# Bitnami package for Dremio Dremio is an open-source self-service data access tool that provides high-performance queries for interactive analytics on data lakes. [Overview of Dremio](https://www.dremio.com/) Trademarks: This software listing is packaged by Bitnami. The respective trademarks mentioned in the offering are owned by the respective companies, and use of them does not imply any affiliation or endorsement. ## TL;DR ```console helm install my-release oci://registry-1.docker.io/bitnamicharts/dremio ``` Looking to use dremio in production? Try [VMware Tanzu Application Catalog](https://bitnami.com/enterprise), the enterprise edition of Bitnami Application Catalog. ## Introduction This chart bootstraps a [Dremio](https://github.com/bitnami/containers/tree/main/bitnami/dremio) deployment on a [Kubernetes](https://kubernetes.io) cluster using the [Helm](https://helm.sh) package manager. ## Prerequisites - Kubernetes 1.23+ - Helm 3.8.0+ - PV provisioner support in the underlying infrastructure ## Installing the Chart To install the chart with the release name `my-release`: ```console helm install my-release oci://REGISTRY_NAME/REPOSITORY_NAME/dremio ``` > Note: You need to substitute the placeholders `REGISTRY_NAME` and `REPOSITORY_NAME` with a reference to your Helm chart registry and repository. For example, in the case of Bitnami, you need to use `REGISTRY_NAME=registry-1.docker.io` and `REPOSITORY_NAME=bitnamicharts`. The command deploys dremio on the Kubernetes cluster in the default configuration. The [Parameters](#parameters) section lists the parameters that can be configured during installation. > **Tip**: List all releases using `helm list` ## Configuration and installation details ### [Rolling VS Immutable tags](https://techdocs.broadcom.com/us/en/vmware-tanzu/application-catalog/tanzu-application-catalog/services/tac-doc/apps-tutorials-understand-rolling-tags-containers-index.html) It is strongly recommended to use immutable tags in a production environment. This ensures your deployment does not change automatically if the same tag is updated with a different image. Bitnami will release a new chart updating its containers if a new version of the main container, significant changes, or critical vulnerabilities exist. ### Customizing Dremio configuration files Dremio has two main configuration files: `dremio.conf` and `core-site.xml`. These are automatically generated by the chart using the information provided in the `values.yaml` file. It is possible to add custom information in both files #### Customizing the dremio.conf file The `dremio.conf` file gets overridden using the following parameters: - `dremio.dremioConf.configOverrides`: non-sensitive settings to be applied to *all Dremio nodes*. - `dremio.dremioConf.secretConfigOverrides`: sensitive settings to be applied to *all Dremio nodes*. The parameters above are applied to all Dremio nodes. For more specific node settings, the chart uses the following parameters: -`masterCoordinator.dremioConf.configOverrides`: non-sensitive settings to be applied to *Dremio master coordinator nodes*. -`masterCoordinator.dremioConf.secretConfigOverrides`: sensitive settings to be applied to *Dremio master coordinator nodes*. -`coordinator.dremioConf.configOverrides`: non-sensitive settings to be applied to *Dremio coordinator nodes*. -`coordinator.dremioConf.secretConfigOverrides`: sensitive settings to be applied to *Dremio coordinator nodes*. -`executor.common.dremioConf.configOverrides`: non-sensitive settings to be applied to *Dremio executor nodes*. -`executor.common.dremioConf.secretConfigOverrides`: sensitive settings to be applied to *Dremio executor nodes*. Using these parameters, the chart will generate ConfigMaps (with the non-sensitive settings) and Secrets (with the sensitive settings) for each Dremio component. Afterwards, an init-container will merge the information from the ConfigMap and the Secret generating the final `dremio.conf` file which gets mounted in `/opt/bitnami/dremio/conf`. > NOTE: The settings in the parameters above must be inserted in YAML format, which will get translated into HOCON-compatible flattened YAML. In the example below we override the upload path for all Dremio nodes and increase the token expiration time in master-coordinator nodes: ```yaml dremio: dremioConf: configOverrides: paths.upload: /tmp/uploads masterCoordinator: dremioConf: configOverrides: services.coordinator.web.tokens.cache.expiration_minutes: 20 ``` Check the [upstream Dremio documentation](https://docs.dremio.com/current/get-started/cluster-deployments/customizing-configuration/dremio-conf/) for the list of allowed settings. As an alternative, it is possible to provide existing ConfigMaps and Secrets with the `dremio.conf` configuration. This is done using the `*.dremioConf.existingSecret` and `*.dremioConf.existingConfigmap` parameters. #### Customizing the core-site.xml file The `core-site.xml` file can be customized with the follownig parameter: - `dremio.coreSite.appendConfiguration`: XML string that gets appended inside the `` section of the core-site.xml file. In the example below we disable SSL connection to the S3 backend: ```yaml dremio: coreSite: appendConfiguration: | fs.s3a.connection.ssl.enabled Value can either be true or false, set to true to use SSL with a secure Minio server. false ``` As an alternative, it is possible to provide an existing Secret with the `core-site.xml` configuration. This is done using the `dremio.coreSite.existingSecret` parameter. Check the [upstream Dremio documentation](https://docs.dremio.com/current/get-started/cluster-deployments/customizing-configuration/dremio-conf/dist-store-config/) for the list of available settings in the `core-site.xml` file. #### Environment variables inside configuration files The chart allows adding Dremio configuration settings relative to environment vars. This is done by enclosing the environment variable inside `{{ }}`. An init container will render the environment variable using the [render-template](https://github.com/bitnami/render-template) tool. This is useful when having rotating secrets. For adding extra environment variables for rendering, set the `defaultInitContainers.generateConf.extraEnvVars` parameter. In the following example we add a property in the `core-site.xml` dependant to `AZURE_TOKEN` environment variable, which is part of a secret named `azure-secret` with key `token`. ```yaml dremio: coreSite: appendConfiguration: | dremio.azure.key The shared access key for the storage account. {{ AZURE_TOKEN }} defaultInitContainers: generateConf: extraEnvVars: - name: AZURE_TOKEN valueFrom: secretKeyRef: name: azure-secret key: token ``` #### Adding extra configuration files For advanced configurations such as editing files like `logback.xml`, it is possible to include extra configuration files in the `dremio.conf` ConfigMap or Secret using the following values: - `dremio.dremioConf.extraFiles`: Adds extra non-sensitive files. - `dremio.dremioConf.extraSecretFiles`: Add extra sensitive files. In the following example we include a modified version of the `logback.xml` file: ```yaml dremio: dremioConf: extraFiles: logback.xml: | %date{ISO8601} [%thread] %-5level %logger{36} - %msg%n ``` > NOTE: Adding `dremio.conf` in `extraFiles` or `extraSecretFiles` fully overwrites the default dremio.conf file generated by the chart ### Distributed Storage configuration The Bitnami Dremio chart natively supports `s3` as backend, either using AWS or MinIO(TM). This is configured using `dremio.distStorageType`, possible values are: `aws`, `minio` or `other`. E.g.: - `dremio.distStorageType`: `aws` It is possible to configure other distributed storage backends when setting `dremio.distStorageType` to `other`, but these require add extra configuration settings using the `*.dremioConf` and `*.coreSite`. In the sections below we detail some example distributed storage backends. Check the [upstream Dremio documentation](https://docs.dremio.com/current/get-started/cluster-deployments/customizing-configuration/dremio-conf/dist-store-config/) for the required settings in the `dremio.conf` and `core-site.xml` files. #### MinIO(TM) subchart as storage backend (default) Set the following parameters for using the embedded subchart: ```yaml dremio: distStorageType: minio minio: enabled: true ``` #### External MinIO(TM) as distributed storage For configuring an external MinIO(TM) installation, use the `externalS3` section (replace the `DREMIO_*` placeholders) ```yaml dremio: distStorageType: minio minio: enabled: false externalS3: host: DREMIO_MINIO_HOST port: DREMIO_MINIO_PORT accessKeyID: DREMIO_ACCESS_KEY_ID accessKeySecret: DREMIO_ACCESS_KEY_SECRET bucket: DREMIO_BUCKET ``` #### AWS as distributed storage using access key authentication For configuring AWS as distributed storage, use the `externalS3` section (replace the `DREMIO_*` placeholders): ```yaml dremio: distStorageType: minio minio: enabled: false externalS3: accessKeyID: DREMIO_ACCESS_KEY_ID accessKeySecret: DREMIO_ACCESS_KEY_SECRET bucket: DREMIO_BUCKET regien: DREMIO_REGION ``` #### Azure Storage as distributed storage For configuring Azure Storage as distributed storage following the [upstream Dremio documentation](https://docs.dremio.com/current/get-started/cluster-deployments/customizing-configuration/dremio-conf/dist-store-config/#azure-storage), use the `dremio.dremioConf` and `dremio.coreSite` parameters (replace the `DREMIO_*` placeholders): ```yaml dremio: distStorageType: other dremioConf: configOverrides: paths.dist: "dremioAzureStorage://:///DREMIO_FILE_SYSTEM_NAME/DREMIO_ALTERNATIVE_STORAGE_ROOT_DIRECTORY" coreSite: appendConfiguration: | fs.dremioAzureStorage.impl FileSystem implementation. Must always be com.dremio.plugins.azure.AzureStorageFileSystem com.dremio.plugins.azure.AzureStorageFileSystem dremio.azure.account The name of the storage account. DREMIO_ACCOUNT_NAME dremio.azure.key The shared access key for the storage account. DREMIO_ACCESS_KEY dremio.azure.mode The storage account type. Value: STORAGE_V2 STORAGE_V2 dremio.azure.secure Boolean option to enable SSL connections. Default: True Value: True/False True minio: enabled: false ``` #### Google Cloud Storage as distributed storage For configuring Google Cloud Storage as distributed storage following the [upstream Dremio documentation](https://docs.dremio.com/current/get-started/cluster-deployments/customizing-configuration/dremio-conf/dist-store-config/#google-cloud-storage), use the `dremio.dremioConf` and `dremio.coreSite` parameters (replace the `DREMIO_*` placeholders): ```yaml dremio: distStorageType: other dremioConf: configOverrides: paths.dist: "dremiogcs:///DREMIO_BUCKET_NAME/DREMIO_BUCKET_FOLDER" coreSite: appendConfiguration: | dremio.gcs.whitelisted.buckets GCS bucket to use for distributed storage DREMIO_BUCKET_NAME fs.dremiogcs.impl The FileSystem implementation. Must be set to com.dremio.plugins.gcs.GoogleBucketFileSystem com.dremio.plugins.gcs.GoogleBucketFileSystem dremio.gcs.use_keyfile Do not use the key file false minio: enabled: false ``` ### Prometheus metrics This chart can be integrated with Prometheus by setting `metrics.enabled` to `true`. This will deploy a sidecar container with [jmx_exporter](https://github.com/prometheus/jmx_exporter) in all pods and a `metrics` service, which can be configured under the `metrics.service` section. This `metrics` service will have the necessary annotations to be automatically scraped by Prometheus. #### Prometheus requirements It is necessary to have a working installation of Prometheus or Prometheus Operator for the integration to work. Install the [Bitnami Prometheus helm chart](https://github.com/bitnami/charts/tree/main/bitnami/prometheus) or the [Bitnami Kube Prometheus helm chart](https://github.com/bitnami/charts/tree/main/bitnami/kube-prometheus) to easily have a working Prometheus in your cluster. #### Integration with Prometheus Operator The chart can deploy `ServiceMonitor` objects for integration with Prometheus Operator installations. To do so, set the value `metrics.serviceMonitor.enabled=true`. Ensure that the Prometheus Operator `CustomResourceDefinitions` are installed in the cluster or it will fail with the following error: ```text no matches for kind "ServiceMonitor" in version "monitoring.coreos.com/v1" ``` Install the [Bitnami Kube Prometheus helm chart](https://github.com/bitnami/charts/tree/main/bitnami/kube-prometheus) for having the necessary CRDs and the Prometheus Operator. ### User authentication When the `dremio.auth.enabled` parameter is set to true, the chart will create a Job that automatically bootstraps a user using Dremio internal authentication mechanisms. The user is customized with the following parameters: - `dremio.auth.username`: Bootstrap username - `dremio.auth.password`: Bootstrap password - `dremio.auth.email`: Bootstrap email - `dremio.auth.firstName`: Bootstrap first name - `dremio.auth.lastName`: Bootstrap last name Also, it is possible to provide the password using an existing secret with the `dremio.auth.existingSecret` value. Other authentication mechanisms can be configured using the `dremioConf` and `coreSite` values. You could check [upstream Dremio documentation](https://docs.dremio.com/current/security/authentication/) for all the available options. ### External Zookeeper support You may want to have Dremio connect to an external zookeeper rather than installing one inside your cluster. Typical reasons for this are to use a managed database service, or to share a common database server for all your applications. To achieve this, the chart allows you to specify credentials for an external database with the [`externalZookeeper` parameter](#parameters). You should also disable the Zookeeper installation with the `zookeeper.enabled` option. Here is an example: ```console zookeper.enabled=false externalZookeeper.hosts[0]=myexternalhost externalZookeeper.port=2181 ``` ### Securing traffic using TLS TLS support for the Web interface can be enabled in the chart by specifying the `dremio.tls.enabled=true`while creating a release. Two possible options are available: - Provide your own secret with the PEM or JKS certificates - Have the chart auto-generate the certificates. #### Providing your own TLS secret To provide your own secret set the `dremio.tls.existingSecret` value. It is possible to use PEM or JKS. To use PEM Certs: - `dremio.tls.usePemCerts=true`: Use PEM certificates instead of a JKS file. - `dremio.tls.certFilename`: Certificate filename. Defaults to `tls.crt`. - `dremio.tls.certKeyFilename`: Certificate key filename. Defaults to `tls.key` To use JKS keystore: - `dremio.tls.usePemCerts=false`: Use JKS file. - `dremio.tls.keystoreFilename`: Certificate filename. Defaults to `dremio.jks`. In the following example we will use PEM certificates. First, create the secret with the certificates files: ```console kubectl create secret generic certificates-tls-secret --from-file=./cert.pem --from-file=./cert.key --from-file=./ca.pem ``` Then, use the following parameters: ```console dremio.tls.enabled="true" dremio.tls.existingSecret="certificates-tls-secret" dremio.tls.usePemCerts="true" dremio.tls.certFilename="cert.pem" dremio.tls.certKeyFilename="cert.key" ``` #### Auto-generation of TLS certificates It is also possible to rely on the chart certificate auto-generation capabilities. The chart supports two different ways to auto-generate the required certificates: - Using Helm capabilities. Enable this feature by setting `dremio.tls.autoGenerated.enabled` to `true` and `dremio.tls.autoGenerated.engine` to `helm`. - Relying on CertManager (please note it's required to have CertManager installed in your K8s cluster). Enable this feature by setting `dremio.tls.autoGenerated.enabled` to `true` and `dremio.tls.autoGenerated.engine` to `cert-manager`. Please note it's supported to use an existing Issuer/ClusterIssuer for issuing the TLS certificates by setting the `dremio.tls.autoGenerated.certManager.existingIssuer` and `dremio.tls.autoGenerated.certManager.existingIssuerKind` parameters. ### Ingress This chart provides support for Ingress resources. If you have an ingress controller installed on your cluster, such as [nginx-ingress-controller](https://github.com/bitnami/charts/tree/main/bitnami/nginx-ingress-controller) or [contour](https://github.com/bitnami/charts/tree/main/bitnami/contour) you can utilize it to serve your application.To enable Ingress integration, set `ingress.enabled` to `true`. The most common scenario is to have one host name mapped to the deployment. In this case, the `ingress.hostname` property can be used to set the host name. The `ingress.tls` parameter can be used to add the TLS configuration for this host. However, it is also possible to have more than one host. To facilitate this, the `ingress.extraHosts` parameter (if available) can be set with the host names specified as an array. The `ingress.extraTLS` parameter (if available) can also be used to add the TLS configuration for extra hosts. > NOTE: For each host specified in the `ingress.extraHosts` parameter, it is necessary to set a name, path, and any annotations that the Ingress controller should know about. Not all annotations are supported by all Ingress controllers, but [this annotation reference document](https://github.com/kubernetes/ingress-nginx/blob/master/docs/user-guide/nginx-configuration/annotations.md) lists the annotations supported by many popular Ingress controllers. Adding the TLS parameter (where available) will cause the chart to generate HTTPS URLs, and the application will be available on port 443. The actual TLS secrets do not have to be generated by this chart. However, if TLS is enabled, the Ingress record will not work until the TLS secret exists. [Learn more about Ingress controllers](https://kubernetes.io/docs/concepts/services-networking/ingress-controllers/). ### Configure TLS Secrets for use with Ingress This chart facilitates the creation of TLS secrets for use with the Ingress controller (although this is not mandatory). There are several common use cases: - Generate certificate secrets based on chart parameters. - Enable externally generated certificates. - Manage application certificates via an external service (like [cert-manager](https://github.com/jetstack/cert-manager/)). - Create self-signed certificates within the chart (if supported). In the first two cases, a certificate and a key are needed. Files are expected in `.pem` format. Here is an example of a certificate file: > NOTE: There may be more than one certificate if there is a certificate chain. ```text -----BEGIN CERTIFICATE----- MIID6TCCAtGgAwIBAgIJAIaCwivkeB5EMA0GCSqGSIb3DQEBCwUAMFYxCzAJBgNV ... jScrvkiBO65F46KioCL9h5tDvomdU1aqpI/CBzhvZn1c0ZTf87tGQR8NK7v7 -----END CERTIFICATE----- ``` Here is an example of a certificate key: ```text -----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEAvLYcyu8f3skuRyUgeeNpeDvYBCDcgq+LsWap6zbX5f8oLqp4 ... wrj2wDbCDCFmfqnSJ+dKI3vFLlEz44sAV8jX/kd4Y6ZTQhlLbYc= -----END RSA PRIVATE KEY----- ``` - If using Helm to manage the certificates based on the parameters, copy these values into the `certificate` and `key` parameters for a given `*.ingress.secrets` entry. - If managing TLS secrets separately, it is necessary to create a TLS secret with name `INGRESS_HOSTNAME-tls` (where INGRESS_HOSTNAME is a placeholder to be replaced with the hostname you set using the `*.ingress.hostname` parameter). - If your cluster has a [cert-manager](https://github.com/jetstack/cert-manager) add-on to automate the management and issuance of TLS certificates, add to `*.ingress.annotations` the [corresponding ones](https://cert-manager.io/docs/usage/ingress/#supported-annotations) for cert-manager. - If using self-signed certificates created by Helm, set both `*.ingress.tls` and `*.ingress.selfSigned` to `true`. ### Dremio Executor configuration The charts deploys a default executor using the configuration inside the `executor.common` section. It is possible to define extra group of executor nodes using the `executor.engines` parameter. Each element inside the `executor.engines` array has the following parameters: -`name`: Name of the group of executors (engine). -`overrides`: Perform overrides over the parameters in the `executor.common` section. In the following example we define an extra group of executors, modifying the default `replicaCount` set in the `common` section: ```yaml executor: common: replicaCount: 1 engines: - name: default # This group will have 1 replica overrides: {} - name: special # This group will have 3 replicas overrides: replicaCount: 3 ``` ### Additional environment variables In case you want to add extra environment variables (useful for advanced operations like custom init scripts), you can use the `extraEnvVars` property. ```yaml masterCoordinator: extraEnvVars: - name: LOG_LEVEL value: error ``` Alternatively, you can use a ConfigMap or a Secret with the environment variables. To do so, use the `extraEnvVarsCM` or the `extraEnvVarsSecret` parameters. ### Sidecars If additional containers are needed in the same pod as dremio (such as additional metrics or logging exporters), they can be defined using the `sidecars` parameter. ```yaml masterCoordinator: sidecars: - name: your-image-name image: your-image imagePullPolicy: Always ports: - name: portname containerPort: 1234 ``` If these sidecars export extra ports, extra port definitions can be added using the `service.extraPorts` parameter (where available), as shown in the example below: ```yaml service: extraPorts: - name: extraPort port: 11311 targetPort: 11311 ``` > NOTE: This Helm chart already includes sidecar containers for the Prometheus exporters (where applicable). These can be activated by adding the `--enable-metrics=true` parameter at deployment time. The `sidecars` parameter should therefore only be used for any extra sidecar containers. If additional init containers are needed in the same pod, they can be defined using the `initContainers` parameter. Here is an example: ```yaml masterCoordinator: initContainers: - name: your-image-name image: your-image imagePullPolicy: Always ports: - name: portname containerPort: 1234 ``` Learn more about [sidecar containers](https://kubernetes.io/docs/concepts/workloads/pods/) and [init containers](https://kubernetes.io/docs/concepts/workloads/pods/init-containers/). ### Pod affinity This chart allows you to set your custom affinity using the `affinity` parameter. Find more information about Pod affinity in the [kubernetes documentation](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity). As an alternative, use one of the preset configurations for pod affinity, pod anti-affinity, and node affinity available at the [bitnami/common](https://github.com/bitnami/charts/tree/main/bitnami/common#affinities) chart. To do so, set the `podAffinityPreset`, `podAntiAffinityPreset`, or `nodeAffinityPreset` parameters. ### Backup and restore To back up and restore Helm chart deployments on Kubernetes, you need to back up the persistent volumes from the source deployment and attach them to a new deployment using [Velero](https://velero.io/), a Kubernetes backup/restore tool. Find the instructions for using Velero in [this guide](https://techdocs.broadcom.com/us/en/vmware-tanzu/application-catalog/tanzu-application-catalog/services/tac-doc/apps-tutorials-backup-restore-deployments-velero-index.html). ## Persistence The [Bitnami dremio](https://github.com/bitnami/containers/tree/main/bitnami/dremio) image stores the dremio data and configurations at the `/bitnami` path of the container. Persistent Volume Claims are used to keep the data across deployments. If you encounter errors when working with persistent volumes, refer to our [troubleshooting guide for persistent volumes](https://docs.bitnami.com/kubernetes/faq/troubleshooting/troubleshooting-persistence-volumes/). ### Deploying extra resources There are cases where you may want to deploy extra objects, such a ConfigMap containing your app's configuration or some extra deployment with a micro service used by your app. For covering this case, the chart allows adding the full specification of other objects using the `extraDeploy` parameter. ## Parameters ### Global parameters | Name | Description | Value | | ----------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------- | | `global.imageRegistry` | Global Docker image registry | `""` | | `global.imagePullSecrets` | Global Docker registry secret names as an array | `[]` | | `global.defaultStorageClass` | Global