rebased with master
This commit is contained in:
		
							parent
							
								
									5fd53d0b28
								
							
						
					
					
						commit
						68632c5f35
					
				|  | @ -58,10 +58,14 @@ configKubernetes: | ||||||
|   cluster_name_label: cluster-name |   cluster_name_label: cluster-name | ||||||
|   # additional annotations to add to every database pod |   # additional annotations to add to every database pod | ||||||
|   custom_pod_annotations: |   custom_pod_annotations: | ||||||
|  |   # enables initContainers to run actions before Spilo is started | ||||||
|  |   enable_init_containers: false | ||||||
|   # toggles pod anti affinity on the Postgres pods |   # toggles pod anti affinity on the Postgres pods | ||||||
|   enable_pod_antiaffinity: false |   enable_pod_antiaffinity: false | ||||||
|   # toggles PDB to set to MinAvailabe 0 or 1 |   # toggles PDB to set to MinAvailabe 0 or 1 | ||||||
|   enable_pod_disruption_budget: true |   enable_pod_disruption_budget: true | ||||||
|  |   # enables sidecar containers to run alongside Spilo in the same pod | ||||||
|  |   enable_sidecars: false | ||||||
|   # name of the secret containing infrastructure roles names and passwords |   # name of the secret containing infrastructure roles names and passwords | ||||||
|   # infrastructure_roles_secret_name: postgresql-infrastructure-roles |   # infrastructure_roles_secret_name: postgresql-infrastructure-roles | ||||||
| 
 | 
 | ||||||
|  | @ -190,8 +194,6 @@ configLogicalBackup: | ||||||
|   logical_backup_s3_access_key_id: "" |   logical_backup_s3_access_key_id: "" | ||||||
|   # S3 bucket to store backup results |   # S3 bucket to store backup results | ||||||
|   logical_backup_s3_bucket: "my-bucket-url" |   logical_backup_s3_bucket: "my-bucket-url" | ||||||
|   # S3 server side encription to use |  | ||||||
|   logical_backup_s3_sse: "AES256" |  | ||||||
|   # S3 endpoint url when not using AWS |   # S3 endpoint url when not using AWS | ||||||
|   logical_backup_s3_endpoint: "" |   logical_backup_s3_endpoint: "" | ||||||
|   # S3 Secret Access Key |   # S3 Secret Access Key | ||||||
|  |  | ||||||
|  | @ -189,8 +189,6 @@ configLogicalBackup: | ||||||
|   logical_backup_s3_access_key_id: "" |   logical_backup_s3_access_key_id: "" | ||||||
|   # S3 bucket to store backup results |   # S3 bucket to store backup results | ||||||
|   logical_backup_s3_bucket: "my-bucket-url" |   logical_backup_s3_bucket: "my-bucket-url" | ||||||
|   # S3 server side encription  |  | ||||||
|   logical_backup_s3_sse: "AES256" |  | ||||||
|   # S3 endpoint url when not using AWS |   # S3 endpoint url when not using AWS | ||||||
|   logical_backup_s3_endpoint: "" |   logical_backup_s3_endpoint: "" | ||||||
|   # S3 Secret Access Key |   # S3 Secret Access Key | ||||||
|  |  | ||||||
|  | @ -82,14 +82,6 @@ Those are top-level keys, containing both leaf keys and groups. | ||||||
|   your own Spilo image from the [github |   your own Spilo image from the [github | ||||||
|   repository](https://github.com/zalando/spilo). |   repository](https://github.com/zalando/spilo). | ||||||
| 
 | 
 | ||||||
| * **enable_init_containers** |  | ||||||
|   global option to allow for creating init containers to run actions before |  | ||||||
|   Spilo is started. Disabled by default. |  | ||||||
| 
 |  | ||||||
| * **enable_sidecars** |  | ||||||
|   global option to allow for creating sidecar containers to run alongside Spilo |  | ||||||
|   on the same pod. Disabled by default. |  | ||||||
| 
 |  | ||||||
| * **sidecar_docker_images** | * **sidecar_docker_images** | ||||||
|   a map of sidecar names to docker images to run with Spilo. In case of the name |   a map of sidecar names to docker images to run with Spilo. In case of the name | ||||||
|   conflict with the definition in the cluster manifest the cluster-specific one |   conflict with the definition in the cluster manifest the cluster-specific one | ||||||
|  | @ -200,6 +192,14 @@ configuration they are grouped under the `kubernetes` key. | ||||||
|   [admin docs](../administrator.md#pod-disruption-budget) for more information. |   [admin docs](../administrator.md#pod-disruption-budget) for more information. | ||||||
|   Default is true. |   Default is true. | ||||||
| 
 | 
 | ||||||
|  | * **enable_init_containers** | ||||||
|  |   global option to allow for creating init containers to run actions before | ||||||
|  |   Spilo is started. Disabled by default. | ||||||
|  | 
 | ||||||
|  | * **enable_sidecars** | ||||||
