[bitnami/influxdb] Add support for image digest apart from tag (#11887)

* [bitnami/influxdb] Add support for image digest apart from tag

Signed-off-by: Carlos Rodriguez Hernandez <carlosrh@vmware.com>

* Update README.md with readme-generator-for-helm

Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>

Signed-off-by: Carlos Rodriguez Hernandez <carlosrh@vmware.com>
Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>
Co-authored-by: Bitnami Containers <bitnami-bot@vmware.com>
This commit is contained in:
Carlos Rodríguez Hernández
2022-08-22 14:14:41 +02:00
committed by GitHub
parent a3d07ee9c4
commit 1de92933e6
4 changed files with 177 additions and 162 deletions

View File

@@ -1,6 +1,6 @@
dependencies:
- name: common
repository: https://charts.bitnami.com/bitnami
version: 1.17.1
digest: sha256:dacc73770a5640c011e067ff8840ddf89631fc19016c8d0a9e5ea160e7da8690
generated: "2022-08-19T13:32:07.401838436Z"
version: 2.0.0
digest: sha256:c66468d294c878acfb7cc6c082bc08d7105d139098bd42f88e6fe26903506c8f
generated: "2022-08-20T10:58:00.675405501Z"

View File

@@ -7,7 +7,7 @@ dependencies:
repository: https://charts.bitnami.com/bitnami
tags:
- bitnami-common
version: 1.x.x
version: 2.x.x
description: InfluxDB(TM) is an open source time-series database. It is a core component of the TICK (Telegraf, InfluxDB(TM), Chronograf, Kapacitor) stack.
engine: gotpl
home: https://github.com/bitnami/charts/tree/master/bitnami/influxdb
@@ -24,4 +24,4 @@ name: influxdb
sources:
- https://github.com/bitnami/containers/tree/main/bitnami/influxdb
- https://www.influxdata.com/products/influxdb-overview/
version: 5.3.12
version: 5.4.0

View File

@@ -80,104 +80,105 @@ The command removes all the Kubernetes components associated with the chart and
### InfluxDB&trade; parameters
| Name | Description | Value |
| ------------------------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------- |
| `image.registry` | InfluxDB&trade; image registry | `docker.io` |
| `image.repository` | InfluxDB&trade; image repository | `bitnami/influxdb` |
| `image.tag` | InfluxDB&trade; image tag (immutable tags are recommended) | `2.2.0-debian-10-r41` |
| `image.pullPolicy` | InfluxDB&trade; image pull policy | `IfNotPresent` |
| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
| `image.debug` | Specify if debug logs should be enabled | `false` |
| `auth.enabled` | Enable/disable authentication (Variable to keep compatibility with InfluxDB&trade; v1, in v2 it will be ignored) | `true` |
| `auth.usePasswordFiles` | Whether to use files to provide secrets instead of env vars. | `false` |
| `auth.admin.username` | InfluxDB&trade; admin user name | `admin` |
| `auth.admin.password` | InfluxDB&trade; admin user's password | `""` |
| `auth.admin.token` | InfluxDB&trade; admin user's token. Only valid with InfluxDB&trade; v2 | `""` |
| `auth.admin.org` | InfluxDB&trade; admin user's org. Only valid with InfluxDB&trade; v2 | `primary` |
| `auth.admin.bucket` | InfluxDB&trade; admin user's bucket. Only valid with InfluxDB&trade; v2 | `primary` |
| `auth.createUserToken` | Whether to create tokens for the different users. Take into account these tokens are going to be created by CLI randomly and they will not be accessible from a secret. See more influxdb 2.0 [auth ref](https://docs.influxdata.com/influxdb/v2.0/security/tokens/) | `false` |
| `auth.user.username` | Name for InfluxDB&trade; user with 'admin' privileges on the bucket specified at `auth.user.bucket` and `auth.user.org` or `auth.admin.org` | `""` |
| `auth.user.password` | InfluxDB&trade; password for `user.name` user | `""` |
| `auth.user.org` | Org to be created on first run | `""` |
| `auth.user.bucket` | Bucket to be created on first run | `""` |
| `auth.readUser.username` | Name for InfluxDB&trade; user with 'read' privileges on the bucket specified at `auth.user.bucket` | `""` |
| `auth.readUser.password` | InfluxDB&trade; password for `auth.readUser.username` user | `""` |
| `auth.writeUser.username` | Name for InfluxDB&trade; user with 'read' privileges on the bucket specified at `auth.user.bucket` | `""` |
| `auth.writeUser.password` | InfluxDB&trade; password for `auth.writeUser.username` user | `""` |
| `auth.existingSecret` | Name of existing Secret object with InfluxDB&trade; credentials (`auth.admin.password`, `auth.user.password`, `auth.readUser.password`, and `auth.writeUser.password` will be ignored and picked up from this secret) | `""` |
| `influxdb.configuration` | Specify content for influxdb.conf | `""` |