default StorageClass for Persistent Volume(s) | `""` | | `global.security.allowInsecureImages` | Allows skipping image verification | `false` | | `global.compatibility.openshift.adaptSecurityContext` | Adapt the securityContext sections of the deployment to make them compatible with Openshift restricted-v2 SCC: remove runAsUser, runAsGroup and fsGroup and let the platform use their allowed default IDs. Possible values: auto (apply if the detected running cluster is Openshift), force (perform the adaptation always), disabled (do not perform adaptation) | `auto` | ### Common parameters | Name | Description | Value | | ------------------------ | --------------------------------------------------------------------------------------- | --------------- | | `kubeVersion` | Override Kubernetes version | `""` | | `apiVersions` | Override Kubernetes API versions reported by .Capabilities | `[]` | | `nameOverride` | String to partially override common.names.name | `""` | | `fullnameOverride` | String to fully override common.names.fullname | `""` | | `namespaceOverride` | String to fully override common.names.namespace | `""` | | `commonLabels` | Labels to add to all deployed objects | `{}` | | `commonAnnotations` | Annotations to add to all deployed objects | `{}` | | `clusterDomain` | Kubernetes cluster domain name | `cluster.local` | | `extraDeploy` | Array of extra objects to deploy with the release | `[]` | | `diagnosticMode.enabled` | Enable diagnostic mode (all probes will be disabled and the command will be overridden) | `false` | | `diagnosticMode.command` | Command to override all containers in the chart release | `["sleep"]` | | `diagnosticMode.args` | Args to override all containers in the chart release | `["infinity"]` | | `usePasswordFiles` | Mount secrets as files | `true` | ### Dremio common configuration settings | Name | Description | Value | | --------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------ | | `dremio.image.registry` | Dremio image registry | `REGISTRY_NAME` | | `dremio.image.repository` | Dremio image repository | `REPOSITORY_NAME/dremio` | | `dremio.image.digest` | Dremio image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` | | `dremio.image.pullPolicy` | Dremio image pull policy | `IfNotPresent` | | `dremio.image.pullSecrets` | Dremio image pull secrets | `[]` | | `dremio.image.debug` | Enable Dremio image debug mode | `false` | | `dremio.auth.enabled` | Automatically bootstrap a Dremio user | `true` | | `dremio.auth.username` | Dremio bootstrap username | `user` | | `dremio.auth.password` | Dremio bootstrap password | `""` | | `dremio.auth.firstName` | Dremio bootstrap first name | `User` | | `dremio.auth.lastName` | Dremio bootstrap last name | `User` | | `dremio.auth.email` | Dremio bootstrap email | `user@example.com` | | `dremio.auth.existingSecret` | Name of a secret containing the password of the bootstrap user | `""` | | `dremio.auth.existingSecretKey` | Key inside the secret containing the password of the bootstrap user (requires setting existingSecret) | `""` | | `dremio.tls.enabled` | Enable TLS in the web frontend | `false` | | `dremio.tls.usePemCerts` | Use certificates in .pem format | `true` | | `dremio.tls.existingSecret` | Name of a secret containing the certificate files | `""` | | `dremio.tls.certFilename` | Filename inside the secret of the .crt file (when usePemCerts=true) | `tls.crt` | | `dremio.tls.certKeyFilename` | Filename inside the secret of the .key file (when usePemCerts=true) | `tls.key` | | `dremio.tls.keystoreFilename` | Filename inside the secret of the .jks file (when usePemCerts=false) | `dremio.jks` | | `dremio.tls.password` | Password of the Java keystore | `""` | | `dremio.tls.passwordSecret` | Name of a secret containing the password of the Java keystore | `""` | | `dremio.tls.autoGenerated.enabled` | Enable automatic generation of certificates for TLS | `true` | | `dremio.tls.autoGenerated.engine` | Mechanism to generate the certificates (allowed values: helm, cert-manager) | `helm` | | `dremio.tls.autoGenerated.certManager.existingIssuer` | The name of an existing Issuer to use for generating the certificates (only for `cert-manager` engine) | `""` | | `dremio.tls.autoGenerated.certManager.existingIssuerKind` | Existing Issuer kind, defaults to Issuer (only for `cert-manager` engine) | `""` | | `dremio.tls.autoGenerated.certManager.keyAlgorithm` | Key algorithm for the certificates (only for `cert-manager` engine) | `RSA` | | `dremio.tls.autoGenerated.certManager.keySize` | Key size for the certificates (only for `cert-manager` engine) | `2048` | | `dremio.tls.autoGenerated.certManager.duration` | Duration for the certificates (only for `cert-manager` engine) | `2160h` | | `dremio.tls.autoGenerated.certManager.renewBefore` | Renewal period for the certificates (only for `cert-manager` engine) | `360h` | | `dremio.distStorageType` | Dremio distributed storage type. Allowed values: "minio", "aws" and "others" ("minio" and "aws" natively supported, the rest of the types requires adding extra configuration parameters in the "dremio.dremioConf" and "dremio.coreSite" sections) | `minio` | | `dremio.dremioConf.configOverrides` | Add configuration overrides in dremio.conf applied to all components (using YAML format) | `{}` | | `dremio.dremioConf.secretConfigOverrides` | Add sensitive configuration overrides in dremio.conf applied to all components (using YAML format) | `{}` | | `dremio.dremioConf.extraFiles` | Add extra configuration files | `{}` | | `dremio.dremioConf.extraSecretFiles` | Add extra sensitive configuration files | `{}` | | `dremio.coreSite.appendConfiguration` | Add extra configuration in the core-site.xml file (in XML format) | `""` | | `dremio.coreSite.existingSecret` | Name of a secret containing the core-site.xml file | `""` | | `dremio.containerPorts.web` | Dremio Web container port | `9047` | | `dremio.containerPorts.client` | Dremio client container port | `31010` | | `dremio.containerPorts.flight` | Dremio flight container port | `32010` | | `dremio.containerPorts.fabric` | Dremio fabric container port | `45678` | | `dremio.containerPorts.conduit` | Dremio conduit container port | `45679` | | `dremio.containerPorts.jmx` | Dremio JMX container port | `50000` | | `dremio.containerPorts.liveness` | Dremio liveness container port | `44349` | ### Dremio Master Coordinator Parameters | Name | Description | Value | | --------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------------- | | `masterCoordinator.replicaCount` | Number of Dremio Master Coordinator replicas to deploy | `1` | | `masterCoordinator.extraContainerPorts` | Optionally specify extra list of additional ports for Dremio Master Coordinator containers | `[]` | | `masterCoordinator.extraJavaOpts` | Add extra Java opts | `""` | | `masterCoordinator.livenessProbe.enabled` | Enable livenessProbe on Dremio Master Coordinator containers | `true` | | `masterCoordinator.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `20` | | `masterCoordinator.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | | `masterCoordinator.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | | `masterCoordinator.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `5` | | `masterCoordinator.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | | `masterCoordinator.readinessProbe.enabled` | Enable readinessProbe on Dremio Master Coordinator containers | `true` | | `masterCoordinator.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `10` | | `masterCoordinator.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | | `masterCoordinator.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `5` | | `masterCoordinator.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `5` | | `masterCoordinator.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | | `masterCoordinator.startupProbe.enabled` | Enable startupProbe on Dremio Master Coordinator containers | `false` | | `masterCoordinator.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `10` | | `masterCoordinator.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | | `masterCoordinator.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | | `masterCoordinator.startupProbe.failureThreshold` | Failure threshold for startupProbe | `5` | | `masterCoordinator.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | | `masterCoordinator.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | | `masterCoordinator.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | | `masterCoordinator.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | | `masterCoordinator.resourcesPreset` | Set Dremio Master Coordinator container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if masterCoordinator.resources is set (masterCoordinator.resources is recommended for production). | `xlarge` | | `masterCoordinator.resources` | Set Dremio Master Coordinator container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | | `masterCoordinator.podSecurityContext.enabled` | Enable Dremio Master Coordinator pods' Security Context | `true` | | `masterCoordinator.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy for Dremio Master Coordinator pods | `Always` | | `masterCoordinator.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface for Dremio Master Coordinator pods | `[]` | | `masterCoordinator.podSecurityContext.supplementalGroups` | Set filesystem extra groups for Dremio Master Coordinator pods | `[]` | | `masterCoordinator.podSecurityContext.fsGroup` | Set fsGroup in Dremio Master Coordinator pods' Security Context | `1001` | | `masterCoordinator.containerSecurityContext.enabled` | Enabled Dremio Master Coordinator container' Security Context | `true` | | `masterCoordinator.containerSecurityContext.seLinuxOptions` | Set SELinux options in Dremio Master Coordinator container | `{}` | | `masterCoordinator.containerSecurityContext.runAsUser` | Set runAsUser in Dremio Master Coordinator container' Security Context | `1001` | | `masterCoordinator.containerSecurityContext.runAsGroup` | Set runAsGroup in Dremio Master Coordinator container' Security Context | `1001` | | `masterCoordinator.containerSecurityContext.runAsNonRoot` | Set runAsNonRoot in Dremio Master Coordinator container' Security Context | `true` | | `masterCoordinator.containerSecurityContext.readOnlyRootFilesystem` | Set readOnlyRootFilesystem in Dremio Master Coordinator container' Security Context | `true` | | `masterCoordinator.containerSecurityContext.privileged` | Set privileged in Dremio Master Coordinator container' Security Context | `false` | | `masterCoordinator.containerSecurityContext.allowPrivilegeEscalation` | Set allowPrivilegeEscalation in Dremio Master Coordinator container' Security Context | `false` | | `masterCoordinator.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped in Dremio Master Coordinator container | `["ALL"]` | | `masterCoordinator.containerSecurityContext.seccompProfile.type` | Set seccomp profile in Dremio Master Coordinator container | `RuntimeDefault` | | `masterCoordinator.command` | Override default Dremio Master Coordinator container command (useful when using custom images) | `[]` | | `masterCoordinator.args` | Override default Dremio Master Coordinator container args (useful when using custom images) | `[]` | | `masterCoordinator.automountServiceAccountToken` | Mount Service Account token in Dremio Master Coordinator pods | `false` | | `masterCoordinator.hostAliases` | Dremio Master Coordinator pods host aliases | `[]` | | `masterCoordinator.statefulsetAnnotations` | Annotations for Dremio Master Coordinator statefulset | `{}` | | `masterCoordinator.podLabels` | Extra labels for Dremio Master Coordinator pods | `{}` | | `masterCoordinator.podAnnotations` | Annotations for Dremio Master Coordinator pods | `{}` | | `masterCoordinator.podAffinityPreset` | Pod affinity preset. Ignored if `masterCoordinator.affinity` is set. Allowed values: `soft` or `hard` | `""` | | `masterCoordinator.