingress][] to expose the OpenSearch service. See [values.yaml][] for an example | see [values.yaml][] |
|
||||
| `initResources` | Allows you to set the [resources][] for the `initContainer` in the StatefulSet | `{}` |
|
||||
| `keystore` | Allows you map Kubernetes secrets into the keystore. | `[]` |
|
||||
| `labels` | Configurable [labels][] applied to all OpenSearch pods | `{}` |
|
||||
| `masterService` | The service name used to connect to the masters. You only need to set this if your master `nodeGroup` is set to something other than `master` | `""` |
|
||||
| `maxUnavailable` | The [maxUnavailable][] value for the pod disruption budget. By default this will prevent Kubernetes from having more than 1 unhealthy pod in the node group | `1` |
|
||||
| `metricsPort` | The metrics port (for Performance Analyzer) that Kubernetes will use for the service. | `9600` |
|
||||
| `nameOverride` | Overrides the `clusterName` when used in the naming of resources | `""` |
|
||||
| `networkHost` | Value for the `network.host OpenSearch setting` | `0.0.0.0` |
|
||||
| `networkPolicy.create` | Enable network policy creation for OpenSearch | `false` |
|
||||
| `nodeAffinity` | Value for the [node affinity settings][] | `{}` |
|
||||
| `nodeGroup` | This is the name that will be used for each group of nodes in the cluster. The name will be `clusterName-nodeGroup-X` , `nameOverride-nodeGroup-X` if a `nameOverride` is specified, and `fullnameOverride-X` if a `fullnameOverride` is specified | `master` |
|
||||
| `nodeSelector` | Configurable [nodeSelector][] so that you can target specific nodes for your OpenSearch cluster | `{}` |
|
||||
| `persistence` | Enables a persistent volume for OpenSearch data. | see [values.yaml][] |
|
||||
| `persistence.enableInitChown` | Disable the `fsgroup-volume` initContainer that will update permissions on the persistent disk. | `true` |
|
||||
| `podAffinity` | Value for the [pod affinity settings][] | `{}` |
|
||||
| `podAnnotations` | Configurable [annotations][] applied to all OpenSearch pods | `{}` |
|
||||
| `podManagementPolicy` | By default Kubernetes [deploys StatefulSets serially][]. This deploys them in parallel so that they can discover each other | `Parallel` |
|
||||
| `podSecurityContext` | Allows you to set the [securityContext][] for the pod | see [values.yaml][] |
|
||||
| `podSecurityPolicy` | Configuration for create a pod security policy with minimal permissions to run this Helm chart with `create: true`. Also can be used to reference an external pod security policy with `name: "externalPodSecurityPolicy"` | see [values.yaml][] |
|
||||
| `priorityClassName` | The name of the [PriorityClass][]. No default is supplied as the PriorityClass must be created first | `""` |
|
||||
| `rbac` | Configuration for creating a role, role binding and ServiceAccount as part of this Helm chart with `create: true`. Also can be used to reference an external ServiceAccount with `serviceAccountName: "externalServiceAccountName"` | see [values.yaml][] |
|
||||
| `rbac.automountServiceAccountToken` | Controls whether a service account token should be automatically mounted to the Pods. | `true` |
|
||||
| `replicas` | Kubernetes replica count for the StatefulSet (i.e. how many pods) | `3` |
|
||||
| `resources` | Allows you to set the [resources][] for the StatefulSet | see [values.yaml][] |
|
||||
| `roles` | A list of the specific node [roles][] for the `nodeGroup` | see [values.yaml][] |
|
||||
| `singleNode` | If `discovery.type` in the opensearch configuration is set to `"single-node"`, this should be set to `true`. If `true`, replicas will be forced to `1`. | `false` |
|
||||
| `schedulerName` | Name of the [alternate scheduler][] | `""` |
|
||||
| `secretMounts` | Allows you easily mount a secret as a file inside the StatefulSet. Useful for mounting certificates and other secrets. See [values.yaml][] for an example | `[]` |
|
||||
| `securityConfig` | Configure the opensearch security plugin. There are multiple ways to inject configuration into the chart, see [values.yaml][] details. | By default an insecure demonstration configuration is set. This **must** be changed before going to production. |
|
||||
| `securityContext` | Allows you to set the [securityContext][] for the container | see [values.yaml][] |
|
||||
| `service.annotations` | [LoadBalancer annotations][] that Kubernetes will use for the service. This will configure load balancer if `service.type` is `LoadBalancer` | `{}` |
|
||||
| `service.headless.annotations` | Allow you to set annotations on the headless service | `{}` |
|
||||
| `service.externalTrafficPolicy` | Some cloud providers allow you to specify the [LoadBalancer externalTrafficPolicy][]. Kubernetes will use this to preserve the client source IP. This will configure load balancer if `service.type` is `LoadBalancer` | `""` |
|
||||
| `service.httpPortName` | The name of the http port within the service | `http` |
|
||||
| `service.labelsHeadless` | Labels to be added to headless service | `{}` |
|
||||
| `service.labels` | Labels to be added to non-headless service | `{}` |
|
||||
| `service.loadBalancerIP` | Some cloud providers allow you to specify the [loadBalancer][] IP. If the `loadBalancerIP` field is not specified, the IP is dynamically assigned. If you specify a `loadBalancerIP` but your cloud provider does not support the feature, it is ignored. | `""` |
|
||||
| `service.loadBalancerSourceRanges` | The IP ranges that are allowed to access | `[]` |
|
||||
| `service.metricsPortName` | The name of the metrics port (for Performance Analyzer) within the service | `metrics` |
|
||||
| `service.nodePort` | Custom [nodePort][] port that can be set if you are using `service.type: nodePort` | `""` |
|
||||
| `service.transportPortName` | The name of the transport port within the service | `transport` |
|
||||
| `service.type` | OpenSearch [Service Types][] | `ClusterIP` |
|
||||
| `service.ipFamilyPolicy` | This sets the preferred ip addresses in case of a dual-stack server, there are three options [PreferDualStack, SingleStack, RequireDualStack], [more information on dual stack](https://kubernetes.io/docs/concepts/services-networking/dual-stack/) | `""` |
|
||||
| `service.ipFamilies` | Sets the preferred IP variants and in which order they are preferred, the first family you list is used for the legacy .spec.ClusterIP field, [more information on dual stack](https://kubernetes.io/docs/concepts/services-networking/dual-stack/) | `""` |
|
||||
| `sidecarResources` | Allows you to set the [resources][] for the sidecar containers in the StatefulSet | {} |
|
||||
| `sysctlInit` | Allows you to enable the `sysctlInit` to set sysctl vm.max_map_count through privileged `initContainer`. | `enabled: false` |
|
||||
| `sysctlVmMaxMapCount` | Sets the [vm.max_map_count][] needed for OpenSearch | `262144` |
|
||||
| `terminationGracePeriod` | The [terminationGracePeriod][] in seconds used when trying to stop the pod | `120` |
|
||||
| `tolerations` | Configurable [tolerations][] | `[]` |
|
||||
| `topologySpreadConstraints` | Configuration for pod [topologySpreadConstraints][] | `[]` |
|
||||
| `transportHostPort` | Expose another transport port as hostPort. Refer to documentation for more information and requirements about using hostPorts. | `""` |
|
||||
| `transportPort` | The transport port that Kubernetes will use for the service. If you change this you will also need to set transport port configuration in `extraEnvs` | `9300` |
|
||||
| `updateStrategy` | The [updateStrategy][] for the StatefulSet. By default Kubernetes will wait for the cluster to be green after upgrading each pod. Setting this to `OnDelete` will allow you to manually delete each pod during upgrades | `RollingUpdate` |
|
||||
| `volumeClaimTemplate` | Configuration for the [volumeClaimTemplate for StatefulSets][]. You will want to adjust the storage (default `30Gi` ) and the `storageClassName` if you are using a different storage class | see [values.yaml][] |
|
||||
| `extraObjects` | Array of extra K8s manifests to deploy | list `[]` |
|
||||
| `livenessProbe` | Configuration fields for the liveness [probe][] | see [exampleLiveness][] in `values.yaml` |
|
||||
| `readinessProbe` | Configuration fields for the readiness [probe][] | see [exampleReadiness][] in `values.yaml` |
|
||||
| `startupProbe` | Configuration fields for the startup [probe][] | see [exampleStartup][] in `values.yaml` |
|
||||
| `plugins.enabled` | Allow/disallow to add 3rd Party / Custom plugins not offered in the default OpenSearchDashboards image | false |
|
||||
| `plugins.installList` | Array containing the Opensearch Dashboards plugins to be installed in container | \[] |
|
||||
| `opensearchLifecycle` | Allows you to configure lifecycle hooks for the OpenSearch container in the StatefulSet | {} |
|
||||
| `lifecycle` | Allows you to configure lifecycle hooks for the OpenSearch container in the StatefulSet | {} |
|
||||
| `openSearchAnnotations` | Allows you to configure custom annotation in the StatefullSet of the OpenSearch container | {} |
|
||||
|
||||
[anti-affinity]: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
|
||||
|
||||
[environment from variables]: https://kubernetes.io/docs/tasks/configure-pod-container/configure-pod-configmap/#configure-all-key-value-pairs-in-a-configmap-as-container-environment-variables
|
||||
|
||||
[values.yaml]:https://github.com/opensearch-project/helm-charts/blob/main/charts/opensearch/values.yaml
|
||||
|
||||
[hostAliases]: https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/
|
||||
|
||||
[image.pullPolicy]: https://kubernetes.io/docs/concepts/containers/images/#updating-images
|
||||
[imagePullSecrets]: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
[ingress]: https://kubernetes.io/docs/concepts/services-networking/ingress/
|
||||
[resources]: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/
|
||||
|
||||
[labels]: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/
|
||||
|
||||
[maxUnavailable]: https://kubernetes.io/docs/tasks/run-application/configure-pdb/#specifying-a-poddisruptionbudget
|
||||
|
||||
[node affinity settings]: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#node-affinity-beta-feature
|
||||
|
||||
[pod affinity settings]: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#types-of-inter-pod-affinity-and-anti-affinity
|
||||
|
||||
[nodeSelector]: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector
|
||||
|
||||
[annotations]: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
|
||||
|
||||
[deploys statefulsets serially]: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#pod-management-policies
|
||||
|
||||
[securityContext]: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
|
||||
|
||||
[priorityClass]: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass
|
||||
|
||||
[roles]: https://opensearch.org/docs/opensearch/cluster/
|
||||
|
||||
[alternate scheduler]: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/#specify-schedulers-for-pods
|
||||
|
||||
[loadBalancer annotations]: https://kubernetes.io/docs/concepts/services-networking/service/#ssl-support-on-aws
|
||||
[loadBalancer externalTrafficPolicy]: https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip
|
||||
[loadBalancer]: https://kubernetes.io/docs/concepts/services-networking/service/#loadbalancer
|
||||
[maxUnavailable]: https://kubernetes.io/docs/tasks/run-application/configure-pdb/#specifying-a-poddisruptionbudget
|
||||
|
||||
[nodePort]: https://kubernetes.io/docs/concepts/services-networking/service/#nodeport
|
||||
|
||||
[nodeSelector]: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector
|
||||
|
||||
[vm.max_map_count]: https://opensearch.org/docs/opensearch/install/important-settings/
|
||||
|
||||
[terminationGracePeriod]: https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods
|
||||
[tolerations]: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
|
||||
|
||||
[updateStrategy]: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/
|
||||
[volumeClaimTemplate for statefulsets]: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#stable-storage
|
||||
|
||||
[service types]: https://kubernetes.io/docs/concepts/services-networking/service/#publishing-services-service-types
|
||||
|
||||
[topologySpreadConstraints]: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints
|
||||
|
||||
[probe]: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#define-readiness-probes
|
||||
|
||||
[exampleStartup]: https://github.com/opensearch-project/helm-charts/blob/main/charts/opensearch/values.yaml#332
|
||||
[exampleLiveness]: https://github.com/opensearch-project/helm-charts/blob/main/charts/opensearch/values.yaml#340
|
||||
[exampleReadiness]: https://github.com/opensearch-project/helm-charts/blob/main/charts/opensearch/values.yaml#349
|
||||
442
opensearch/ci/ci-ingress-class-name-values.yaml
Normal file
442
opensearch/ci/ci-ingress-class-name-values.yaml
Normal file
@ -0,0 +1,442 @@
|
||||
---
|
||||
clusterName: "opensearch-cluster"
|
||||
nodeGroup: "master"
|
||||
|
||||
# The service that non master groups will try to connect to when joining the cluster
|
||||
# This should be set to clusterName + "-" + nodeGroup for your master group
|
||||
masterService: "opensearch-cluster-master"
|
||||
|
||||
# OpenSearch roles that will be applied to this nodeGroup
|
||||
# These will be set as environment variable "node.roles". E.g. node.roles=master,ingest,data,remote_cluster_client
|
||||
roles:
|
||||
- master
|
||||
- ingest
|
||||
- data
|
||||
- remote_cluster_client
|
||||
|
||||
replicas: 1
|
||||
|
||||
# if not set, falls back to parsing .Values.imageTag, then .Chart.appVersion.
|
||||
majorVersion: ""
|
||||
|
||||
global:
|
||||
# Set if you want to change the default docker registry, e.g. a private one.
|
||||
dockerRegistry: ""
|
||||
|
||||
# Allows you to add any config files in {{ .Values.opensearchHome }}/config
|
||||
opensearchHome: /usr/share/opensearch
|
||||
# such as opensearch.yml and log4j2.properties
|
||||
config:
|
||||
# Values must be YAML literal style scalar / YAML multiline string.
|
||||
# <filename>: |
|
||||
# <formatted-value(s)>
|
||||
# log4j2.properties: |
|
||||
# status = error
|
||||
#
|
||||
# appender.console.type = Console
|
||||
# appender.console.name = console
|
||||
# appender.console.layout.type = PatternLayout
|
||||
# appender.console.layout.pattern = [%d{ISO8601}][%-5p][%-25c{1.}] [%node_name]%marker %m%n
|
||||
#
|
||||
# rootLogger.level = info
|
||||
# rootLogger.appenderRef.console.ref = console
|
||||
opensearch.yml: |
|
||||
cluster.name: opensearch-cluster
|
||||
|
||||
# Bind to all interfaces because we don't know what IP address Docker will assign to us.
|
||||
network.host: 0.0.0.0
|
||||
transport.host: localhost
|
||||
transport.tcp.port: 9300
|
||||
|
||||
# Setting network.host to a non-loopback address enables the annoying bootstrap checks. "Single-node" mode disables them again.
