forked from kubernetes-sigs/blob-csi-driver
-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathvalues.yaml
186 lines (174 loc) · 4.72 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
image:
baseRepo: mcr.microsoft.com
blob:
repository: /oss/kubernetes-csi/blob-csi
tag: v1.25.1
pullPolicy: IfNotPresent
csiProvisioner:
repository: /oss/kubernetes-csi/csi-provisioner
tag: v5.2.0
pullPolicy: IfNotPresent
livenessProbe:
repository: /oss/kubernetes-csi/livenessprobe
tag: v2.15.0
pullPolicy: IfNotPresent
nodeDriverRegistrar:
repository: /oss/kubernetes-csi/csi-node-driver-registrar
tag: v2.13.0
pullPolicy: IfNotPresent
csiResizer:
repository: /oss/kubernetes-csi/csi-resizer
tag: v1.13.1
pullPolicy: IfNotPresent
cloud: AzurePublicCloud
## Reference to one or more secrets to be used when pulling images
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
imagePullSecrets: []
# - name: myRegistryKeySecretName
serviceAccount:
create: true # When true, service accounts will be created for you. Set to false if you want to use your own.
controller: csi-blob-controller-sa # Name of Service Account to be created or used
node: csi-blob-node-sa # Name of Service Account to be created or used
rbac:
create: true
name: blob
## Collection of annotations to add to all the pods
podAnnotations: {}
## Collection of labels to add to all the pods
podLabels: {}
# -- Custom labels to add into metadata
customLabels: {}
# k8s-app: blob-csi-driver
## Leverage a PriorityClass to ensure your pods survive resource shortages
## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/
priorityClassName: system-cluster-critical
## Security context give the opportunity to run container as nonroot by setting a securityContext
## by example :
## securityContext: { runAsUser: 1001 }
securityContext: {}
controller:
name: csi-blob-controller
cloudConfigSecretName: azure-cloud-provider
cloudConfigSecretNamespace: kube-system
allowEmptyCloudConfig: true
hostNetwork: true # this setting could be disabled if controller does not depend on MSI setting
metricsPort: 29634
livenessProbe:
healthPort: 29632
replicas: 2
runOnMaster: false
runOnControlPlane: false
logLevel: 5
resources:
csiProvisioner:
limits:
memory: 500Mi
requests:
cpu: 10m
memory: 20Mi
livenessProbe:
limits:
memory: 100Mi
requests:
cpu: 10m
memory: 20Mi
blob:
limits:
memory: 800Mi
requests:
cpu: 10m
memory: 20Mi
csiResizer:
limits:
memory: 500Mi
requests:
cpu: 10m
memory: 20Mi
affinity: {}
nodeSelector: {}
tolerations:
- key: "node-role.kubernetes.io/master"
operator: "Exists"
effect: "NoSchedule"
- key: "node-role.kubernetes.io/controlplane"
operator: "Exists"
effect: "NoSchedule"
- key: "node-role.kubernetes.io/control-plane"
operator: "Exists"
effect: "NoSchedule"
- key: "CriticalAddonsOnly"
operator: "Exists"
effect: "NoSchedule"
node:
name: csi-blob-node
cloudConfigSecretName: azure-cloud-provider
cloudConfigSecretNamespace: kube-system
allowEmptyCloudConfig: true
allowInlineVolumeKeyAccessWithIdentity: false
maxUnavailable: 1
metricsPort: 29635
livenessProbe:
healthPort: 29633
logLevel: 5
enableBlobfuseProxy: true
blobfuseProxy:
installBlobfuse: false
blobfuseVersion: "1.4.5"
installBlobfuse2: true
blobfuse2Version: "2.4.0"
setMaxOpenFileNum: true
maxOpenFileNum: "9000000"
disableUpdateDB: true
migrateK8sRepo: false
setReadAheadSize: true
blobfuseCachePath: /mnt
appendTimeStampInCacheDir: false
mountPermissions: 0777
resources:
livenessProbe:
limits:
memory: 100Mi
requests:
cpu: 10m
memory: 20Mi
nodeDriverRegistrar:
limits:
memory: 100Mi
requests:
cpu: 10m
memory: 20Mi
blob:
limits:
memory: 2100Mi
requests:
cpu: 10m
memory: 20Mi
aznfswatchdog:
limits:
memory: 100Mi
requests:
cpu: 10m
memory: 20Mi
affinity: {}
nodeSelector: {}
tolerations:
- operator: "Exists"
enableAznfsMount: true
feature:
fsGroupPolicy: ReadWriteOnceWithFSType
enableGetVolumeStats: false
driver:
name: blob.csi.azure.com
customUserAgent: ""
userAgentSuffix: "OSS-helm"
azureGoSDKLogLevel: "" # available values: ""(no logs), DEBUG, INFO, WARNING, ERROR
httpsProxy: ""
httpProxy: ""
linux:
kubelet: /var/lib/kubelet
distro: debian
workloadIdentity:
clientID: ""
# [optional] If the AAD application or user-assigned managed identity is not in the same tenant as the cluster
# then set tenantID with the application or user-assigned managed identity tenant ID
tenantID: ""