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `masterCoordinator.affinity` is set. Allowed values: `soft` or `hard` | `soft` | | `masterCoordinator.dremioConf.configOverrides` | Add configuration overrides in dremio.conf applied to all master-coordinator nodes (using YAML format) | `{}` | | `masterCoordinator.dremioConf.secretConfigOverrides` | Add sensitive configuration overrides in dremio.conf applied to master-coordinator nodes (using YAML format) | `{}` | | `masterCoordinator.dremioConf.extraFiles` | Add extra files to the ConfigMap | `{}` | | `masterCoordinator.dremioConf.extraSecretFiles` | Add extra files to the Secret | `{}` | | `masterCoordinator.dremioConf.existingConfigmap` | Name of a configmap containing a dremio.conf configuration file for the master-coordinator nodes (without sensitive information) | `""` | | `masterCoordinator.dremioConf.existingSecret` | Name of a secret containing a dremio.conf configuration file for the master-coordinator nodes (with sensitive information) | `""` | | `masterCoordinator.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `masterCoordinator.affinity` is set. Allowed values: `soft` or `hard` | `""` | | `masterCoordinator.nodeAffinityPreset.key` | Node label key to match. Ignored if `masterCoordinator.affinity` is set | `""` | | `masterCoordinator.nodeAffinityPreset.values` | Node label values to match. Ignored if `masterCoordinator.affinity` is set | `[]` | | `masterCoordinator.affinity` | Affinity for Dremio Master Coordinator pods assignment | `{}` | | `masterCoordinator.nodeSelector` | Node labels for Dremio Master Coordinator pods assignment | `{}` | | `masterCoordinator.tolerations` | Tolerations for Dremio Master Coordinator pods assignment | `[]` | | `masterCoordinator.updateStrategy.type` | Dremio Master Coordinator statefulset strategy type | `RollingUpdate` | | `masterCoordinator.podManagementPolicy` | Pod management policy for Dremio Master Coordinator statefulset | `OrderedReady` | | `masterCoordinator.priorityClassName` | Dremio Master Coordinator pods' priorityClassName | `""` | | `masterCoordinator.topologySpreadConstraints` | Topology Spread Constraints for Dremio Master Coordinator pod assignment spread across your cluster among failure-domains | `[]` | | `masterCoordinator.schedulerName` | Name of the k8s scheduler (other than default) for Dremio Master Coordinator pods | `""` | | `masterCoordinator.terminationGracePeriodSeconds` | Seconds Dremio Master Coordinator pods need to terminate gracefully | `""` | | `masterCoordinator.lifecycleHooks` | for Dremio Master Coordinator containers to automate configuration before or after startup | `{}` | | `masterCoordinator.extraEnvVars` | Array with extra environment variables to add to Dremio Master Coordinator containers | `[]` | | `masterCoordinator.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Dremio Master Coordinator containers | `""` | | `masterCoordinator.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Dremio Master Coordinator containers | `""` | | `masterCoordinator.extraVolumes` | Optionally specify extra list of additional volumes for the Dremio Master Coordinator pods | `[]` | | `masterCoordinator.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Dremio Master Coordinator containers | `[]` | | `masterCoordinator.sidecars` | Add additional sidecar containers to the Dremio Master Coordinator pods | `[]` | | `masterCoordinator.initContainers` | Add additional init containers to the Dremio Master Coordinator pods | `[]` | | `masterCoordinator.pdb.create` | Enable/disable a Pod Disruption Budget creation | `true` | | `masterCoordinator.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `""` | | `masterCoordinator.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable. Defaults to `1` if both `masterCoordinator.pdb.minAvailable` and `masterCoordinator.pdb.maxUnavailable` are empty. | `""` | | `masterCoordinator.autoscaling.vpa.enabled` | Enable VPA for Dremio Master Coordinator pods | `false` | | `masterCoordinator.autoscaling.vpa.annotations` | Annotations for VPA resource | `{}` | | `masterCoordinator.autoscaling.vpa.controlledResources` | VPA List of resources that the vertical pod autoscaler can control. Defaults to cpu and memory | `[]` | | `masterCoordinator.autoscaling.vpa.maxAllowed` | VPA Max allowed resources for the pod | `{}` | | `masterCoordinator.autoscaling.vpa.minAllowed` | VPA Min allowed resources for the pod | `{}` | | `masterCoordinator.autoscaling.vpa.updatePolicy.updateMode` | Autoscaling update policy | `Auto` | | `masterCoordinator.autoscaling.hpa.enabled` | Enable HPA for Dremio Master Coordinator pods | `false` | | `masterCoordinator.autoscaling.hpa.minReplicas` | Minimum number of replicas | `""` | | `masterCoordinator.autoscaling.hpa.maxReplicas` | Maximum number of replicas | `""` | | `masterCoordinator.autoscaling.hpa.targetCPU` | Target CPU utilization percentage | `""` | | `masterCoordinator.autoscaling.hpa.targetMemory` | Target Memory utilization percentage | `""` | | `masterCoordinator.networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | | `masterCoordinator.networkPolicy.allowExternal` | Don't require server label for connections | `true` | | `masterCoordinator.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | | `masterCoordinator.networkPolicy.addExternalClientAccess` | Allow access from pods with client label set to "true". Ignored if `networkPolicy.allowExternal` is true. | `true` | | `masterCoordinator.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolicy | `[]` | | `masterCoordinator.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy (ignored if allowExternalEgress=true) | `[]` | | `masterCoordinator.networkPolicy.ingressPodMatchLabels` | Labels to match to allow traffic from other pods. Ignored if `networkPolicy.allowExternal` is true. | `{}` | | `masterCoordinator.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces. Ignored if `networkPolicy.allowExternal` is true. | `{}` | | `masterCoordinator.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces. Ignored if `networkPolicy.allowExternal` is true. | `{}` | | `masterCoordinator.persistence.enabled` | Enable persistence using Persistent Volume Claims | `true` | | `masterCoordinator.persistence.mountPath` | Path to mount the volume at. | `/bitnami/dremio/data` | | `masterCoordinator.persistence.subPath` | The subdirectory of the volume to mount to, useful in dev environments and one PV for multiple services | `""` | | `masterCoordinator.persistence.storageClass` | Storage class of backing PVC | `""` | | `masterCoordinator.persistence.annotations` | Persistent Volume Claim annotations | `{}` | | `masterCoordinator.persistence.accessModes` | Persistent Volume Access Modes | `["ReadWriteOnce"]` | | `masterCoordinator.persistence.size` | Size of data volume | `8Gi` | | `masterCoordinator.persistence.existingClaim` | The name of an existing PVC to use for persistence | `""` | | `masterCoordinator.persistence.selector` | Selector to match an existing Persistent Volume for WordPress data PVC | `{}` | | `masterCoordinator.persistence.dataSource` | Custom PVC data source | `{}` | | `masterCoordinator.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | | `masterCoordinator.serviceAccount.name` | The name of the ServiceAccount to use. | `""` | | `masterCoordinator.serviceAccount.annotations` | Additional Service Account annotations (evaluated as a template) | `{}` | | `masterCoordinator.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `false` | ### Dremio Coordinator Parameters | Name | Description | Value | | --------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------- | | `coordinator.replicaCount` | Number of Dremio Coordinator replicas to deploy | `1` | | `coordinator.extraContainerPorts` | Optionally specify extra list of additional ports for Dremio Coordinator containers | `[]` | | `coordinator.extraJavaOpts` | Add extra Java opts | `""` | | `coordinator.livenessProbe.enabled` | Enable livenessProbe on Dremio Coordinator containers | `true` | | `coordinator.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `20` | | `coordinator.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | | `coordinator.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | | `coordinator.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `5` | | `coordinator.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | | `coordinator.readinessProbe.enabled` | Enable readinessProbe on Dremio Coordinator containers | `true` | | `coordinator.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `10` | | `coordinator.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | | `coordinator.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `5` | | `coordinator.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `5` | | `coordinator.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | | `coordinator.startupProbe.enabled` | Enable startupProbe on Dremio Coordinator containers | `false` | | `coordinator.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `10` | | `coordinator.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | | `coordinator.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | | `coordinator.startupProbe.failureThreshold` | Failure threshold for startupProbe | `5` | | `coordinator.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | | `coordinator.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | | `coordinator.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | | `coordinator.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | | `coordinator.resourcesPreset` | Set Dremio Coordinator container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if coordinator.resources is set (coordinator.resources is recommended for production). | `xlarge` | | `coordinator.resources` | Set Dremio Coordinator container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | | `coordinator.podSecurityContext.enabled` | Enable Dremio Coordinator pods' Security Context | `true` | | `coordinator.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy for Dremio Coordinator pods | `Always` | | `coordinator.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface for Dremio Coordinator pods | `[]` | | `coordinator.podSecurityContext.supplementalGroups` | Set filesystem extra groups for Dremio Coordinator pods | `[]` | | `coordinator.podSecurityContext.fsGroup` | Set fsGroup in Dremio Coordinator pods' Security Context | `1001` | | `coordinator.containerSecurityContext.enabled` | Enabled Dremio Coordinator container' Security Context | `true` | | `coordinator.containerSecurityContext.seLinuxOptions` | Set SELinux options in Dremio Coordinator container | `{}` | | `coordinator.containerSecurityContext.runAsUser` | Set runAsUser in Dremio Coordinator container' Security Context | `1001` | | `coordinator.containerSecurityContext.runAsGroup` | Set runAsGroup in Dremio Coordinator container' Security Context | `1001` | | `coordinator.containerSecurityContext.runAsNonRoot` | Set runAsNonRoot in Dremio Coordinator container' Security Context | `true` | | `coordinator.containerSecurityContext.readOnlyRootFilesystem` | Set readOnlyRootFilesystem in Dremio Coordinator container' Security Context | `true` | | `coordinator.containerSecurityContext.privileged` | Set privileged in Dremio Coordinator container' Security Context | `false` | | `coordinator.containerSecurityContext.allowPrivilegeEscalation` | Set allowPrivilegeEscalation in Dremio Coordinator container' Security Context | `false` | | `coordinator.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped in Dremio Coordinator container | `["ALL"]` | | `coordinator.containerSecurityContext.seccompProfile.type` | Set seccomp profile in Dremio Coordinator container | `RuntimeDefault` | | `coordinator.command` | Override default Dremio Coordinator container command (useful when using custom images) | `[]` | | `coordinator.args` | Override default Dremio Coordinator container args (useful when using custom images) | `[]` | | `coordinator.automountServiceAccountToken` | Mount Service Account token in Dremio Coordinator pods | `false` | | `coordinator.hostAliases` | Dremio Coordinator pods host aliases | `[]` | | `coordinator.statefulsetAnnotations` | Annotations for Dremio Coordinator statefulset | `{}` | | `coordinator.podLabels` | Extra labels for Dremio Coordinator pods | `{}` | | `coordinator.podAnnotations` | Annotations for Dremio Coordinator pods | `{}` | | `coordinator.podAffinityPreset` | Pod affinity preset. Ignored if `coordinator.affinity` is set. Allowed values: `soft` or `hard` | `""` | | `coordinator.