|  |   global option to allow for creating sidecar containers to run alongside Spilo | ||||||
|  |   on the same pod. Disabled by default. | ||||||
|  | 
 | ||||||
| * **secret_name_template** | * **secret_name_template** | ||||||
|   a template for the name of the database user secrets generated by the |   a template for the name of the database user secrets generated by the | ||||||
|   operator. `{username}` is replaced with name of the secret, `{cluster}` with |   operator. `{username}` is replaced with name of the secret, `{cluster}` with | ||||||
|  | @ -452,19 +452,10 @@ grouped under the `logical_backup` key. | ||||||
| * **logical_backup_s3_endpoint** | * **logical_backup_s3_endpoint** | ||||||
|   When using non-AWS S3 storage, endpoint can be set as a ENV variable. |   When using non-AWS S3 storage, endpoint can be set as a ENV variable. | ||||||
| 
 | 
 | ||||||
| <<<<<<< HEAD |  | ||||||
| <<<<<<< HEAD |  | ||||||
| ======= |  | ||||||
| >>>>>>> ebd09880... Modified dump.sh so it knows how to handle new features. Configurable S3 SSE |  | ||||||
| * **logical_backup_s3_sse** | * **logical_backup_s3_sse** | ||||||
|   Specify server side encription that S3 storage is using. If empty string |   Specify server side encription that S3 storage is using. If empty string | ||||||
|   is specified, no argument will be passed to `aws s3` command. Default: "AES256". |   is specified, no argument will be passed to `aws s3` command. Default: "AES256". | ||||||
| 
 | 
 | ||||||
| <<<<<<< HEAD |  | ||||||
| ======= |  | ||||||
| >>>>>>> 7cd05ba4... Updated documentation for logical backup endpoint, access and secret key. |  | ||||||
| ======= |  | ||||||
| >>>>>>> ebd09880... Modified dump.sh so it knows how to handle new features. Configurable S3 SSE |  | ||||||
| * **logical_backup_s3_access_key_id** | * **logical_backup_s3_access_key_id** | ||||||
|   When set, value will be in AWS_ACCESS_KEY_ID env variable. The Default is empty. |   When set, value will be in AWS_ACCESS_KEY_ID env variable. The Default is empty. | ||||||
| 
 | 
 | ||||||
|  |  | ||||||
|  | @ -378,9 +378,9 @@ spec: | ||||||
| 
 | 
 | ||||||
| `initContainers` accepts full `v1.Container` definition. | `initContainers` accepts full `v1.Container` definition. | ||||||
| 
 | 
 | ||||||
| **Note**: The operator will not launch a cluster if init containers are specified | **Note**: The operator will not launch a cluster if `initContainers` are | ||||||
| but globally disabled in the configuration. The `enable_init_containers` option | specified but globally disabled in the configuration. The | ||||||
| must be set to `true`. | `enable_init_containers` option must be set to `true`. | ||||||
| 
 | 
 | ||||||
| ## Increase volume size | ## Increase volume size | ||||||
| 
 | 
 | ||||||
|  |  | ||||||
|  | @ -22,11 +22,13 @@ data: | ||||||
|   docker_image: registry.opensource.zalan.do/acid/spilo-11:1.6-p1 |   docker_image: registry.opensource.zalan.do/acid/spilo-11:1.6-p1 | ||||||
|   # enable_admin_role_for_users: "true" |   # enable_admin_role_for_users: "true" | ||||||
|   # enable_database_access: "true" |   # enable_database_access: "true" | ||||||
|  |   enable_init_containers: "false" | ||||||
|   enable_master_load_balancer: "false" |   enable_master_load_balancer: "false" | ||||||
|   # enable_pod_antiaffinity: "false" |   # enable_pod_antiaffinity: "false" | ||||||
|   # enable_pod_disruption_budget: "true" |   # enable_pod_disruption_budget: "true" | ||||||
|   enable_replica_load_balancer: "false" |   enable_replica_load_balancer: "false" | ||||||
|   # enable_shm_volume: "true" |   # enable_shm_volume: "true" | ||||||
|  |   enable_sidecars: "false" | ||||||
|   # enable_team_superuser: "false" |   # enable_team_superuser: "false" | ||||||
|   enable_teams_api: "false" |   enable_teams_api: "false" | ||||||
|   # etcd_host: "" |   # etcd_host: "" | ||||||
|  |  | ||||||
|  | @ -49,6 +49,8 @@ type KubernetesMetaConfiguration struct { | ||||||
| 	SpiloFSGroup                           *int64                `json:"spilo_fsgroup,omitempty"` | 	SpiloFSGroup                           *int64                `json:"spilo_fsgroup,omitempty"` | ||||||
| 	WatchedNamespace                       string                `json:"watched_namespace,omitempty"` | 	WatchedNamespace                       string                `json:"watched_namespace,omitempty"` | ||||||
| 	PDBNameFormat                          config.StringTemplate `json:"pdb_name_format,omitempty"` | 	PDBNameFormat                          config.StringTemplate `json:"pdb_name_format,omitempty"` | ||||||
