-
Notifications
You must be signed in to change notification settings - Fork 4
/
values.yaml
128 lines (99 loc) · 8.46 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
# Please uncomment and specify values for these options as per your requirements.
# This is the marketplace subscribed product: PX-ENTERPRISE or PX-ENTERPRISE-DR
awsProduct: ${awsProduct} #This is the default.
namespace: ${namespace} # Namespace where Portworx cluster will be deployed
createNamespace: ${createNamespace} # Set to true when you want the namespace passed above doesnt exits and is to be created by the terraform script. Installation fails if the namespace already exists and the variable is set to true.
deployOperator: true # Deploy the Portworx operator
deployCluster: true # Deploy the Portworx cluster
imageVersion: ${imageVersion} # Version of the PX Image.
pxOperatorImageVersion: ${pxOperatorImageVersion} # Version of the PX operator image.
openshiftInstall: ${useOpenshiftInstall} # Defaults to false for installing Portworx on Openshift .
isTargetOSCoreOS: false # Is your target OS CoreOS? Defaults to false.
pksInstall: false # installation on PKS (Pivotal Container Service)
EKSInstall: true # installation on EKS.
AKSInstall: false # installation on AKS
etcdEndPoint: ${etcdEndPoint} # The ETCD endpoint. Should be in the format etcd:http://<your-etcd-endpoint>:2379. If there are multiple etcd endpoints they need to be ";" seperated.
# the default value is empty since it requires to be explicity set using either the --set option of -f values.yaml.
clusterName: ${clusterName} # This is the default. please change it to your cluster name.
usefileSystemDrive: false # true/false Instructs PX to use an unmounted Drive even if it has a filesystem.
usedrivesAndPartitions: false # Defaults to false. Change to true and PX will use unmounted drives and partitions.
drives: ${drives} # NOTE: This is a ";" seperated list of drives. For eg: "/dev/sda;/dev/sdb;/dev/sdc" or
# "type=gp2+size=200;type=gp3+size=500". For each cloud drive specify its "type" and "size" by passing a "+" separated value for these fields. Defaults to use -A switch.
journalDevice:
maxStorageNodesPerZone: ${maxStorageNodesPerZone} # The maximum number of storage nodes desired per zone, in case of cloud drive provisioning
secretType: k8s # Defaults to k8s, but can be kvdb/k8s/aws-kms/vault/ibm-kp. It is autopopulated to ibm-kp if the environment is IKS.
dataInterface: ${dataInterface} # Name of the interface <ethX>
managementInterface: none # Name of the interface <ethX>
serviceType: none # Kubernetes service type for services deployed by the Operator. Direct Values like
# 'LoadBalancer', 'NodePort' will change all services. To change the types of specific
# services, value can be specified as 'portworx-service:LoadBalancer;portworx-api:ClusterIP'
envVars: ${envVars} # DEPRECATED: Use envs section to set env variables
# NOTE: This is a ";" seperated list of environment variables.
# For eg: MYENV1=myvalue1;MYENV2=myvalue2
envs: # Add environment variables to the Portworx container in all Kubernetes supported formats
# - name: AWS_CA_BUNDLE
# value: "/etc/pwx/objectstore-cert/objectstore.pem"
# - name: AWS_ACCESS_KEY_ID
# valueFrom:
# secretKeyRef:
# name: aws-creds
# key: access-key
miscArgs: none # Miscellaneous arguments that will be passed to portworx verbatim. Only use this if there is
# no equivalent way to specify these options directly via a StorageCluster spec field.
disableStorageClass: false # Instructs Operator to not install the default Portworx StorageClasses.
stork: ${useStork} # Use Stork https://docs.portworx.com/scheduler/kubernetes/stork.html for hyperconvergence.
storkVersion: ${storkVersion} # Optional: version of Stork. For eg: 2.7.0, when it's empty Portworx operator will pick up
# version according to Portworx version.
storkSpec: # Optional Stork configurations
args: # Pass arguments to Stork container. Example: verbose='true';webhook-controller='false'
volumes: # Add volumes to Stork container. Refer the top level volumes for schema.
customRegistryURL: ${customRegistryURL} #Url wherre to pull Portworx image from
registrySecret: ${registrySecret} #Image registery credentials to pull Portworx Images from a secure registry
licenseSecret: ${licenseSecret} #Kubernetes secret name that has Portworx licensing information
monitoring: ${monitoring}
deployOnMaster: false # For POC only
csi: ${enableCSI} # Enable CSI
aut: ${enableAutopilot} # Enable AutoPilot
internalKVDB: ${useInternalKVDB} # internal KVDB
kvdbDevice: ${kvdbDevice} # specify a separate device to store KVDB data, only used when internalKVDB is set to true
etcd: # DEPRECATED: Use kvdb.authSecretName for configuring secure etcd
credentials: none:none # Username and password for ETCD authentication in the form user:password
certPath: none # Base path where the certificates are placed. (example: if the certificates ca,crt and the key are in /etc/pwx/etcdcerts the value should be provided as /etc/pwx/etcdcerts)
ca: none # Location of CA file for ETCD authentication. Should be /path/to/server.ca
cert: none # Location of certificate for ETCD authentication. Should be /path/to/server.crt
key: none # Location of certificate key for ETCD authentication Should be /path/to/servery.key
consul: # DEPRECATED: Use kvdb.authSecretName for configuring secure consul
token: none # ACL token value used for Consul authentication. (example: 398073a8-5091-4d9c-871a-bbbeb030d1f6)
kvdb:
authSecretName: ${KVDBauthSecretName} # Refer https://docs.portworx.com/reference/etcd/#securing-with-certificates-in-kubernetes to
# create a kvdb secret and specify the name of the secret here
volumes: # Add volumes to Portworx container. Supported volume types: Host, Secret, ConfigMap
# - name: objectstore-cert
# mountPath: /etc/pwx/objectstore-cert
# secret:
# secretName: objectstore-cert
# items:
# - key: objectstore.pem
# path: objectstore.pem
tolerations: # Add tolerations
# - key: "key"
# operator: "Equal|Exists"
# value: "value"
# effect: "NoSchedule|PreferNoSchedule|NoExecute(1.6 only)"
serviceAccount:
hook:
create: true
name:
aws:
marketplace: false #Set to True if you want to use AWS Marketplace license with Portworx. Make sure you subscribe to the correct Portworx product lsiting from the markettplace and then perform installation
eksServiceAccount: ${eksServiceAccount} # Name of the service account with Metering Permission used to send Billing data to AWS Marketplace. Default the service account is created automatically when aws.marketplace is set to true and correct value is passed to this parameter
accessKeyId: ${awsAccessKeyId}
secretAccessKey: ${awsSecretAccessKey}
deleteType: ${deleteType}
clusterToken:
create: true # Create cluster token
secretName: px-vol-encryption # Name of kubernetes secret to be created. Requires clusterToken.create to be true.
serviceAccountName: px-create-cluster-token # Service account name to use for post-install hook to create cluster token
#requirePxEnabledTag: true # if set to true, portworx will only install on nodes with px/enabled: true label. Not required in most scenarios.
deleteStrategy: # Optional: Delete strategy for the portworx cluster
type: # Valid values: Uninstall, UninstallAndWipe