|
||||
# discovery.type: single-node
|
||||
|
||||
# Start OpenSearch Security Demo Configuration
|
||||
# WARNING: revise all the lines below before you go into production
|
||||
plugins:
|
||||
security:
|
||||
ssl:
|
||||
transport:
|
||||
pemcert_filepath: esnode.pem
|
||||
pemkey_filepath: esnode-key.pem
|
||||
pemtrustedcas_filepath: root-ca.pem
|
||||
enforce_hostname_verification: false
|
||||
http:
|
||||
enabled: true
|
||||
pemcert_filepath: esnode.pem
|
||||
pemkey_filepath: esnode-key.pem
|
||||
pemtrustedcas_filepath: root-ca.pem
|
||||
allow_unsafe_democertificates: true
|
||||
allow_default_init_securityindex: true
|
||||
authcz:
|
||||
admin_dn:
|
||||
- CN=kirk,OU=client,O=client,L=test,C=de
|
||||
audit.type: internal_opensearch
|
||||
enable_snapshot_restore_privilege: true
|
||||
check_snapshot_restore_write_privileges: true
|
||||
restapi:
|
||||
roles_enabled: ["all_access", "security_rest_api_access"]
|
||||
system_indices:
|
||||
enabled: true
|
||||
indices:
|
||||
[
|
||||
".opendistro-alerting-config",
|
||||
".opendistro-alerting-alert*",
|
||||
".opendistro-anomaly-results*",
|
||||
".opendistro-anomaly-detector*",
|
||||
".opendistro-anomaly-checkpoints",
|
||||
".opendistro-anomaly-detection-state",
|
||||
".opendistro-reports-*",
|
||||
".opendistro-notifications-*",
|
||||
".opendistro-notebooks",
|
||||
".opendistro-asynchronous-search-response*",
|
||||
]
|
||||
######## End OpenSearch Security Demo Configuration ########
|
||||
# log4j2.properties:
|
||||
|
||||
# Extra environment variables to append to this nodeGroup
|
||||
# This will be appended to the current 'env:' key. You can use any of the kubernetes env
|
||||
# syntax here
|
||||
extraEnvs:
|
||||
- name: OPENSEARCH_INITIAL_ADMIN_PASSWORD
|
||||
value: myStrongPassword123@456
|
||||
# - name: MY_ENVIRONMENT_VAR
|
||||
# value: the_value_goes_here
|
||||
|
||||
# Allows you to load environment variables from kubernextes secret or config map
|
||||
envFrom: []
|
||||
# - secretRef:
|
||||
# name: env-secret
|
||||
# - configMapRef:
|
||||
# name: config-map
|
||||
|
||||
# A list of secrets and their paths to mount inside the pod
|
||||
# This is useful for mounting certificates for security and for mounting
|
||||
# the X-Pack license
|
||||
secretMounts: []
|
||||
|
||||
hostAliases: []
|
||||
# - ip: "127.0.0.1"
|
||||
# hostnames:
|
||||
# - "foo.local"
|
||||
# - "bar.local"
|
||||
|
||||
image:
|
||||
repository: "opensearchproject/opensearch"
|
||||
# override image tag, which is .Chart.AppVersion by default
|
||||
tag: ""
|
||||
pullPolicy: "IfNotPresent"
|
||||
|
||||
podAnnotations: {}
|
||||
# iam.amazonaws.com/role: es-cluster
|
||||
|
||||
# additionals labels
|
||||
labels: {}
|
||||
|
||||
opensearchJavaOpts: "-Xmx512M -Xms512M"
|
||||
|
||||
resources:
|
||||
requests:
|
||||
cpu: "1000m"
|
||||
memory: "100Mi"
|
||||
|
||||
initResources: {}
|
||||
# limits:
|
||||
# cpu: "25m"
|
||||
# # memory: "128Mi"
|
||||
# requests:
|
||||
# cpu: "25m"
|
||||
# memory: "128Mi"
|
||||
|
||||
sidecarResources: {}
|
||||
# limits:
|
||||
# cpu: "25m"
|
||||
# # memory: "128Mi"
|
||||
# requests:
|
||||
# cpu: "25m"
|
||||
# memory: "128Mi"
|
||||
|
||||
networkHost: "0.0.0.0"
|
||||
|
||||
rbac:
|
||||
create: false
|
||||
serviceAccountAnnotations: {}
|
||||
serviceAccountName: ""
|
||||
automountServiceAccountToken: false
|
||||
|
||||
podSecurityPolicy:
|
||||
create: false
|
||||
name: ""
|
||||
spec:
|
||||
privileged: true
|
||||
fsGroup:
|
||||
rule: RunAsAny
|
||||
runAsUser:
|
||||
rule: RunAsAny
|
||||
seLinux:
|
||||
rule: RunAsAny
|
||||
supplementalGroups:
|
||||
rule: RunAsAny
|
||||
volumes:
|
||||
- secret
|
||||
- configMap
|
||||
- persistentVolumeClaim
|
||||
- emptyDir
|
||||
|
||||
persistence:
|
||||
enabled: true
|
||||
# Set to false to disable the `fsgroup-volume` initContainer that will update permissions on the persistent disk.
|
||||
enableInitChown: true
|
||||
# override image, which is busybox by default
|
||||
# image: busybox
|
||||
# override image tag, which is latest by default
|
||||
# imageTag:
|
||||
labels:
|
||||
# Add default labels for the volumeClaimTemplate of the StatefulSet
|
||||
enabled: false
|
||||
# OpenSearch Persistent Volume Storage Class
|
||||
# If defined, storageClassName: <storageClass>
|
||||
# If set to "-", storageClassName: "", which disables dynamic provisioning
|
||||
# If undefined (the default) or set to null, no storageClassName spec is
|
||||
# set, choosing the default provisioner. (gp2 on AWS, standard on
|
||||
# GKE, AWS & OpenStack)
|
||||
#
|
||||
# storageClass: "-"
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
size: 8Gi
|
||||
annotations: {}
|
||||
|
||||
extraVolumes: []
|
||||
# - name: extras
|
||||
# emptyDir: {}
|
||||
|
||||
extraVolumeMounts: []
|
||||
# - name: extras
|
||||
# mountPath: /usr/share/extras
|
||||
# readOnly: true
|
||||
|
||||
extraContainers: []
|
||||
# - name: do-something
|
||||
# image: busybox
|
||||
# command: ['do', 'something']
|
||||
|
||||
extraInitContainers: []
|
||||
# - name: do-somethings
|
||||
# image: busybox
|
||||
# command: ['do', 'something']
|
||||
|
||||
# This is the PriorityClass settings as defined in
|
||||
# https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass
|
||||
priorityClassName: ""
|
||||
|
||||
# By default this will make sure two pods don't end up on the same node
|
||||
# Changing this to a region would allow you to spread pods across regions
|
||||
antiAffinityTopologyKey: "kubernetes.io/hostname"
|
||||
|
||||
# Hard means that by default pods will only be scheduled if there are enough nodes for them
|
||||
# and that they will never end up on the same node. Setting this to soft will do this "best effort".
|
||||
# Setting this to custom will use what is passed into customAntiAffinity.
|
||||
antiAffinity: "soft"
|
||||
|
||||
# Allows passing in custom anti-affinity settings as defined in
|
||||
# https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#types-of-inter-pod-affinity-and-anti-affinity
|
||||
# Using this parameter requires setting antiAffinity to custom.
|
||||
customAntiAffinity: {}
|
||||
|
||||
# This is the node affinity settings as defined in
|
||||
# https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#node-affinity-beta-feature
|
||||
nodeAffinity: {}
|
||||
|
||||
# This is the pod affinity settings as defined in
|
||||
# https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#types-of-inter-pod-affinity-and-anti-affinity
|
||||
podAffinity: {}
|
||||
|
||||
# The default is to deploy all pods serially. By setting this to parallel all pods are started at
|
||||
# the same time when bootstrapping the cluster
|
||||
podManagementPolicy: "Parallel"
|
||||
|
||||
# The environment variables injected by service links are not used, but can lead to slow OpenSearch boot times when
|
||||
# there are many services in the current namespace.
|
||||
# If you experience slow pod startups you probably want to set this to `false`.
|
||||
enableServiceLinks: true
|
||||
|
||||
protocol: https
|
||||
httpPort: 9200
|
||||
transportPort: 9300
|
||||
metricsPort: 9600
|
||||
|
||||
service:
|
||||
labels: {}
|
||||
labelsHeadless: {}
|
||||
headless:
|
||||
annotations: {}
|
||||
type: ClusterIP
|
||||
nodePort: ""
|
||||
annotations: {}
|
||||
httpPortName: http
|
||||
transportPortName: transport
|
||||
loadBalancerIP: ""
|
||||
loadBalancerSourceRanges: []
|
||||
externalTrafficPolicy: ""
|
||||
|
||||
updateStrategy: RollingUpdate
|
||||
|
||||
# This is the max unavailable setting for the pod disruption budget
|
||||
# The default value of 1 will make sure that kubernetes won't allow more than 1
|
||||
# of your pods to be unavailable during maintenance
|
||||
maxUnavailable: 1
|
||||
|
||||
podSecurityContext:
|
||||
fsGroup: 1000
|
||||
runAsUser: 1000
|
||||
|
||||
securityContext:
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
# readOnlyRootFilesystem: true
|
||||
runAsNonRoot: true
|
||||
runAsUser: 1000
|
||||
|
||||
securityConfig:
|
||||
enabled: true
|
||||
path: "/usr/share/opensearch/plugins/opensearch-security/securityconfig"
|
||||
actionGroupsSecret:
|
||||
configSecret:
|
||||
internalUsersSecret:
|
||||
rolesSecret:
|
||||
rolesMappingSecret:
|
||||
tenantsSecret:
|
||||
# The following option simplifies securityConfig by using a single secret and
|
||||
# specifying the config files as keys in the secret instead of creating
|
||||
# different secrets for for each config file.
|
||||
# Note that this is an alternative to the individual secret configuration
|
||||
# above and shouldn't be used if the above secrets are used.
|
||||
config:
|
||||
# There are multiple ways to define the configuration here:
|
||||
# * If you define anything under data, the chart will automatically create
|
||||
# a secret and mount it.
|
||||
# * If you define securityConfigSecret, the chart will assume this secret is
|
||||
# created externally and mount it.
|
||||
# * It is an error to define both data and securityConfigSecret.
|
||||
securityConfigSecret: ""
|
||||
data: {}
|
||||
# config.yml: |-
|
||||
# internal_users.yml: |-
|
||||
# roles.yml: |-
|
||||
# roles_mapping.yml: |-
|
||||
# action_groups.yml: |-
|
||||
# tenants.yml: |-
|
||||
|
||||
# How long to wait for opensearch to stop gracefully
|
||||
terminationGracePeriod: 120
|
||||
|
||||
sysctlVmMaxMapCount: 262144
|
||||
|
||||
startupProbe:
|
||||
tcpSocket:
|
||||
port: 9200
|
||||
initialDelaySeconds: 5
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 3
|
||||
failureThreshold: 30
|
||||
|
||||
readinessProbe:
|
||||
failureThreshold: 3
|
||||
initialDelaySeconds: 900
|
||||
periodSeconds: 10
|
||||
successThreshold: 3
|
||||
timeoutSeconds: 2
|
||||
|
||||
## Use an alternate scheduler.
|
||||
## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
|
||||
##
|
||||
schedulerName: ""
|
||||
|
||||
imagePullSecrets: []
|
||||
nodeSelector: {}
|
||||
tolerations: []
|
||||
|
||||
# Enabling this will publically expose your OpenSearch instance.
|
||||
# Only enable this if you have security enabled on your cluster
|
||||
ingress:
|
||||
enabled: true
|
||||
|
||||
# For Kubernetes >= 1.18 you should specify the ingress-controller via the field ingressClassName
|
||||
# See https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/#specifying-the-class-of-an-ingress
|
||||
ingressClassName: nginx
|
||||
|
||||
annotations: {}
|
||||
# kubernetes.io/ingress.class: nginx
|
||||
# kubernetes.io/tls-acme: "true"
|
||||
path: /
|
||||
hosts:
|
||||
- chart-example.local
|
||||
tls: []
|
||||
# - secretName: chart-example-tls
|
||||
# hosts:
|
||||
# - chart-example.local
|
||||
|
||||
nameOverride: ""
|
||||
fullnameOverride: ""
|
||||
|
||||
masterTerminationFix: false
|
||||
|
||||
lifecycle: {}
|
||||
# preStop:
|
||||
# exec:
|
||||
# command: ["/bin/sh", "-c", "echo Hello from the postStart handler > /usr/share/message"]
|
||||
# postStart:
|
||||
# exec:
|
||||
# command:
|
||||
# - bash
|
||||
# - -c
|
||||
# - |
|
||||
# #!/bin/bash
|
||||
# # Add a template to adjust number of shards/replicas1
|
||||
# TEMPLATE_NAME=my_template
|
||||
# INDEX_PATTERN="logstash-*"
|
||||
# SHARD_COUNT=8
|
||||
# REPLICA_COUNT=1
|
||||
# ES_URL=http://localhost:9200
|
||||
# while [[ "$(curl -s -o /dev/null -w '%{http_code}\n' $ES_URL)" != "200" ]]; do sleep 1; done
|
||||
# curl -XPUT "$ES_URL/_template/$TEMPLATE_NAME" -H 'Content-Type: application/json' -d'{"index_patterns":['\""$INDEX_PATTERN"\"'],"settings":{"number_of_shards":'$SHARD_COUNT',"number_of_replicas":'$REPLICA_COUNT'}}'
|
||||
|
||||
keystore: []
|
||||
|
||||
networkPolicy:
|
||||
## Enable creation of NetworkPolicy resources. Only Ingress traffic is filtered for now.
|
||||
## In order for a Pod to access OpenSearch, it needs to have the following label:
|
||||
## {{ template "uname" . }}-client: "true"
|
||||
## Example for default configuration to access HTTP port:
|
||||
## opensearch-master-http-client: "true"
|
||||
## Example for default configuration to access transport port:
|
||||
## opensearch-master-transport-client: "true"
|
||||
|
||||
http:
|
||||
enabled: false
|
||||
|
||||
# Deprecated
|
||||
# please use the above podSecurityContext.fsGroup instead
|
||||
fsGroup: ""
|
||||
|
||||
## Set optimal sysctl's through securityContext. This requires privilege. Can be disabled if
|
||||
## the system has already been preconfigured. (Ex: https://www.elastic.co/guide/en/elasticsearch/reference/current/vm-max-map-count.html)
|
||||
## Also see: https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/
|
||||
sysctl:
|
||||
enabled: false
|
||||
|
||||
## Set optimal sysctl's through privileged initContainer.
|
||||
sysctlInit:
|
||||
enabled: true
|
||||
# override image, which is busybox by default
|
||||
# image: busybox
|
||||
# override image tag, which is latest by default
|
||||
# imageTag:
|
||||
|
||||
## Enable to add 3rd Party / Custom plugins not offered in the default OpenSearch image.
|
||||
plugins:
|
||||
enabled: false
|
||||
installList: []
|
||||
# - example-fake-plugin
|
||||
442
opensearch/ci/ci-rbac-enabled-values.yaml
Normal file
442
opensearch/ci/ci-rbac-enabled-values.yaml
Normal file
@ -0,0 +1,442 @@
|
||||
---
|
||||
clusterName: "opensearch-cluster"
|
||||
nodeGroup: "master"
|
||||
|
||||
# The service that non master groups will try to connect to when joining the cluster
|
||||
# This should be set to clusterName + "-" + nodeGroup for your master group
|
||||
masterService: "opensearch-cluster-master"
|
||||
|
||||
# OpenSearch roles that will be applied to this nodeGroup
|
||||
# These will be set as environment variable "node.roles". E.g. node.roles=master,ingest,data,remote_cluster_client
|
||||
roles:
|
||||
- master
|
||||
- ingest
|
||||
- data
|
||||
- remote_cluster_client
|
||||
|
||||
replicas: 1
|
||||
|
||||
# if not set, falls back to parsing .Values.imageTag, then .Chart.appVersion.
|
||||
majorVersion: ""
|
||||
|
||||
global:
|
||||
# Set if you want to change the default docker registry, e.g. a private one.
|
||||
dockerRegistry: ""
|
||||
|
||||
# Allows you to add any config files in {{ .Values.opensearchHome }}/config
|
||||
opensearchHome: /usr/share/opensearch
|
||||
# such as opensearch.yml and log4j2.properties
|
||||
config:
|
||||
# Values must be YAML literal style scalar / YAML multiline string.
|
||||
# <filename>: |
|
||||
# <formatted-value(s)>
|
||||
# log4j2.properties: |
|
||||
# status = error
|
||||
#
|
||||
# appender.console.type = Console
|
||||
# appender.console.name = console
|
||||
# appender.console.layout.type = PatternLayout
|
||||
# appender.console.layout.pattern = [%d{ISO8601}][%-5p][%-25c{1.}] [%node_name]%marker %m%n
|
||||
#
|
||||
# rootLogger.level = info
|
||||
# rootLogger.appenderRef.console.ref = console
|
||||
opensearch.yml: |
|
||||
cluster.name: opensearch-cluster
|
||||
|
||||
# Bind to all interfaces because we don't know what IP address Docker will assign to us.
|
||||
network.host: 0.0.0.0
|
||||
transport.host: localhost
|
||||
transport.tcp.port: 9300
|
||||
|
||||
# Setting network.host to a non-loopback address enables the annoying bootstrap checks. "Single-node" mode disables them again.
