mirror of
https://github.com/bitnami/charts.git
synced 2026-03-12 06:47:32 +08:00
[bitnami/influxdb] Feature - Add CA bundle option to influxdb backup job (#30659)
* Feature to include ca-bundle in backup cronjob Signed-off-by: Shreekumar Hegde <s.shreekumar.c@gmail.com> * Update Chart version Signed-off-by: Shreekumar Hegde <s.shreekumar.c@gmail.com> * Update README Signed-off-by: Shreekumar Hegde <s.shreekumar.c@gmail.com> * Resolve merge conflict - CHANGELOG.md Signed-off-by: Shreekumar Hegde <s.shreekumar.c@gmail.com> * Update CHANGELOG.md Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com> * Update CHANGELOG.md Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com> --------- Signed-off-by: Shreekumar Hegde <s.shreekumar.c@gmail.com> Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com> Co-authored-by: Bitnami Containers <bitnami-bot@vmware.com>
This commit is contained in:
@@ -1,8 +1,12 @@
|
||||
# Changelog
|
||||
|
||||
## 6.3.23 (2024-11-28)
|
||||
## 6.4.0 (2024-11-29)
|
||||
|
||||
* [bitnam/influxdb] gcloud backups, replace gsutil ([#30595](https://github.com/bitnami/charts/pull/30595))
|
||||
* [bitnami/influxdb] Feature - Add CA bundle option to influxdb backup job ([#30659](https://github.com/bitnami/charts/pull/30659))
|
||||
|
||||
## <small>6.3.23 (2024-11-28)</small>
|
||||
|
||||
* [bitnam/influxdb] gcloud backups, replace gsutil (#30595) ([9914b1b](https://github.com/bitnami/charts/commit/9914b1bbc403330378c28711371bdf53b76ffc19)), closes [#30595](https://github.com/bitnami/charts/issues/30595)
|
||||
|
||||
## <small>6.3.22 (2024-11-07)</small>
|
||||
|
||||
|
||||
@@ -37,4 +37,4 @@ maintainers:
|
||||
name: influxdb
|
||||
sources:
|
||||
- https://github.com/bitnami/charts/tree/main/bitnami/influxdb
|
||||
version: 6.3.23
|
||||
version: 6.4.0
|
||||
|
||||
@@ -400,84 +400,88 @@ There are K8s distribution, such as OpenShift, where you can dynamically define
|
||||
|
||||
### InfluxDB™ backup parameters
|
||||
|
||||
| Name | Description | Value |
|
||||
| ------------------------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------- |
|
||||
| `backup.enabled` | Enable InfluxDB™ backup | `false` |
|
||||
| `backup.directory` | Directory where backups are stored | `/backups` |
|
||||
| `backup.retentionDays` | Retention time in days for backups (older backups are deleted) | `10` |
|
||||
| `backup.persistence.ownConfig` | Prefer independent own persistence parameters to configure the backup volume | `false` |
|
||||
| `backup.persistence.enabled` | Enable data persistence for backup volume | `true` |
|
||||
| `backup.persistence.existingClaim` | Use a existing PVC which must be created manually before bound | `""` |
|
||||
| `backup.persistence.storageClass` | Specify the `storageClass` used to provision the volume | `""` |
|
||||
| `backup.persistence.accessModes` | Access mode of data volume | `["ReadWriteOnce"]` |
|
||||
| `backup.persistence.size` | Size of data volume | `8Gi` |
|
||||
| `backup.persistence.annotations` | Persistent Volume Claim annotations | `{}` |
|
||||
| `backup.cronjob.schedule` | Schedule in Cron format to save snapshots | `0 2 * * *` |
|
||||
| `backup.cronjob.historyLimit` | Number of successful finished jobs to retain | `1` |
|
||||
| `backup.cronjob.podAnnotations` | Pod annotations | `{}` |
|
||||
| `backup.cronjob.podSecurityContext.enabled` | Enable security context for InfluxDB™ backup pods | `true` |
|
||||
| `backup.cronjob.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` |
|
||||
| `backup.cronjob.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` |
|
||||
| `backup.cronjob.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
|
||||
| `backup.cronjob.podSecurityContext.fsGroup` | Group ID for the InfluxDB™ filesystem | `1001` |
|
||||
| `backup.cronjob.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
|
||||
| `backup.cronjob.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
|
||||
| `backup.cronjob.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
|
||||
| `backup.cronjob.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` |
|
||||
| `backup.cronjob.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
|
||||
| `backup.cronjob.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
|
||||
| `backup.cronjob.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` |
|
||||
| `backup.cronjob.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` |
|
||||