| `influxdb.existingConfiguration` | Name of existing ConfigMap object with the InfluxDB&trade; configuration (`influxdb.configuration` will be ignored). | `""` |
| `influxdb.initdbScripts` | Dictionary of initdb scripts | `{}` |
| `influxdb.initdbScriptsCM` | Name of existing ConfigMap object with the initdb scripts (`influxdb.initdbScripts` will be ignored). | `""` |
| `influxdb.initdbScriptsSecret` | Secret with initdb scripts that contain sensitive information (Note: can be used with `initdbScriptsConfigMap` or `initdbScripts`) | `""` |
| `influxdb.podAffinityPreset` | InfluxDB&trade; Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `influxdb.podAntiAffinityPreset` | InfluxDB&trade; Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
| `influxdb.nodeAffinityPreset.type` | InfluxDB&trade; Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `influxdb.nodeAffinityPreset.key` | InfluxDB&trade; Node label key to match Ignored if `affinity` is set. | `""` |
| `influxdb.nodeAffinityPreset.values` | InfluxDB&trade; Node label values to match. Ignored if `affinity` is set. | `[]` |
| `influxdb.affinity` | InfluxDB&trade; Affinity for pod assignment | `{}` |
| `influxdb.nodeSelector` | InfluxDB&trade; Node labels for pod assignment | `{}` |
| `influxdb.tolerations` | InfluxDB&trade; Tolerations for pod assignment | `[]` |
| `influxdb.podAnnotations` | Annotations for InfluxDB&trade; pods | `{}` |
| `influxdb.podLabels` | Extra labels for InfluxDB&trade; pods | `{}` |
| `influxdb.hostAliases` | InfluxDB&trade; pods host aliases | `[]` |
| `influxdb.updateStrategy.type` | InfluxDB&trade; statefulset/deployment strategy type | `RollingUpdate` |
| `influxdb.priorityClassName` | InfluxDB&trade; pods' priorityClassName | `""` |
| `influxdb.schedulerName` | Name of the k8s scheduler (other than default) | `""` |
| `influxdb.topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` |
| `influxdb.podManagementPolicy` | podManagementPolicy to manage scaling operation of InfluxDB&trade; pods | `OrderedReady` |
| `influxdb.podSecurityContext.enabled` | Enabled InfluxDB&trade; pods' Security Context | `true` |
| `influxdb.podSecurityContext.fsGroup` | Set InfluxDB&trade; pod's Security Context fsGroup | `1001` |
| `influxdb.containerSecurityContext.enabled` | Enabled InfluxDB&trade; containers' Security Context | `true` |
| `influxdb.containerSecurityContext.runAsUser` | Set InfluxDB&trade; containers' Security Context runAsUser | `1001` |
| `influxdb.containerSecurityContext.runAsNonRoot` | Set Controller container's Security Context runAsNonRoot | `true` |
| `influxdb.resources.limits` | The resources limits for the container | `{}` |
| `influxdb.resources.requests` | The requested resources for the container | `{}` |
| `influxdb.command` | Override default container command (useful when using custom images) | `[]` |
| `influxdb.args` | Override default container args (useful when using custom images) | `[]` |
| `influxdb.lifecycleHooks` | for the InfluxDB&trade; container(s) to automate configuration before or after startup | `{}` |
| `influxdb.extraEnvVars` | Array containing extra env vars to configure InfluxDB&trade; | `[]` |
| `influxdb.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for InfluxDB&trade; nodes | `""` |
| `influxdb.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for InfluxDB&trade; nodes | `""` |
| `influxdb.extraVolumes` | Array of extra volumes to be added to the deployment (evaluated as template). Requires setting extraVolumeMounts | `[]` |
| `influxdb.extraVolumeMounts` | Array of extra volume mounts to be added to the container (evaluated as template). Normally used with extraVolumes. | `[]` |
| `influxdb.containerPorts.http` | InfluxDB&trade; container HTTP port | `8086` |
| `influxdb.containerPorts.rpc` | InfluxDB&trade; container RPC port | `8088` |
| `influxdb.startupProbe.enabled` | Enable startupProbe | `false` |
| `influxdb.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `180` |
| `influxdb.startupProbe.periodSeconds` | Period seconds for startupProbe | `45` |
| `influxdb.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `30` |
| `influxdb.startupProbe.failureThreshold` | Failure threshold for startupProbe | `6` |
| `influxdb.startupProbe.successThreshold` | Success threshold for startupProbe | `1` |
| `influxdb.livenessProbe.enabled` | Enable livenessProbe | `true` |
| `influxdb.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `180` |
| `influxdb.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `45` |
| `influxdb.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` |