|
||||
# discovery.type: single-node
|
||||
|
||||
# Start OpenSearch Security Demo Configuration
|
||||
# WARNING: revise all the lines below before you go into production
|
||||
plugins:
|
||||
security:
|
||||
ssl:
|
||||
transport:
|
||||
pemcert_filepath: esnode.pem
|
||||
pemkey_filepath: esnode-key.pem
|
||||
pemtrustedcas_filepath: root-ca.pem
|
||||
enforce_hostname_verification: false
|
||||
http:
|
||||
enabled: true
|
||||
pemcert_filepath: esnode.pem
|
||||
pemkey_filepath: esnode-key.pem
|
||||
pemtrustedcas_filepath: root-ca.pem
|
||||
allow_unsafe_democertificates: true
|
||||
allow_default_init_securityindex: true
|
||||
authcz:
|
||||
admin_dn:
|
||||
- CN=kirk,OU=client,O=client,L=test,C=de
|
||||
audit.type: internal_opensearch
|
||||
enable_snapshot_restore_privilege: true
|
||||
check_snapshot_restore_write_privileges: true
|
||||
restapi:
|
||||
roles_enabled: ["all_access", "security_rest_api_access"]
|
||||
system_indices:
|
||||
enabled: true
|
||||
indices:
|
||||
[
|
||||
".opendistro-alerting-config",
|
||||
".opendistro-alerting-alert*",
|
||||
".opendistro-anomaly-results*",
|
||||
".opendistro-anomaly-detector*",
|
||||
".opendistro-anomaly-checkpoints",
|
||||
".opendistro-anomaly-detection-state",
|
||||
".opendistro-reports-*",
|
||||
".opendistro-notifications-*",
|
||||
".opendistro-notebooks",
|
||||
".opendistro-asynchronous-search-response*",
|
||||
]
|
||||
######## End OpenSearch Security Demo Configuration ########
|
||||
# log4j2.properties:
|
||||
|
||||
# Extra environment variables to append to this nodeGroup
|
||||
# This will be appended to the current 'env:' key. You can use any of the kubernetes env
|
||||
# syntax here
|
||||
extraEnvs:
|
||||
- name: OPENSEARCH_INITIAL_ADMIN_PASSWORD
|
||||
value: myStrongPassword123@456
|
||||
# - name: MY_ENVIRONMENT_VAR
|
||||
# value: the_value_goes_here
|
||||
|
||||
# Allows you to load environment variables from kubernextes secret or config map
|
||||
envFrom: []
|
||||
# - secretRef:
|
||||
# name: env-secret
|
||||
# - configMapRef:
|
||||
# name: config-map
|
||||
|
||||
# A list of secrets and their paths to mount inside the pod
|
||||
# This is useful for mounting certificates for security and for mounting
|
||||
# the X-Pack license
|
||||
secretMounts: []
|
||||
|
||||
hostAliases: []
|
||||
# - ip: "127.0.0.1"
|
||||
# hostnames:
|
||||
# - "foo.local"
|
||||
# - "bar.local"
|
||||
|
||||
image:
|
||||
repository: "opensearchproject/opensearch"
|
||||
# override image tag, which is .Chart.AppVersion by default
|
||||
tag: ""
|
||||
pullPolicy: "IfNotPresent"
|
||||
|
||||
podAnnotations: {}
|
||||
# iam.amazonaws.com/role: es-cluster
|
||||
|
||||
# additionals labels
|
||||
labels: {}
|
||||
|
||||
opensearchJavaOpts: "-Xmx512M -Xms512M"
|
||||
|
||||
resources:
|
||||
requests:
|
||||
cpu: "1000m"
|
||||
memory: "100Mi"
|
||||
|
||||
initResources: {}
|
||||
# limits:
|
||||
# cpu: "25m"
|
||||
# # memory: "128Mi"
|
||||
# requests:
|
||||
# cpu: "25m"
|
||||
# memory: "128Mi"
|
||||
|
||||
sidecarResources: {}
|
||||
# limits:
|
||||
# cpu: "25m"
|
||||
# # memory: "128Mi"
|
||||
# requests:
|
||||
# cpu: "25m"
|
||||
# memory: "128Mi"
|
||||
|
||||
networkHost: "0.0.0.0"
|
||||
|
||||
rbac:
|
||||
create: true
|
||||
serviceAccountAnnotations: {}
|
||||
serviceAccountName: ""
|
||||
automountServiceAccountToken: true
|
||||
|
||||
podSecurityPolicy:
|
||||
create: false
|
||||
name: ""
|
||||
spec:
|
||||
privileged: true
|
||||
fsGroup:
|
||||
rule: RunAsAny
|
||||
runAsUser:
|
||||
rule: RunAsAny
|
||||
seLinux:
|
||||
rule: RunAsAny
|
||||
supplementalGroups:
|
||||
rule: RunAsAny
|
||||
volumes:
|
||||
- secret
|
||||
- configMap
|
||||
- persistentVolumeClaim
|
||||
- emptyDir
|
||||
|
||||
persistence:
|
||||
enabled: true
|
||||
# Set to false to disable the `fsgroup-volume` initContainer that will update permissions on the persistent disk.
|
||||
enableInitChown: true
|
||||
# override image, which is busybox by default
|
||||
# image: busybox
|
||||
# override image tag, which is latest by default
|
||||
# imageTag:
|
||||
labels:
|
||||
# Add default labels for the volumeClaimTemplate of the StatefulSet
|
||||
enabled: false
|
||||
# OpenSearch Persistent Volume Storage Class
|
||||
# If defined, storageClassName: <storageClass>
|
||||
# If set to "-", storageClassName: "", which disables dynamic provisioning
|
||||
# If undefined (the default) or set to null, no storageClassName spec is
|
||||
# set, choosing the default provisioner. (gp2 on AWS, standard on
|
||||
# GKE, AWS & OpenStack)
|
||||
#
|
||||
# storageClass: "-"
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
size: 8Gi
|
||||
annotations: {}
|
||||
|
||||
extraVolumes: []
|
||||
# - name: extras
|
||||
# emptyDir: {}
|
||||
|
||||
extraVolumeMounts: []
|
||||
# - name: extras
|
||||
# mountPath: /usr/share/extras
|
||||
# readOnly: true
|
||||
|
||||
extraContainers: []
|
||||
# - name: do-something
|
||||
# image: busybox
|
||||
# command: ['do', 'something']
|
||||
|
||||
extraInitContainers: []
|
||||
# - name: do-somethings
|
||||
# image: busybox
|
||||
# command: ['do', 'something']
|
||||
|
||||
# This is the PriorityClass settings as defined in
|
||||
# https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass
|
||||
priorityClassName: ""
|
||||
|
||||
# By default this will make sure two pods don't end up on the same node
|
||||
# Changing this to a region would allow you to spread pods across regions
|
||||
antiAffinityTopologyKey: "kubernetes.io/hostname"
|
||||
|
||||
# Hard means that by default pods will only be scheduled if there are enough nodes for them
|
||||
# and that they will never end up on the same node. Setting this to soft will do this "best effort".
|
||||
# Setting this to custom will use what is passed into customAntiAffinity.
|
||||
antiAffinity: "soft"
|
||||
|
||||
# Allows passing in custom anti-affinity settings as defined in
|
||||
# https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#types-of-inter-pod-affinity-and-anti-affinity
|
||||
# Using this parameter requires setting antiAffinity to custom.
|
||||
customAntiAffinity: {}
|
||||
|
||||
# This is the node affinity settings as defined in
|
||||
# https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#node-affinity-beta-feature
|
||||
nodeAffinity: {}
|
||||
|
||||
# This is the pod affinity settings as defined in
|
||||
# https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#types-of-inter-pod-affinity-and-anti-affinity
|
||||
podAffinity: {}
|
||||
|
||||
# The default is to deploy all pods serially. By setting this to parallel all pods are started at
|
||||
# the same time when bootstrapping the cluster
|
||||
podManagementPolicy: "Parallel"
|
||||
|
||||
# The environment variables injected by service links are not used, but can lead to slow OpenSearch boot times when
|
||||
# there are many services in the current namespace.
|
||||
# If you experience slow pod startups you probably want to set this to `false`.
|
||||
enableServiceLinks: true
|
||||
|
||||
protocol: https
|
||||
httpPort: 9200
|
||||
transportPort: 9300
|
||||
metricsPort: 9600
|
||||
|
||||
service:
|
||||
labels: {}
|
||||
labelsHeadless: {}
|
||||
headless:
|
||||
annotations: {}
|
||||
type: ClusterIP
|
||||
nodePort: ""
|
||||
annotations: {}
|
||||
httpPortName: http
|
||||
transportPortName: transport
|
||||
loadBalancerIP: ""
|
||||
loadBalancerSourceRanges: []
|
||||
externalTrafficPolicy: ""
|
||||
|
||||
updateStrategy: RollingUpdate
|
||||
|
||||
# This is the max unavailable setting for the pod disruption budget
|
||||
# The default value of 1 will make sure that kubernetes won't allow more than 1
|
||||
# of your pods to be unavailable during maintenance
|
||||
maxUnavailable: 1
|
||||
|
||||
podSecurityContext:
|
||||
fsGroup: 1000
|
||||
runAsUser: 1000
|
||||
|
||||
securityContext:
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
# readOnlyRootFilesystem: true
|
||||
runAsNonRoot: true
|
||||
runAsUser: 1000
|
||||
|
||||
securityConfig:
|
||||
enabled: true
|
||||
path: "/usr/share/opensearch/plugins/opensearch-security/securityconfig"
|
||||
actionGroupsSecret:
|
||||
configSecret:
|
||||
internalUsersSecret:
|
||||
rolesSecret:
|
||||
rolesMappingSecret:
|
||||
tenantsSecret:
|
||||
# The following option simplifies securityConfig by using a single secret and
|
||||
# specifying the config files as keys in the secret instead of creating
|
||||
# different secrets for for each config file.
|
||||
# Note that this is an alternative to the individual secret configuration
|
||||
# above and shouldn't be used if the above secrets are used.
|
||||
config:
|
||||
# There are multiple ways to define the configuration here:
|
||||
# * If you define anything under data, the chart will automatically create
|
||||
# a secret and mount it.
|
||||
# * If you define securityConfigSecret, the chart will assume this secret is
|
||||
# created externally and mount it.
|
||||
# * It is an error to define both data and securityConfigSecret.
|
||||
securityConfigSecret: ""
|
||||
data: {}
|
||||
# config.yml: |-
|
||||
# internal_users.yml: |-
|
||||
# roles.yml: |-
|
||||
# roles_mapping.yml: |-
|
||||
# action_groups.yml: |-
|
||||
# tenants.yml: |-
|
||||
|
||||
# How long to wait for opensearch to stop gracefully
|
||||
terminationGracePeriod: 120
|
||||
|
||||
sysctlVmMaxMapCount: 262144
|
||||
|
||||
startupProbe:
|
||||
tcpSocket:
|
||||
port: 9200
|
||||
initialDelaySeconds: 5
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 3
|
||||
failureThreshold: 30
|
||||
|
||||
readinessProbe:
|
||||
failureThreshold: 3
|
||||
initialDelaySeconds: 900
|
||||
periodSeconds: 10
|
||||
successThreshold: 3
|
||||
timeoutSeconds: 2
|
||||
|
||||
## Use an alternate scheduler.
|
||||
## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
|
||||
##
|
||||
schedulerName: ""
|
||||
|
||||
imagePullSecrets: []
|
||||
nodeSelector: {}
|
||||
tolerations: []
|
||||
|
||||
# Enabling this will publically expose your OpenSearch instance.
|
||||
# Only enable this if you have security enabled on your cluster
|
||||
ingress:
|
||||
enabled: false
|
||||
|
||||
# For Kubernetes >= 1.18 you should specify the ingress-controller via the field ingressClassName
|
||||
# See https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/#specifying-the-class-of-an-ingress
|
||||
ingressClassName: nginx
|
||||
|
||||
annotations: {}
|
||||
# kubernetes.io/ingress.class: nginx
|
||||
# kubernetes.io/tls-acme: "true"
|
||||
path: /
|
||||
hosts:
|
||||
- chart-example.local
|
||||
tls: []
|
||||
# - secretName: chart-example-tls
|
||||
# hosts:
|
||||
# - chart-example.local
|
||||
|
||||
nameOverride: ""
|
||||
fullnameOverride: ""
|
||||
|
||||
masterTerminationFix: false
|
||||
|
||||
lifecycle: {}
|
||||
# preStop:
|
||||
# exec:
|
||||
# command: ["/bin/sh", "-c", "echo Hello from the postStart handler > /usr/share/message"]
|
||||
# postStart:
|
||||
# exec:
|
||||
# command:
|
||||
# - bash
|
||||
# - -c
|
||||
# - |
|
||||
# #!/bin/bash
|
||||
# # Add a template to adjust number of shards/replicas1
|
||||
# TEMPLATE_NAME=my_template
|
||||
# INDEX_PATTERN="logstash-*"
|
||||
# SHARD_COUNT=8
|
||||
# REPLICA_COUNT=1
|
||||
# ES_URL=http://localhost:9200
|
||||
# while [[ "$(curl -s -o /dev/null -w '%{http_code}\n' $ES_URL)" != "200" ]]; do sleep 1; done
|
||||
# curl -XPUT "$ES_URL/_template/$TEMPLATE_NAME" -H 'Content-Type: application/json' -d'{"index_patterns":['\""$INDEX_PATTERN"\"'],"settings":{"number_of_shards":'$SHARD_COUNT',"number_of_replicas":'$REPLICA_COUNT'}}'
|
||||
|
||||
keystore: []
|
||||
|
||||
networkPolicy:
|
||||
## Enable creation of NetworkPolicy resources. Only Ingress traffic is filtered for now.
|
||||
## In order for a Pod to access OpenSearch, it needs to have the following label:
|
||||
## {{ template "uname" . }}-client: "true"
|
||||
## Example for default configuration to access HTTP port:
|
||||
## opensearch-master-http-client: "true"
|
||||
## Example for default configuration to access transport port:
|
||||
## opensearch-master-transport-client: "true"
|
||||
|
||||
http:
|
||||
enabled: false
|
||||
|
||||
# Deprecated
|
||||
# please use the above podSecurityContext.fsGroup instead
|
||||
fsGroup: ""
|
||||
|
||||
## Set optimal sysctl's through securityContext. This requires privilege. Can be disabled if
|
||||
## the system has already been preconfigured. (Ex: https://www.elastic.co/guide/en/elasticsearch/reference/current/vm-max-map-count.html)
|
||||
## Also see: https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/
|
||||
sysctl:
|
||||
enabled: false
|
||||
|
||||
## Set optimal sysctl's through privileged initContainer.
|
||||
sysctlInit:
|
||||
enabled: false
|
||||
# override image, which is busybox by default
|
||||
# image: busybox
|
||||
# override image tag, which is latest by default
|
||||
# imageTag:
|
||||
|
||||
## Enable to add 3rd Party / Custom plugins not offered in the default OpenSearch image.
|
||||
plugins:
|
||||
enabled: false
|
||||
installList: []
|
||||
# - example-fake-plugin
|
||||
428
opensearch/ci/ci-values.yaml
Normal file
428
opensearch/ci/ci-values.yaml
Normal file
@ -0,0 +1,428 @@
|
||||
---
|
||||
clusterName: "opensearch-cluster"
|
||||
nodeGroup: "master"
|
||||
|
||||
# The service that non master groups will try to connect to when joining the cluster
|
||||
# This should be set to clusterName + "-" + nodeGroup for your master group
|
||||
masterService: "opensearch-cluster-master"
|
||||
|
||||
# OpenSearch roles that will be applied to this nodeGroup
|
||||
# These will be set as environment variable "node.roles". E.g. node.roles=master,ingest,data,remote_cluster_client
|
||||
roles:
|
||||
- master
|
||||
- ingest
|
||||
- data
|
||||
- remote_cluster_client
|
||||
|
||||
replicas: 1
|
||||
|
||||
# if not set, falls back to parsing .Values.imageTag, then .Chart.appVersion.
|
||||
majorVersion: ""
|
||||
|
||||
global:
|
||||
# Set if you want to change the default docker registry, e.g. a private one.
|
||||
dockerRegistry: ""
|
||||
|
||||
# Allows you to add any config files in {{ .Values.opensearchHome }}/config
|
||||
opensearchHome: /usr/share/opensearch
|
||||
# such as opensearch.yml and log4j2.properties
|
||||
config:
|
||||
# Values must be YAML literal style scalar / YAML multiline string.
|
||||
# <filename>: |
|
||||
# <formatted-value(s)>
|
||||
# log4j2.properties: |
|
||||
# status = error
|
||||
#
|
||||
# appender.console.type = Console
|
||||
# appender.console.name = console
|
||||
# appender.console.layout.type = PatternLayout
|
||||
# appender.console.layout.pattern = [%d{ISO8601}][%-5p][%-25c{1.}] [%node_name]%marker %m%n
|
||||
#
|
||||
# rootLogger.level = info
|
||||
# rootLogger.appenderRef.console.ref = console
|
||||
opensearch.yml: |
|
||||
cluster.name: opensearch-cluster
|
||||
|
||||
# Bind to all interfaces because we don't know what IP address Docker will assign to us.
|
||||
network.host: 0.0.0.0
|
||||
transport.host: localhost
|
||||
transport.tcp.port: 9300
|
||||
|
||||
# Setting network.host to a non-loopback address enables the annoying bootstrap checks. "Single-node" mode disables them again.
