318 lines
13 KiB
YAML
318 lines
13 KiB
YAML
|
{{- if .Values.replication.enabled }}
|
||
|
apiVersion: {{ template "mariadb.statefulset.apiVersion" . }}
|
||
|
kind: StatefulSet
|
||
|
metadata:
|
||
|
name: {{ template "slave.fullname" . }}
|
||
|
namespace: {{ .Release.Namespace }}
|
||
|
labels:
|
||
|
app: {{ template "mariadb.name" . }}
|
||
|
chart: {{ template "mariadb.chart" . }}
|
||
|
release: {{ .Release.Name }}
|
||
|
heritage: {{ .Release.Service }}
|
||
|
component: slave
|
||
|
{{- include "mariadb.podLabels" . | nindent 4 }}
|
||
|
spec:
|
||
|
selector:
|
||
|
matchLabels:
|
||
|
app: {{ template "mariadb.name" . }}
|
||
|
release: {{ .Release.Name }}
|
||
|
component: slave
|
||
|
serviceName: {{ template "slave.fullname" . }}
|
||
|
replicas: {{ .Values.slave.replicas }}
|
||
|
updateStrategy:
|
||
|
type: {{ .Values.slave.updateStrategy.type }}
|
||
|
{{- if (eq "Recreate" .Values.slave.updateStrategy.type) }}
|
||
|
rollingUpdate: null
|
||
|
{{- end }}
|
||
|
template:
|
||
|
metadata:
|
||
|
{{- if .Values.slave.annotations }}
|
||
|
annotations: {{- include "mariadb.tplValue" (dict "value" .Values.slave.annotations "context" $) | nindent 8 }}
|
||
|
{{- end }}
|
||
|
labels:
|
||
|
app: {{ template "mariadb.name" . }}
|
||
|
chart: {{ template "mariadb.chart" . }}
|
||
|
release: {{ .Release.Name }}
|
||
|
heritage: {{ .Release.Service }}
|
||
|
component: slave
|
||
|
{{- include "mariadb.podLabels" . | nindent 8 }}
|
||
|
spec:
|
||
|
{{- if .Values.schedulerName }}
|
||
|
schedulerName: {{ .Values.schedulerName | quote }}
|
||
|
{{- end }}
|
||
|
serviceAccountName: {{ template "mariadb.serviceAccountName" . }}
|
||
|
{{- if .Values.securityContext.enabled }}
|
||
|
securityContext:
|
||
|
fsGroup: {{ .Values.securityContext.fsGroup }}
|
||
|
runAsUser: {{ .Values.securityContext.runAsUser }}
|
||
|
{{- end }}
|
||
|
{{- if eq .Values.slave.antiAffinity "hard" }}
|
||
|
affinity:
|
||
|
{{- with .Values.slave.affinity }}
|
||
|
{{ toYaml . | indent 8 }}
|
||
|
{{- end }}
|
||
|
podAntiAffinity:
|
||
|
requiredDuringSchedulingIgnoredDuringExecution:
|
||
|
- topologyKey: "kubernetes.io/hostname"
|
||
|
labelSelector:
|
||
|
matchLabels:
|
||
|
app: {{ template "mariadb.name" . }}
|
||
|
release: {{ .Release.Name }}
|
||
|
{{- else if eq .Values.slave.antiAffinity "soft" }}
|
||
|
affinity:
|
||
|
{{- with .Values.slave.affinity }}
|
||
|
{{ toYaml . | indent 8 }}
|
||
|
{{- end }}
|
||
|
podAntiAffinity:
|
||
|
preferredDuringSchedulingIgnoredDuringExecution:
|
||
|
- weight: 1
|
||
|
podAffinityTerm:
|
||
|
topologyKey: kubernetes.io/hostname
|
||
|
labelSelector:
|
||
|
matchLabels:
|
||
|
app: {{ template "mariadb.name" . }}
|
||
|
release: {{ .Release.Name }}
|
||
|
{{- else}}
|
||
|
{{- with .Values.slave.affinity }}
|
||
|
affinity: {{ toYaml . | nindent 8 }}
|
||
|
{{- end }}
|
||
|
{{- end }}
|
||
|
{{- if .Values.slave.nodeSelector }}
|
||
|
nodeSelector: {{ toYaml .Values.slave.nodeSelector | nindent 8 }}
|
||
|
{{- end -}}
|
||
|
{{- with .Values.slave.tolerations }}
|
||
|
tolerations: {{ toYaml . | nindent 8 }}
