chart/templates/cluster_data_statefulset.yaml (441 lines of code) (raw):

{{/* Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements. See the NOTICE file distributed with this work for additional information regarding copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */}} {{- if and .Values.cluster.enabled .Values.cluster.data }} {{- $nodeTemplate := .Values.cluster.data.nodeTemplate }} {{- range $roleName, $roleConfig := .Values.cluster.data.roles }} {{- /* Merge nodeTemplate with role-specific config */}} {{- $roleConfig := merge $roleConfig $nodeTemplate }} apiVersion: apps/v1 kind: StatefulSet metadata: labels: {{ include "banyandb.labels" $ | nindent 4 }} app.kubernetes.io/component: data app.kubernetes.io/role: {{ $roleName }} name: {{ template "banyandb.fullname" $ }}-data-{{ $roleName }} spec: serviceName: banyandb replicas: {{ $roleConfig.replicas }} selector: matchLabels: {{ include "banyandb.selectorLabels" $ | nindent 6 }} app.kubernetes.io/component: data app.kubernetes.io/role: {{ $roleName }} updateStrategy: type: RollingUpdate podManagementPolicy: Parallel template: metadata: labels: {{ include "banyandb.labels" $ | nindent 8 }} app.kubernetes.io/component: data app.kubernetes.io/role: {{ $roleName }} {{- $mergedAnnotations := merge $.Values.cluster.data.nodeTemplate.podAnnotations $roleConfig.podAnnotations }} {{- if $mergedAnnotations }} annotations: {{ toYaml $mergedAnnotations | indent 8 }} {{- end }} spec: serviceAccountName: {{ template "banyandb.serviceAccountName" $ }} {{- $mergedSecurity := merge $.Values.cluster.data.nodeTemplate.securityContext $roleConfig.securityContext }} {{- with $mergedSecurity }} securityContext: {{- toYaml . | nindent 8 }} {{- end }} priorityClassName: {{ $roleConfig.priorityClassName }} initContainers: {{- if $roleConfig.restoreInitContainer.enabled }} - name: restore-init image: {{ $.Values.image.repository }}:{{ required "banyandb.image.tag is required" $.Values.image.tag }}-slim imagePullPolicy: {{ $.Values.image.pullPolicy }} command: - "/restore" - "run" - "--source={{ $roleConfig.backupSidecar.dest }}" {{- if $.Values.storage.enabled }} volumeMounts: {{- range $claim := $.Values.storage.persistentVolumeClaims }} {{- if eq $claim.nodeRole $roleName }} {{- if $claim.existingClaimName }} {{- range $claim.mountTargets }} - mountPath: /tmp/{{ . }} name: {{ $claim.existingClaimName }} subPath: {{ . }} {{- end }} {{- else }} {{- range $claim.mountTargets }} - mountPath: /tmp/{{ . }} name: {{ $claim.claimName }} subPath: {{ . }} {{- end }} {{- end }} {{- end }} {{- end }} {{- end }} {{- with $roleConfig.restoreInitContainer.resources }} resources: {{- toYaml . | nindent 12 }} {{- end }} {{- end }} containers: - name: data image: {{ $.Values.image.repository }}:{{ required "banyandb.image.tag is required" $.Values.image.tag }}-slim imagePullPolicy: {{ $.Values.image.pullPolicy }} env: {{- $mergedEnv := concat $.Values.cluster.data.nodeTemplate.env $roleConfig.env }} {{- range $env := $mergedEnv }} - name: {{ $env.name }} value: {{ $env.value }} {{- end }} - name: BYDB_DATA_NODE_ROLE value: {{ $roleName }} {{- if $roleConfig.tls}} {{- if $roleConfig.tls.grpcSecretName }} - name: BYDB_TLS value: "true" - name: BYDB_CERT_FILE value: "/etc/tls/{{ $roleConfig.tls.grpcSecretName }}/tls.crt" - name: BYDB_KEY_FILE value: "/etc/tls/{{ $roleConfig.tls.grpcSecretName }}/tls.key" - name: BYDB_HTTP_GRPC_CERT_FILE value: "/etc/tls/{{ $roleConfig.tls.grpcSecretName }}/tls.crt" {{- end }} {{- end }} {{- if and $.Values.etcd.auth.rbac.create (not $.Values.etcd.auth.rbac.allowNoneAuthentication) }} - name: BYDB_ETCD_USERNAME value: "root" - name: BYDB_ETCD_PASSWORD value: {{ $.Values.etcd.auth.rbac.rootPassword }} {{- end }} {{- if $.Values.etcd.auth.client.secureTransport }} - name: BYDB_ETCD_TLS_CA_FILE value: "/etc/tls/{{ $roleConfig.tls.etcdSecretName }}/ca.crt" {{- end }} {{- if $.Values.etcd.auth.client.enableAuthentication }} - name: BYDB_ETCD_TLS_CERT_FILE value: "/etc/tls/{{ $roleConfig.tls.etcdSecretName }}/tls.crt" - name: BYDB_ETCD_TLS_KEY_FILE value: "/etc/tls/{{ $roleConfig.tls.etcdSecretName }}/tls.key" {{- end }} {{- if and (not $.Values.etcd.enabled) $.Values.cluster.etcdEndpoints }} - name: BYDB_ETCD_ENDPOINTS value: "{{- $.Values.cluster.etcdEndpoints | join "," -}}" {{- else }} {{- include "banyandb.etcdEndpoints" $ | nindent 12 }} {{- end }} - name: BYDB_NODE_HOST_PROVIDER value: "ip" - name: BYDB_NODE_HOST valueFrom: fieldRef: fieldPath: status.podIP args: - data ports: - containerPort: 17912 name: grpc - containerPort: 17913 name: http-healthz - containerPort: 6060 name: pprof - containerPort: 2121 name: observebility readinessProbe: httpGet: path: /api/healthz port: 17913 scheme: HTTP initialDelaySeconds: {{ $roleConfig.readinessProbe.initialDelaySeconds }} periodSeconds: {{ $roleConfig.readinessProbe.periodSeconds }} timeoutSeconds: {{ $roleConfig.readinessProbe.timeoutSeconds }} successThreshold: {{ $roleConfig.readinessProbe.successThreshold }} failureThreshold: {{ $roleConfig.readinessProbe.failureThreshold }} livenessProbe: httpGet: path: /api/healthz port: 17913 scheme: HTTP initialDelaySeconds: {{ $roleConfig.livenessProbe.initialDelaySeconds }} periodSeconds: {{ $roleConfig.livenessProbe.periodSeconds }} timeoutSeconds: {{ $roleConfig.livenessProbe.timeoutSeconds }} successThreshold: {{ $roleConfig.livenessProbe.successThreshold }} failureThreshold: {{ $roleConfig.livenessProbe.failureThreshold }} startupProbe: httpGet: path: /api/healthz port: 17913 scheme: HTTP initialDelaySeconds: {{ $roleConfig.startupProbe.initialDelaySeconds }} periodSeconds: {{ $roleConfig.startupProbe.periodSeconds }} timeoutSeconds: {{ $roleConfig.startupProbe.timeoutSeconds }} successThreshold: {{ $roleConfig.startupProbe.successThreshold }} failureThreshold: {{ $roleConfig.startupProbe.failureThreshold }} {{- if $roleConfig.resources }} resources: {{- if $roleConfig.resources.requests }} requests: {{- range $request := $roleConfig.resources.requests }} {{ $request.key }}: {{ $request.value }} {{- end }} {{- end }} {{- if $roleConfig.resources.limits }} limits: {{- range $limit := $roleConfig.resources.limits }} {{ $limit.key }}: {{ $limit.value }} {{- end }} {{- end }} {{- end }} {{- if or $.Values.storage.enabled $roleConfig.tls }} volumeMounts: {{- if $.Values.storage.enabled }} {{- range $claim := $.Values.storage.persistentVolumeClaims }} {{- if eq $claim.nodeRole $roleName }} {{- if $claim.existingClaimName }} {{- range $claim.mountTargets }} - mountPath: /tmp/{{ . }} name: {{ $claim.existingClaimName }} subPath: {{ . }} {{- end }} {{- else }} {{- range $claim.mountTargets }} - mountPath: /tmp/{{ . }} name: {{ $claim.claimName }} subPath: {{ . }} {{- end }} {{- end }} {{- end }} {{- end }} {{- end }} {{- if $roleConfig.tls }} {{- if $roleConfig.tls.grpcSecretName }} - mountPath: /etc/tls/{{ $roleConfig.tls.grpcSecretName }} name: {{ $roleConfig.tls.grpcSecretName }}-volume {{- end }} {{- if $roleConfig.tls.etcdSecretName }} - mountPath: /etc/tls/{{ $roleConfig.tls.etcdSecretName }} name: {{ $roleConfig.tls.etcdSecretName }}-volume {{- end }} {{- end }} {{- end }} {{- if $roleConfig.backupSidecar.enabled }} - name: backup image: {{ $.Values.image.repository }}:{{ required "banyandb.image.tag is required" $.Values.image.tag }}-slim imagePullPolicy: {{ $.Values.image.pullPolicy }} command: - "/backup" - "--dest={{ $roleConfig.backupSidecar.dest }}" - "--time-style={{ $roleConfig.backupSidecar.timeStyle }}" - "--schedule={{ $roleConfig.backupSidecar.schedule }}" - "--grpc-addr=127.0.0.1:17912" env: - name: ORDINAL_NUMBER valueFrom: fieldRef: fieldPath: metadata.labels['apps.kubernetes.io/pod-index'] {{- if $.Values.storage.enabled }} volumeMounts: {{- range $claim := $.Values.storage.persistentVolumeClaims }} {{- if eq $claim.nodeRole $roleName }} {{- if $claim.existingClaimName }} {{- range $claim.mountTargets }} - mountPath: /tmp/{{ . }} name: {{ $claim.existingClaimName }} subPath: {{ . }} {{- end }} {{- else }} {{- range $claim.mountTargets }} - mountPath: /tmp/{{ . }} name: {{ $claim.claimName }} subPath: {{ . }} {{- end }} {{- end }} {{- end }} {{- end }} {{- end }} {{- with $roleConfig.backupSidecar.resources }} resources: {{- toYaml . | nindent 4 }} {{- end }} {{- end }} {{- if $roleConfig.lifecycleSidecar.enabled }} - name: lifecycle image: {{ $.Values.image.repository }}:{{ required "banyandb.image.tag is required" $.Values.image.tag }}-slim imagePullPolicy: {{ $.Values.image.pullPolicy }} command: - "/lifecycle" - "--schedule={{ $roleConfig.lifecycleSidecar.schedule }}" {{- if $.Values.storage.enabled }} volumeMounts: {{- range $claim := $.Values.storage.persistentVolumeClaims }} {{- if eq $claim.nodeRole $roleName }} {{- if $claim.existingClaimName }} {{- range $claim.mountTargets }} - mountPath: /tmp/{{ . }} name: {{ $claim.existingClaimName }} subPath: {{ . }} {{- end }} {{- else }} {{- range $claim.mountTargets }} - mountPath: /tmp/{{ . }} name: {{ $claim.claimName }} subPath: {{ . }} {{- end }} {{- end }} {{- end }} {{- end }} {{- end }} {{- with $roleConfig.lifecycleSidecar.resources }} resources: {{- toYaml . | nindent 4 }} {{- end }} {{- end }} {{- range $sidecar := $roleConfig.sidecar }} - name: {{ $sidecar.name }} image: {{ $sidecar.image }} imagePullPolicy: {{ $sidecar.imagePullPolicy }} command: {{- range $sidecar.commands.normal }} - {{ . | quote }} {{- end }} lifecycle: preStop: exec: command: {{- range $sidecar.commands.preStop }} - {{ . | quote }} {{- end }} {{- if $.Values.storage.enabled }} volumeMounts: {{- range $claim := $.Values.storage.persistentVolumeClaims }} {{- if eq $claim.nodeRole $roleName }} {{- if $claim.existingClaimName }} {{- range $claim.mountTargets }} - mountPath: /tmp/{{ . }} name: {{ $claim.existingClaimName }} subPath: {{ . }} {{- end }} {{- else }} {{- range $claim.mountTargets }} - mountPath: /tmp/{{ . }} name: {{ $claim.claimName }} subPath: {{ . }} {{- end }} {{- end }} {{- end }} {{- end }} {{- end }} {{- end }} {{- if $roleConfig.tls }} volumes: {{- if $roleConfig.tls.grpcSecretName }} - name: {{ $roleConfig.tls.grpcSecretName }}-volume secret: secretName: {{ $roleConfig.tls.grpcSecretName }} {{- end }} {{- if $roleConfig.tls.etcdSecretName }} - name: {{ $roleConfig.tls.etcdSecretName }}-volume secret: secretName: {{ $roleConfig.tls.etcdSecretName }} {{- end }} {{- end }} {{- if $roleConfig.tolerations }} tolerations: {{- range $toleration := $roleConfig.tolerations }} - key: {{ $toleration.key }} operator: {{ $toleration.operator }} value: {{ $toleration.value }} effect: {{ $toleration.effect }} {{- end }} {{- end }} {{- if $roleConfig.nodeSelector }} nodeSelector: {{- range $selector := $roleConfig.nodeSelector }} {{ $selector.key }}: {{ $selector.value }} {{- end }} {{- end }} {{- if $roleConfig.affinity }} affinity: {{ toYaml $roleConfig.affinity | nindent 8 }} {{- else if or $roleConfig.podAffinityPreset $roleConfig.podAntiAffinityPreset }} affinity: {{- if and $roleConfig.podAffinityPreset (not (empty $roleConfig.podAffinityPreset)) }} podAffinity: {{- if eq $roleConfig.podAffinityPreset "soft" }} preferredDuringSchedulingIgnoredDuringExecution: - weight: 100 podAffinityTerm: labelSelector: matchLabels: {{ include "banyandb.selectorLabels" $ | nindent 20 }} app.kubernetes.io/component: data app.kubernetes.io/role: {{ $roleName }} topologyKey: kubernetes.io/hostname {{- else if eq $roleConfig.podAffinityPreset "hard" }} requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: labelSelector: matchLabels: {{ include "banyandb.selectorLabels" $ | nindent 20 }} app.kubernetes.io/component: data app.kubernetes.io/role: {{ $roleName }} topologyKey: kubernetes.io/hostname {{- end }} {{- end }} {{- if and $roleConfig.podAntiAffinityPreset (not (empty $roleConfig.podAntiAffinityPreset)) }} podAntiAffinity: {{- if eq $roleConfig.podAntiAffinityPreset "soft" }} preferredDuringSchedulingIgnoredDuringExecution: - weight: 100 podAffinityTerm: labelSelector: matchLabels: {{ include "banyandb.selectorLabels" $ | nindent 20 }} app.kubernetes.io/component: data app.kubernetes.io/role: {{ $roleName }} topologyKey: kubernetes.io/hostname {{- else if eq $roleConfig.podAntiAffinityPreset "hard" }} requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: labelSelector: matchLabels: {{ include "banyandb.selectorLabels" $ | nindent 20 }} app.kubernetes.io/component: data app.kubernetes.io/role: {{ $roleName }} topologyKey: kubernetes.io/hostname {{- end }} {{- end }} {{- end }} {{- if $.Values.storage.enabled }} volumeClaimTemplates: {{- range $claim := $.Values.storage.persistentVolumeClaims }} {{- if eq $claim.nodeRole $roleName }} - metadata: name: {{ $claim.claimName }} spec: {{- if $claim.accessModes }} accessModes: {{- range $claim.accessModes }} - {{ . }} {{- end }} {{- end }} {{- if $claim.size }} resources: requests: storage: {{ $claim.size }} {{- end }} {{- if $claim.storageClass }} storageClassName: {{ $claim.storageClass }} {{- end }} {{- if $claim.volumeMode }} volumeMode: {{ $claim.volumeMode }} {{- end }} {{- end }} {{- end }} {{- end }} --- {{- end }} {{- end }}