|
||||
# discovery.type: single-node
|
||||
|
||||
# Start OpenSearch Security Demo Configuration
|
||||
# WARNING: revise all the lines below before you go into production
|
||||
plugins:
|
||||
security:
|
||||
ssl:
|
||||
transport:
|
||||
pemcert_filepath: esnode.pem
|
||||
pemkey_filepath: esnode-key.pem
|
||||
pemtrustedcas_filepath: root-ca.pem
|
||||
enforce_hostname_verification: false
|
||||
http:
|
||||
enabled: true
|
||||
pemcert_filepath: esnode.pem
|
||||
pemkey_filepath: esnode-key.pem
|
||||
pemtrustedcas_filepath: root-ca.pem
|
||||
allow_unsafe_democertificates: true
|
||||
allow_default_init_securityindex: true
|
||||
authcz:
|
||||
admin_dn:
|
||||
- CN=kirk,OU=client,O=client,L=test,C=de
|
||||
audit.type: internal_opensearch
|
||||
enable_snapshot_restore_privilege: true
|
||||
check_snapshot_restore_write_privileges: true
|
||||
restapi:
|
||||
roles_enabled: ["all_access", "security_rest_api_access"]
|
||||
system_indices:
|
||||
enabled: true
|
||||
indices:
|
||||
[
|
||||
".opendistro-alerting-config",
|
||||
".opendistro-alerting-alert*",
|
||||
".opendistro-anomaly-results*",
|
||||
".opendistro-anomaly-detector*",
|
||||
".opendistro-anomaly-checkpoints",
|
||||
".opendistro-anomaly-detection-state",
|
||||
".opendistro-reports-*",
|
||||
".opendistro-notifications-*",
|
||||
".opendistro-notebooks",
|
||||
".opendistro-asynchronous-search-response*",
|
||||
]
|
||||
######## End OpenSearch Security Demo Configuration ########
|
||||
# log4j2.properties:
|
||||
|
||||
# Extra environment variables to append to this nodeGroup
|
||||
# This will be appended to the current 'env:' key. You can use any of the kubernetes env
|
||||
# syntax here
|
||||
extraEnvs:
|
||||
- name: OPENSEARCH_INITIAL_ADMIN_PASSWORD
|
||||
value: myStrongPassword123@456
|
||||
# - name: MY_ENVIRONMENT_VAR
|
||||
# value: the_value_goes_here
|
||||
|
||||
# Allows you to load environment variables from kubernextes secret or config map
|
||||
envFrom: []
|
||||
# - secretRef:
|
||||
# name: env-secret
|
||||
# - configMapRef:
|
||||
# name: config-map
|
||||
|
||||
# A list of secrets and their paths to mount inside the pod
|
||||
# This is useful for mounting certificates for security and for mounting
|
||||
# the X-Pack license
|
||||
secretMounts: []
|
||||
|
||||
hostAliases: []
|
||||
# - ip: "127.0.0.1"
|
||||
# hostnames:
|
||||
# - "foo.local"
|
||||
# - "bar.local"
|
||||
|
||||
|
||||
image:
|
||||
repository: "opensearchproject/opensearch"
|
||||
# override image tag, which is .Chart.AppVersion by default
|
||||
tag: ""
|
||||
pullPolicy: "IfNotPresent"
|
||||
|
||||
|
||||
podAnnotations: {}
|
||||
# iam.amazonaws.com/role: es-cluster
|
||||
|
||||
# additionals labels
|
||||
labels: {}
|
||||
|
||||
opensearchJavaOpts: "-Xmx512M -Xms512M"
|
||||
|
||||
resources:
|
||||
requests:
|
||||
cpu: "1000m"
|
||||
memory: "100Mi"
|
||||
|
||||
initResources: {}
|
||||
# limits:
|
||||
# cpu: "25m"
|
||||
# # memory: "128Mi"
|
||||
# requests:
|
||||
# cpu: "25m"
|
||||
# memory: "128Mi"
|
||||
|
||||
sidecarResources: {}
|
||||
# limits:
|
||||
# cpu: "25m"
|
||||
# # memory: "128Mi"
|
||||
# requests:
|
||||
# cpu: "25m"
|
||||
# memory: "128Mi"
|
||||
|
||||
networkHost: "0.0.0.0"
|
||||
|
||||
rbac:
|
||||
create: false
|
||||
serviceAccountAnnotations: {}
|
||||
serviceAccountName: ""
|
||||
|
||||
podSecurityPolicy:
|
||||
create: false
|
||||
name: ""
|
||||
spec:
|
||||
privileged: true
|
||||
fsGroup:
|
||||
rule: RunAsAny
|
||||
runAsUser:
|
||||
rule: RunAsAny
|
||||
seLinux:
|
||||
rule: RunAsAny
|
||||
supplementalGroups:
|
||||
rule: RunAsAny
|
||||
volumes:
|
||||
- secret
|
||||
- configMap
|
||||
- persistentVolumeClaim
|
||||
- emptyDir
|
||||
|
||||
persistence:
|
||||
enabled: true
|
||||
# Set to false to disable the `fsgroup-volume` initContainer that will update permissions on the persistent disk.
|
||||
enableInitChown: true
|
||||
# override image, which is busybox by default
|
||||
# image: busybox
|
||||
# override image tag, which is latest by default
|
||||
# imageTag:
|
||||
labels:
|
||||
# Add default labels for the volumeClaimTemplate of the StatefulSet
|
||||
enabled: false
|
||||
# OpenSearch Persistent Volume Storage Class
|
||||
# If defined, storageClassName: <storageClass>
|
||||
# If set to "-", storageClassName: "", which disables dynamic provisioning
|
||||
# If undefined (the default) or set to null, no storageClassName spec is
|
||||
# set, choosing the default provisioner. (gp2 on AWS, standard on
|
||||
# GKE, AWS & OpenStack)
|
||||
#
|
||||
# storageClass: "-"
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
size: 8Gi
|
||||
annotations: {}
|
||||
|
||||
extraVolumes: []
|
||||
# - name: extras
|
||||
# emptyDir: {}
|
||||
|
||||
extraVolumeMounts: []
|
||||
# - name: extras
|
||||
# mountPath: /usr/share/extras
|
||||
# readOnly: true
|
||||
|
||||
extraContainers: []
|
||||
# - name: do-something
|
||||
# image: busybox
|
||||
# command: ['do', 'something']
|
||||
|
||||
extraInitContainers: []
|
||||
# - name: do-somethings
|
||||
# image: busybox
|
||||
# command: ['do', 'something']
|
||||
|
||||
# This is the PriorityClass settings as defined in
|
||||
# https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass
|
||||
priorityClassName: ""
|
||||
|
||||
# By default this will make sure two pods don't end up on the same node
|
||||
# Changing this to a region would allow you to spread pods across regions
|
||||
antiAffinityTopologyKey: "kubernetes.io/hostname"
|
||||
|
||||
# Hard means that by default pods will only be scheduled if there are enough nodes for them
|
||||
# and that they will never end up on the same node. Setting this to soft will do this "best effort".
|
||||
# Setting this to custom will use what is passed into customAntiAffinity.
|
||||
antiAffinity: "soft"
|
||||
|
||||
# Allows passing in custom anti-affinity settings as defined in
|
||||
# https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#types-of-inter-pod-affinity-and-anti-affinity
|
||||
# Using this parameter requires setting antiAffinity to custom.
|
||||
customAntiAffinity: {}
|
||||
|
||||
# This is the node affinity settings as defined in
|
||||
# https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#node-affinity-beta-feature
|
||||
nodeAffinity: {}
|
||||
|
||||
# This is the pod affinity settings as defined in
|
||||
# https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#types-of-inter-pod-affinity-and-anti-affinity
|
||||
podAffinity: {}
|
||||
|
||||
# The default is to deploy all pods serially. By setting this to parallel all pods are started at
|
||||
# the same time when bootstrapping the cluster
|
||||
podManagementPolicy: "Parallel"
|
||||
|
||||
# The environment variables injected by service links are not used, but can lead to slow OpenSearch boot times when
|
||||
# there are many services in the current namespace.
|
||||
# If you experience slow pod startups you probably want to set this to `false`.
|
||||
enableServiceLinks: true
|
||||
|
||||
protocol: https
|
||||
httpPort: 9200
|
||||
transportPort: 9300
|
||||
metricsPort: 9600
|
||||
|
||||
service:
|
||||
labels: {}
|
||||
labelsHeadless: {}
|
||||
headless:
|
||||
annotations: {}
|
||||
type: ClusterIP
|
||||
nodePort: ""
|
||||
annotations: {}
|
||||
httpPortName: http
|
||||
transportPortName: transport
|
||||
loadBalancerIP: ""
|
||||
loadBalancerSourceRanges: []
|
||||
externalTrafficPolicy: ""
|
||||
|
||||
updateStrategy: RollingUpdate
|
||||
|
||||
# This is the max unavailable setting for the pod disruption budget
|
||||
# The default value of 1 will make sure that kubernetes won't allow more than 1
|
||||
# of your pods to be unavailable during maintenance
|
||||
maxUnavailable: 1
|
||||
|
||||
podSecurityContext:
|
||||
fsGroup: 1000
|
||||
runAsUser: 1000
|
||||
|
||||
securityContext:
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
# readOnlyRootFilesystem: true
|
||||
runAsNonRoot: true
|
||||
runAsUser: 1000
|
||||
|
||||
securityConfig:
|
||||
enabled: true
|
||||
path: "/usr/share/opensearch/plugins/opensearch-security/securityconfig"
|
||||
actionGroupsSecret:
|
||||
configSecret:
|
||||
internalUsersSecret:
|
||||
rolesSecret:
|
||||
rolesMappingSecret:
|
||||
tenantsSecret:
|
||||
# The following option simplifies securityConfig by using a single secret and
|
||||
# specifying the config files as keys in the secret instead of creating
|
||||
# different secrets for for each config file.
|
||||
# Note that this is an alternative to the individual secret configuration
|
||||
# above and shouldn't be used if the above secrets are used.
|
||||
config:
|
||||
# There are multiple ways to define the configuration here:
|
||||
# * If you define anything under data, the chart will automatically create
|
||||
# a secret and mount it.
|
||||
# * If you define securityConfigSecret, the chart will assume this secret is
|
||||
# created externally and mount it.
|
||||
# * It is an error to define both data and securityConfigSecret.
|
||||
securityConfigSecret: ""
|
||||
data: {}
|
||||
# config.yml: |-
|
||||
# internal_users.yml: |-
|
||||
# roles.yml: |-
|
||||
# roles_mapping.yml: |-
|
||||
# action_groups.yml: |-
|
||||
# tenants.yml: |-
|
||||
|
||||
# How long to wait for opensearch to stop gracefully
|
||||
terminationGracePeriod: 120
|
||||
|
||||
sysctlVmMaxMapCount: 262144
|
||||
|
||||
## Use an alternate scheduler.
|
||||
## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
|
||||
##
|
||||
schedulerName: ""
|
||||
|
||||
imagePullSecrets: []
|
||||
nodeSelector: {}
|
||||
tolerations: []
|
||||
|
||||
# Enabling this will publically expose your OpenSearch instance.
|
||||
# Only enable this if you have security enabled on your cluster
|
||||
ingress:
|
||||
enabled: false
|
||||
|
||||
# For Kubernetes >= 1.18 you should specify the ingress-controller via the field ingressClassName
|
||||
# See https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/#specifying-the-class-of-an-ingress
|
||||
ingressClassName: nginx
|
||||
|
||||
annotations: {}
|
||||
# kubernetes.io/ingress.class: nginx
|
||||
# kubernetes.io/tls-acme: "true"
|
||||
path: /
|
||||
hosts:
|
||||
- chart-example.local
|
||||
tls: []
|
||||
# - secretName: chart-example-tls
|
||||
# hosts:
|
||||
# - chart-example.local
|
||||
|
||||
nameOverride: ""
|
||||
fullnameOverride: ""
|
||||
|
||||
masterTerminationFix: false
|
||||
|
||||
lifecycle: {}
|
||||
# preStop:
|
||||
# exec:
|
||||
# command: ["/bin/sh", "-c", "echo Hello from the postStart handler > /usr/share/message"]
|
||||
# postStart:
|
||||
# exec:
|
||||
# command:
|
||||
# - bash
|
||||
# - -c
|
||||
# - |
|
||||
# #!/bin/bash
|
||||
# # Add a template to adjust number of shards/replicas1
|
||||
# TEMPLATE_NAME=my_template
|
||||
# INDEX_PATTERN="logstash-*"
|
||||
# SHARD_COUNT=8
|
||||
# REPLICA_COUNT=1
|
||||
# ES_URL=http://localhost:9200
|
||||
# while [[ "$(curl -s -o /dev/null -w '%{http_code}\n' $ES_URL)" != "200" ]]; do sleep 1; done
|
||||
# curl -XPUT "$ES_URL/_template/$TEMPLATE_NAME" -H 'Content-Type: application/json' -d'{"index_patterns":['\""$INDEX_PATTERN"\"'],"settings":{"number_of_shards":'$SHARD_COUNT',"number_of_replicas":'$REPLICA_COUNT'}}'
|
||||
|
||||
keystore: []
|
||||
|
||||
networkPolicy:
|
||||
## Enable creation of NetworkPolicy resources. Only Ingress traffic is filtered for now.
|
||||
## In order for a Pod to access OpenSearch, it needs to have the following label:
|
||||
## {{ template "uname" . }}-client: "true"
|
||||
## Example for default configuration to access HTTP port:
|
||||
## opensearch-master-http-client: "true"
|
||||
## Example for default configuration to access transport port:
|
||||
## opensearch-master-transport-client: "true"
|
||||
|
||||
http:
|
||||
enabled: false
|
||||
|
||||
# Deprecated
|
||||
# please use the above podSecurityContext.fsGroup instead
|
||||
fsGroup: ""
|
||||
|
||||
## Set optimal sysctl's through securityContext. This requires privilege. Can be disabled if
|
||||
## the system has already been preconfigured. (Ex: https://www.elastic.co/guide/en/elasticsearch/reference/current/vm-max-map-count.html)
|
||||
## Also see: https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/
|
||||
sysctl:
|
||||
enabled: false
|
||||
|
||||
## Set optimal sysctl's through privileged initContainer.
|
||||
sysctlInit:
|
||||
enabled: false
|
||||
# override image, which is busybox by default
|
||||
# image: busybox
|
||||
# override image tag, which is latest by default
|
||||
# imageTag:
|
||||
|
||||
## Enable to add 3rd Party / Custom plugins not offered in the default OpenSearch image.
|
||||
plugins:
|
||||
enabled: false
|
||||
installList: []
|
||||
# - example-fake-plugin
|
||||
2
opensearch/templates/NOTES.txt
Normal file
2
opensearch/templates/NOTES.txt
Normal file
@ -0,0 +1,2 @@
|
||||
Watch all cluster members come up.
|
||||
$ kubectl get pods --namespace={{ .Release.Namespace }} -l app.kubernetes.io/component={{ template "opensearch.uname" . }} -w
|
||||
144
opensearch/templates/_helpers.tpl
Normal file
144
opensearch/templates/_helpers.tpl
Normal file
@ -0,0 +1,144 @@
|
||||
{{/* vim: set filetype=mustache: */}}
|
||||
{{/*
|
||||
Expand the name of the chart.
|
||||
*/}}
|
||||
{{- define "opensearch.name" -}}
|
||||
{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
Create a default fully qualified app name.
|
||||
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
|
||||
If release name contains chart name it will be used as a full name.
|
||||
*/}}
|
||||
{{- define "opensearch.fullname" -}}
|
||||
{{- if contains .Chart.Name .Release.Name }}
|
||||
{{- .Release.Name | trunc 63 | trimSuffix "-" }}
|
||||
{{- else }}
|
||||
{{- printf "%s-%s" .Release.Name .Chart.Name | trunc 63 | trimSuffix "-" }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
Create chart name and version as used by the chart label.