|
||
|
{{- end }}
|
||
|
{{- include "mariadb.imagePullSecrets" . | indent 6 }}
|
||
|
initContainers:
|
||
|
{{- if .Values.master.extraInitContainers }}
|
||
|
{{- tpl .Values.master.extraInitContainers . | nindent 8 }}
|
||
|
{{- end }}
|
||
|
{{- if and .Values.volumePermissions.enabled .Values.slave.persistence.enabled }}
|
||
|
- name: volume-permissions
|
||
|
image: {{ template "mariadb.volumePermissions.image" . }}
|
||
|
imagePullPolicy: {{ .Values.volumePermissions.image.pullPolicy | quote }}
|
||
|
command: ["chown", "-R", "{{ .Values.securityContext.runAsUser }}:{{ .Values.securityContext.fsGroup }}", "/bitnami/mariadb"]
|
||
|
securityContext:
|
||
|
runAsUser: 0
|
||
|
resources: {{ toYaml .Values.volumePermissions.resources | nindent 12 }}
|
||
|
volumeMounts:
|
||
|
- name: data
|
||
|
mountPath: /bitnami/mariadb
|
||
|
{{- end }}
|
||
|
containers:
|
||
|
- name: "mariadb"
|
||
|
image: {{ template "mariadb.image" . }}
|
||
|
imagePullPolicy: {{ .Values.image.pullPolicy | quote }}
|
||
|
env:
|
||
|
{{- if .Values.image.debug}}
|
||
|
- name: BITNAMI_DEBUG
|
||
|
value: "true"
|
||
|
{{- end }}
|
||
|
{{- if .Values.slave.extraFlags }}
|
||
|
- name: MARIADB_EXTRA_FLAGS
|
||
|
value: "{{ .Values.slave.extraFlags }}"
|
||
|
{{- end }}
|
||
|
- name: MARIADB_REPLICATION_MODE
|
||
|
value: "slave"
|
||
|
- name: MARIADB_MASTER_HOST
|
||
|
value: {{ template "mariadb.fullname" . }}
|
||
|
- name: MARIADB_MASTER_PORT_NUMBER
|
||
|
value: "{{ .Values.service.port }}"
|
||
|
- name: MARIADB_MASTER_ROOT_USER
|
||
|
value: "root"
|
||
|
{{- if .Values.rootUser.injectSecretsAsVolume }}
|
||
|
- name: MARIADB_MASTER_ROOT_PASSWORD_FILE
|
||
|
value: {{ default "/opt/bitnami/mariadb/secrets/mariadb-root-password" .Values.rootUser.injectSecretsFile }}
|
||
|
{{- else }}
|
||
|
- name: MARIADB_MASTER_ROOT_PASSWORD
|
||
|
valueFrom:
|
||
|
secretKeyRef:
|
||
|
name: {{ template "mariadb.secretName" . }}
|
||
|
key: mariadb-root-password
|
||
|
{{- end }}
|
||
|
- name: MARIADB_REPLICATION_USER
|
||
|
value: "{{ .Values.replication.user }}"
|
||
|
{{- if .Values.replication.injectSecretsAsVolume }}
|
||
|
- name: MARIADB_REPLICATION_PASSWORD_FILE
|
||
|
value: {{ default "/opt/bitnami/mariadb/secrets/mariadb-replication-password" .Values.replication.injectSecretsFile }}
|
||
|
{{- else }}
|
||
|
- name: MARIADB_REPLICATION_PASSWORD
|
||
|
valueFrom:
|
||
|
secretKeyRef:
|
||
|
name: {{ template "mariadb.secretName" . }}
|
||
|
key: mariadb-replication-password
|
||
|
{{- end }}
|
||
|
{{- if .Values.slave.extraEnvVars }}
|
||
|
{{- tpl (toYaml .Values.slave.extraEnvVars) $ | nindent 12 }}
|
||
|
{{- end }}
|
||
|
{{- if or .Values.slave.extraEnvVarsCM .Values.slave.extraEnvVarsSecret }}
|
||
|
envFrom:
|
||
|
{{- if .Values.slave.extraEnvVarsCM }}
|
||
|
- configMapRef:
|
||
|
name: {{ .Values.slave.extraEnvVarsCM }}
|
||
|
{{- end }}
|
||
|
{{- if .Values.slave.extraEnvVarsSecret }}
|
||
|
- secretRef:
|
||
|
name: {{ .Values.slave.extraEnvVarsSecret }}
|
||
|
{{- end }}
|
||
|
{{- end }}
|
||
|
ports:
|
||
|
- name: mysql
|
||