| `influxdb.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` |
| `influxdb.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` |
| `influxdb.readinessProbe.enabled` | Enable readinessProbe | `true` |
| `influxdb.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `60` |
| `influxdb.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `45` |
| `influxdb.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` |
| `influxdb.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` |
| `influxdb.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` |
| `influxdb.customStartupProbe` | Override default startup probe | `{}` |
| `influxdb.customLivenessProbe` | Override default liveness probe | `{}` |
| `influxdb.customReadinessProbe` | Override default readiness probe | `{}` |
| `influxdb.sidecars` | Add additional sidecar containers to the InfluxDB&trade; pod(s) | `[]` |
| `influxdb.initContainers` | Add additional init containers to the InfluxDB&trade; pod(s) | `[]` |
| `influxdb.service.type` | Kubernetes service type (`ClusterIP`, `NodePort` or `LoadBalancer`) | `ClusterIP` |
| `influxdb.service.ports.http` | InfluxDB&trade; HTTP port | `8086` |
| `influxdb.service.ports.rpc` | InfluxDB&trade; RPC port | `8088` |
| `influxdb.service.nodePorts` | Specify the nodePort(s) value for the LoadBalancer and NodePort service types. | `{}` |
| `influxdb.service.loadBalancerIP` | loadBalancerIP if service type is `LoadBalancer` | `""` |
| `influxdb.service.loadBalancerSourceRanges` | Address that are allowed when service is LoadBalancer | `[]` |
| `influxdb.service.clusterIP` | Static clusterIP or None for headless services | `""` |
| `influxdb.service.externalTrafficPolicy` | InfluxDB&trade; service external traffic policy | `Cluster` |
| `influxdb.service.extraPorts` | Extra ports to expose (normally used with the `sidecar` value) | `[]` |
| `influxdb.service.annotations` | Annotations for InfluxDB&trade; service | `{}` |
| `influxdb.service.sessionAffinity` | Session Affinity for Kubernetes service, can be "None" or "ClientIP" | `None` |
| `influxdb.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` |
| Name | Description | Value |
| ------------------------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------- |
| `image.registry` | InfluxDB&trade; image registry | `docker.io` |
| `image.repository` | InfluxDB&trade; image repository | `bitnami/influxdb` |
| `image.tag` | InfluxDB&trade; image tag (immutable tags are recommended) | `2.4.0-debian-11-r0` |
| `image.digest` | InfluxDB&trade; image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `image.pullPolicy` | InfluxDB&trade; image pull policy | `IfNotPresent` |
| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
| `image.debug` | Specify if debug logs should be enabled | `false` |
| `auth.enabled` | Enable/disable authentication (Variable to keep compatibility with InfluxDB&trade; v1, in v2 it will be ignored) | `true` |
| `auth.usePasswordFiles` | Whether to use files to provide secrets instead of env vars. | `false` |
| `auth.admin.username` | InfluxDB&trade; admin user name | `admin` |
| `auth.admin.password` | InfluxDB&trade; admin user's password | `""` |
| `auth.admin.token` | InfluxDB&trade; admin user's token. Only valid with InfluxDB&trade; v2 | `""` |
| `auth.admin.org` | InfluxDB&trade; admin user's org. Only valid with InfluxDB&trade; v2 | `primary` |
| `auth.admin.bucket` | InfluxDB&trade; admin user's bucket. Only valid with InfluxDB&trade; v2 | `primary` |
| `auth.createUserToken` | Whether to create tokens for the different users. Take into account these tokens are going to be created by CLI randomly and they will not be accessible from a secret. See more influxdb 2.0 [auth ref](https://docs.influxdata.com/influxdb/v2.0/security/tokens/) | `false` |
| `auth.user.username` | Name for InfluxDB&trade; user with 'admin' privileges on the bucket specified at `auth.user.bucket` and `auth.user.org` or `auth.admin.org` | `""` |
| `auth.user.password` | InfluxDB&trade; password for `user.name` user | `""` |
| `auth.user.org` | Org to be created on first run | `""` |
| `auth.user.bucket` | Bucket to be created on first run | `""` |
| `auth.readUser.username` | Name for InfluxDB&trade; user with 'read' privileges on the bucket specified at `auth.user.bucket` | `""` |
| `auth.readUser.password` | InfluxDB&trade; password for `auth.readUser.username` user | `""` |
| `auth.writeUser.username` | Name for InfluxDB&trade; user with 'read' privileges on the bucket specified at `auth.user.bucket` | `""` |