|
||||
*/}}
|
||||
{{- define "opensearch.chart" -}}
|
||||
{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
Common labels
|
||||
*/}}
|
||||
{{- define "opensearch.labels" -}}
|
||||
helm.sh/chart: {{ include "opensearch.chart" . }}
|
||||
{{ include "opensearch.selectorLabels" . }}
|
||||
{{- if .Chart.AppVersion }}
|
||||
app.kubernetes.io/version: {{ .Chart.AppVersion | quote }}
|
||||
{{- end }}
|
||||
app.kubernetes.io/managed-by: {{ .Release.Service }}
|
||||
app.kubernetes.io/component: {{ include "opensearch.uname" . }}
|
||||
{{- with .Values.labels }}
|
||||
{{ toYaml . }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
Selector labels
|
||||
*/}}
|
||||
{{- define "opensearch.selectorLabels" -}}
|
||||
app.kubernetes.io/name: {{ include "opensearch.name" . }}
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
{{- end }}
|
||||
|
||||
{{- define "opensearch.uname" -}}
|
||||
{{- if empty .Values.fullnameOverride -}}
|
||||
{{- if empty .Values.nameOverride -}}
|
||||
{{ .Values.clusterName }}-{{ .Values.nodeGroup }}
|
||||
{{- else -}}
|
||||
{{ .Values.nameOverride }}-{{ .Values.nodeGroup }}
|
||||
{{- end -}}
|
||||
{{- else -}}
|
||||
{{ .Values.fullnameOverride }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "opensearch.masterService" -}}
|
||||
{{- if empty .Values.masterService -}}
|
||||
{{- if empty .Values.fullnameOverride -}}
|
||||
{{- if empty .Values.nameOverride -}}
|
||||
{{ .Values.clusterName }}-master
|
||||
{{- else -}}
|
||||
{{ .Values.nameOverride }}-master
|
||||
{{- end -}}
|
||||
{{- else -}}
|
||||
{{ .Values.fullnameOverride }}
|
||||
{{- end -}}
|
||||
{{- else -}}
|
||||
{{ .Values.masterService }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "opensearch.serviceName" -}}
|
||||
{{- if eq .Values.nodeGroup "master" }}
|
||||
{{- include "opensearch.masterService" . }}
|
||||
{{- else }}
|
||||
{{- include "opensearch.uname" . }}
|
||||
{{- end }}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "opensearch.endpoints" -}}
|
||||
{{- $replicas := int (toString (.Values.replicas)) }}
|
||||
{{- $uname := (include "opensearch.uname" .) }}
|
||||
{{- range $i, $e := untilStep 0 $replicas 1 -}}
|
||||
{{ $uname }}-{{ $i }},
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "opensearch.majorVersion" -}}
|
||||
{{- if .Values.majorVersion }}
|
||||
{{- .Values.majorVersion }}
|
||||
{{- else }}
|
||||
{{- $version := semver (coalesce .Values.image.tag .Chart.AppVersion "1") }}
|
||||
{{- $version.Major }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{- define "opensearch.dockerRegistry" -}}
|
||||
{{- if eq .Values.global.dockerRegistry "" -}}
|
||||
{{- .Values.global.dockerRegistry -}}
|
||||
{{- else -}}
|
||||
{{- .Values.global.dockerRegistry | trimSuffix "/" | printf "%s/" -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "opensearch.roles" -}}
|
||||
{{- range $.Values.roles -}}
|
||||
{{ . }},
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Return the appropriate apiVersion for ingress.
|
||||
*/}}
|
||||
{{- define "opensearch.ingress.apiVersion" -}}
|
||||
{{- if and (.Capabilities.APIVersions.Has "networking.k8s.io/v1") (semverCompare ">= 1.19-0" .Capabilities.KubeVersion.Version) -}}
|
||||
{{- print "networking.k8s.io/v1" -}}
|
||||
{{- else if .Capabilities.APIVersions.Has "networking.k8s.io/v1beta1" -}}
|
||||
{{- print "networking.k8s.io/v1beta1" -}}
|
||||
{{- else -}}
|
||||
{{- print "extensions/v1beta1" -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Return if ingress is stable.
|
||||
*/}}
|
||||
{{- define "opensearch.ingress.isStable" -}}
|
||||
{{- eq (include "opensearch.ingress.apiVersion" .) "networking.k8s.io/v1" -}}
|
||||
{{- end -}}
|
||||
{{/*
|
||||
Return if ingress supports ingressClassName.
|
||||
*/}}
|
||||
{{- define "opensearch.ingress.supportsIngressClassName" -}}
|
||||
{{- or (eq (include "opensearch.ingress.isStable" .) "true") (and (eq (include "opensearch.ingress.apiVersion" .) "networking.k8s.io/v1beta1") (semverCompare ">= 1.18-0" .Capabilities.KubeVersion.Version)) -}}
|
||||
{{- end -}}
|
||||
18
opensearch/templates/configmap.yaml
Normal file
18
opensearch/templates/configmap.yaml
Normal file
@ -0,0 +1,18 @@
|
||||
{{- $root := . }}
|
||||
{{- if .Values.config }}
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: {{ template "opensearch.uname" . }}-config
|
||||
labels:
|
||||
{{- include "opensearch.labels" . | nindent 4 }}
|
||||
data:
|
||||
{{- range $configName, $configYaml := .Values.config }}
|
||||
{{ $configName }}: |
|
||||
{{- if (eq (kindOf $configYaml) "map")}}
|
||||
{{- tpl (toYaml $configYaml) $root | nindent 4 }}
|
||||
{{- else -}}
|
||||
{{- tpl $configYaml $root | nindent 4 }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
8
opensearch/templates/extraManifests.yaml
Normal file
8
opensearch/templates/extraManifests.yaml
Normal file
@ -0,0 +1,8 @@
|
||||
{{ range .Values.extraObjects }}
|
||||
---
|
||||
{{- if typeIs "string" . }}
|
||||
{{- tpl . $ }}
|
||||
{{- else }}
|
||||
{{- tpl (toYaml .) $ }}
|
||||
{{- end }}
|
||||
{{ end }}
|
||||
65
opensearch/templates/ingress.yaml
Normal file
65
opensearch/templates/ingress.yaml
Normal file
@ -0,0 +1,65 @@
|
||||
{{- if .Values.ingress.enabled -}}
|
||||
{{- $fullName := include "opensearch.serviceName" . -}}
|
||||
{{- $servicePort := .Values.httpPort -}}
|
||||
{{- $ingressPath := .Values.ingress.path -}}
|
||||
{{- $ingressApiIsStable := eq (include "opensearch.ingress.isStable" .) "true" -}}
|
||||
{{- $ingressSupportsIngressClassName := eq (include "opensearch.ingress.supportsIngressClassName" .) "true" -}}
|
||||
{{- if semverCompare ">=1.19-0" .Capabilities.KubeVersion.GitVersion -}}
|
||||
apiVersion: networking.k8s.io/v1
|
||||
{{- else if semverCompare ">=1.14-0" .Capabilities.KubeVersion.GitVersion -}}
|
||||
apiVersion: networking.k8s.io/v1beta1
|
||||
{{- else -}}
|
||||
apiVersion: extensions/v1beta1
|
||||
{{- end }}
|
||||
kind: Ingress
|
||||
metadata:
|
||||
name: {{ $fullName }}
|
||||
labels:
|
||||
{{- include "opensearch.labels" . | nindent 4 }}
|
||||
{{- with .Values.ingress.ingressLabels }}
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- with .Values.ingress.annotations }}
|
||||
annotations:
|
||||
{{ toYaml . | indent 4 }}
|
||||
{{- end }}
|
||||
spec:
|
||||
{{- if and $ingressSupportsIngressClassName .Values.ingress.ingressClassName }}
|
||||
ingressClassName: {{ .Values.ingress.ingressClassName }}
|
||||
{{- end -}}
|
||||
{{- if .Values.ingress.tls }}
|
||||
tls:
|
||||
{{- range .Values.ingress.tls }}
|
||||
- hosts:
|
||||
{{- range .hosts }}
|
||||
- {{ . }}
|
||||
{{- end }}
|
||||
secretName: {{ .secretName }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
rules:
|
||||
{{- if semverCompare ">=1.19-0" .Capabilities.KubeVersion.GitVersion -}}
|
||||
{{- range .Values.ingress.hosts }}
|
||||
- host: {{ . | quote }}
|
||||
http:
|
||||
paths:
|
||||
- path: {{ $ingressPath }}
|
||||
pathType: Prefix
|
||||
backend:
|
||||
service:
|
||||
name: {{ $fullName }}
|
||||
port:
|
||||
number: {{ $servicePort }}
|
||||
{{- end }}
|
||||
{{- else -}}
|
||||
{{- range .Values.ingress.hosts }}
|
||||
- host: {{ . | quote }}
|
||||
http:
|
||||
paths:
|
||||
- path: {{ $ingressPath }}
|
||||
backend:
|
||||
serviceName: {{ $fullName }}
|
||||
servicePort: {{ $servicePort }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
17
opensearch/templates/networkpolicy.yaml
Normal file
17
opensearch/templates/networkpolicy.yaml
Normal file
@ -0,0 +1,17 @@
|
||||
{{- if .Values.networkPolicy.create -}}
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: NetworkPolicy
|
||||
metadata:
|
||||
name: {{ template "opensearch.uname" . }}-opensearch-net
|
||||
labels:
|
||||
{{- include "opensearch.labels" . | nindent 4 }}
|
||||
spec:
|
||||
ingress:
|
||||
- from:
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
{{ template "opensearch.uname" . }}-transport-client: "true"
|
||||
podSelector:
|
||||
matchLabels:
|
||||
{{ template "opensearch.uname" . }}-transport-client: "true"
|
||||
{{- end }}
|
||||
17
opensearch/templates/poddisruptionbudget.yaml
Normal file
17
opensearch/templates/poddisruptionbudget.yaml
Normal file
@ -0,0 +1,17 @@
|
||||
{{- if .Values.maxUnavailable }}
|
||||
{{- if semverCompare ">=1.21-0" .Capabilities.KubeVersion.GitVersion -}}
|
||||
apiVersion: policy/v1
|
||||
{{- else -}}
|
||||
apiVersion: policy/v1beta1
|
||||
{{- end }}
|
||||
kind: PodDisruptionBudget
|
||||
metadata:
|
||||
name: "{{ template "opensearch.uname" . }}-pdb"
|
||||
labels:
|
||||
{{- include "opensearch.labels" . | nindent 4 }}
|
||||
spec:
|
||||
maxUnavailable: {{ .Values.maxUnavailable }}
|
||||
selector:
|
||||
matchLabels:
|
||||
{{- include "opensearch.selectorLabels" . | nindent 6 }}
|
||||
{{- end }}
|
||||
17
opensearch/templates/podsecuritypolicy.yaml
Normal file
17
opensearch/templates/podsecuritypolicy.yaml
Normal file
@ -0,0 +1,17 @@
|
||||
{{- if semverCompare "<1.25-0" .Capabilities.KubeVersion.GitVersion -}}
|
||||
{{- if .Values.podSecurityPolicy.create -}}
|
||||
{{- $fullName := include "opensearch.uname" . -}}
|
||||
apiVersion: policy/v1beta1
|
||||
kind: PodSecurityPolicy
|
||||
metadata:
|
||||
name: {{ default $fullName .Values.podSecurityPolicy.name | quote }}
|
||||
labels:
|
||||
{{- include "opensearch.labels" . | nindent 4 }}
|
||||
spec:
|
||||
{{ toYaml .Values.podSecurityPolicy.spec | indent 2 }}
|
||||
{{- if .Values.sysctl.enabled }}
|
||||
allowedUnsafeSysctls:
|
||||
- vm.max_map_count
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
22
opensearch/templates/role.yaml
Normal file
22
opensearch/templates/role.yaml
Normal file
@ -0,0 +1,22 @@
|
||||
{{- if .Values.rbac.create -}}
|
||||
{{- $fullName := include "opensearch.uname" . -}}
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: Role
|
||||
metadata:
|
||||
name: {{ $fullName | quote }}
|
||||
labels:
|
||||
{{- include "opensearch.labels" . | nindent 4 }}
|
||||
rules:
|
||||
- apiGroups:
|
||||
- extensions
|
||||
resources:
|
||||
- podsecuritypolicies
|
||||
resourceNames:
|
||||
{{- if eq .Values.podSecurityPolicy.name "" }}
|
||||
- {{ $fullName | quote }}
|
||||
{{- else }}
|
||||
- {{ .Values.podSecurityPolicy.name | quote }}
|
||||
{{- end }}
|
||||
verbs:
|
||||
- use
|
||||
{{- end -}}
|
||||
21
opensearch/templates/rolebinding.yaml
Normal file
21
opensearch/templates/rolebinding.yaml
Normal file
@ -0,0 +1,21 @@
|
||||
{{- if .Values.rbac.create -}}
|
||||
{{- $fullName := include "opensearch.uname" . -}}
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: {{ $fullName | quote }}
|
||||
labels:
|
||||
{{- include "opensearch.labels" . | nindent 4 }}
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
{{- if eq .Values.rbac.serviceAccountName "" }}
|
||||
name: {{ $fullName | quote }}
|
||||
{{- else }}
|
||||
name: {{ .Values.rbac.serviceAccountName | quote }}
|
||||
{{- end }}
|
||||
namespace: {{ .Release.Namespace | quote }}
|
||||
roleRef:
|
||||
kind: Role
|
||||
name: {{ $fullName | quote }}
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
{{- end -}}
|
||||
19
opensearch/templates/securityconfig.yaml
Normal file
19
opensearch/templates/securityconfig.yaml
Normal file
@ -0,0 +1,19 @@
|
||||
{{- if .Values.securityConfig.config.data -}}
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: {{ include "opensearch.uname" . }}-securityconfig
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
{{- include "opensearch.labels" . | nindent 4 }}
|
||||
type: Opaque
|
||||
stringData:
|
||||
{{- range $key, $val := .Values.securityConfig.config.data }}
|
||||
{{ $key }}: |
|
||||
{{- if (eq (kindOf $val) "map")}}
|
||||
{{- tpl (toYaml $val) $ | nindent 4 }}
|
||||
{{- else }}
|
||||
{{- tpl $val $ | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
72
opensearch/templates/service.yaml
Normal file
72
opensearch/templates/service.yaml
Normal file
@ -0,0 +1,72 @@
|
||||
---
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: {{ template "opensearch.serviceName" . }}
|
||||
labels:
|
||||
{{- include "opensearch.labels" . | nindent 4 }}
|
||||
{{- if .Values.service.labels }}
|
||||
{{ toYaml .Values.service.labels | indent 4 }}
|
||||
{{- end }}
|
||||
annotations:
|
||||
{{ toYaml .Values.service.annotations | indent 4 }}
|
||||
spec:
|
||||
type: {{ .Values.service.type }}
|
||||
{{- if (semverCompare ">= 1.23-0" .Capabilities.KubeVersion.Version) }}
|
||||
{{- if .Values.service.ipFamilyPolicy }}
|
||||
ipFamilyPolicy: {{ .Values.service.ipFamilyPolicy }}
|
||||
{{- end }}
|
||||
{{- if .Values.service.ipFamilies }}
|
||||
ipFamilies: {{ .Values.service.ipFamilies }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
selector:
|
||||
{{- include "opensearch.selectorLabels" . | nindent 4 }}
|
||||
ports:
|
||||
- name: {{ .Values.service.httpPortName | default "http" }}
|
||||
protocol: TCP
|
||||
port: {{ .Values.httpPort }}
|
||||
{{- if .Values.service.nodePort }}
|
||||
nodePort: {{ .Values.service.nodePort }}
|
||||
{{- end }}
|
||||
- name: {{ .Values.service.transportPortName | default "transport" }}
|
||||
protocol: TCP
|
||||
port: {{ .Values.transportPort }}
|
||||
{{- if .Values.service.loadBalancerIP }}
|
||||
loadBalancerIP: {{ .Values.service.loadBalancerIP }}
|
||||
{{- end }}
|
||||
{{- with .Values.service.loadBalancerSourceRanges }}
|
||||
loadBalancerSourceRanges:
|
||||
{{ toYaml . | indent 4 }}
|
||||
{{- end }}
|
||||
{{- if .Values.service.externalTrafficPolicy }}
|
||||
externalTrafficPolicy: {{ .Values.service.externalTrafficPolicy }}
|
||||
{{- end }}
|
||||
---
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: {{ template "opensearch.serviceName" . }}-headless
|
||||
labels:
|
||||
{{- include "opensearch.labels" . | nindent 4 }}
|
||||
{{- if .Values.service.labelsHeadless }}
|
||||
{{ toYaml .Values.service.labelsHeadless | indent 4 }}
|
||||
{{- end }}
|
||||
annotations:
|
||||
service.alpha.kubernetes.io/tolerate-unready-endpoints: "true"
|
||||
{{- if .Values.service.headless.annotations }}
|
||||
{{ toYaml .Values.service.headless.annotations | indent 4 }}
|
||||
{{- end }}
|
||||
spec:
|
||||
clusterIP: None # This is needed for statefulset hostnames like opensearch-0 to resolve
|
||||
# Create endpoints also if the related pod isn't ready
|