|  | 	EnableSidecars                         bool                  `json:"enable_sidecars,omitempty"` | ||||||
|  | 	EnableInitContainers                   bool                  `json:"enable_init_containers,omitempty"` | ||||||
| 	EnablePodDisruptionBudget              *bool                 `json:"enable_pod_disruption_budget,omitempty"` | 	EnablePodDisruptionBudget              *bool                 `json:"enable_pod_disruption_budget,omitempty"` | ||||||
| 	SecretNameTemplate                     config.StringTemplate `json:"secret_name_template,omitempty"` | 	SecretNameTemplate                     config.StringTemplate `json:"secret_name_template,omitempty"` | ||||||
| 	ClusterDomain                          string                `json:"cluster_domain"` | 	ClusterDomain                          string                `json:"cluster_domain"` | ||||||
|  | @ -160,8 +162,6 @@ type OperatorConfigurationData struct { | ||||||
| 	SetMemoryRequestToLimit    bool                               `json:"set_memory_request_to_limit,omitempty"` | 	SetMemoryRequestToLimit    bool                               `json:"set_memory_request_to_limit,omitempty"` | ||||||
| 	ShmVolume                  *bool                              `json:"enable_shm_volume,omitempty"` | 	ShmVolume                  *bool                              `json:"enable_shm_volume,omitempty"` | ||||||
| 	Sidecars                   map[string]string                  `json:"sidecar_docker_images,omitempty"` | 	Sidecars                   map[string]string                  `json:"sidecar_docker_images,omitempty"` | ||||||
| 	EnableSidecars             bool                               `json:"enable_sidecars,omitempty"` |  | ||||||
| 	EnableInitContainers       bool                               `json:"enable_init_containers,omitempty"` |  | ||||||
| 	PostgresUsersConfiguration PostgresUsersConfiguration         `json:"users"` | 	PostgresUsersConfiguration PostgresUsersConfiguration         `json:"users"` | ||||||
| 	Kubernetes                 KubernetesMetaConfiguration        `json:"kubernetes"` | 	Kubernetes                 KubernetesMetaConfiguration        `json:"kubernetes"` | ||||||
| 	PostgresPodResources       PostgresPodResourcesDefaults       `json:"postgres_pod_resources"` | 	PostgresPodResources       PostgresPodResourcesDefaults       `json:"postgres_pod_resources"` | ||||||
|  |  | ||||||
|  | @ -35,8 +35,6 @@ func (c *Controller) importConfigurationFromCRD(fromCRD *acidv1.OperatorConfigur | ||||||
| 	result.SetMemoryRequestToLimit = fromCRD.SetMemoryRequestToLimit | 	result.SetMemoryRequestToLimit = fromCRD.SetMemoryRequestToLimit | ||||||
| 	result.ShmVolume = fromCRD.ShmVolume | 	result.ShmVolume = fromCRD.ShmVolume | ||||||
| 	result.Sidecars = fromCRD.Sidecars | 	result.Sidecars = fromCRD.Sidecars | ||||||
| 	result.EnableSidecars = fromCRD.EnableSidecars |  | ||||||
| 	result.EnableInitContainers = fromCRD.EnableInitContainers |  | ||||||
| 
 | 
 | ||||||
| 	// user config
 | 	// user config
 | ||||||
| 	result.SuperUsername = fromCRD.PostgresUsersConfiguration.SuperUsername | 	result.SuperUsername = fromCRD.PostgresUsersConfiguration.SuperUsername | ||||||
|  | @ -55,6 +53,8 @@ func (c *Controller) importConfigurationFromCRD(fromCRD *acidv1.OperatorConfigur | ||||||
| 	result.WatchedNamespace = fromCRD.Kubernetes.WatchedNamespace | 	result.WatchedNamespace = fromCRD.Kubernetes.WatchedNamespace | ||||||
| 	result.PDBNameFormat = fromCRD.Kubernetes.PDBNameFormat | 	result.PDBNameFormat = fromCRD.Kubernetes.PDBNameFormat | ||||||
| 	result.EnablePodDisruptionBudget = fromCRD.Kubernetes.EnablePodDisruptionBudget | 	result.EnablePodDisruptionBudget = fromCRD.Kubernetes.EnablePodDisruptionBudget | ||||||
|  | 	result.EnableSidecars = fromCRD.Kubernetes.EnableSidecars | ||||||
|  | 	result.EnableInitContainers = fromCRD.Kubernetes.EnableInitContainers | ||||||
| 	result.SecretNameTemplate = fromCRD.Kubernetes.SecretNameTemplate | 	result.SecretNameTemplate = fromCRD.Kubernetes.SecretNameTemplate | ||||||
| 	result.OAuthTokenSecretName = fromCRD.Kubernetes.OAuthTokenSecretName | 	result.OAuthTokenSecretName = fromCRD.Kubernetes.OAuthTokenSecretName | ||||||
| 	result.InfrastructureRolesSecretName = fromCRD.Kubernetes.InfrastructureRolesSecretName | 	result.InfrastructureRolesSecretName = fromCRD.Kubernetes.InfrastructureRolesSecretName | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue