You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: charts/redis-ha/Chart.yaml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ keywords:
5
5
- redis
6
6
- keyvalue
7
7
- database
8
-
version: 4.35.10
8
+
version: 4.36.0
9
9
appVersion: 8.2.4
10
10
description: This Helm chart provides a highly available Redis implementation with a master/slave configuration and uses Sentinel sidecars for failover management
|`image.tag`| Redis image tag | string |`"8.2.1-alpine"`|
91
+
|`image.tag`| Redis image tag | string |`"8.2.4-alpine"`|
92
92
|`imagePullSecrets`| Reference to one or more secrets to be used when pulling redis images | list |`[]`|
93
93
|`init.resources`| Extra init resources | object |`{}`|
94
94
|`labels`| Custom labels for the redis pod | object |`{}`|
@@ -173,8 +173,22 @@ The following table lists the configurable parameters of the Redis chart and the
173
173
|`serviceAccount.automountToken`| opt in/out of automounting API credentials into container. Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/| bool |`false`|
174
174
|`serviceAccount.create`| Specifies whether a ServiceAccount should be created | bool |`true`|
175
175
|`serviceAccount.name`| The name of the ServiceAccount to use. If not set and create is true, a name is generated using the redis-ha.fullname template | string |`""`|
176
+
|`podAnnotations`| Annotations for redis statefulset pods (top-level) | object |`{}`|
177
+
|`serviceAnnotations`| Custom annotations for redis services | object |`{}`|
176
178
|`serviceLabels`| Custom labels for redis service | object |`{}`|
177
179
|`splitBrainDetection.interval`| Interval between redis sentinel and server split brain checks (in seconds) | int |`60`|
180
+
|`splitBrainDetection.livenessProbe.exec.command`| Command for liveness probe exec check | list |`["cat", "/readonly-config/redis.conf"]`|
181
+
|`splitBrainDetection.livenessProbe.failureThreshold`| Failure threshold for liveness probe | int |`5`|
182
+
|`splitBrainDetection.livenessProbe.initialDelaySeconds`| Initial delay in seconds for liveness probe | int |`30`|
183
+
|`splitBrainDetection.livenessProbe.periodSeconds`| Period in seconds after which liveness probe will be repeated | int |`15`|
184
+
|`splitBrainDetection.livenessProbe.successThreshold`| Success threshold for liveness probe | int |`1`|
185
+
|`splitBrainDetection.livenessProbe.timeoutSeconds`| Timeout seconds for liveness probe | int |`15`|
186
+
|`splitBrainDetection.readinessProbe.exec.command`| Command for readiness probe exec check | list |`["sh", "-c", "test -d /proc/1"]`|
187
+
|`splitBrainDetection.readinessProbe.failureThreshold`| Failure threshold for readiness probe | int |`5`|
188
+
|`splitBrainDetection.readinessProbe.initialDelaySeconds`| Initial delay in seconds for readiness probe | int |`30`|
189
+
|`splitBrainDetection.readinessProbe.periodSeconds`| Period in seconds after which readiness probe will be repeated | int |`15`|
190
+
|`splitBrainDetection.readinessProbe.successThreshold`| Success threshold for readiness probe | int |`1`|
191
+
|`splitBrainDetection.readinessProbe.timeoutSeconds`| Timeout seconds for readiness probe | int |`15`|
|`sysctlImage.command`| sysctlImage command to execute | list |`[]`|
@@ -187,6 +201,7 @@ The following table lists the configurable parameters of the Redis chart and the
187
201
|`sysctlImage.tag`| sysctlImage Init container tag | string |`"1.34.1"`|
188
202
|`tls.caCertFile`| Name of CA certificate file | string |`"ca.crt"`|
189
203
|`tls.certFile`| Name of certificate file | string |`"redis.crt"`|
204
+
|`tls.secretName`| Name of existing secret with TLS certificates. Supports templates. | string |`""`|
190
205
|`tls.dhParamsFile`| Name of Diffie-Hellman (DH) key exchange parameters file (Example: redis.dh) | string |`nil`|
191
206
|`tls.keyFile`| Name of key file | string |`"redis.key"`|
192
207
|`tolerations`|| list |`[]`|
@@ -202,6 +217,7 @@ The following table lists the configurable parameters of the Redis chart and the