||||
publishNotReadyAddresses: true
|
||||
selector:
|
||||
{{- include "opensearch.selectorLabels" . | nindent 4 }}
|
||||
ports:
|
||||
- name: {{ .Values.service.httpPortName | default "http" }}
|
||||
port: {{ .Values.httpPort }}
|
||||
- name: {{ .Values.service.transportPortName | default "transport" }}
|
||||
port: {{ .Values.transportPort }}
|
||||
- name: {{ .Values.service.metricsPortName | default "metrics" }}
|
||||
port: {{ .Values.metricsPort }}
|
||||
17
opensearch/templates/serviceaccount.yaml
Normal file
17
opensearch/templates/serviceaccount.yaml
Normal file
@ -0,0 +1,17 @@
|
||||
{{- if .Values.rbac.create -}}
|
||||
{{- $fullName := include "opensearch.uname" . -}}
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
{{- if eq .Values.rbac.serviceAccountName "" }}
|
||||
name: {{ $fullName | quote }}
|
||||
{{- else }}
|
||||
name: {{ .Values.rbac.serviceAccountName | quote }}
|
||||
{{- end }}
|
||||
labels:
|
||||
{{- include "opensearch.labels" . | nindent 4 }}
|
||||
annotations:
|
||||
{{- with .Values.rbac.serviceAccountAnnotations }}
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- end -}}
|
||||
580
opensearch/templates/statefulset.yaml
Normal file
580
opensearch/templates/statefulset.yaml
Normal file
@ -0,0 +1,580 @@
|
||||
---
|
||||
apiVersion: apps/v1
|
||||
kind: StatefulSet
|
||||
metadata:
|
||||
name: {{ template "opensearch.uname" . }}
|
||||
labels:
|
||||
{{- include "opensearch.labels" . | nindent 4 }}
|
||||
annotations:
|
||||
majorVersion: "{{ include "opensearch.majorVersion" . }}"
|
||||
{{- with .Values.openSearchAnnotations }}
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end }}
|
||||
spec:
|
||||
serviceName: {{ template "opensearch.serviceName" . }}-headless
|
||||
selector:
|
||||
matchLabels:
|
||||
{{- include "opensearch.selectorLabels" . | nindent 6 }}
|
||||
{{- if .Values.singleNode }}
|
||||
replicas: 1
|
||||
{{- else }}
|
||||
replicas: {{ .Values.replicas }}
|
||||
{{- end }}
|
||||
podManagementPolicy: {{ .Values.podManagementPolicy }}
|
||||
updateStrategy:
|
||||
type: {{ .Values.updateStrategy }}
|
||||
{{- if .Values.persistence.enabled }}
|
||||
volumeClaimTemplates:
|
||||
- metadata:
|
||||
name: {{ template "opensearch.uname" . }}
|
||||
{{- if .Values.persistence.labels.enabled }}
|
||||
labels:
|
||||
{{- include "opensearch.labels" . | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- with .Values.persistence.annotations }}
|
||||
annotations:
|
||||
{{ toYaml . | indent 8 }}
|
||||
{{- end }}
|
||||
spec:
|
||||
accessModes:
|
||||
{{- range .Values.persistence.accessModes }}
|
||||
- {{ . | quote }}
|
||||
{{- end }}
|
||||
resources:
|
||||
requests:
|
||||
storage: {{ .Values.persistence.size | quote }}
|
||||
{{- if .Values.persistence.storageClass }}
|
||||
{{- if (eq "-" .Values.persistence.storageClass) }}
|
||||
storageClassName: ""
|
||||
{{- else }}
|
||||
storageClassName: "{{ .Values.persistence.storageClass }}"
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
template:
|
||||
metadata:
|
||||
name: "{{ template "opensearch.uname" . }}"
|
||||
labels:
|
||||
{{- include "opensearch.labels" . | nindent 8 }}
|
||||
annotations:
|
||||
{{- range $key, $value := .Values.podAnnotations }}
|
||||
{{ $key }}: {{ $value | quote }}
|
||||
{{- end }}
|
||||
{{- /* This forces a restart if the configmap has changed */}}
|
||||
{{- if .Values.config }}
|
||||
configchecksum: {{ include (print .Template.BasePath "/configmap.yaml") . | sha256sum | trunc 63 }}
|
||||
{{- end }}
|
||||
{{- if .Values.securityConfig.config.data }}
|
||||
securityconfigchecksum: {{ include (print .Template.BasePath "/securityconfig.yaml") . | sha256sum | trunc 63 }}
|
||||
{{- end }}
|
||||
spec:
|
||||
{{- if .Values.schedulerName }}
|
||||
schedulerName: "{{ .Values.schedulerName }}"
|
||||
{{- end }}
|
||||
securityContext:
|
||||
{{ toYaml .Values.podSecurityContext | indent 8 }}
|
||||
{{- if .Values.sysctl.enabled }}
|
||||
sysctls:
|
||||
- name: vm.max_map_count
|
||||
value: {{ .Values.sysctlVmMaxMapCount | quote }}
|
||||
{{- end }}
|
||||
{{- if .Values.fsGroup }}
|
||||
fsGroup: {{ .Values.fsGroup }} # Deprecated value, please use .Values.podSecurityContext.fsGroup
|
||||
{{- end }}
|
||||
{{- if and .Values.rbac.create (eq .Values.rbac.serviceAccountName "") }}
|
||||
serviceAccountName: "{{ template "opensearch.uname" . }}"
|
||||
automountServiceAccountToken: {{ ne .Values.rbac.automountServiceAccountToken false }}
|
||||
{{- else if and .Values.rbac.create (ne .Values.rbac.serviceAccountName "") }}
|
||||
serviceAccountName: {{ .Values.rbac.serviceAccountName | quote }}
|
||||
automountServiceAccountToken: {{ ne .Values.rbac.automountServiceAccountToken false }}
|
||||
{{- else }}
|
||||
automountServiceAccountToken: {{ ne .Values.rbac.automountServiceAccountToken false }}
|
||||
{{- end }}
|
||||
{{- if .Values.imagePullSecrets }}
|
||||
{{- end }}
|
||||
{{- with .Values.tolerations }}
|
||||
tolerations:
|
||||
{{ toYaml . | indent 6 }}
|
||||
{{- end }}
|
||||
{{- with .Values.nodeSelector }}
|
||||
nodeSelector:
|
||||
{{ toYaml . | indent 8 }}
|
||||
{{- end }}
|
||||
{{- if or (eq .Values.antiAffinity "hard") (eq .Values.antiAffinity "soft") (eq .Values.antiAffinity "custom") .Values.nodeAffinity .Values.podAffinity }}
|
||||
{{- if .Values.priorityClassName }}
|
||||
priorityClassName: {{ .Values.priorityClassName }}
|
||||
{{- end }}
|
||||
affinity:
|
||||
{{- end }}
|
||||
{{- if eq .Values.antiAffinity "hard" }}
|
||||
podAntiAffinity:
|
||||
requiredDuringSchedulingIgnoredDuringExecution:
|
||||
- labelSelector:
|
||||
matchExpressions:
|
||||
- key: app.kubernetes.io/instance
|
||||
operator: In
|
||||
values:
|
||||
- {{ .Release.Name }}
|
||||
- key: app.kubernetes.io/name
|
||||
operator: In
|
||||
values:
|
||||
- {{ include "opensearch.name" . }}
|
||||
topologyKey: {{ .Values.antiAffinityTopologyKey }}
|
||||
{{- else if eq .Values.antiAffinity "soft" }}
|
||||
podAntiAffinity:
|
||||
preferredDuringSchedulingIgnoredDuringExecution:
|
||||
- weight: 1
|
||||
podAffinityTerm:
|
||||
topologyKey: {{ .Values.antiAffinityTopologyKey }}
|
||||
labelSelector:
|
||||
matchExpressions:
|
||||
- key: app.kubernetes.io/instance
|
||||
operator: In
|
||||
values:
|
||||
- {{ .Release.Name }}
|
||||
- key: app.kubernetes.io/name
|
||||
operator: In
|
||||
values:
|
||||
- {{ include "opensearch.name" . }}
|
||||
{{- else if eq .Values.antiAffinity "custom" }}
|
||||
{{- with .Values.customAntiAffinity }}
|
||||
podAntiAffinity:
|
||||
{{ toYaml . | indent 10 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- with .Values.podAffinity }}
|
||||
podAffinity:
|
||||
{{ toYaml . | indent 10 }}
|
||||
{{- end }}
|
||||
{{- with .Values.nodeAffinity }}
|
||||
nodeAffinity:
|
||||
{{ toYaml . | indent 10 }}
|
||||
{{- end }}
|
||||
{{- if .Values.topologySpreadConstraints }}
|
||||
topologySpreadConstraints:
|
||||
{{- toYaml .Values.topologySpreadConstraints | nindent 8 }}
|
||||
{{- end }}
|
||||
terminationGracePeriodSeconds: {{ .Values.terminationGracePeriod }}
|
||||
volumes:
|
||||
{{- if .Values.config }}
|
||||
- name: config
|
||||
configMap:
|
||||
name: {{ template "opensearch.uname" . }}-config
|
||||
- emptyDir: {}
|
||||
name: config-emptydir
|
||||
{{- end }}
|
||||
{{- range .Values.secretMounts }}
|
||||
- name: {{ .name | required "secretMount .name is required" }}
|
||||
secret:
|
||||
secretName: {{ .secretName | required "secretMount .secretName is required" }}
|
||||
{{- if .defaultMode }}
|
||||
defaultMode: {{ .defaultMode }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if and .Values.securityConfig.config.data .Values.securityConfig.config.securityConfigSecret }}
|
||||
{{ fail "Only one of .Values.securityConfig.config.data and .Values.securityConfig.config.securityConfigSecret may be defined. Please see the comment in values.yaml describing usage." }}
|
||||
{{- end }}
|
||||
{{- if .Values.securityConfig.config.data }}
|
||||
- name: security-config-data
|
||||
secret:
|
||||
secretName: {{ include "opensearch.uname" . }}-securityconfig
|
||||
{{- end }}
|
||||
{{- with .Values.securityConfig.config.securityConfigSecret }}
|
||||
- name: security-config-complete
|
||||
secret:
|
||||
secretName: {{ . | quote }}
|
||||
{{- end }}
|
||||
{{- if .Values.securityConfig.actionGroupsSecret }}
|
||||
- name: action-groups
|
||||
secret:
|
||||
secretName: {{ .Values.securityConfig.actionGroupsSecret }}
|
||||
{{- end }}
|
||||
{{- if .Values.securityConfig.configSecret }}
|
||||
- name: security-config
|
||||
secret:
|
||||
secretName: {{ .Values.securityConfig.configSecret }}
|
||||
{{- end }}
|
||||
{{- if .Values.securityConfig.internalUsersSecret }}
|
||||
- name: internal-users-config
|
||||
secret:
|
||||
secretName: {{ .Values.securityConfig.internalUsersSecret }}
|
||||
{{- end }}
|
||||
{{- if .Values.securityConfig.rolesSecret }}
|
||||
- name: roles
|
||||
secret:
|
||||
secretName: {{ .Values.securityConfig.rolesSecret }}
|
||||
{{- end }}
|
||||
{{- if .Values.securityConfig.rolesMappingSecret }}
|
||||
- name: role-mapping
|
||||
secret:
|
||||
secretName: {{ .Values.securityConfig.rolesMappingSecret }}
|
||||
{{- end -}}
|
||||
{{- if .Values.securityConfig.tenantsSecret }}
|
||||
- name: tenants
|
||||
secret:
|
||||
secretName: {{ .Values.securityConfig.tenantsSecret }}
|
||||
{{- end }}
|
||||
{{- if .Values.keystore }}
|
||||
- name: keystore
|
||||
emptyDir: {}
|
||||
{{- range .Values.keystore }}
|
||||
- name: keystore-{{ .secretName }}
|
||||
secret: {{ toYaml . | nindent 12 }}
|
||||
{{- end }}
|
||||
{{ end }}
|
||||
{{- if .Values.extraVolumes }}
|
||||
# Currently some extra blocks accept strings
|
||||
# to continue with backwards compatibility this is being kept
|
||||
# whilst also allowing for yaml to be specified too.
|
||||
{{- if eq "string" (printf "%T" .Values.extraVolumes) }}
|
||||
{{ tpl .Values.extraVolumes . | indent 6 }}
|
||||
{{- else }}
|
||||
{{ toYaml .Values.extraVolumes | indent 6 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if .Values.imagePullSecrets }}
|
||||
imagePullSecrets:
|
||||
{{ toYaml .Values.imagePullSecrets | indent 8 }}
|
||||
{{- end }}
|
||||
enableServiceLinks: {{ .Values.enableServiceLinks }}
|
||||
{{- if .Values.hostAliases }}
|
||||
hostAliases: {{ toYaml .Values.hostAliases | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- if or (.Values.extraInitContainers) (.Values.keystore) (.Values.persistence.enabled) (.Values.sysctlInit.enabled) (.Values.config) }}
|
||||
initContainers:
|
||||
{{- if and .Values.persistence.enabled .Values.persistence.enableInitChown }}
|
||||
- name: fsgroup-volume
|
||||
image: "{{ template "opensearch.dockerRegistry" . }}{{ .Values.persistence.image | default "busybox" }}:{{ .Values.persistence.imageTag | default "latest" }}"
|
||||
imagePullPolicy: "{{ .Values.image.pullPolicy }}"
|
||||
command: ['sh', '-c']
|
||||
args:
|
||||
- 'chown -R 1000:1000 /usr/share/opensearch/data'
|
||||
securityContext:
|
||||
runAsUser: 0
|
||||
resources:
|
||||
{{- toYaml .Values.initResources | nindent 10 }}
|
||||
volumeMounts:
|
||||
- name: "{{ template "opensearch.uname" . }}"
|
||||
mountPath: {{ .Values.opensearchHome }}/data
|
||||
{{- end }}
|
||||
{{- if .Values.sysctlInit.enabled }}
|
||||
- name: sysctl
|
||||
image: "{{ template "opensearch.dockerRegistry" . }}{{ .Values.sysctlInit.image | default "busybox" }}:{{ .Values.sysctlInit.imageTag | default "latest" }}"
|
||||
imagePullPolicy: "{{ .Values.image.pullPolicy }}"
|
||||
command:
|
||||
- sh
|
||||
- -c
|
||||
- |
|
||||
set -xe
|
||||
DESIRED="{{ .Values.sysctlVmMaxMapCount }}"
|
||||
CURRENT=$(sysctl -n vm.max_map_count)
|
||||
if [ "$DESIRED" -gt "$CURRENT" ]; then
|
||||
sysctl -w vm.max_map_count=$DESIRED
|
||||
fi
|
||||
securityContext:
|
||||
runAsUser: 0
|
||||
privileged: true
|
||||
resources:
|
||||
{{- toYaml .Values.initResources | nindent 10 }}
|
||||
{{- end }}
|
||||
{{- if .Values.config }}
|
||||
- name: configfile
|
||||
image: "{{ template "opensearch.dockerRegistry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag | default .Chart.AppVersion }}"
|
||||
imagePullPolicy: "{{ .Values.image.pullPolicy }}"
|
||||
command:
|
||||
- sh
|
||||
- -c
|
||||
- |
|
||||
#!/usr/bin/env bash
|
||||
cp -r /tmp/configfolder/* /tmp/config/
|
||||
resources:
|
||||
{{- toYaml .Values.initResources | nindent 10 }}
|
||||
volumeMounts:
|
||||
- mountPath: /tmp/config/
|
||||
name: config-emptydir
|
||||
{{- range $path, $config := .Values.config }}
|
||||
- name: config
|
||||
mountPath: /tmp/configfolder/{{ $path }}
|
||||
subPath: {{ $path }}
|
||||
{{- end -}}
|
||||
{{- end }}
|
||||
{{- if .Values.keystore }}
|
||||
- name: keystore
|
||||
image: "{{ template "opensearch.dockerRegistry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag | default .Chart.AppVersion }}"
|
||||
imagePullPolicy: "{{ .Values.image.pullPolicy }}"
|
||||
command:
|
||||
- sh
|
||||
- -c
|
||||
- |
|
||||
#!/usr/bin/env bash
|
||||
set -euo pipefail
|
||||
|
||||
{{ .Values.opensearchHome }}/bin/opensearch-keystore create
|
||||
|
||||
for i in /tmp/keystoreSecrets/*/*; do
|
||||
[ -f "$i" ] || continue
|
||||
key=$(basename $i)
|
||||
echo "Adding file $i to keystore key $key"
|
||||
{{ .Values.opensearchHome }}/bin/opensearch-keystore add-file "$key" "$i"
|
||||
done
|
||||
|
||||
# Add the bootstrap password since otherwise the opensearch entrypoint tries to do this on startup
|
||||
if [ ! -z ${PASSWORD+x} ]; then
|
||||
echo 'Adding env $PASSWORD to keystore as key bootstrap.password'
|
||||
echo "$PASSWORD" | {{ .Values.opensearchHome }}/bin/opensearch-keystore add -x bootstrap.password
|
||||
fi
|
||||
|
||||
cp -a {{ .Values.opensearchHome }}/config/opensearch.keystore /tmp/keystore/
|
||||
env: {{ toYaml .Values.extraEnvs | nindent 10 }}
|
||||
envFrom: {{ toYaml .Values.envFrom | nindent 10 }}
|
||||
resources:
|
||||
{{- toYaml .Values.initResources | nindent 10 }}
|
||||
volumeMounts:
|
||||
- name: keystore
|
||||
mountPath: /tmp/keystore
|
||||
{{- range .Values.keystore }}
|
||||
- name: keystore-{{ .secretName }}
|
||||
mountPath: /tmp/keystoreSecrets/{{ .secretName }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if .Values.extraInitContainers }}