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `coordinator.affinity` is set. Allowed values: `soft` or `hard` | `soft` | | `coordinator.dremioConf.configOverrides` | Add configuration overrides in dremio.conf applied to all coordinator nodes (using YAML format) | `{}` | | `coordinator.dremioConf.secretConfigOverrides` | Add sensitive configuration overrides in dremio.conf applied to coordinator nodes (using YAML format) | `{}` | | `coordinator.dremioConf.extraFiles` | Add extra files to the ConfigMap | `{}` | | `coordinator.dremioConf.extraSecretFiles` | Add extra files to the Secret | `{}` | | `coordinator.dremioConf.existingConfigmap` | Name of a configmap containing a dremio.conf configuration file for the coordinator nodes (without sensitive information) | `""` | | `coordinator.dremioConf.existingSecret` | Name of a secret containing a dremio.conf configuration file for the coordinator nodes (with sensitive information) | `""` | | `coordinator.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `coordinator.affinity` is set. Allowed values: `soft` or `hard` | `""` | | `coordinator.nodeAffinityPreset.key` | Node label key to match. Ignored if `coordinator.affinity` is set | `""` | | `coordinator.nodeAffinityPreset.values` | Node label values to match. Ignored if `coordinator.affinity` is set | `[]` | | `coordinator.affinity` | Affinity for Dremio Coordinator pods assignment | `{}` | | `coordinator.nodeSelector` | Node labels for Dremio Coordinator pods assignment | `{}` | | `coordinator.tolerations` | Tolerations for Dremio Coordinator pods assignment | `[]` | | `coordinator.updateStrategy.type` | Dremio Coordinator statefulset strategy type | `RollingUpdate` | | `coordinator.podManagementPolicy` | Pod management policy for Dremio Coordinator statefulset | `OrderedReady` | | `coordinator.priorityClassName` | Dremio Coordinator pods' priorityClassName | `""` | | `coordinator.topologySpreadConstraints` | Topology Spread Constraints for Dremio Coordinator pod assignment spread across your cluster among failure-domains | `[]` | | `coordinator.schedulerName` | Name of the k8s scheduler (other than default) for Dremio Coordinator pods | `""` | | `coordinator.terminationGracePeriodSeconds` | Seconds Dremio Coordinator pods need to terminate gracefully | `""` | | `coordinator.lifecycleHooks` | for Dremio Coordinator containers to automate configuration before or after startup | `{}` | | `coordinator.extraEnvVars` | Array with extra environment variables to add to Dremio Coordinator containers | `[]` | | `coordinator.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Dremio Coordinator containers | `""` | | `coordinator.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Dremio Coordinator containers | `""` | | `coordinator.extraVolumes` | Optionally specify extra list of additional volumes for the Dremio Coordinator pods | `[]` | | `coordinator.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Dremio Coordinator containers | `[]` | | `coordinator.sidecars` | Add additional sidecar containers to the Dremio Coordinator pods | `[]` | | `coordinator.initContainers` | Add additional init containers to the Dremio Coordinator pods | `[]` | | `coordinator.pdb.create` | Enable/disable a Pod Disruption Budget creation | `true` | | `coordinator.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `""` | | `coordinator.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable. Defaults to `1` if both `coordinator.pdb.minAvailable` and `coordinator.pdb.maxUnavailable` are empty. | `""` | | `coordinator.autoscaling.vpa.enabled` | Enable VPA for Dremio Coordinator pods | `false` | | `coordinator.autoscaling.vpa.annotations` | Annotations for VPA resource | `{}` | | `coordinator.autoscaling.vpa.controlledResources` | VPA List of resources that the vertical pod autoscaler can control. Defaults to cpu and memory | `[]` | | `coordinator.autoscaling.vpa.maxAllowed` | VPA Max allowed resources for the pod | `{}` | | `coordinator.autoscaling.vpa.minAllowed` | VPA Min allowed resources for the pod | `{}` | | `coordinator.autoscaling.vpa.updatePolicy.updateMode` | Autoscaling update policy | `Auto` | | `coordinator.autoscaling.hpa.enabled` | Enable HPA for Dremio Coordinator pods | `false` | | `coordinator.autoscaling.hpa.minReplicas` | Minimum number of replicas | `""` | | `coordinator.autoscaling.hpa.maxReplicas` | Maximum number of replicas | `""` | | `coordinator.autoscaling.hpa.targetCPU` | Target CPU utilization percentage | `""` | | `coordinator.autoscaling.hpa.targetMemory` | Target Memory utilization percentage | `""` | | `coordinator.networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | | `coordinator.networkPolicy.allowExternal` | Don't require server label for connections | `true` | | `coordinator.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | | `coordinator.networkPolicy.addExternalClientAccess` | Allow access from pods with client label set to "true". Ignored if `networkPolicy.allowExternal` is true. | `true` | | `coordinator.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolicy | `[]` | | `coordinator.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy (ignored if allowExternalEgress=true) | `[]` | | `coordinator.networkPolicy.ingressPodMatchLabels` | Labels to match to allow traffic from other pods. Ignored if `networkPolicy.allowExternal` is true. | `{}` | | `coordinator.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces. Ignored if `networkPolicy.allowExternal` is true. | `{}` | | `coordinator.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces. Ignored if `networkPolicy.allowExternal` is true. | `{}` | | `coordinator.persistence.enabled` | Enable persistence using Persistent Volume Claims | `true` | | `coordinator.persistence.mountPath` | Path to mount the volume at. | `/bitnami/dremio/data` | | `coordinator.persistence.subPath` | The subdirectory of the volume to mount to, useful in dev environments and one PV for multiple services | `""` | | `coordinator.persistence.storageClass` | Storage class of backing PVC | `""` | | `coordinator.persistence.annotations` | Persistent Volume Claim annotations | `{}` | | `coordinator.persistence.accessModes` | Persistent Volume Access Modes | `["ReadWriteOnce"]` | | `coordinator.persistence.size` | Size of data volume | `8Gi` | | `coordinator.persistence.existingClaim` | The name of an existing PVC to use for persistence | `""` | | `coordinator.persistence.selector` | Selector to match an existing Persistent Volume for WordPress data PVC | `{}` | | `coordinator.persistence.dataSource` | Custom PVC data source | `{}` | | `coordinator.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | | `coordinator.serviceAccount.name` | The name of the ServiceAccount to use. | `""` | | `coordinator.serviceAccount.annotations` | Additional Service Account annotations (evaluated as a template) | `{}` | | `coordinator.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `false` | ### Dremio Executor common Parameters | Name | Description | Value | | ------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------- | | `executor.common.replicaCount` | Number of Dremio Executor replicas to deploy | `1` | | `executor.common.extraContainerPorts` | Optionally specify extra list of additional ports for Dremio Executor containers | `[]` | | `executor.common.extraJavaOpts` | Add extra Java opts | `""` | | `executor.common.livenessProbe.enabled` | Enable livenessProbe on Dremio Executor containers | `true` | | `executor.common.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `20` | | `executor.common.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | | `executor.common.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | | `executor.common.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `5` | | `executor.common.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | | `executor.common.readinessProbe.enabled` | Enable readinessProbe on Dremio Executor containers | `true` | | `executor.common.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `10` | | `executor.common.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | | `executor.common.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `5` | | `executor.common.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `5` | | `executor.common.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | | `executor.common.startupProbe.enabled` | Enable startupProbe on Dremio Executor containers | `false` | | `executor.common.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `10` | | `executor.common.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | | `executor.common.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | | `executor.common.startupProbe.failureThreshold` | Failure threshold for startupProbe | `5` | | `executor.common.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | | `executor.common.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | | `executor.common.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | | `executor.common.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | | `executor.common.resourcesPreset` | Set Dremio Executor container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if coordinator.resources is set (coordinator.resources is recommended for production). | `xlarge` | | `executor.common.resources` | Set Dremio Executor container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | | `executor.common.podSecurityContext.enabled` | Enable Dremio Executor pods' Security Context | `true` | | `executor.common.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy for Dremio Executor pods | `Always` | | `executor.common.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface for Dremio Executor pods | `[]` | | `executor.common.podSecurityContext.supplementalGroups` | Set filesystem extra groups for Dremio Executor pods | `[]` | | `executor.common.podSecurityContext.fsGroup` | Set fsGroup in Dremio Executor pods' Security Context | `1001` | | `executor.common.containerSecurityContext.enabled` | Enabled Dremio Executor container' Security Context | `true` | | `executor.common.containerSecurityContext.seLinuxOptions` | Set SELinux options in Dremio Executor container | `{}` | | `executor.common.containerSecurityContext.runAsUser` | Set runAsUser in Dremio Executor container' Security Context | `1001` | | `executor.common.containerSecurityContext.runAsGroup` | Set runAsGroup in Dremio Executor container' Security Context | `1001` | | `executor.common.containerSecurityContext.runAsNonRoot` | Set runAsNonRoot in Dremio Executor container' Security Context | `true` | | `executor.common.containerSecurityContext.readOnlyRootFilesystem` | Set readOnlyRootFilesystem in Dremio Executor container' Security Context | `true` | | `executor.common.containerSecurityContext.privileged` | Set privileged in Dremio Executor container' Security Context | `false` | | `executor.common.containerSecurityContext.allowPrivilegeEscalation` | Set allowPrivilegeEscalation in Dremio Executor container' Security Context | `false` | | `executor.common.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped in Dremio Executor container | `["ALL"]` | | `executor.common.containerSecurityContext.seccompProfile.type` | Set seccomp profile in Dremio Executor container | `RuntimeDefault` | | `executor.common.command` | Override default Dremio Executor container command (useful when using custom images) | `[]` | | `executor.common.args` | Override default Dremio Executor container args (useful when using custom images) | `[]` | | `executor.common.automountServiceAccountToken` | Mount Service Account token in Dremio Executor pods | `false` | | `executor.common.hostAliases` | Dremio Executor pods host aliases | `[]` | | `executor.common.statefulsetAnnotations` | Annotations for Dremio Executor statefulset | `{}` | | `executor.common.podLabels` | Extra labels for Dremio Executor pods | `{}` | | `executor.common.podAnnotations` | Annotations for Dremio Executor pods | `{}` | | `executor.common.podAffinityPreset` | Pod affinity preset. Ignored if `coordinator.affinity` is set. Allowed values: `soft` or `hard` | `""` | | `executor.common.