| `auth.writeUser.password` | InfluxDB&trade; password for `auth.writeUser.username` user | `""` |
| `auth.existingSecret` | Name of existing Secret object with InfluxDB&trade; credentials (`auth.admin.password`, `auth.user.password`, `auth.readUser.password`, and `auth.writeUser.password` will be ignored and picked up from this secret) | `""` |
| `influxdb.configuration` | Specify content for influxdb.conf | `""` |
| `influxdb.existingConfiguration` | Name of existing ConfigMap object with the InfluxDB&trade; configuration (`influxdb.configuration` will be ignored). | `""` |
| `influxdb.initdbScripts` | Dictionary of initdb scripts | `{}` |
| `influxdb.initdbScriptsCM` | Name of existing ConfigMap object with the initdb scripts (`influxdb.initdbScripts` will be ignored). | `""` |
| `influxdb.initdbScriptsSecret` | Secret with initdb scripts that contain sensitive information (Note: can be used with `initdbScriptsConfigMap` or `initdbScripts`) | `""` |
| `influxdb.podAffinityPreset` | InfluxDB&trade; Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `influxdb.podAntiAffinityPreset` | InfluxDB&trade; Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
| `influxdb.nodeAffinityPreset.type` | InfluxDB&trade; Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `influxdb.nodeAffinityPreset.key` | InfluxDB&trade; Node label key to match Ignored if `affinity` is set. | `""` |
| `influxdb.nodeAffinityPreset.values` | InfluxDB&trade; Node label values to match. Ignored if `affinity` is set. | `[]` |
| `influxdb.affinity` | InfluxDB&trade; Affinity for pod assignment | `{}` |
| `influxdb.nodeSelector` | InfluxDB&trade; Node labels for pod assignment | `{}` |
| `influxdb.tolerations` | InfluxDB&trade; Tolerations for pod assignment | `[]` |
| `influxdb.podAnnotations` | Annotations for InfluxDB&trade; pods | `{}` |
| `influxdb.podLabels` | Extra labels for InfluxDB&trade; pods | `{}` |
| `influxdb.hostAliases` | InfluxDB&trade; pods host aliases | `[]` |
| `influxdb.updateStrategy.type` | InfluxDB&trade; statefulset/deployment strategy type | `RollingUpdate` |
| `influxdb.priorityClassName` | InfluxDB&trade; pods' priorityClassName | `""` |
| `influxdb.schedulerName` | Name of the k8s scheduler (other than default) | `""` |
| `influxdb.topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` |
| `influxdb.podManagementPolicy` | podManagementPolicy to manage scaling operation of InfluxDB&trade; pods | `OrderedReady` |
| `influxdb.podSecurityContext.enabled` | Enabled InfluxDB&trade; pods' Security Context | `true` |
| `influxdb.podSecurityContext.fsGroup` | Set InfluxDB&trade; pod's Security Context fsGroup | `1001` |
| `influxdb.containerSecurityContext.enabled` | Enabled InfluxDB&trade; containers' Security Context | `true` |
| `influxdb.containerSecurityContext.runAsUser` | Set InfluxDB&trade; containers' Security Context runAsUser | `1001` |
| `influxdb.containerSecurityContext.runAsNonRoot` | Set Controller container's Security Context runAsNonRoot | `true` |
| `influxdb.resources.limits` | The resources limits for the container | `{}` |
| `influxdb.resources.requests` | The requested resources for the container | `{}` |
| `influxdb.command` | Override default container command (useful when using custom images) | `[]` |
| `influxdb.args` | Override default container args (useful when using custom images) | `[]` |
| `influxdb.lifecycleHooks` | for the InfluxDB&trade; container(s) to automate configuration before or after startup | `{}` |
| `influxdb.extraEnvVars` | Array containing extra env vars to configure InfluxDB&trade; | `[]` |
| `influxdb.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for InfluxDB&trade; nodes | `""` |
| `influxdb.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for InfluxDB&trade; nodes | `""` |
| `influxdb.extraVolumes` | Array of extra volumes to be added to the deployment (evaluated as template). Requires setting extraVolumeMounts | `[]` |
| `influxdb.extraVolumeMounts` | Array of extra volume mounts to be added to the container (evaluated as template). Normally used with extraVolumes. | `[]` |
| `influxdb.containerPorts.http` | InfluxDB&trade; container HTTP port | `8086` |
| `influxdb.containerPorts.rpc` | InfluxDB&trade; container RPC port | `8088` |
| `influxdb.startupProbe.enabled` | Enable startupProbe | `false` |
| `influxdb.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `180` |
| `influxdb.startupProbe.periodSeconds` | Period seconds for startupProbe | `45` |
| `influxdb.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `30` |