|
||||
# Currently some extra blocks accept strings
|
||||
# to continue with backwards compatibility this is being kept
|
||||
# whilst also allowing for yaml to be specified too.
|
||||
{{- if eq "string" (printf "%T" .Values.extraInitContainers) }}
|
||||
{{ tpl .Values.extraInitContainers . | indent 6 }}
|
||||
{{- else }}
|
||||
{{ toYaml .Values.extraInitContainers | indent 6 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
containers:
|
||||
- name: "{{ template "opensearch.name" . }}"
|
||||
securityContext:
|
||||
{{ toYaml .Values.securityContext | indent 10 }}
|
||||
{{- if .Values.plugins.enabled }}
|
||||
command:
|
||||
- sh
|
||||
- -c
|
||||
- |
|
||||
#!/usr/bin/env bash
|
||||
set -euo pipefail
|
||||
|
||||
{{- range $plugin := .Values.plugins.installList }}
|
||||
./bin/opensearch-plugin install -b {{ $plugin }}
|
||||
{{- end }}
|
||||
|
||||
bash opensearch-docker-entrypoint.sh
|
||||
{{- end }}
|
||||
|
||||
image: "{{ template "opensearch.dockerRegistry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag | default .Chart.AppVersion }}"
|
||||
imagePullPolicy: "{{ .Values.image.pullPolicy }}"
|
||||
readinessProbe:
|
||||
{{ toYaml .Values.readinessProbe | indent 10 }}
|
||||
{{- if .Values.livenessProbe }}
|
||||
livenessProbe:
|
||||
{{ toYaml .Values.livenessProbe | indent 10 }}
|
||||
{{- end }}
|
||||
{{- if semverCompare ">=1.16-0" .Capabilities.KubeVersion.Version }}
|
||||
startupProbe:
|
||||
{{ toYaml .Values.startupProbe | indent 10 }}
|
||||
{{- end }}
|
||||
ports:
|
||||
- name: http
|
||||
containerPort: {{ .Values.httpPort }}
|
||||
{{- if .Values.httpHostPort }}
|
||||
hostPort: {{ .Values.httpHostPort }}
|
||||
{{- end }}
|
||||
- name: transport
|
||||
containerPort: {{ .Values.transportPort }}
|
||||
{{- if .Values.transportHostPort }}
|
||||
hostPort: {{ .Values.transportHostPort }}
|
||||
{{- end }}
|
||||
- name: metrics
|
||||
containerPort: {{ .Values.metricsPort }}
|
||||
resources:
|
||||
{{- toYaml .Values.resources | nindent 10 }}
|
||||
env:
|
||||
- name: node.name
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: metadata.name
|
||||
{{- if (and (has "master" .Values.roles) (not .Values.singleNode)) }}
|
||||
- name: cluster.initial_master_nodes
|
||||
value: "{{ template "opensearch.endpoints" . }}"
|
||||
{{- end }}
|
||||
- name: discovery.seed_hosts
|
||||
value: "{{ template "opensearch.masterService" . }}-headless"
|
||||
- name: cluster.name
|
||||
value: "{{ .Values.clusterName }}"
|
||||
- name: network.host
|
||||
value: "{{ .Values.networkHost }}"
|
||||
- name: OPENSEARCH_JAVA_OPTS
|
||||
value: "{{ .Values.opensearchJavaOpts }}"
|
||||
- name: node.roles
|
||||
value: "{{ template "opensearch.roles" . }}"
|
||||
{{- if .Values.singleNode }}
|
||||
- name: discovery.type
|
||||
value: "single-node"
|
||||
{{- end }}
|
||||
{{- if .Values.extraEnvs }}
|
||||
{{ toYaml .Values.extraEnvs | indent 8 }}
|
||||
{{- end }}
|
||||
{{- if .Values.envFrom }}
|
||||
envFrom:
|
||||
{{ toYaml .Values.envFrom | indent 8 }}
|
||||
{{- end }}
|
||||
{{- if .Values.opensearchLifecycle }}
|
||||
lifecycle:
|
||||
{{ toYaml .Values.opensearchLifecycle | indent 10 }}
|
||||
{{- end }}
|
||||
volumeMounts:
|
||||
{{- if .Values.persistence.enabled }}
|
||||
- name: "{{ template "opensearch.uname" . }}"
|
||||
mountPath: {{ .Values.opensearchHome }}/data
|
||||
{{- end }}
|
||||
{{- if .Values.keystore }}
|
||||
- name: keystore
|
||||
mountPath: {{ .Values.opensearchHome }}/config/opensearch.keystore
|
||||
subPath: opensearch.keystore
|
||||
{{- end }}
|
||||
{{- if .Values.securityConfig.enabled }}
|
||||
{{- if .Values.securityConfig.actionGroupsSecret }}
|
||||
- mountPath: {{ .Values.securityConfig.path }}/action_groups.yml
|
||||
name: action-groups
|
||||
subPath: action_groups.yml
|
||||
{{- end }}
|
||||
{{- if .Values.securityConfig.configSecret }}
|
||||
- mountPath: {{ .Values.securityConfig.path }}/config.yml
|
||||
name: security-config
|
||||
subPath: config.yml
|
||||
{{- end }}
|
||||
{{- if .Values.securityConfig.internalUsersSecret }}
|
||||
- mountPath: {{ .Values.securityConfig.path }}/internal_users.yml
|
||||
name: internal-users-config
|
||||
subPath: internal_users.yml
|
||||
{{- end }}
|
||||
{{- if .Values.securityConfig.rolesSecret }}
|
||||
- mountPath: {{ .Values.securityConfig.path }}/roles.yml
|
||||
name: roles
|
||||
subPath: roles.yml
|
||||
{{- end }}
|
||||
{{- if .Values.securityConfig.rolesMappingSecret }}
|
||||
- mountPath: {{ .Values.securityConfig.path }}/roles_mapping.yml
|
||||
name: role-mapping
|
||||
subPath: roles_mapping.yml
|
||||
{{- end }}
|
||||
{{- if .Values.securityConfig.tenantsSecret }}
|
||||
- mountPath: {{ .Values.securityConfig.path }}/tenants.yml
|
||||
name: tenants
|
||||
subPath: tenants.yml
|
||||
{{- end }}
|
||||
{{- if .Values.securityConfig.config.data }}
|
||||
{{- if .Values.securityConfig.config.dataComplete }}
|
||||
- mountPath: {{ .Values.securityConfig.path }}
|
||||
name: security-config-data
|
||||
{{- else }}
|
||||
{{- range $key, $_ := .Values.securityConfig.config.data }}
|
||||
- mountPath: {{ $.Values.securityConfig.path }}/{{ $key }}
|
||||
name: security-config-data
|
||||
subPath: {{ $key }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- else if .Values.securityConfig.config.securityConfigSecret }}
|
||||
- mountPath: {{ .Values.securityConfig.path }}
|
||||
name: security-config-complete
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- range .Values.secretMounts }}
|
||||
- name: {{ .name | required "secretMount .name is required" }}
|
||||
mountPath: {{ .path | required "secretMount .path is required" }}
|
||||
{{- if .subPath }}
|
||||
subPath: {{ .subPath }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- range $path, $config := .Values.config }}
|
||||
- name: config-emptydir
|
||||
mountPath: {{ $.Values.opensearchHome }}/config/{{ $path }}
|
||||
subPath: {{ $path }}
|
||||
{{- end -}}
|
||||
{{- if .Values.extraVolumeMounts }}
|
||||
# Currently some extra blocks accept strings
|
||||
# to continue with backwards compatibility this is being kept
|
||||
# whilst also allowing for yaml to be specified too.
|
||||
{{- if eq "string" (printf "%T" .Values.extraVolumeMounts) }}
|
||||
{{ tpl .Values.extraVolumeMounts . | indent 8 }}
|
||||
{{- else }}
|
||||
{{ toYaml .Values.extraVolumeMounts | indent 8 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if .Values.masterTerminationFix }}
|
||||
{{- if has "master" .Values.roles }}
|
||||
# This sidecar will prevent slow master re-election
|
||||
- name: opensearch-master-graceful-termination-handler
|
||||
image: "{{ template "opensearch.dockerRegistry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag | default .Chart.AppVersion }}"
|
||||
imagePullPolicy: "{{ .Values.image.pullPolicy }}"
|
||||
command:
|
||||
- "sh"
|
||||
- -c
|
||||
- |
|
||||
#!/usr/bin/env bash
|
||||
set -eo pipefail
|
||||
|
||||
http () {
|
||||
local path="${1}"
|
||||
if [ -n "${USERNAME}" ] && [ -n "${PASSWORD}" ]; then
|
||||
BASIC_AUTH="-u ${USERNAME}:${PASSWORD}"
|
||||
else
|
||||
BASIC_AUTH=''
|
||||
fi
|
||||
curl -XGET -s -k --fail ${BASIC_AUTH} {{ .Values.protocol }}://{{ template "opensearch.masterService" . }}:{{ .Values.httpPort }}${path}
|
||||
}
|
||||
|
||||
cleanup () {
|
||||
while true ; do
|
||||
local master="$(http "/_cat/master?h=node" || echo "")"
|
||||
if [[ $master == "{{ template "opensearch.masterService" . }}"* && $master != "${NODE_NAME}" ]]; then
|
||||
echo "This node is not master."
|
||||
break
|
||||
fi
|
||||
echo "This node is still master, waiting gracefully for it to step down"
|
||||
sleep 1
|
||||
done
|
||||
|
||||
exit 0
|
||||
}
|
||||
|
||||
trap cleanup SIGTERM
|
||||
|
||||
sleep infinity &
|
||||
wait $!
|
||||
resources:
|
||||
{{- toYaml .Values.sidecarResources | nindent 10 }}
|
||||
env:
|
||||
- name: NODE_NAME
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: metadata.name
|
||||
{{- if .Values.extraEnvs }}
|
||||
{{ toYaml .Values.extraEnvs | indent 8 }}
|
||||
{{- end }}
|
||||
{{- if .Values.envFrom }}
|
||||
envFrom:
|
||||
{{ toYaml .Values.envFrom | indent 8 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if .Values.lifecycle }}
|
||||
lifecycle:
|
||||
{{ toYaml .Values.lifecycle | indent 10 }}
|
||||
{{- end }}
|
||||
{{- if .Values.extraContainers }}
|
||||
# Currently some extra blocks accept strings
|
||||
# to continue with backwards compatibility this is being kept
|
||||
# whilst also allowing for yaml to be specified too.
|
||||
{{- if eq "string" (printf "%T" .Values.extraContainers) }}
|
||||
{{ tpl .Values.extraContainers . | indent 6 }}
|
||||
{{- else }}
|
||||
{{ toYaml .Values.extraContainers | indent 6 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
531
opensearch/values.yaml
Normal file
531
opensearch/values.yaml
Normal file
@ -0,0 +1,531 @@
|
||||
---
|
||||
clusterName: "opensearch-cluster"
|
||||
nodeGroup: "master"
|
||||
|
||||
# If discovery.type in the opensearch configuration is set to "single-node",
|
||||
# this should be set to "true"
|
||||
# If "true", replicas will be forced to 1
|
||||
singleNode: false
|
||||
|
||||
# The service that non master groups will try to connect to when joining the cluster
|
||||
# This should be set to clusterName + "-" + nodeGroup for your master group
|
||||
masterService: "opensearch-cluster-master"
|
||||
|
||||
# OpenSearch roles that will be applied to this nodeGroup
|
||||
# These will be set as environment variable "node.roles". E.g. node.roles=master,ingest,data,remote_cluster_client
|
||||
roles:
|
||||
- master
|
||||
- ingest
|
||||
- data
|
||||
- remote_cluster_client
|
||||
|
||||
replicas: 3
|
||||
|
||||
# if not set, falls back to parsing .Values.imageTag, then .Chart.appVersion.
|
||||
majorVersion: ""
|
||||
|
||||
global:
|
||||
# Set if you want to change the default docker registry, e.g. a private one.
|
||||
dockerRegistry: ""
|
||||
|
||||
# Allows you to add any config files in {{ .Values.opensearchHome }}/config
|
||||
opensearchHome: /usr/share/opensearch
|
||||
|
||||
# such as opensearch.yml and log4j2.properties
|
||||
config:
|
||||
# Values must be YAML literal style scalar / YAML multiline string.
|
||||
# <filename>: |
|
||||
# <formatted-value(s)>
|
||||
# log4j2.properties: |
|
||||
# status = error
|
||||
#
|
||||
# appender.console.type = Console
|
||||
# appender.console.name = console
|
||||
# appender.console.layout.type = PatternLayout
|
||||
# appender.console.layout.pattern = [%d{ISO8601}][%-5p][%-25c{1.}] [%node_name]%marker %m%n
|
||||
#
|
||||
# rootLogger.level = info
|
||||
# rootLogger.appenderRef.console.ref = console
|
||||
opensearch.yml: |
|
||||
cluster.name: opensearch-cluster
|
||||
|
||||
# Bind to all interfaces because we don't know what IP address Docker will assign to us.
|
||||
network.host: 0.0.0.0
|
||||
|
||||
# Setting network.host to a non-loopback address enables the annoying bootstrap checks. "Single-node" mode disables them again.
|
||||
# Implicitly done if ".singleNode" is set to "true".
|
||||
# discovery.type: single-node
|
||||
|
||||
# Start OpenSearch Security Demo Configuration
|
||||
# WARNING: revise all the lines below before you go into production
|
||||
plugins:
|
||||
security:
|
||||
ssl:
|
||||
transport:
|
||||
pemcert_filepath: esnode.pem
|
||||
pemkey_filepath: esnode-key.pem
|
||||
pemtrustedcas_filepath: root-ca.pem
|
||||
enforce_hostname_verification: false
|
||||
http:
|
||||
enabled: true
|
||||
pemcert_filepath: esnode.pem
|
||||
pemkey_filepath: esnode-key.pem
|
||||
pemtrustedcas_filepath: root-ca.pem
|
||||
allow_unsafe_democertificates: true
|
||||
allow_default_init_securityindex: true
|
||||
authcz:
|
||||
admin_dn:
|
||||
- CN=kirk,OU=client,O=client,L=test,C=de
|
||||
audit.type: internal_opensearch
|
||||
enable_snapshot_restore_privilege: true
|
||||
check_snapshot_restore_write_privileges: true
|
||||
restapi:
|
||||
roles_enabled: ["all_access", "security_rest_api_access"]
|
||||
system_indices:
|
||||
enabled: true
|
||||
indices:
|
||||
[
|
||||
".opendistro-alerting-config",
|
||||
".opendistro-alerting-alert*",
|
||||
".opendistro-anomaly-results*",
|
||||
".opendistro-anomaly-detector*",
|
||||
".opendistro-anomaly-checkpoints",
|
||||
".opendistro-anomaly-detection-state",
|
||||
".opendistro-reports-*",
|
||||
".opendistro-notifications-*",
|
||||
".opendistro-notebooks",
|
||||
".opendistro-asynchronous-search-response*",
|
||||
]
|
||||
######## End OpenSearch Security Demo Configuration ########
|
||||
# log4j2.properties:
|
||||
|
||||
# Extra environment variables to append to this nodeGroup
|
||||
# This will be appended to the current 'env:' key. You can use any of the kubernetes env
|
||||
# syntax here
|
||||
extraEnvs: []
|
||||
# - name: MY_ENVIRONMENT_VAR
|
||||
# value: the_value_goes_here
|
||||
# Chart version 2.18.0 and App Version OpenSearch 2.12.0 onwards a custom strong password needs to be provided in order to setup demo admin user.