|
containerPort: 3306
|
||
|
{{- if .Values.slave.livenessProbe.enabled }}
|
||
|
livenessProbe:
|
||
|
exec:
|
||
|
command:
|
||
|
- sh
|
||
|
- -c
|
||
|
- |
|
||
|
password_aux="${MARIADB_MASTER_ROOT_PASSWORD:-}"
|
||
|
if [ -f "${MARIADB_MASTER_ROOT_PASSWORD_FILE:-}" ]; then
|
||
|
password_aux=$(cat $MARIADB_MASTER_ROOT_PASSWORD_FILE)
|
||
|
fi
|
||
|
mysqladmin status -uroot -p$password_aux
|
||
|
initialDelaySeconds: {{ .Values.slave.livenessProbe.initialDelaySeconds }}
|
||
|
periodSeconds: {{ .Values.slave.livenessProbe.periodSeconds }}
|
||
|
timeoutSeconds: {{ .Values.slave.livenessProbe.timeoutSeconds }}
|
||
|
successThreshold: {{ .Values.slave.livenessProbe.successThreshold }}
|
||
|
failureThreshold: {{ .Values.slave.livenessProbe.failureThreshold }}
|
||
|
{{- end }}
|
||
|
{{- if .Values.slave.readinessProbe.enabled }}
|
||
|
readinessProbe:
|
||
|
exec:
|
||
|
command:
|
||
|
- sh
|
||
|
- -c
|
||
|
- |
|
||
|
password_aux="${MARIADB_MASTER_ROOT_PASSWORD:-}"
|
||
|
if [ -f "${MARIADB_MASTER_ROOT_PASSWORD_FILE:-}" ]; then
|
||
|
password_aux=$(cat $MARIADB_MASTER_ROOT_PASSWORD_FILE)
|
||
|
fi
|
||
|
mysqladmin status -uroot -p$password_aux
|
||
|
initialDelaySeconds: {{ .Values.slave.readinessProbe.initialDelaySeconds }}
|
||
|
periodSeconds: {{ .Values.slave.readinessProbe.periodSeconds }}
|
||
|
timeoutSeconds: {{ .Values.slave.readinessProbe.timeoutSeconds }}
|
||
|
successThreshold: {{ .Values.slave.readinessProbe.successThreshold }}
|
||
|
failureThreshold: {{ .Values.slave.readinessProbe.failureThreshold }}
|
||
|
{{- end }}
|
||
|
{{- if .Values.slave.resources }}
|
||
|
resources: {{ toYaml .Values.slave.resources | nindent 12 }}
|
||
|
{{- end }}
|
||
|
volumeMounts:
|
||
|
- name: data
|
||
|
mountPath: /bitnami/mariadb
|
||
|
{{- if .Values.slave.config }}
|
||
|
- name: config
|
||
|
mountPath: /opt/bitnami/mariadb/conf/my.cnf
|
||
|
subPath: my.cnf
|
||
|
{{- end }}
|
||
|
{{- if or .Values.rootUser.injectSecretsAsVolume .Values.replication.injectSecretsAsVolume }}
|
||
|
- name: mariadb-credentials
|
||
|
mountPath: /opt/bitnami/mariadb/secrets/
|
||
|
{{- end }}
|
||
|
{{- if .Values.metrics.enabled }}
|
||
|
- name: metrics
|
||
|
image: {{ template "mariadb.metrics.image" . }}
|
||
|
imagePullPolicy: {{ .Values.metrics.image.pullPolicy | quote }}
|
||
|
env:
|
||
|
{{- if .Values.rootUser.injectSecretsAsVolume }}
|
||
|
- name: MARIADB_ROOT_PASSWORD_FILE
|
||
|
value: {{ default "/opt/bitnami/mysqld-exporter/secrets/mariadb-root-password" .Values.rootUser.injectSecretsFile }}
|
||
|
{{- else }}
|
||
|
- name: MARIADB_ROOT_PASSWORD
|
||
|
valueFrom:
|
||
|
secretKeyRef:
|
||
|
name: {{ template "mariadb.secretName" . }}
|
||
|
key: mariadb-root-password
|
||
|
{{- end }}
|
||
|
command:
|
||
|
- sh
|
||
|
- -c
|
||
|
- |
|
||
|
password_aux="${MARIADB_ROOT_PASSWORD:-}"
|
||
|
if [ -f "${MARIADB_ROOT_PASSWORD_FILE:-}" ]; then
|
||
|
password_aux=$(cat $MARIADB_ROOT_PASSWORD_FILE)
|
||
|
fi
|
||
|
DATA_SOURCE_NAME="root:${password_aux}@(localhost:3306)/" /bin/mysqld_exporter {{- range .Values.metrics.extraArgs.slave }} {{ . }} {{- end }}