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `coordinator.affinity` is set. Allowed values: `soft` or `hard` | `soft` | | `executor.common.dremioConf.configOverrides` | Add configuration overrides in dremio.conf applied to all executor nodes (using YAML format) | `{}` | | `executor.common.dremioConf.secretConfigOverrides` | Add sensitive configuration overrides in dremio.conf applied to executor nodes (using YAML format) | `{}` | | `executor.common.dremioConf.extraFiles` | Add extra files to the ConfigMap | `{}` | | `executor.common.dremioConf.extraSecretFiles` | Add extra files to the Secret | `{}` | | `executor.common.dremioConf.existingConfigmap` | Name of a configmap containing a dremio.conf configuration file for the executor nodes (without sensitive information) | `""` | | `executor.common.dremioConf.existingSecret` | Name of a secret containing a dremio.conf configuration file for the executor nodes (with sensitive information) | `""` | | `executor.common.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `coordinator.affinity` is set. Allowed values: `soft` or `hard` | `""` | | `executor.common.nodeAffinityPreset.key` | Node label key to match. Ignored if `coordinator.affinity` is set | `""` | | `executor.common.nodeAffinityPreset.values` | Node label values to match. Ignored if `coordinator.affinity` is set | `[]` | | `executor.common.affinity` | Affinity for Dremio Executor pods assignment | `{}` | | `executor.common.nodeSelector` | Node labels for Dremio Executor pods assignment | `{}` | | `executor.common.tolerations` | Tolerations for Dremio Executor pods assignment | `[]` | | `executor.common.updateStrategy.type` | Dremio Executor statefulset strategy type | `RollingUpdate` | | `executor.common.podManagementPolicy` | Pod management policy for Dremio Executor statefulset | `OrderedReady` | | `executor.common.priorityClassName` | Dremio Executor pods' priorityClassName | `""` | | `executor.common.topologySpreadConstraints` | Topology Spread Constraints for Dremio Executor pod assignment spread across your cluster among failure-domains | `[]` | | `executor.common.schedulerName` | Name of the k8s scheduler (other than default) for Dremio Executor pods | `""` | | `executor.common.terminationGracePeriodSeconds` | Seconds Dremio Executor pods need to terminate gracefully | `""` | | `executor.common.lifecycleHooks` | for Dremio Executor containers to automate configuration before or after startup | `{}` | | `executor.common.extraEnvVars` | Array with extra environment variables to add to Dremio Executor containers | `[]` | | `executor.common.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Dremio Executor containers | `""` | | `executor.common.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Dremio Executor containers | `""` | | `executor.common.extraVolumes` | Optionally specify extra list of additional volumes for the Dremio Executor pods | `[]` | | `executor.common.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Dremio Executor containers | `[]` | | `executor.common.sidecars` | Add additional sidecar containers to the Dremio Executor pods | `[]` | | `executor.common.initContainers` | Add additional init containers to the Dremio Executor pods | `[]` | | `executor.common.pdb.create` | Enable/disable a Pod Disruption Budget creation | `true` | | `executor.common.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `""` | | `executor.common.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable. Defaults to `1` if both `coordinator.pdb.minAvailable` and `coordinator.pdb.maxUnavailable` are empty. | `""` | | `executor.common.autoscaling.vpa.enabled` | Enable VPA for Dremio Executor pods | `false` | | `executor.common.autoscaling.vpa.annotations` | Annotations for VPA resource | `{}` | | `executor.common.autoscaling.vpa.controlledResources` | VPA List of resources that the vertical pod autoscaler can control. Defaults to cpu and memory | `[]` | | `executor.common.autoscaling.vpa.maxAllowed` | VPA Max allowed resources for the pod | `{}` | | `executor.common.autoscaling.vpa.minAllowed` | VPA Min allowed resources for the pod | `{}` | | `executor.common.autoscaling.vpa.updatePolicy.updateMode` | Autoscaling update policy | `Auto` | | `executor.common.autoscaling.hpa.enabled` | Enable HPA for Dremio Executor pods | `false` | | `executor.common.autoscaling.hpa.minReplicas` | Minimum number of replicas | `""` | | `executor.common.autoscaling.hpa.maxReplicas` | Maximum number of replicas | `""` | | `executor.common.autoscaling.hpa.targetCPU` | Target CPU utilization percentage | `""` | | `executor.common.autoscaling.hpa.targetMemory` | Target Memory utilization percentage | `""` | | `executor.common.networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | | `executor.common.networkPolicy.allowExternal` | Don't require server label for connections | `true` | | `executor.common.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | | `executor.common.networkPolicy.addExternalClientAccess` | Allow access from pods with client label set to "true". Ignored if `networkPolicy.allowExternal` is true. | `true` | | `executor.common.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolicy | `[]` | | `executor.common.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy (ignored if allowExternalEgress=true) | `[]` | | `executor.common.networkPolicy.ingressPodMatchLabels` | Labels to match to allow traffic from other pods. Ignored if `networkPolicy.allowExternal` is true. | `{}` | | `executor.common.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces. Ignored if `networkPolicy.allowExternal` is true. | `{}` | | `executor.common.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces. Ignored if `networkPolicy.allowExternal` is true. | `{}` | ### Persistence Parameters | Name | Description | Value | | ------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------- | ---------------------- | | `executor.common.persistence.enabled` | Enable persistence using Persistent Volume Claims | `true` | | `executor.common.persistence.mountPath` | Path to mount the volume at. | `/bitnami/dremio/data` | | `executor.common.persistence.subPath` | The subdirectory of the volume to mount to, useful in dev environments and one PV for multiple services | `""` | | `executor.common.persistence.storageClass` | Storage class of backing PVC | `""` | | `executor.common.persistence.annotations` | Persistent Volume Claim annotations | `{}` | | `executor.common.persistence.accessModes` | Persistent Volume Access Modes | `["ReadWriteOnce"]` | | `executor.common.persistence.size` | Size of data volume | `8Gi` | | `executor.common.persistence.existingClaim` | The name of an existing PVC to use for persistence | `""` | | `executor.common.persistence.selector` | Selector to match an existing Persistent Volume for WordPress data PVC | `{}` | | `executor.common.persistence.dataSource` | Custom PVC data source | `{}` | | `executor.common.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | | `executor.common.serviceAccount.name` | The name of the ServiceAccount to use. | `""` | | `executor.common.serviceAccount.annotations` | Additional Service Account annotations (evaluated as a template) | `{}` | | `executor.common.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `false` | ### Dremio Executor Engine Parameters | Name | Description | Value | | ------------------------------- | ----------------------------------------------------------- | --------- | | `executor.engines[0].name` | Name of the engine | `default` | | `executor.engines[0].overrides` | Override configuration set in the "executor.common" section | `{}` | ### Traffic Exposure Parameters | Name | Description | Value | | ---------------------------------- | -------------------------------------------------------------------------------------------------------------------------------- | ------------------------ | | `service.type` | Dremio service type | `LoadBalancer` | | `service.ports.web` | Dremio service web port | `9047` | | `service.ports.client` | Dremio service client port | `31010` | | `service.ports.flight` | Dremio service flight port | `32010` | | `service.nodePorts.web` | Node port for web | `""` | | `service.nodePorts.client` | Node port for client | `""` | | `service.nodePorts.flight` | Node port for flight | `""` | | `service.clusterIP` | Dremio service Cluster IP | `""` | | `service.loadBalancerIP` | Dremio service Load Balancer IP | `""` | | `service.loadBalancerSourceRanges` | Dremio service Load Balancer sources | `[]` | | `service.externalTrafficPolicy` | Dremio service external traffic policy | `Cluster` | | `service.annotations` | Additional custom annotations for Dremio service | `{}` | | `service.extraPorts` | Extra ports to expose in Dremio service (normally used with the `sidecars` value) | `[]` | | `service.sessionAffinity` | Control where client requests go, to the same pod or round-robin | `None` | | `service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` | | `service.headless.annotations` | Add annotations to the headless service | `{}` | | `ingress.enabled` | Enable ingress record generation for Dremio | `false` | | `ingress.pathType` | Ingress path type | `ImplementationSpecific` | | `ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `""` | | `ingress.hostname` | Default host for the ingress record | `dremio.local` | | `ingress.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | | `ingress.path` | Default path for the ingress record | `/` | | `ingress.annotations` | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | | `ingress.tls` | Enable TLS configuration for the host defined at `ingress.hostname` parameter | `false` | | `ingress.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | | `ingress.extraHosts` | An array with additional hostname(s) to be covered with the ingress record | `[]` | | `ingress.extraPaths` | An array with additional arbitrary paths that may need to be added to the ingress under the main host | `[]` | | `ingress.extraTls` | TLS configuration for additional hostname(s) to be covered with this ingress record | `[]` | | `ingress.secrets` | Custom TLS certificates as secrets | `[]` | | `ingress.extraRules` | Additional rules to be covered with this ingress record | `[]` | ### Dremio bootstrap user job | Name | Description | Value | | -------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------- | | `bootstrapUserJob.enabled` | Enable the bootstrap user job | `true` | | `bootstrapUserJob.forceRun` | Force the run of the credential job | `false` | | `bootstrapUserJob.labels` | Add labels to the init job definition | `{}` | | `bootstrapUserJob.backoffLimit` | set backoff limit of the job | `10` | | `bootstrapUserJob.extraVolumes` | Optionally specify extra list of additional volumes for the credential init job | `[]` | | `bootstrapUserJob.extraCommands` | Extra commands to pass to the generation job | `""` | | `bootstrapUserJob.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | | `bootstrapUserJob.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | | `bootstrapUserJob.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | | `bootstrapUserJob.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | | `bootstrapUserJob.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | | `bootstrapUserJob.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | | `bootstrapUserJob.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | | `bootstrapUserJob.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | | `bootstrapUserJob.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | | `bootstrapUserJob.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | | `bootstrapUserJob.podSecurityContext.enabled` | Enabled credential init job pods' Security Context | `true` | | `bootstrapUserJob.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | | `bootstrapUserJob.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | | `bootstrapUserJob.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | | `bootstrapUserJob.podSecurityContext.fsGroup` | Set credential init job pod's Security Context fsGroup | `1001` | | `bootstrapUserJob.extraEnvVars` | Array containing extra env vars to configure the credential init job | `[]` | | `bootstrapUserJob.extraEnvVarsCM` | ConfigMap containing extra env vars to configure the credential init job | `""` | | `bootstrapUserJob.extraEnvVarsSecret` | Secret containing extra env vars to configure the credential init job (in case of sensitive data) | `""` | | `bootstrapUserJob.extraVolumeMounts` | Array of extra volume mounts to be added to the jwt Container (evaluated as template). Normally used with `extraVolumes`. | `[]` | | `bootstrapUserJob.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if bootstrapUserJob.resources is set (bootstrapUserJob.resources is recommended for production). | `micro` | | `bootstrapUserJob.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | | `bootstrapUserJob.livenessProbe.enabled` | Enable livenessProbe on init job | `true` | | `bootstrapUserJob.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `5` | | `bootstrapUserJob.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | | `bootstrapUserJob.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | | `bootstrapUserJob.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `5` | | `bootstrapUserJob.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | | `bootstrapUserJob.readinessProbe.enabled` | Enable readinessProbe on init job | `true` | | `bootstrapUserJob.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `5` | | `bootstrapUserJob.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | | `bootstrapUserJob.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `5` | | `bootstrapUserJob.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `5` | | `bootstrapUserJob.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | | `bootstrapUserJob.startupProbe.enabled` | Enable startupProbe on Data Coordinator containers | `false` | | `bootstrapUserJob.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | | `bootstrapUserJob.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | | `bootstrapUserJob.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | | `bootstrapUserJob.startupProbe.failureThreshold` | Failure threshold for startupProbe | `5` | | `bootstrapUserJob.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | | `bootstrapUserJob.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | | `bootstrapUserJob.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | | `bootstrapUserJob.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | | `bootstrapUserJob.automountServiceAccountToken` | Mount Service Account token in pod | `false` | | `bootstrapUserJob.hostAliases` | Add deployment host aliases | `[]` | | `bootstrapUserJob.annotations` | Add annotations to the job | `{}` | | `bootstrapUserJob.podLabels` | Additional pod labels | `{}` | | `bootstrapUserJob.podAnnotations` | Additional pod annotations | `{}` | | `bootstrapUserJob.networkPolicy.enabled` | Enable creation of NetworkPolicy resources | `true` | | `bootstrapUserJob.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | | `bootstrapUserJob.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolicy | `[]` | | `bootstrapUserJob.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | | `bootstrapUserJob.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | | `bootstrapUserJob.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | ### Default Init Container Parameters | Name | Description | Value | | ----------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------- | | `defaultInitContainers.defaultImage.registry` | OS Shell + Utility image registry | `REGISTRY_NAME` | | `defaultInitContainers.defaultImage.repository` | OS Shell + Utility image repository | `REPOSITORY_NAME/os-shell` | | `defaultInitContainers.defaultImage.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` | | `defaultInitContainers.defaultImage.pullSecrets` | OS Shell + Utility image pull secrets | `[]` | | `defaultInitContainers.wait.enabled` | Enable init container that waits for backends to be ready | `true` | | `defaultInitContainers.wait.resourcesPreset` | Set init container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if volumePermissions.resources is set (volumePermissions.resources is recommended for production). | `nano` | | `defaultInitContainers.wait.resources` | Set init container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | | `defaultInitContainers.wait.containerSecurityContext.enabled` | Enabled Init container' Security Context | `true` | | `defaultInitContainers.wait.containerSecurityContext.seLinuxOptions` | Set SELinux options in Init container | `{}` | | `defaultInitContainers.wait.containerSecurityContext.runAsUser` | Set runAsUser in Init container' Security Context | `1001` | | `defaultInitContainers.wait.containerSecurityContext.runAsGroup` | Set runAsGroup in Init container' Security Context | `1001` | | `defaultInitContainers.wait.containerSecurityContext.runAsNonRoot` | Set runAsNonRoot in Init container' Security Context | `true` | | `defaultInitContainers.wait.containerSecurityContext.readOnlyRootFilesystem` | Set readOnlyRootFilesystem in Init container' Security Context | `true` | | `defaultInitContainers.wait.containerSecurityContext.privileged` | Set privileged in Init container' Security Context | `false` | | `defaultInitContainers.wait.containerSecurityContext.allowPrivilegeEscalation` | Set allowPrivilegeEscalation in Init container' Security Context | `false` | | `defaultInitContainers.wait.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped in Init container | `["ALL"]` | | `defaultInitContainers.wait.containerSecurityContext.seccompProfile.type` | Set seccomp profile in Init container | `RuntimeDefault` | | `defaultInitContainers.generateConf.enabled` | Enable init container that merges and renders the dremio.conf and core-site.xml configuration files | `true` | | `defaultInitContainers.generateConf.resourcesPreset` | Set init container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if volumePermissions.resources is set (volumePermissions.resources is recommended for production). | `nano` | | `defaultInitContainers.generateConf.resources` | Set init container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | | `defaultInitContainers.generateConf.containerSecurityContext.enabled` | Enabled Init container' Security Context | `true` | | `defaultInitContainers.generateConf.containerSecurityContext.seLinuxOptions` | Set SELinux options in Init container | `{}` | | `defaultInitContainers.generateConf.containerSecurityContext.runAsUser` | Set runAsUser in Init container' Security Context | `1001` | | `defaultInitContainers.generateConf.containerSecurityContext.runAsGroup` | Set runAsGroup in Init container' Security Context | `1001` | | `defaultInitContainers.generateConf.containerSecurityContext.runAsNonRoot` | Set runAsNonRoot in Init container' Security Context | `true` | | `defaultInitContainers.generateConf.containerSecurityContext.readOnlyRootFilesystem` | Set readOnlyRootFilesystem in Init container' Security Context | `true` | | `defaultInitContainers.generateConf.containerSecurityContext.privileged` | Set privileged in Init container' Security Context | `false` | | `defaultInitContainers.generateConf.containerSecurityContext.allowPrivilegeEscalation` | Set allowPrivilegeEscalation in Init container' Security Context | `false` | | `defaultInitContainers.generateConf.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped in Init container | `["ALL"]` | | `defaultInitContainers.generateConf.containerSecurityContext.seccompProfile.type` | Set seccomp profile in Init container | `RuntimeDefault` | | `defaultInitContainers.generateConf.extraEnvVars` | Array with extra environment variables to add to Dremio containers | `[]` | | `defaultInitContainers.generateConf.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Dremio containers | `""` | | `defaultInitContainers.generateConf.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Dremio containers | `""` | | `defaultInitContainers.generateConf.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Dremio containers | `[]` | | `defaultInitContainers.initCerts.enabled` | Enable init container that initializes the Java keystore with the TLS certificates (requires dremio.tls.enabled=true) | `true` | | `defaultInitContainers.initCerts.resourcesPreset` | Set init container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if volumePermissions.resources is set (volumePermissions.resources is recommended for production). | `nano` | | `defaultInitContainers.initCerts.resources` | Set init container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | | `defaultInitContainers.initCerts.containerSecurityContext.enabled` | Enabled Init container' Security Context | `true` | | `defaultInitContainers.initCerts.containerSecurityContext.seLinuxOptions` | Set SELinux options in Init container | `{}` | | `defaultInitContainers.initCerts.containerSecurityContext.runAsUser` | Set runAsUser in Init container' Security Context | `1001` | | `defaultInitContainers.initCerts.containerSecurityContext.runAsGroup` | Set runAsGroup in Init container' Security Context | `1001` | | `defaultInitContainers.initCerts.containerSecurityContext.runAsNonRoot` | Set runAsNonRoot in Init container' Security Context | `true` | | `defaultInitContainers.initCerts.containerSecurityContext.readOnlyRootFilesystem` | Set readOnlyRootFilesystem in Init container' Security Context | `true` | | `defaultInitContainers.initCerts.containerSecurityContext.privileged` | Set privileged in Init container' Security Context | `false` | | `defaultInitContainers.initCerts.containerSecurityContext.allowPrivilegeEscalation` | Set allowPrivilegeEscalation in Init container' Security Context | `false` | | `defaultInitContainers.initCerts.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped in Init container | `["ALL"]` | | `defaultInitContainers.initCerts.containerSecurityContext.seccompProfile.type` | Set seccomp profile in Init container | `RuntimeDefault` | | `defaultInitContainers.copyDefaultConf.enabled` | Enable init container that copies the default dremio configuration to an empty-dir volume | `true` | | `defaultInitContainers.copyDefaultConf.resourcesPreset` | Set init container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if volumePermissions.resources is set (volumePermissions.resources is recommended for production). | `nano` | | `defaultInitContainers.copyDefaultConf.resources` | Set init container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | | `defaultInitContainers.copyDefaultConf.containerSecurityContext.enabled` | Enabled Init container' Security Context | `true` | | `defaultInitContainers.copyDefaultConf.containerSecurityContext.seLinuxOptions` | Set SELinux options in Init container | `{}` | | `defaultInitContainers.copyDefaultConf.containerSecurityContext.runAsUser` | Set runAsUser in Init container' Security Context | `1001` | | `defaultInitContainers.copyDefaultConf.containerSecurityContext.runAsGroup` | Set runAsGroup in Init container' Security Context | `1001` | | `defaultInitContainers.copyDefaultConf.containerSecurityContext.runAsNonRoot` | Set runAsNonRoot in Init container' Security Context | `true` | | `defaultInitContainers.copyDefaultConf.containerSecurityContext.readOnlyRootFilesystem` | Set readOnlyRootFilesystem in Init container' Security Context | `true` | | `defaultInitContainers.copyDefaultConf.containerSecurityContext.privileged` | Set privileged in Init container' Security Context | `false` | | `defaultInitContainers.copyDefaultConf.containerSecurityContext.allowPrivilegeEscalation` | Set allowPrivilegeEscalation in Init container' Security Context | `false` | | `defaultInitContainers.copyDefaultConf.