| `influxdb.startupProbe.failureThreshold` | Failure threshold for startupProbe | `6` |
| `influxdb.startupProbe.successThreshold` | Success threshold for startupProbe | `1` |
| `influxdb.livenessProbe.enabled` | Enable livenessProbe | `true` |
| `influxdb.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `180` |
| `influxdb.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `45` |
| `influxdb.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` |
| `influxdb.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` |
| `influxdb.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` |
| `influxdb.readinessProbe.enabled` | Enable readinessProbe | `true` |
| `influxdb.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `60` |
| `influxdb.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `45` |
| `influxdb.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` |
| `influxdb.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` |
| `influxdb.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` |
| `influxdb.customStartupProbe` | Override default startup probe | `{}` |
| `influxdb.customLivenessProbe` | Override default liveness probe | `{}` |
| `influxdb.customReadinessProbe` | Override default readiness probe | `{}` |
| `influxdb.sidecars` | Add additional sidecar containers to the InfluxDB&trade; pod(s) | `[]` |
| `influxdb.initContainers` | Add additional init containers to the InfluxDB&trade; pod(s) | `[]` |
| `influxdb.service.type` | Kubernetes service type (`ClusterIP`, `NodePort` or `LoadBalancer`) | `ClusterIP` |
| `influxdb.service.ports.http` | InfluxDB&trade; HTTP port | `8086` |
| `influxdb.service.ports.rpc` | InfluxDB&trade; RPC port | `8088` |
| `influxdb.service.nodePorts` | Specify the nodePort(s) value for the LoadBalancer and NodePort service types. | `{}` |
| `influxdb.service.loadBalancerIP` | loadBalancerIP if service type is `LoadBalancer` | `""` |
| `influxdb.service.loadBalancerSourceRanges` | Address that are allowed when service is LoadBalancer | `[]` |
| `influxdb.service.clusterIP` | Static clusterIP or None for headless services | `""` |
| `influxdb.service.externalTrafficPolicy` | InfluxDB&trade; service external traffic policy | `Cluster` |
| `influxdb.service.extraPorts` | Extra ports to expose (normally used with the `sidecar` value) | `[]` |
| `influxdb.service.annotations` | Annotations for InfluxDB&trade; service | `{}` |
| `influxdb.service.sessionAffinity` | Session Affinity for Kubernetes service, can be "None" or "ClientIP" | `None` |
| `influxdb.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` |
### InfluxDB Collectd&trade; parameters
@@ -259,69 +260,73 @@ The command removes all the Kubernetes components associated with the chart and
### Volume permissions parameters
| Name | Description | Value |
| --------------------------------------------- | ----------------------------------------------------------------------------------------------------------------- | ----------------------- |
| `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume mountpoint to `runAsUser:fsGroup` | `false` |
| `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` |
| `volumePermissions.image.repository` | Init container volume-permissions image name | `bitnami/bitnami-shell` |
| `volumePermissions.image.tag` | Init container volume-permissions image tag | `10-debian-10-r431` |
| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` |
| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
| `volumePermissions.securityContext.runAsUser` | User ID for the init container (when facing issues in OpenShift or uid unknown, try value "auto") | `0` |
| Name | Description | Value |
| --------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------- | ----------------------- |
| `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume mountpoint to `runAsUser:fsGroup` | `false` |
| `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` |
| `volumePermissions.image.repository` | Init container volume-permissions image name | `bitnami/bitnami-shell` |
| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r27` |
| `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` |
| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
| `volumePermissions.securityContext.runAsUser` | User ID for the init container (when facing issues in OpenShift or uid unknown, try value "auto") | `0` |
### InfluxDB&trade; backup parameters
| Name | Description | Value |
| ------------------------------------------------- | ------------------------------------------------------------------------------------------------------- | -------------------------- |
| `backup.enabled` | Enable InfluxDB&trade; backup | `false` |
| `backup.directory` | Directory where backups are stored | `/backups` |
| `backup.retentionDays` | Retention time in days for backups (older backups are deleted) | `10` |
| `backup.cronjob.schedule` | Schedule in Cron format to save snapshots | `0 2 * * *` |
| `backup.cronjob.historyLimit` | Number of successful finished jobs to retain | `1` |
| `backup.cronjob.podAnnotations` | Pod annotations | `{}` |
| `backup.cronjob.securityContext.enabled` | Enable security context for InfluxDB&trade; | `true` |
| `backup.cronjob.securityContext.fsGroup` | Group ID for the InfluxDB&trade; filesystem | `1001` |
| `backup.cronjob.securityContext.runAsUser` | Group ID for the InfluxDB&trade; filesystem | `1001` |
| `backup.podAffinityPreset` | Backup &trade; Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `backup.podAntiAffinityPreset` | Backup&trade; Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
| `backup.nodeAffinityPreset.type` | Backup&trade; Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `backup.nodeAffinityPreset.key` | Backup&trade; Node label key to match Ignored if `affinity` is set. | `""` |
| `backup.nodeAffinityPreset.values` | Backup&trade; Node label values to match. Ignored if `affinity` is set. | `[]` |
| `backup.affinity` | Backup&trade; Affinity for backup pod assignment | `{}` |
| `backup.nodeSelector` | Backup&trade; Node labels for backup pod assignment | `{}` |
| `backup.tolerations` | Backup&trade; Tolerations for backup pod assignment | `[]` |
| `backup.uploadProviders.google.enabled` | enable upload to google storage bucket | `false` |
| `backup.uploadProviders.google.secret` | json secret with serviceaccount data to access Google storage bucket | `""` |
| `backup.uploadProviders.google.secretKey` | service account secret key name | `key.json` |
| `backup.uploadProviders.google.existingSecret` | Name of existing secret object with Google serviceaccount json credentials | `""` |
| `backup.uploadProviders.google.bucketName` | google storage bucket name name | `gs://bucket/influxdb` |
| `backup.uploadProviders.google.image.registry` | Google Cloud SDK image registry | `docker.io` |
| `backup.uploadProviders.google.image.repository` | Google Cloud SDK image name | `bitnami/google-cloud-sdk` |
| `backup.uploadProviders.google.image.tag` | Google Cloud SDK image tag | `0.386.0-debian-10-r2` |
| `backup.uploadProviders.google.image.pullPolicy` | Google Cloud SDK image pull policy | `IfNotPresent` |
| `backup.uploadProviders.google.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
| `backup.uploadProviders.azure.enabled` | Enable upload to azure storage container | `false` |
| `backup.uploadProviders.azure.secret` | Secret with credentials to access Azure storage | `""` |
| `backup.uploadProviders.azure.secretKey` | Service account secret key name | `connection-string` |
| `backup.uploadProviders.azure.existingSecret` | Name of existing secret object | `""` |
| `backup.uploadProviders.azure.containerName` | Destination container | `influxdb-container` |
| `backup.uploadProviders.azure.image.registry` | Azure CLI image registry | `docker.io` |
| `backup.uploadProviders.azure.image.repository` | Azure CLI image repository | `bitnami/azure-cli` |
| `backup.uploadProviders.azure.image.tag` | Azure CLI image tag (immutable tags are recommended) | `2.36.0-debian-10-r23` |
| `backup.uploadProviders.azure.image.pullPolicy` | Azure CLI image pull policy | `IfNotPresent` |
| `backup.uploadProviders.azure.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
| `backup.uploadProviders.aws.enabled` | Enable upload to aws s3 bucket | `false` |
| `backup.uploadProviders.aws.accessKeyID` | Access Key ID to access aws s3 | `""` |
| `backup.uploadProviders.aws.secretAccessKey` | Secret Access Key to access aws s3 | `""` |
| `backup.uploadProviders.aws.region` | Region of aws s3 bucket | `us-east-1` |
| `backup.uploadProviders.aws.existingSecret` | Name of existing secret object | `""` |
| `backup.uploadProviders.aws.bucketName` | aws s3 bucket name | `s3://bucket/influxdb` |
| `backup.uploadProviders.aws.image.registry` | AWS CLI image registry | `docker.io` |
| `backup.uploadProviders.aws.image.repository` | AWS CLI image repository | `bitnami/aws-cli` |
| `backup.uploadProviders.aws.image.tag` | AWS CLI image tag (immutable tags are recommended) | `2.4.7-debian-10-r4` |
| `backup.uploadProviders.aws.image.pullPolicy` | AWS CLI image pull policy | `IfNotPresent` |