|
||
|
ports:
|
||
|
- name: metrics
|
||
|
containerPort: 9104
|
||
|
{{- if .Values.metrics.livenessProbe.enabled }}
|
||
|
livenessProbe:
|
||
|
httpGet:
|
||
|
path: /metrics
|
||
|
port: metrics
|
||
|
initialDelaySeconds: {{ .Values.metrics.livenessProbe.initialDelaySeconds }}
|
||
|
periodSeconds: {{ .Values.metrics.livenessProbe.periodSeconds }}
|
||
|
timeoutSeconds: {{ .Values.metrics.livenessProbe.timeoutSeconds }}
|
||
|
successThreshold: {{ .Values.metrics.livenessProbe.successThreshold }}
|
||
|
failureThreshold: {{ .Values.metrics.livenessProbe.failureThreshold }}
|
||
|
{{- end }}
|
||
|
{{- if .Values.metrics.readinessProbe.enabled }}
|
||
|
readinessProbe:
|
||
|
httpGet:
|
||
|
path: /metrics
|
||
|
port: metrics
|
||
|
initialDelaySeconds: {{ .Values.metrics.readinessProbe.initialDelaySeconds }}
|
||
|
periodSeconds: {{ .Values.metrics.readinessProbe.periodSeconds }}
|
||
|
timeoutSeconds: {{ .Values.metrics.readinessProbe.timeoutSeconds }}
|
||
|
successThreshold: {{ .Values.metrics.readinessProbe.successThreshold }}
|
||
|
failureThreshold: {{ .Values.metrics.readinessProbe.failureThreshold }}
|
||
|
{{- end }}
|
||
|
{{- if .Values.metrics.resources }}
|
||
|
resources: {{ toYaml .Values.metrics.resources | nindent 12 }}
|
||
|
{{- end }}
|
||
|
{{- if .Values.rootUser.injectSecretsAsVolume }}
|
||
|
volumeMounts:
|
||
|
- name: mariadb-credentials
|
||
|
mountPath: /opt/bitnami/mysqld-exporter/secrets/
|
||
|
{{- end }}
|
||
|
{{- end }}
|
||
|
volumes:
|
||
|
{{- if .Values.slave.config }}
|
||
|
- name: config
|
||
|
configMap:
|
||
|
name: {{ template "slave.fullname" . }}
|
||
|
{{- end }}
|
||
|
{{- if or .Values.rootUser.injectSecretsAsVolume .Values.replication.injectSecretsAsVolume }}
|
||
|
- name: mariadb-credentials
|
||
|
secret:
|
||
|
secretName: {{ template "mariadb.fullname" . }}
|
||
|
items:
|
||
|
{{- if .Values.rootUser.injectSecretsAsVolume }}
|
||
|
- key: mariadb-root-password
|
||
|
path: mariadb-root-password
|
||
|
{{- end }}
|
||
|
{{- if .Values.replication.injectSecretsAsVolume }}
|
||
|
- key: mariadb-replication-password
|
||
|
path: mariadb-replication-password
|
||
|
{{- end }}
|
||
|
{{- end }}
|
||
|
{{- if not .Values.slave.persistence.enabled }}
|
||
|
- name: "data"
|
||
|
emptyDir: {}
|
||
|
{{- else }}
|
||
|
volumeClaimTemplates:
|
||
|
- metadata:
|
||
|
name: data
|
||
|
labels:
|
||
|
app: "{{ template "mariadb.name" . }}"
|
||
|
component: "slave"
|
||
|
release: {{ .Release.Name | quote }}
|
||
|
heritage: {{ .Release.Service | quote }}
|
||
|
spec:
|
||
|
accessModes:
|
||
|
{{- range .Values.slave.persistence.accessModes }}
|
||
|
- {{ . | quote }}
|
||
|
{{- end }}
|
||
|
resources:
|
||
|
requests:
|
||
|
storage: {{ .Values.slave.persistence.size | quote }}
|
||
|
{{ include "mariadb.slave.storageClass" . }}
|
||
|
{{- if .Values.slave.persistence.selector }}
|
||
|
selector: {{- include "mariadb.tplValue" (dict "value" .Values.slave.persistence.selector "context" $) | nindent 10 }}
|
||
|
{{- end -}}
|
||
|
{{- end }}
|
||
|
{{- end }}
|