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped in Init container | `["ALL"]` | | `defaultInitContainers.copyDefaultConf.containerSecurityContext.seccompProfile.type` | Set seccomp profile in Init container | `RuntimeDefault` | | `defaultInitContainers.upgradeKeystore.enabled` | Enable init container that upgrades the metadata KV store | `true` | | `defaultInitContainers.upgradeKeystore.resourcesPreset` | Set init container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if volumePermissions.resources is set (volumePermissions.resources is recommended for production). | `large` | | `defaultInitContainers.upgradeKeystore.resources` | Set init container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | | `defaultInitContainers.upgradeKeystore.containerSecurityContext.enabled` | Enabled Init container' Security Context | `true` | | `defaultInitContainers.upgradeKeystore.containerSecurityContext.seLinuxOptions` | Set SELinux options in Init container | `{}` | | `defaultInitContainers.upgradeKeystore.containerSecurityContext.runAsUser` | Set runAsUser in Init container' Security Context | `1001` | | `defaultInitContainers.upgradeKeystore.containerSecurityContext.runAsGroup` | Set runAsGroup in Init container' Security Context | `1001` | | `defaultInitContainers.upgradeKeystore.containerSecurityContext.runAsNonRoot` | Set runAsNonRoot in Init container' Security Context | `true` | | `defaultInitContainers.upgradeKeystore.containerSecurityContext.readOnlyRootFilesystem` | Set readOnlyRootFilesystem in Init container' Security Context | `true` | | `defaultInitContainers.upgradeKeystore.containerSecurityContext.privileged` | Set privileged in Init container' Security Context | `false` | | `defaultInitContainers.upgradeKeystore.containerSecurityContext.allowPrivilegeEscalation` | Set allowPrivilegeEscalation in Init container' Security Context | `false` | | `defaultInitContainers.upgradeKeystore.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped in Init container | `["ALL"]` | | `defaultInitContainers.upgradeKeystore.containerSecurityContext.seccompProfile.type` | Set seccomp profile in Init container | `RuntimeDefault` | | `defaultInitContainers.volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` | | `defaultInitContainers.volumePermissions.resourcesPreset` | Set init container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if volumePermissions.resources is set (volumePermissions.resources is recommended for production). | `nano` | | `defaultInitContainers.volumePermissions.resources` | Set init container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | | `defaultInitContainers.volumePermissions.containerSecurityContext.enabled` | Enabled init container' Security Context | `true` | | `defaultInitContainers.volumePermissions.containerSecurityContext.seLinuxOptions` | Set SELinux options in init container | `{}` | | `defaultInitContainers.volumePermissions.containerSecurityContext.runAsUser` | Set init container's Security Context runAsUser | `0` | ### MinIO® chart parameters | Name | Description | Value | | ---------------------------------- | --------------------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------- | | `minio` | For full list of MinIO® values configurations please refere [here](https://github.com/bitnami/charts/tree/main/bitnami/minio) | | | `minio.enabled` | Enable/disable MinIO® chart installation | `true` | | `minio.containerPorts.api` | MinIO® container port to open for MinIO® API | `9000` | | `minio.auth.rootUser` | MinIO® root username | `admin` | | `minio.auth.rootPassword` | Password for MinIO® root user | `""` | | `minio.auth.existingSecret` | Name of an existing secret containing the MinIO® credentials | `""` | | `minio.defaultBuckets` | Comma, semi-colon or space separated list of MinIO® buckets to create | `dremio` | | `minio.provisioning.enabled` | Enable/disable MinIO® provisioning job | `true` | | `minio.provisioning.extraCommands` | Extra commands to run on MinIO® provisioning job | `["mc anonymous set download provisioning/dremio"]` | | `minio.tls.enabled` | Enable TLS configuration for MinIO® | `true` | | `minio.tls.autoGenerated.enabled` | Enable automatic generation of TLS certificates | `true` | | `minio.service.type` | MinIO® service type | `ClusterIP` | | `minio.service.loadBalancerIP` | MinIO® service LoadBalancer IP | `""` | | `minio.service.ports.api` | MinIO® service port | `9000` | | `minio.console.enabled` | Enable MinIO® Console | `false` | ### Prometheus metrics parameters | Name | Description | Value | | ----------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------ | | `metrics.enabled` | Enable the export of Prometheus metrics | `false` | | `metrics.image.registry` | JMX exporter image registry | `REGISTRY_NAME` | | `metrics.image.repository` | JMX exporter image repository | `REPOSITORY_NAME/jmx-exporter` | | `metrics.image.digest` | JMX exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | | `metrics.image.pullPolicy` | JMX exporter image pull policy | `IfNotPresent` | | `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | | `metrics.extraArgs` | Add extra arguments to the default container args section | `[]` | | `metrics.containerSecurityContext.enabled` | Enable Prometheus JMX exporter containers' Security Context | `true` | | `metrics.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | | `metrics.containerSecurityContext.runAsUser` | Set Prometheus JMX exporter containers' Security Context runAsUser | `1001` | | `metrics.containerSecurityContext.runAsGroup` | Group ID for the Prometheus JMX exporter container | `1001` | | `metrics.containerSecurityContext.runAsNonRoot` | Set Prometheus JMX exporter containers' Security Context runAsNonRoot | `true` | | `metrics.containerSecurityContext.privileged` | Set Prometheus JMX exporter container's Security Context privileged | `false` | | `metrics.containerSecurityContext.allowPrivilegeEscalation` | Set Prometheus JMX exporter containers' Security Context allowPrivilegeEscalation | `false` | | `metrics.containerSecurityContext.readOnlyRootFilesystem` | Set Prometheus JMX exporter containers' Security Context readOnlyRootFilesystem | `true` | | `metrics.containerSecurityContext.capabilities.drop` | Set Prometheus JMX exporter containers' Security Context capabilities to be dropped | `["ALL"]` | | `metrics.containerSecurityContext.seccompProfile.type` | Set Prometheus JMX exporter container's Security Context seccomp profile | `RuntimeDefault` | | `metrics.containerPorts.metrics` | Prometheus JMX exporter metrics container port | `5556` | | `metrics.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if metrics.resources is set (metrics.resources is recommended for production). | `micro` | | `metrics.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | | `metrics.livenessProbe.enabled` | Enable livenessProbe | `true` | | `metrics.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `60` | | `metrics.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | | `metrics.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` | | `metrics.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `3` | | `metrics.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | | `metrics.readinessProbe.enabled` | Enable readinessProbe | `true` | | `metrics.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | | `metrics.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | | `metrics.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` | | `metrics.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `3` | | `metrics.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | | `metrics.startupProbe.enabled` | Enable startupProbe | `true` | | `metrics.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `30` | | `metrics.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | | `metrics.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `30` | | `metrics.startupProbe.failureThreshold` | Failure threshold for startupProbe | `3` | | `metrics.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | | `metrics.service.ports.metrics` | Prometheus JMX exporter metrics service port | `5556` | | `metrics.service.clusterIP` | Static clusterIP or None for headless services | `""` | | `metrics.service.sessionAffinity` | Control where client requests go, to the same pod or round-robin | `None` | | `metrics.service.annotations` | Annotations for the Prometheus JMX exporter service | `{}` | | `metrics.configOverrides` | Configuration file for JMX exporter | `""` | | `metrics.existingConfigmap` | Name of existing ConfigMap with JMX exporter configuration | `""` | | `metrics.serviceMonitor.enabled` | if `true`, creates a Prometheus Operator ServiceMonitor (also requires `metrics.enabled` to be `true`) | `false` | | `metrics.serviceMonitor.namespace` | Namespace in which Prometheus is running | `""` | | `metrics.serviceMonitor.annotations` | Additional custom annotations for the ServiceMonitor | `{}` | | `metrics.serviceMonitor.labels` | Extra labels for the ServiceMonitor | `{}` | | `metrics.serviceMonitor.jobLabel` | The name of the label on the target service to use as the job name in Prometheus | `""` | | `metrics.serviceMonitor.honorLabels` | honorLabels chooses the metric's labels on collisions with target labels | `false` | | `metrics.serviceMonitor.interval` | Interval at which metrics should be scraped. | `""` | | `metrics.serviceMonitor.scrapeTimeout` | Timeout after which the scrape is ended | `""` | | `metrics.serviceMonitor.metricRelabelings` | Specify additional relabeling of metrics | `[]` | | `metrics.serviceMonitor.relabelings` | Specify general relabeling | `[]` | | `metrics.serviceMonitor.selector` | Prometheus instance selector labels | `{}` | ### External S3 parameters | Name | Description | Value | | ----------------------------------------- | ------------------------------------------------------------------- | --------------- | | `externalS3.host` | External S3 host | `""` | | `externalS3.port` | External S3 port number | `443` | | `externalS3.accessKeyID` | External S3 access key ID | `""` | | `externalS3.accessKeySecret` | External S3 access key secret | `""` | | `externalS3.existingSecret` | Name of an existing secret resource containing the S3 credentials | `""` | | `externalS3.existingSecretAccessKeyIDKey` | Name of an existing secret key containing the S3 access key ID | `root-user` | | `externalS3.existingSecretKeySecretKey` | Name of an existing secret key containing the S3 access key secret | `root-password` | | `externalS3.protocol` | External S3 protocol | `https` | | `externalS3.bucket` | External S3 bucket | `dremio` | | `externalS3.path` | External S3 path inside the bucket | `""` | | `externalS3.region` | External S3 region | `us-east-1` | | `externalS3.authentication` | External S3 authentication type | `accesskey` | | `externalS3.disableCertChecking` | Disable certificate checking on external S3 (necessary if it uses ) | `false` | ### External Zookeeper paramaters | Name | Description | Value | | --------------------------- | ----------------------------------------- | ------ | | `externalZookeeper.servers` | List of external zookeeper servers to use | `[]` | | `externalZookeeper.port` | Port of the Zookeeper servers | `2888` | ### Zookeeper subchart parameters | Name | Description | Value | | --------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------- | | `zookeeper.enabled` | Deploy Zookeeper subchart | `true` | | `zookeeper.replicaCount` | Number of Zookeeper instances | `1` | | `zookeeper.containerPorts.client` | Zookeeper container port | `2181` | | `zookeeper.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if resources is set (resources is recommended for production). | `micro` | | `zookeeper.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | Specify each parameter using the `--set key=value[,key=value]` argument to `helm install`. Alternatively, a YAML file that specifies the values for the above parameters can be provided while installing the chart. For example, ```console helm install my-release -f values.yaml oci://REGISTRY_NAME/REPOSITORY_NAME/dremio ``` > Note: You need to substitute the placeholders `REGISTRY_NAME` and `REPOSITORY_NAME` with a reference to your Helm chart registry and repository. For example, in the case of Bitnami, you need to use `REGISTRY_NAME=registry-1.docker.io` and `REPOSITORY_NAME=bitnamicharts`. > **Tip**: You can use the default [values.yaml](https://github.com/bitnami/charts/blob/main/template/dremio/values.yaml) ## Troubleshooting ## Upgrading ### To 3.0.0 This major updates the `minio` subchart to its newest major, 17.0.0. For more information on this subchart's major, please refer to [minio upgrade notes](https://github.com/bitnami/charts/tree/main/bitnami/minio#to-1700). ### To 1.0.0 This major updates the `minio` subchart to its newest major, 16.0.0. For more information on this subchart's major, please refer to [minio upgrade notes](https://github.com/bitnami/charts/tree/main/bitnami/minio#to-1600). ## License Copyright © 2025 Broadcom. The term "Broadcom" refers to Broadcom Inc. and/or its subsidiaries. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.