| `backup.cronjob.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` |
|
||||
| `backup.cronjob.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` |
|
||||
| `backup.cronjob.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if influxdb.resources is set (influxdb.resources is recommended for production). | `none` |
|
||||
| `backup.cronjob.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
|
||||
| `backup.podAffinityPreset` | Backup ™ Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `backup.podAntiAffinityPreset` | Backup™ Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
|
||||
| `backup.nodeAffinityPreset.type` | Backup™ Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `backup.nodeAffinityPreset.key` | Backup™ Node label key to match Ignored if `affinity` is set. | `""` |
|
||||
| `backup.nodeAffinityPreset.values` | Backup™ Node label values to match. Ignored if `affinity` is set. | `[]` |
|
||||
| `backup.affinity` | Backup™ Affinity for backup pod assignment | `{}` |
|
||||
| `backup.nodeSelector` | Backup™ Node labels for backup pod assignment | `{}` |
|
||||
| `backup.tolerations` | Backup™ Tolerations for backup pod assignment | `[]` |
|
||||
| `backup.uploadProviders.google.enabled` | enable upload to google storage bucket | `false` |
|
||||
| `backup.uploadProviders.google.secret` | json secret with serviceaccount data to access Google storage bucket | `""` |
|
||||
| `backup.uploadProviders.google.secretKey` | service account secret key name | `key.json` |
|
||||
| `backup.uploadProviders.google.existingSecret` | Name of existing secret object with Google serviceaccount json credentials | `""` |
|
||||
| `backup.uploadProviders.google.bucketName` | google storage bucket name name | `gs://bucket/influxdb` |
|
||||
| `backup.uploadProviders.google.image.registry` | Google Cloud SDK image registry | `REGISTRY_NAME` |
|
||||
| `backup.uploadProviders.google.image.repository` | Google Cloud SDK image name | `REPOSITORY_NAME/google-cloud-sdk` |
|
||||
| `backup.uploadProviders.google.image.digest` | Google Cloud SDK image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `backup.uploadProviders.google.image.pullPolicy` | Google Cloud SDK image pull policy | `IfNotPresent` |
|
||||
| `backup.uploadProviders.google.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
| `backup.uploadProviders.google.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if influxdb.resources is set (influxdb.resources is recommended for production). | `none` |
|
||||
| `backup.uploadProviders.google.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
|
||||
| `backup.uploadProviders.azure.enabled` | Enable upload to azure storage container | `false` |
|
||||
| `backup.uploadProviders.azure.secret` | Secret with credentials to access Azure storage | `""` |
|
||||
| `backup.uploadProviders.azure.secretKey` | Service account secret key name | `connection-string` |
|
||||
| `backup.uploadProviders.azure.existingSecret` | Name of existing secret object | `""` |
|
||||
| `backup.uploadProviders.azure.containerName` | Destination container | `influxdb-container` |
|
||||
| `backup.uploadProviders.azure.image.registry` | Azure CLI image registry | `REGISTRY_NAME` |
|
||||
| `backup.uploadProviders.azure.image.repository` | Azure CLI image repository | `REPOSITORY_NAME/azure-cli` |
|
||||
| `backup.uploadProviders.azure.image.digest` | Azure CLI image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `backup.uploadProviders.azure.image.pullPolicy` | Azure CLI image pull policy | `IfNotPresent` |
|
||||
| `backup.uploadProviders.azure.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
| `backup.uploadProviders.azure.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if influxdb.resources is set (influxdb.resources is recommended for production). | `none` |
|
||||
| `backup.uploadProviders.azure.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
|
||||
| `backup.uploadProviders.aws.enabled` | Enable upload to aws s3 bucket | `false` |
|
||||
| `backup.uploadProviders.aws.accessKeyID` | Access Key ID to access aws s3 | `""` |
|
||||
| `backup.uploadProviders.aws.secretAccessKey` | Secret Access Key to access aws s3 | `""` |
|
||||
| `backup.uploadProviders.aws.region` | Region of aws s3 bucket | `us-east-1` |
|
||||
| `backup.uploadProviders.aws.existingSecret` | Name of existing secret object | `""` |
|
||||
| `backup.uploadProviders.aws.bucketName` | aws s3 bucket name | `s3://bucket/influxdb` |
|
||||
| `backup.uploadProviders.aws.endpoint` | aws s3 endpoint, no value default public endpoint aws s3 endpoint | `""` |
|
||||
| `backup.uploadProviders.aws.image.registry` | AWS CLI image registry | `REGISTRY_NAME` |
|
||||
| `backup.uploadProviders.aws.image.repository` | AWS CLI image repository | `REPOSITORY_NAME/aws-cli` |
|
||||
| `backup.uploadProviders.aws.image.digest` | AWS CLI image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `backup.uploadProviders.aws.image.pullPolicy` | AWS CLI image pull policy | `IfNotPresent` |
|
||||
| `backup.uploadProviders.aws.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
| `backup.uploadProviders.aws.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if influxdb.resources is set (influxdb.resources is recommended for production). | `none` |
|
||||
| `backup.uploadProviders.aws.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
|
||||
| Name | Description | Value |
|
||||
| ------------------------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------ |
|
||||
| `backup.enabled` | Enable InfluxDB™ backup | `false` |
|
||||
| `backup.directory` | Directory where backups are stored | `/backups` |
|
||||
| `backup.retentionDays` | Retention time in days for backups (older backups are deleted) | `10` |
|
||||
| `backup.persistence.ownConfig` | Prefer independent own persistence parameters to configure the backup volume | `false` |
|
||||
| `backup.persistence.enabled` | Enable data persistence for backup volume | `true` |
|
||||
| `backup.persistence.existingClaim` | Use a existing PVC which must be created manually before bound | `""` |
|
||||
| `backup.persistence.storageClass` | Specify the `storageClass` used to provision the volume | `""` |
|
||||
| `backup.persistence.accessModes` | Access mode of data volume | `["ReadWriteOnce"]` |
|
||||
| `backup.persistence.size` | Size of data volume | `8Gi` |
|
||||
| `backup.persistence.annotations` | Persistent Volume Claim annotations | `{}` |
|
||||
| `backup.cronjob.schedule` | Schedule in Cron format to save snapshots | `0 2 * * *` |
|
||||
| `backup.cronjob.historyLimit` | Number of successful finished jobs to retain | `1` |
|
||||
| `backup.cronjob.caBundle.enabled` | Boolean flag to enable/disable the inclusion of a CA bundle for backup CronJob. | `false` |
|
||||
| `backup.cronjob.caBundle.existingConfigMap` | Name of the existing ConfigMap that contains the CA bundle for SSL Communication. | `""` |
|
||||
| `backup.cronjob.caBundle.mountPath` | The path inside the CronJob container where the CA bundle will be mounted. | `/opt/ca-certificates/ca-bundle.crt` |
|
||||
| `backup.cronjob.caBundle.subPath` | The filename within the mountPath directory where the CA bundle will be available. | `ca-bundle.crt` |
|
||||
| `backup.cronjob.podAnnotations` | Pod annotations | `{}` |
|
||||
| `backup.cronjob.podSecurityContext.enabled` | Enable security context for InfluxDB™ backup pods | `true` |
|
||||
| `backup.cronjob.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` |
|
||||
| `backup.cronjob.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` |
|
||||
| `backup.cronjob.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
|
||||
| `backup.cronjob.podSecurityContext.fsGroup` | Group ID for the InfluxDB™ filesystem | `1001` |
|
||||
| `backup.cronjob.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
|
||||
| `backup.cronjob.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
|
||||
| `backup.cronjob.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
|
||||
| `backup.cronjob.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` |
|
||||
| `backup.cronjob.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
|
||||
| `backup.cronjob.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
|
||||
| `backup.cronjob.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` |
|
||||
| `backup.cronjob.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` |
|
||||
| `backup.cronjob.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` |
|
||||
| `backup.cronjob.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` |
|
||||
| `backup.cronjob.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if influxdb.resources is set (influxdb.resources is recommended for production). | `none` |
|
||||
| `backup.cronjob.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
|
||||