202
217
|`sentinel.auth`| Enables or disables sentinel AUTH (Requires `sentinel.password` to be set) | bool |`false`|
203
218
|`sentinel.authClients`| It is possible to disable client side certificates authentication when "authClients" is set to "no" | string |`""`|
204
219
|`sentinel.authKey`| The key holding the sentinel password in an existing secret. | string |`"sentinel-password"`|
220
+
|`sentinel.bind`| Configure the bind directive for sentinel | string |`nil`|
205
221
|`sentinel.config`| Valid sentinel config options in this section will be applied as config options to each sentinel (see below) | object | see values.yaml |
206
222
|`sentinel.customArgs`|| list |`[]`|
207
223
|`sentinel.customCommand`|| list |`[]`|
@@ -245,10 +261,10 @@ The following table lists the configurable parameters of the Redis chart and the
245
261
|`haproxy.additionalAffinities`| Additional affinities to add to the haproxy pods. | object |`{}`|
246
262
|`haproxy.additionalPorts`| Additional ports to expose on HAProxy service and deployment. Each port should have a name, containerPort, and optionally servicePort (defaults to containerPort) | list |`[]`|
247
263
|`haproxy.affinity`| Override all other affinity settings for the haproxy pods with a string. | string |`""`|
|`haproxy.containerPort`| Modify HAProxy deployment container port | int |`6379`|
267
+
|`haproxy.tlsPort`| Dedicated TLS port for HAProxy frontend. When set together with `haproxy.tls.enabled`, plaintext stays on `containerPort` and TLS binds to `tlsPort`. When not set, `haproxy.tls.enabled` replaces plaintext with TLS on `containerPort` (current behavior). | int |`nil`|
252
268
|`haproxy.containerSecurityContext`| Security context to be added to the HAProxy containers. | object |`{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}}`|
253
269
|`haproxy.customConfig`| Allows for custom config-haproxy.cfg file to be applied. If this is used then default config will be overwriten | string |`nil`|
|`haproxy.tls`| Enable TLS termination on HAproxy, This will create a volume mount | object |`{"certMountPath":"/tmp/","enabled":false,"keyName":null,"secretName":""}`|
328
+
|`haproxy.tls`| Enable TLS termination on HAproxy, This will create a volume mount | object |`{"certMountPath":"/tmp/","enabled":false,"keyName":"tls.pem","secretName":""}`|
313
329
|`haproxy.tls.certMountPath`| Path to mount the secret that contains the certificates. haproxy | string |`"/tmp/"`|
314
330
|`haproxy.tls.enabled`| If "true" this will enable TLS termination on haproxy | bool |`false`|
315
-
|`haproxy.tls.keyName`| Key file name | string |`nil`|
331
+
|`haproxy.tls.keyName`| Key file name (PEM bundle containing cert and private key) | string |`"tls.pem"`|
316
332
|`haproxy.tls.secretName`| Secret containing the .pem file | string |`""`|
317
333
318
334
### Prometheus exporter parameters
@@ -350,7 +366,8 @@ The following table lists the configurable parameters of the Redis chart and the
350
366
|`exporter.serviceMonitor.relabelings`|| list |`[]`|
351
367
|`exporter.serviceMonitor.telemetryPath`| Set path to redis-exporter telemtery-path (default is /metrics) | string |`""`|
352
368
|`exporter.serviceMonitor.timeout`| Set timeout for scrape (default is 10s) | string |`""`|
353
-
|`exporter.tag`| Exporter image tag | string |`"v1.67.0"`|
369
+
|`exporter.sslEnabled`| Enable SSL for exporter connection to redis | bool |`false`|
370
+
|`exporter.tag`| Exporter image tag | string |`"v1.80.2"`|
354
371
|`prometheusRule.additionalLabels`| Additional labels to be set in metadata. | object |`{}`|
355
372
|`prometheusRule.enabled`| If true, creates a Prometheus Operator PrometheusRule. | bool |`false`|
356
373
|`prometheusRule.interval`| How often rules in the group are evaluated (falls back to `global.evaluation_interval` if not set). | string |`"10s"`|
bind {{ if .Values.haproxy.IPv6.enabled }}[::]{{ end }}:{{ $root.Values.haproxy.containerPort }} {{ if .Values.haproxy.IPv6.enabled }}v4v6{{ end }}
597
+
bind {{ if .Values.haproxy.IPv6.enabled }}[::]{{ end }}:{{ $root.Values.haproxy.tlsPort }} ssl crt {{ .Values.haproxy.tls.certMountPath }}{{ .Values.haproxy.tls.keyName }} {{ if .Values.haproxy.IPv6.enabled }}v4v6{{ end }}
598
+
{{- elseif .Values.haproxy.tls.enabled }}
592
599
bind {{ if .Values.haproxy.IPv6.enabled }}[::]{{ end }}:{{ $root.Values.haproxy.containerPort }} ssl crt {{ .Values.haproxy.tls.certMountPath }}{{ .Values.haproxy.tls.keyName }} {{ if .Values.haproxy.IPv6.enabled }}v4v6{{ end }}
593
-
{{ else}}
600
+
{{-else}}
594
601
bind {{ if .Values.haproxy.IPv6.enabled }}[::]{{ end }}:{{ ifne (int $root.Values.redis.port) 0 }}{{ $root.Values.redis.port }}{{ else}}{{ $root.Values.redis.tlsPort }}{{ end }} {{ if .Values.haproxy.IPv6.enabled }}v4v6{{ end }}
595
602
{{- end }}
596
603
use_backend bk_redis_master
@@ -608,7 +615,7 @@
608
615
{{- end }}
609
616
mode tcp
610
617
option tcp-check
611
-
tcp-check connect
618
+
tcp-check connect default
612
619
{{- if .Values.auth }}
613
620
tcp-check send "AUTH ${AUTH}"\r\n
614
621
tcp-check expect string +OK
@@ -622,9 +629,9 @@
622
629
{{- range $i := until $replicas}}
623
630
use-server R{{ $i}} if { srv_is_up(R{{ $i}}) } { nbsrv(check_if_redis_is_master_{{ $i}}) ge 2 }
624
631
{{- if $.Values.sentinel.resolveHostnames }}
625
-
server R{{ $i}} {{ $fullName}}-announce-{{ $i}}.{{ $.Release.Namespace }}.svc:{{ $root.Values.redis.port}} check inter {{ $root.Values.haproxy.checkInterval }} fall {{ $root.Values.haproxy.checkFall }} rise 1
632
+
server R{{ $i}} {{ $fullName}}-announce-{{ $i}}.{{ $.Release.Namespace }}.svc:{{ $redisPort}} check inter {{ $root.Values.haproxy.checkInterval }} fall {{ $root.Values.haproxy.checkFall }} rise 1{{ if$redisTLS}} ssl verify required ca-file /tls-certs/{{ $root.Values.tls.caCertFile }} crt /usr/local/etc/haproxy/backend-tls.pem{{ end }}
626
633
{{- else}}
627
-
server R{{ $i}} {{ $fullName}}-announce-{{ $i}}:{{ $root.Values.redis.port}} check inter {{ $root.Values.haproxy.checkInterval }} fall {{ $root.Values.haproxy.checkFall }} rise 1
634
+
server R{{ $i}} {{ $fullName}}-announce-{{ $i}}:{{ $redisPort}} check inter {{ $root.Values.haproxy.checkInterval }} fall {{ $root.Values.haproxy.checkFall }} rise 1{{ if$redisTLS}} ssl verify required ca-file /tls-certs/{{ $root.Values.tls.caCertFile }} crt /usr/local/etc/haproxy/backend-tls.pem{{ end }}
628
635
{{- end }}
629
636
{{- end }}
630
637
{{- if .Values.haproxy.readOnly.enabled }}
@@ -635,7 +642,7 @@
635
642
{{- end }}
636
643
mode tcp
637
644
option tcp-check
638
-
tcp-check connect
645
+
tcp-check connect default
639
646
{{- if .Values.auth }}
640
647
tcp-check send "AUTH ${AUTH}"\r\n
641
648
tcp-check expect string +OK
@@ -648,9 +655,9 @@
648
655
tcp-check expect string +OK
649
656
{{- range $i := until $replicas}}
650
657
{{- if $.Values.sentinel.resolveHostnames }}
651
-
server R{{ $i}} {{ $fullName}}-announce-{{ $i}}.{{ $.Release.Namespace }}.svc:{{ $root.Values.redis.port}} check inter {{ $root.Values.haproxy.checkInterval }} fall {{ $root.Values.haproxy.checkFall }} rise 1
658
+
server R{{ $i}} {{ $fullName}}-announce-{{ $i}}.{{ $.Release.Namespace }}.svc:{{ $redisPort}} check inter {{ $root.Values.haproxy.checkInterval }} fall {{ $root.Values.haproxy.checkFall }} rise 1{{ if$redisTLS}} ssl verify required ca-file /tls-certs/{{ $root.Values.tls.caCertFile }} crt /usr/local/etc/haproxy/backend-tls.pem{{ end }}
652
659
{{- else}}
653
-
server R{{ $i}} {{ $fullName}}-announce-{{ $i}}:{{ $root.Values.redis.port}} check inter {{ $root.Values.haproxy.checkInterval }} fall {{ $root.Values.haproxy.checkFall }} rise 1
660
+
server R{{ $i}} {{ $fullName}}-announce-{{ $i}}:{{ $redisPort}} check inter {{ $root.Values.haproxy.checkInterval }} fall {{ $root.Values.haproxy.checkFall }} rise 1{{ if$redisTLS}} ssl verify required ca-file /tls-certs/{{ $root.Values.tls.caCertFile }} crt /usr/local/etc/haproxy/backend-tls.pem{{ end }}
0 commit comments