| `backup.uploadProviders.aws.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
| Name | Description | Value |
| ------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------- | -------------------------- |
| `backup.enabled` | Enable InfluxDB&trade; backup | `false` |
| `backup.directory` | Directory where backups are stored | `/backups` |
| `backup.retentionDays` | Retention time in days for backups (older backups are deleted) | `10` |
| `backup.cronjob.schedule` | Schedule in Cron format to save snapshots | `0 2 * * *` |
| `backup.cronjob.historyLimit` | Number of successful finished jobs to retain | `1` |
| `backup.cronjob.podAnnotations` | Pod annotations | `{}` |
| `backup.cronjob.securityContext.enabled` | Enable security context for InfluxDB&trade; | `true` |
| `backup.cronjob.securityContext.fsGroup` | Group ID for the InfluxDB&trade; filesystem | `1001` |
| `backup.cronjob.securityContext.runAsUser` | Group ID for the InfluxDB&trade; filesystem | `1001` |
| `backup.podAffinityPreset` | Backup &trade; Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `backup.podAntiAffinityPreset` | Backup&trade; Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
| `backup.nodeAffinityPreset.type` | Backup&trade; Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `backup.nodeAffinityPreset.key` | Backup&trade; Node label key to match Ignored if `affinity` is set. | `""` |
| `backup.nodeAffinityPreset.values` | Backup&trade; Node label values to match. Ignored if `affinity` is set. | `[]` |
| `backup.affinity` | Backup&trade; Affinity for backup pod assignment | `{}` |
| `backup.nodeSelector` | Backup&trade; Node labels for backup pod assignment | `{}` |
| `backup.tolerations` | Backup&trade; Tolerations for backup pod assignment | `[]` |
| `backup.uploadProviders.google.enabled` | enable upload to google storage bucket | `false` |
| `backup.uploadProviders.google.secret` | json secret with serviceaccount data to access Google storage bucket | `""` |
| `backup.uploadProviders.google.secretKey` | service account secret key name | `key.json` |
| `backup.uploadProviders.google.existingSecret` | Name of existing secret object with Google serviceaccount json credentials | `""` |
| `backup.uploadProviders.google.bucketName` | google storage bucket name name | `gs://bucket/influxdb` |
| `backup.uploadProviders.google.image.registry` | Google Cloud SDK image registry | `docker.io` |
| `backup.uploadProviders.google.image.repository` | Google Cloud SDK image name | `bitnami/google-cloud-sdk` |
| `backup.uploadProviders.google.image.tag` | Google Cloud SDK image tag | `0.398.0-debian-11-r0` |
| `backup.uploadProviders.google.image.digest` | Google Cloud SDK image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `backup.uploadProviders.google.image.pullPolicy` | Google Cloud SDK image pull policy | `IfNotPresent` |
| `backup.uploadProviders.google.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
| `backup.uploadProviders.azure.enabled` | Enable upload to azure storage container | `false` |
| `backup.uploadProviders.azure.secret` | Secret with credentials to access Azure storage | `""` |
| `backup.uploadProviders.azure.secretKey` | Service account secret key name | `connection-string` |
| `backup.uploadProviders.azure.existingSecret` | Name of existing secret object | `""` |
| `backup.uploadProviders.azure.containerName` | Destination container | `influxdb-container` |
| `backup.uploadProviders.azure.image.registry` | Azure CLI image registry | `docker.io` |
| `backup.uploadProviders.azure.image.repository` | Azure CLI image repository | `bitnami/azure-cli` |
| `backup.uploadProviders.azure.image.tag` | Azure CLI image tag (immutable tags are recommended) | `2.39.0-debian-11-r6` |
| `backup.uploadProviders.azure.image.digest` | Azure CLI image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `backup.uploadProviders.azure.image.pullPolicy` | Azure CLI image pull policy | `IfNotPresent` |
| `backup.uploadProviders.azure.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
| `backup.uploadProviders.aws.enabled` | Enable upload to aws s3 bucket | `false` |
| `backup.uploadProviders.aws.accessKeyID` | Access Key ID to access aws s3 | `""` |
| `backup.uploadProviders.aws.secretAccessKey` | Secret Access Key to access aws s3 | `""` |
| `backup.uploadProviders.aws.region` | Region of aws s3 bucket | `us-east-1` |
| `backup.uploadProviders.aws.existingSecret` | Name of existing secret object | `""` |
| `backup.uploadProviders.aws.bucketName` | aws s3 bucket name | `s3://bucket/influxdb` |