| `backup.podAffinityPreset` | Backup ™ Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `backup.podAntiAffinityPreset` | Backup™ Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
|
||||
| `backup.nodeAffinityPreset.type` | Backup™ Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `backup.nodeAffinityPreset.key` | Backup™ Node label key to match Ignored if `affinity` is set. | `""` |
|
||||
| `backup.nodeAffinityPreset.values` | Backup™ Node label values to match. Ignored if `affinity` is set. | `[]` |
|
||||
| `backup.affinity` | Backup™ Affinity for backup pod assignment | `{}` |
|
||||
| `backup.nodeSelector` | Backup™ Node labels for backup pod assignment | `{}` |
|
||||
| `backup.tolerations` | Backup™ Tolerations for backup pod assignment | `[]` |
|
||||
| `backup.uploadProviders.google.enabled` | enable upload to google storage bucket | `false` |
|
||||
| `backup.uploadProviders.google.secret` | json secret with serviceaccount data to access Google storage bucket | `""` |
|
||||
| `backup.uploadProviders.google.secretKey` | service account secret key name | `key.json` |
|
||||
| `backup.uploadProviders.google.existingSecret` | Name of existing secret object with Google serviceaccount json credentials | `""` |
|
||||
| `backup.uploadProviders.google.bucketName` | google storage bucket name name | `gs://bucket/influxdb` |
|
||||
| `backup.uploadProviders.google.image.registry` | Google Cloud SDK image registry | `REGISTRY_NAME` |
|
||||
| `backup.uploadProviders.google.image.repository` | Google Cloud SDK image name | `REPOSITORY_NAME/google-cloud-sdk` |
|
||||
| `backup.uploadProviders.google.image.digest` | Google Cloud SDK image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `backup.uploadProviders.google.image.pullPolicy` | Google Cloud SDK image pull policy | `IfNotPresent` |
|
||||
| `backup.uploadProviders.google.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
| `backup.uploadProviders.google.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if influxdb.resources is set (influxdb.resources is recommended for production). | `none` |
|
||||
| `backup.uploadProviders.google.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
|
||||
| `backup.uploadProviders.azure.enabled` | Enable upload to azure storage container | `false` |
|
||||
| `backup.uploadProviders.azure.secret` | Secret with credentials to access Azure storage | `""` |
|
||||
| `backup.uploadProviders.azure.secretKey` | Service account secret key name | `connection-string` |
|
||||
| `backup.uploadProviders.azure.existingSecret` | Name of existing secret object | `""` |
|
||||
| `backup.uploadProviders.azure.containerName` | Destination container | `influxdb-container` |
|
||||
| `backup.uploadProviders.azure.image.registry` | Azure CLI image registry | `REGISTRY_NAME` |
|
||||
| `backup.uploadProviders.azure.image.repository` | Azure CLI image repository | `REPOSITORY_NAME/azure-cli` |
|
||||
| `backup.uploadProviders.azure.image.digest` | Azure CLI image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `backup.uploadProviders.azure.image.pullPolicy` | Azure CLI image pull policy | `IfNotPresent` |
|
||||
| `backup.uploadProviders.azure.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
| `backup.uploadProviders.azure.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if influxdb.resources is set (influxdb.resources is recommended for production). | `none` |
|
||||
| `backup.uploadProviders.azure.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
|
||||
| `backup.uploadProviders.aws.enabled` | Enable upload to aws s3 bucket | `false` |
|
||||
| `backup.uploadProviders.aws.accessKeyID` | Access Key ID to access aws s3 | `""` |
|
||||
| `backup.uploadProviders.aws.secretAccessKey` | Secret Access Key to access aws s3 | `""` |
|
||||
| `backup.uploadProviders.aws.region` | Region of aws s3 bucket | `us-east-1` |
|
||||
| `backup.uploadProviders.aws.existingSecret` | Name of existing secret object | `""` |
|
||||
| `backup.uploadProviders.aws.bucketName` | aws s3 bucket name | `s3://bucket/influxdb` |
|
||||
| `backup.uploadProviders.aws.endpoint` | aws s3 endpoint, no value default public endpoint aws s3 endpoint | `""` |
|
||||
| `backup.uploadProviders.aws.image.registry` | AWS CLI image registry | `REGISTRY_NAME` |
|
||||
| `backup.uploadProviders.aws.image.repository` | AWS CLI image repository | `REPOSITORY_NAME/aws-cli` |
|
||||
| `backup.uploadProviders.aws.image.digest` | AWS CLI image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
|
||||