|
||||
# Cluster will not spin-up without this unless demo config install is disabled.
|
||||
# - name: OPENSEARCH_INITIAL_ADMIN_PASSWORD
|
||||
# value: <strong-password>
|
||||
|
||||
# Allows you to load environment variables from kubernetes secret or config map
|
||||
envFrom: []
|
||||
# - secretRef:
|
||||
# name: env-secret
|
||||
# - configMapRef:
|
||||
# name: config-map
|
||||
|
||||
# A list of secrets and their paths to mount inside the pod
|
||||
# This is useful for mounting certificates for security and for mounting
|
||||
# the X-Pack license
|
||||
secretMounts: []
|
||||
|
||||
hostAliases: []
|
||||
# - ip: "127.0.0.1"
|
||||
# hostnames:
|
||||
# - "foo.local"
|
||||
# - "bar.local"
|
||||
|
||||
image:
|
||||
repository: "opensearchproject/opensearch"
|
||||
# override image tag, which is .Chart.AppVersion by default
|
||||
tag: ""
|
||||
pullPolicy: "IfNotPresent"
|
||||
|
||||
podAnnotations: {}
|
||||
# iam.amazonaws.com/role: es-cluster
|
||||
|
||||
# OpenSearch Statefulset annotations
|
||||
openSearchAnnotations: {}
|
||||
|
||||
# additionals labels
|
||||
labels: {}
|
||||
|
||||
opensearchJavaOpts: "-Xmx512M -Xms512M"
|
||||
|
||||
resources:
|
||||
requests:
|
||||
cpu: "1000m"
|
||||
memory: "100Mi"
|
||||
|
||||
initResources: {}
|
||||
# limits:
|
||||
# cpu: "25m"
|
||||
# memory: "128Mi"
|
||||
# requests:
|
||||
# cpu: "25m"
|
||||
# memory: "128Mi"
|
||||
|
||||
sidecarResources: {}
|
||||
# limits:
|
||||
# cpu: "25m"
|
||||
# memory: "128Mi"
|
||||
# requests:
|
||||
# cpu: "25m"
|
||||
# memory: "128Mi"
|
||||
|
||||
networkHost: "0.0.0.0"
|
||||
|
||||
rbac:
|
||||
create: false
|
||||
serviceAccountAnnotations: {}
|
||||
serviceAccountName: ""
|
||||
# Controls whether or not the Service Account token is automatically mounted to /var/run/secrets/kubernetes.io/serviceaccount
|
||||
automountServiceAccountToken: false
|
||||
|
||||
podSecurityPolicy:
|
||||
create: false
|
||||
name: ""
|
||||
spec:
|
||||
privileged: true
|
||||
fsGroup:
|
||||
rule: RunAsAny
|
||||
runAsUser:
|
||||
rule: RunAsAny
|
||||
seLinux:
|
||||
rule: RunAsAny
|
||||
supplementalGroups:
|
||||
rule: RunAsAny
|
||||
volumes:
|
||||
- secret
|
||||
- configMap
|
||||
- persistentVolumeClaim
|
||||
- emptyDir
|
||||
|
||||
persistence:
|
||||
enabled: true
|
||||
# Set to false to disable the `fsgroup-volume` initContainer that will update permissions on the persistent disk.
|
||||
enableInitChown: true
|
||||
# override image, which is busybox by default
|
||||
# image: busybox
|
||||
# override image tag, which is latest by default
|
||||
# imageTag:
|
||||
labels:
|
||||
# Add default labels for the volumeClaimTemplate of the StatefulSet
|
||||
enabled: false
|
||||
# OpenSearch Persistent Volume Storage Class
|
||||
# If defined, storageClassName: <storageClass>
|
||||
# If set to "-", storageClassName: "", which disables dynamic provisioning
|
||||
# If undefined (the default) or set to null, no storageClassName spec is
|
||||
# set, choosing the default provisioner. (gp2 on AWS, standard on
|
||||
# GKE, AWS & OpenStack)
|
||||
#
|
||||
# storageClass: "-"
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
size: 8Gi
|
||||
annotations: {}
|
||||
|
||||
extraVolumes: []
|
||||
# - name: extras
|
||||
# emptyDir: {}
|
||||
|
||||
extraVolumeMounts: []
|
||||
# - name: extras
|
||||
# mountPath: /usr/share/extras
|
||||
# readOnly: true
|
||||
|
||||
extraContainers: []
|
||||
# - name: do-something
|
||||
# image: busybox
|
||||
# command: ['do', 'something']
|
||||
|
||||
extraInitContainers: []
|
||||
# - name: do-somethings
|
||||
# image: busybox
|
||||
# command: ['do', 'something']
|
||||
|
||||
# This is the PriorityClass settings as defined in
|
||||
# https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass
|
||||
priorityClassName: ""
|
||||
|
||||
# By default this will make sure two pods don't end up on the same node
|
||||
# Changing this to a region would allow you to spread pods across regions
|
||||
antiAffinityTopologyKey: "kubernetes.io/hostname"
|
||||
|
||||
# Hard means that by default pods will only be scheduled if there are enough nodes for them
|
||||
# and that they will never end up on the same node. Setting this to soft will do this "best effort".
|
||||
# Setting this to custom will use what is passed into customAntiAffinity.
|
||||
antiAffinity: "soft"
|
||||
|
||||
# Allows passing in custom anti-affinity settings as defined in
|
||||
# https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#types-of-inter-pod-affinity-and-anti-affinity
|
||||
# Using this parameter requires setting antiAffinity to custom.
|
||||
customAntiAffinity: {}
|
||||
|
||||
# This is the node affinity settings as defined in
|
||||
# https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#node-affinity-beta-feature
|
||||
nodeAffinity: {}
|
||||
|
||||
# This is the pod affinity settings as defined in
|
||||
# https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#types-of-inter-pod-affinity-and-anti-affinity
|
||||
podAffinity: {}
|
||||
|
||||
# This is the pod topology spread constraints
|
||||
# https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
|
||||
topologySpreadConstraints: []
|
||||
|
||||
# The default is to deploy all pods serially. By setting this to parallel all pods are started at
|
||||
# the same time when bootstrapping the cluster
|
||||
podManagementPolicy: "Parallel"
|
||||
|
||||
# The environment variables injected by service links are not used, but can lead to slow OpenSearch boot times when
|
||||
# there are many services in the current namespace.
|
||||
# If you experience slow pod startups you probably want to set this to `false`.
|
||||
enableServiceLinks: true
|
||||
|
||||
protocol: https
|
||||
httpPort: 9200
|
||||
transportPort: 9300
|
||||
metricsPort: 9600
|
||||
httpHostPort: ""
|
||||
transportHostPort: ""
|
||||
|
||||
|
||||
service:
|
||||
labels: {}
|
||||
labelsHeadless: {}
|
||||
headless:
|
||||
annotations: {}
|
||||
type: ClusterIP
|
||||
# The IP family and IP families options are to set the behaviour in a dual-stack environment
|
||||
# Omitting these values will let the service fall back to whatever the CNI dictates the defaults
|
||||
# should be
|
||||
#
|
||||
# ipFamilyPolicy: SingleStack
|
||||
# ipFamilies:
|
||||
# - IPv4
|
||||
nodePort: ""
|
||||
annotations: {}
|
||||
httpPortName: http
|
||||
transportPortName: transport
|
||||
metricsPortName: metrics
|
||||
loadBalancerIP: ""
|
||||
loadBalancerSourceRanges: []
|
||||
externalTrafficPolicy: ""
|
||||
|
||||
updateStrategy: RollingUpdate
|
||||
|
||||
# This is the max unavailable setting for the pod disruption budget
|
||||
# The default value of 1 will make sure that kubernetes won't allow more than 1
|
||||
# of your pods to be unavailable during maintenance
|
||||
maxUnavailable: 1
|
||||
|
||||
podSecurityContext:
|
||||
fsGroup: 1000
|
||||
runAsUser: 1000
|
||||
|
||||
securityContext:
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
# readOnlyRootFilesystem: true
|
||||
runAsNonRoot: true
|
||||
runAsUser: 1000
|
||||
|
||||
securityConfig:
|
||||
enabled: true
|
||||
path: "/usr/share/opensearch/config/opensearch-security"
|
||||
actionGroupsSecret:
|
||||
configSecret:
|
||||
internalUsersSecret:
|
||||
rolesSecret:
|
||||
rolesMappingSecret:
|
||||
tenantsSecret:
|
||||
# The following option simplifies securityConfig by using a single secret and
|
||||
# specifying the config files as keys in the secret instead of creating
|
||||
# different secrets for for each config file.
|
||||
# Note that this is an alternative to the individual secret configuration
|
||||
# above and shouldn't be used if the above secrets are used.
|
||||
config:
|
||||
# There are multiple ways to define the configuration here:
|
||||
# * If you define anything under data, the chart will automatically create
|
||||
# a secret and mount it. This is best option to choose if you want to override all the
|
||||
# existing yml files at once.
|
||||
# * If you define securityConfigSecret, the chart will assume this secret is
|
||||
# created externally and mount it. This is best option to choose if your intention is to
|
||||
# only update a single yml file.
|
||||
# * It is an error to define both data and securityConfigSecret.
|
||||
securityConfigSecret: ""
|
||||
dataComplete: true
|
||||
data: {}
|
||||
# config.yml: |-
|
||||
# internal_users.yml: |-
|
||||
# roles.yml: |-
|
||||
# roles_mapping.yml: |-
|
||||
# action_groups.yml: |-
|
||||
# tenants.yml: |-
|
||||
|
||||
# How long to wait for opensearch to stop gracefully
|
||||
terminationGracePeriod: 120
|
||||
|
||||
sysctlVmMaxMapCount: 262144
|
||||
|
||||
startupProbe:
|
||||
tcpSocket:
|
||||
port: 9200
|
||||
initialDelaySeconds: 5
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 3
|
||||
failureThreshold: 30
|
||||
|
||||
livenessProbe: {}
|
||||
# periodSeconds: 20
|
||||
# timeoutSeconds: 5
|
||||
# failureThreshold: 10
|
||||
# successThreshold: 1
|
||||
# initialDelaySeconds: 10
|
||||
# tcpSocket:
|
||||
# port: 9200
|
||||
|
||||
readinessProbe:
|
||||
tcpSocket:
|
||||
port: 9200
|
||||
periodSeconds: 5
|
||||
timeoutSeconds: 3
|
||||
failureThreshold: 3
|
||||
|
||||
## Use an alternate scheduler.
|
||||
## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
|
||||
##
|
||||
schedulerName: ""
|
||||
|
||||
imagePullSecrets: []
|
||||
nodeSelector: {}
|
||||
tolerations: []
|
||||
|
||||
# Enabling this will publically expose your OpenSearch instance.
|
||||
# Only enable this if you have security enabled on your cluster
|
||||
ingress:
|
||||
enabled: false
|
||||
# For Kubernetes >= 1.18 you should specify the ingress-controller via the field ingressClassName
|
||||
# See https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/#specifying-the-class-of-an-ingress
|
||||
# ingressClassName: nginx
|
||||
|
||||
annotations: {}
|
||||
# kubernetes.io/ingress.class: nginx
|
||||
# kubernetes.io/tls-acme: "true"
|
||||
ingressLabels: {}
|
||||
path: /
|
||||
hosts:
|
||||
- chart-example.local
|
||||
tls: []
|
||||
# - secretName: chart-example-tls
|
||||
# hosts:
|
||||
# - chart-example.local
|
||||
|
||||
nameOverride: ""
|
||||
fullnameOverride: ""
|
||||
|
||||
masterTerminationFix: false
|
||||
|
||||
opensearchLifecycle: {}
|
||||
# preStop:
|
||||
# exec:
|
||||
# command: ["/bin/sh", "-c", "echo Hello from the preStart handler > /usr/share/message"]
|
||||
# postStart:
|
||||
# exec:
|
||||
# command: ["/bin/sh", "-c", "echo Hello from the postStart handler > /usr/share/message"]
|
||||
|
||||
lifecycle: {}
|
||||
# preStop:
|
||||
# exec:
|
||||
# command: ["/bin/sh", "-c", "echo Hello from the postStart handler > /usr/share/message"]
|
||||
# postStart:
|
||||
# exec:
|
||||
# command:
|
||||
# - bash
|
||||
# - -c
|
||||
# - |
|
||||
# #!/bin/bash
|
||||
# # Add a template to adjust number of shards/replicas1
|
||||
# TEMPLATE_NAME=my_template
|
||||
# INDEX_PATTERN="logstash-*"
|
||||
# SHARD_COUNT=8
|
||||
# REPLICA_COUNT=1
|
||||
# ES_URL=http://localhost:9200
|
||||
# while [[ "$(curl -s -o /dev/null -w '%{http_code}\n' $ES_URL)" != "200" ]]; do sleep 1; done
|
||||
# curl -XPUT "$ES_URL/_template/$TEMPLATE_NAME" -H 'Content-Type: application/json' -d'{"index_patterns":['\""$INDEX_PATTERN"\"'],"settings":{"number_of_shards":'$SHARD_COUNT',"number_of_replicas":'$REPLICA_COUNT'}}'
|
||||
|
||||
keystore: []
|
||||
# To add secrets to the keystore:
|
||||
# - secretName: opensearch-encryption-key
|
||||
|
||||
networkPolicy:
|
||||
create: false
|
||||
## Enable creation of NetworkPolicy resources. Only Ingress traffic is filtered for now.
|
||||
## In order for a Pod to access OpenSearch, it needs to have the following label:
|
||||
## {{ template "uname" . }}-client: "true"
|
||||
## Example for default configuration to access HTTP port:
|
||||
## opensearch-master-http-client: "true"
|
||||
## Example for default configuration to access transport port:
|
||||
## opensearch-master-transport-client: "true"
|
||||
|
||||
http:
|
||||
enabled: false
|
||||
|
||||
# Deprecated
|
||||
# please use the above podSecurityContext.fsGroup instead
|
||||
fsGroup: ""
|
||||
|
||||
## Set optimal sysctl's through securityContext. This requires privilege. Can be disabled if
|
||||
## the system has already been preconfigured. (Ex: https://www.elastic.co/guide/en/elasticsearch/reference/current/vm-max-map-count.html)
|
||||
## Also see: https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/
|
||||
sysctl:
|
||||
enabled: false
|
||||
|
||||
## Set optimal sysctl's through privileged initContainer.
|
||||
sysctlInit:
|
||||
enabled: false
|
||||
# override image, which is busybox by default
|
||||
# image: busybox
|
||||
# override image tag, which is latest by default
|
||||
# imageTag:
|
||||
|
||||
## Enable to add 3rd Party / Custom plugins not offered in the default OpenSearch image.
|
||||
plugins:
|
||||
enabled: false
|
||||
installList: []
|
||||
# - example-fake-plugin
|
||||
|
||||
# -- Array of extra K8s manifests to deploy
|
||||
extraObjects: []
|
||||
# - apiVersion: secrets-store.csi.x-k8s.io/v1
|
||||
# kind: SecretProviderClass
|
||||
# metadata:
|
||||
# name: argocd-secrets-store
|
||||
# spec:
|
||||
# provider: aws
|
||||
# parameters:
|
||||
# objects: |
|
||||
# - objectName: "argocd"
|
||||
# objectType: "secretsmanager"
|
||||
# jmesPath:
|
||||
# - path: "client_id"
|
||||
# objectAlias: "client_id"
|
||||
# - path: "client_secret"
|
||||
# objectAlias: "client_secret"
|
||||
# secretObjects:
|
||||
# - data:
|
||||
# - key: client_id
|
||||
# objectName: client_id
|
||||
# - key: client_secret
|
||||
# objectName: client_secret
|
||||
# secretName: argocd-secrets-store
|
||||
# type: Opaque
|
||||
# labels:
|
||||
# app.kubernetes.io/part-of: argocd
|
||||
# - |
|
||||
# apiVersion: policy/v1
|
||||
# kind: PodDisruptionBudget
|
||||
# metadata:
|
||||
# name: {{ template "opensearch.uname" . }}
|
||||
# labels:
|
||||
# {{- include "opensearch.labels" . | nindent 4 }}
|
||||
# spec:
|
||||
# minAvailable: 1
|
||||
# selector:
|
||||
# matchLabels:
|
||||
# {{- include "opensearch.selectorLabels" . | nindent 6 }}
|
||||
Loading…
Reference in New Issue
Block a user