| `backup.uploadProviders.aws.image.registry` | AWS CLI image registry | `docker.io` |
| `backup.uploadProviders.aws.image.repository` | AWS CLI image repository | `bitnami/aws-cli` |
| `backup.uploadProviders.aws.image.tag` | AWS CLI image tag (immutable tags are recommended) | `2.4.7-debian-10-r4` |
| `backup.uploadProviders.aws.image.digest` | AWS CLI image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `backup.uploadProviders.aws.image.pullPolicy` | AWS CLI image pull policy | `IfNotPresent` |
| `backup.uploadProviders.aws.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
Specify each parameter using the `--set key=value[,key=value]` argument to `helm install`. For example,

View File

@@ -62,6 +62,7 @@ diagnosticMode:
## @param image.registry InfluxDB&trade; image registry
## @param image.repository InfluxDB&trade; image repository
## @param image.tag InfluxDB&trade; image tag (immutable tags are recommended)
## @param image.digest InfluxDB&trade; image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag
## @param image.pullPolicy InfluxDB&trade; image pull policy
## @param image.pullSecrets Specify docker-registry secret names as an array
## @param image.debug Specify if debug logs should be enabled
@@ -70,6 +71,7 @@ image:
registry: docker.io
repository: bitnami/influxdb
tag: 2.4.0-debian-11-r0
digest: ""
## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images
##
@@ -808,6 +810,7 @@ volumePermissions:
## @param volumePermissions.image.registry Init container volume-permissions image registry
## @param volumePermissions.image.repository Init container volume-permissions image name
## @param volumePermissions.image.tag Init container volume-permissions image tag
## @param volumePermissions.image.digest Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag
## @param volumePermissions.image.pullPolicy Init container volume-permissions image pull policy
## @param volumePermissions.image.pullSecrets Specify docker-registry secret names as an array
##
@@ -815,6 +818,7 @@ volumePermissions:
registry: docker.io
repository: bitnami/bitnami-shell
tag: 11-debian-11-r27
digest: ""
## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images
##
@@ -937,6 +941,7 @@ backup:
## @param backup.uploadProviders.google.image.registry Google Cloud SDK image registry
## @param backup.uploadProviders.google.image.repository Google Cloud SDK image name
## @param backup.uploadProviders.google.image.tag Google Cloud SDK image tag
## @param backup.uploadProviders.google.image.digest Google Cloud SDK image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag
## @param backup.uploadProviders.google.image.pullPolicy Google Cloud SDK image pull policy
## @param backup.uploadProviders.google.image.pullSecrets Specify docker-registry secret names as an array
##
@@ -944,6 +949,7 @@ backup:
registry: docker.io
repository: bitnami/google-cloud-sdk
tag: 0.398.0-debian-11-r0
digest: ""
## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images
##
@@ -974,6 +980,7 @@ backup:
## @param backup.uploadProviders.azure.image.registry Azure CLI image registry
## @param backup.uploadProviders.azure.image.repository Azure CLI image repository
## @param backup.uploadProviders.azure.image.tag Azure CLI image tag (immutable tags are recommended)
## @param backup.uploadProviders.azure.image.digest Azure CLI image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag
## @param backup.uploadProviders.azure.image.pullPolicy Azure CLI image pull policy
## @param backup.uploadProviders.azure.image.pullSecrets Specify docker-registry secret names as an array
##
@@ -981,6 +988,7 @@ backup:
registry: docker.io
repository: bitnami/azure-cli
tag: 2.39.0-debian-11-r6
digest: ""
## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images
##
@@ -1011,6 +1019,7 @@ backup:
## @param backup.uploadProviders.aws.image.registry AWS CLI image registry
## @param backup.uploadProviders.aws.image.repository AWS CLI image repository
## @param backup.uploadProviders.aws.image.tag AWS CLI image tag (immutable tags are recommended)
## @param backup.uploadProviders.aws.image.digest AWS CLI image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag
## @param backup.uploadProviders.aws.image.pullPolicy AWS CLI image pull policy
## @param backup.uploadProviders.aws.image.pullSecrets Specify docker-registry secret names as an array
##
@@ -1018,6 +1027,7 @@ backup:
registry: docker.io
repository: bitnami/aws-cli
tag: 2.4.7-debian-10-r4
digest: ""
## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images
##