| `backup.uploadProviders.aws.image.pullPolicy` | AWS CLI image pull policy | `IfNotPresent` |
|
||||
| `backup.uploadProviders.aws.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
||||
| `backup.uploadProviders.aws.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if influxdb.resources is set (influxdb.resources is recommended for production). | `none` |
|
||||
| `backup.uploadProviders.aws.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
|
||||
|
||||
## Troubleshooting
|
||||
|
||||
|
||||
@@ -40,6 +40,11 @@ spec:
|
||||
configMap:
|
||||
name: {{ include "common.names.fullname" . }}-backup
|
||||
defaultMode: 0755
|
||||
{{- if .Values.backup.cronjob.caBundle.enabled }}
|
||||
- name: ca-bundle
|
||||
configMap:
|
||||
name: {{ .Values.backup.cronjob.caBundle.existingConfigMap }}
|
||||
{{- end }}
|
||||
{{- if .Values.backup.uploadProviders.google.enabled }}
|
||||
- name: google-cloud-key
|
||||
secret:
|
||||
@@ -147,6 +152,11 @@ spec:
|
||||
subPath: upload-google.sh
|
||||
- name: google-cloud-key
|
||||
mountPath: /var/secrets/google/
|
||||
{{- if .Values.backup.cronjob.caBundle.enabled }}
|
||||
- name: ca-bundle
|
||||
mountPath: {{ .Values.backup.cronjob.caBundle.mountPath }}
|
||||
subPath: {{ .Values.backup.cronjob.caBundle.subPath }}
|
||||
{{- end }}
|
||||
{{- if .Values.backup.cronjob.containerSecurityContext.enabled }}
|
||||
securityContext: {{- include "common.compatibility.renderSecurityContext" (dict "secContext" .Values.backup.cronjob.containerSecurityContext "context" $) | nindent 16 }}
|
||||
{{- end }}
|
||||
@@ -185,6 +195,11 @@ spec:
|
||||
- name: backup-scripts
|
||||
mountPath: /tmp/upload-azure.sh
|
||||
subPath: upload-azure.sh
|
||||
{{- if .Values.backup.cronjob.caBundle.enabled }}
|
||||
- name: ca-bundle
|
||||
mountPath: {{ .Values.backup.cronjob.caBundle.mountPath }}
|
||||
subPath: {{ .Values.backup.cronjob.caBundle.subPath }}
|
||||
{{- end }}
|
||||
{{- if .Values.backup.cronjob.containerSecurityContext.enabled }}
|
||||
securityContext: {{- include "common.compatibility.renderSecurityContext" (dict "secContext" .Values.backup.cronjob.containerSecurityContext "context" $) | nindent 16 }}
|
||||
{{- end }}
|
||||
@@ -241,6 +256,10 @@ spec:
|
||||
name: {{ include "common.names.fullname" . }}-backup-aws
|
||||
{{- end }}
|
||||
key: endpoint
|
||||
{{- if .Values.backup.cronjob.caBundle.enabled }}
|
||||
- name: AWS_CA_BUNDLE
|
||||
value: {{ .Values.backup.cronjob.caBundle.mountPath }}
|
||||
{{- end }}
|
||||
volumeMounts:
|
||||
- name: empty-dir
|
||||
mountPath: /tmp
|
||||
@@ -253,6 +272,11 @@ spec:
|
||||
- name: backup-scripts
|
||||
mountPath: /tmp/upload-aws.sh
|
||||
subPath: upload-aws.sh
|
||||
{{- if .Values.backup.cronjob.caBundle.enabled }}
|
||||
- name: ca-bundle
|
||||
mountPath: {{ .Values.backup.cronjob.caBundle.mountPath }}
|
||||
subPath: {{ .Values.backup.cronjob.caBundle.subPath }}
|
||||
{{- end }}
|
||||
{{- if .Values.backup.cronjob.containerSecurityContext.enabled }}
|
||||
securityContext: {{- include "common.compatibility.renderSecurityContext" (dict "secContext" .Values.backup.cronjob.containerSecurityContext "context" $) | nindent 16 }}
|
||||
{{- end }}
|
||||
|
||||
@@ -979,6 +979,24 @@ backup:
|
||||
## @param backup.cronjob.historyLimit Number of successful finished jobs to retain
|
||||
##
|
||||
historyLimit: 1
|
||||
##
|
||||
## Option to include ca-bundle
|
||||
##
|
||||
caBundle:
|
||||
## @param backup.cronjob.caBundle.enabled Boolean flag to enable/disable the inclusion of a CA bundle for backup CronJob.
|
||||
## If enabled a configmap should be created with key as ca-bundle.crt and value to be the actual CA Bundle
|
||||
##
|
||||
enabled: false
|
||||
## @param backup.cronjob.caBundle.existingConfigMap Name of the existing ConfigMap that contains the CA bundle for SSL Communication.
|
||||
##
|
||||
existingConfigMap: ""
|
||||
## @param backup.cronjob.caBundle.mountPath The path inside the CronJob container where the CA bundle will be mounted.
|
||||
##
|
||||
mountPath: "/opt/ca-certificates/ca-bundle.crt"
|
||||
## @param backup.cronjob.caBundle.subPath The filename within the mountPath directory where the CA bundle will be available.
|
||||
##
|
||||
subPath: "ca-bundle.crt"
|
||||
##
|
||||
## @param backup.cronjob.podAnnotations Pod annotations
|
||||
## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
|
||||
##
|
||||
|
||||
Reference in New Issue
Block a user