Key | +Type | +Default | +Description | + + +
---|---|---|---|
+ +existingSecret + + | ++ +tpl/string + + | ++ +```yaml +existingSecret: | +``` + + | ++ +Use this if you have predefined secrets object + + | +
+ +extraConfigMap + + | ++ +tpl/map + + | ++ +```yaml +extraConfigMap: | + #file_1: "conf content" +``` + + | ++ +Define this for extra config map + + | +
+ +extraPodEnv + + | ++ +tpl/list + + | +
+
+
+
+
++Expand+ +```yaml +extraPodEnv: | + #- name: KEY_1 + # value: "VALUE_1" + #- name: KEY_2 + # value: "VALUE_2" + - name: PASSWORD_AUTHENTICATION + value: "md5" +``` + + |
++ +Define this for extra pod environment variables + + | +
+ +extraPodSpec + + | ++ +tpl/map + + | +
+
+
+
+
++Expand+ +```yaml +extraPodSpec: | + ##You can set pod attribute if needed + #ports: + # - containerPort: 5432 + # name: tcp-port +``` + + |
++ +This will be evaluated as pod spec + + | +
+ +extraSecret + + | ++ +tpl/map + + | ++ +```yaml +extraSecret: | + #key_1: value_1 +``` + + | ++ +Define this for extra secrets to be included + + | +
+ +extraVolume + + | ++ +tpl/list + + | +
+
+
+
+
++Expand+ +```yaml +extraVolume: | + ##You may potentially mount a config map/secret + #- name: custom-config + # configMap: + # name: geoserver-config +``` + + |
++ +Define this for extra volume (in pair with extraVolumeMounts) + + | +
+ +extraVolumeMounts + + | ++ +tpl/list + + | +
+
+
+
+
++Expand+ +```yaml +extraVolumeMounts: | + ##You may potentially mount a config map/secret + #- name: custom-config + # mountPath: /docker-entrypoint.sh + # subPath: docker-entrypoint.sh + # readOnly: true +``` + + |
++ +Define this for extra volume mounts in the pod + + | +
+ +global.storageClass + + | ++ +string + + | ++ +```json +null +``` + + | ++ +Storage class name used to provision PV + + | +
+ +image + + | ++ +object/container-image + + | +
+
+
+
+
++Expand+ +```yaml +# -- Image registry +registry: docker.io +# -- Image repository +repository: kartoza/postgis +# -- Image tag +tag: "13-3.1" +# -- (k8s/containers/image/imagePullPolicy) Image pullPolicy +pullPolicy: IfNotPresent +``` + + |
++ +Image map + + | +
+ +image.pullPolicy + + | ++ +k8s/containers/image/imagePullPolicy + + | ++ +```json +"IfNotPresent" +``` + + | ++ +Image pullPolicy + + | +
+ +image.registry + + | ++ +string + + | ++ +```json +"docker.io" +``` + + | ++ +Image registry + + | +
+ +image.repository + + | ++ +string + + | ++ +```json +"kartoza/postgis" +``` + + | ++ +Image repository + + | +
+ +image.tag + + | ++ +string + + | ++ +```json +"13-3.1" +``` + + | ++ +Image tag + + | +
+ +persistence.accessModes + + | ++ +list + + | ++ +```json +[ + "ReadWriteOnce" +] +``` + + | ++ +Default Access Modes + + | +
+ +persistence.annotations + + | ++ +map + + | ++ +```json +{} +``` + + | ++ +You can specify extra annotations here + + | +
+ +persistence.enabled + + | ++ +bool + + | ++ +```json +true +``` + + | ++ +Enable persistence. If set to false, the data directory will use ephemeral volume + + | +
+ +persistence.existingClaim + + | ++ +string + + | ++ +```yaml +persistence.existingClaim: | +``` + + | ++ +A manually managed Persistent Volume and Claim If defined, PVC must be created manually before volume will be bound The value is evaluated as a template, so, for example, the name can depend on .Release or .Chart + + | +
+ +persistence.mountPath + + | ++ +path + + | ++ +```json +"/opt/kartoza/postgis/data" +``` + + | ++ +The path the volume will be mounted at, useful when using different PostgreSQL images. + + | +
+ +persistence.size + + | ++ +string/size + + | ++ +```json +"8Gi" +``` + + | ++ +Size of the PV + + | +
+ +persistence.storageClass + + | ++ +string + + | ++ +```json +null +``` + + | ++ +Storage class name used to provision PV + + | +
+ +persistence.subPath + + | ++ +string + + | ++ +```json +"data" +``` + + | ++ +The subdirectory of the volume to mount to, useful in dev environments and one PV for multiple services. Default provisioner usually have .lost+found directory, so you might want to use this so the container can have empty volume + + | +
+ +postgresqlDataDir + + | ++ +path + + | ++ +```json +"/opt/kartoza/postgis/data" +``` + + | ++ +PostgreSQL data dir. Location where you want to store the stateful data + + | +
+ +postgresqlDatabase + + | ++ +string + + | ++ +```json +"gis" +``` + + | ++ +default generated database name if the image support it, pass a comma-separated list of database name, and it will be exposed in environment variable POSTGRES_DBNAME. The first database will be used to check connection in the probe. + + | +
+ +postgresqlPassword + + | ++ +object/common.secret + + | +
+
+
+
+
++Expand+ +```yaml +# -- (string) Specify this password value. If not, it will be +# autogenerated everytime chart upgraded +value: +valueFrom: + secretKeyRef: + name: + key: postgresql-password +``` + + |
++ +Secret structure for postgres super user password Use this for prefilled password + + | +
+ +postgresqlPassword.value + + | ++ +string + + | ++ +```json +null +``` + + | ++ +Specify this password value. If not, it will be autogenerated everytime chart upgraded + + | +
+ +postgresqlUsername + + | ++ +string + + | ++ +```json +"docker" +``` + + | ++ +postgres super user + + | +
+ +probe + + | ++ +k8s/containers/probe + + | ++ +```yaml +probe: | +``` + + | ++ +Probe can be overridden If set empty, it will use default probe + + | +
+ +securityContext + + | ++ +k8s/containers/securityContext + + | +
+
+
+
+
++Expand+ +```yaml +securityContext: | + ##You have to use fsGroup if you use custom certificate + #fsGroup: 101 # postgres group + #runAsUser: 1000 # run as root + #runAsGroup: 1000 # run as root +``` + + |
++ +Define this if you want more control with the security context of the pods + + | +
+ +service.annotations + + | ++ +tpl/map + + | ++ +```yaml +service.annotations: | +``` + + | ++ +Provide any additional annotations which may be required. Evaluated as a template. + + | +
+ +service.clusterIP + + | ++ +k8s/service/clusterIP + + | ++ +```json +"None" +``` + + | ++ +Set to None for Headless Service Otherwise set to "" to give a default cluster IP + + | +
+ +service.labels + + | ++ +tpl/map + + | ++ +```yaml +service.labels: | +``` + + | ++ +Provide any additional annotations which may be required. Evaluated as a template. + + | +
+ +service.loadBalancerIP + + | ++ +k8s/service/loadBalancerIP + + | ++ +```json +null +``` + + | ++ +Set the LoadBalancer service type to internal only. [ref](https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer) + + | +
+ +service.nodePort + + | ++ +k8s/service/nodePort + + | ++ +```json +null +``` + + | ++ +Specify the nodePort value for the LoadBalancer and NodePort service types. [ref](https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport) + + | +
+ +service.port + + | ++ +k8s/service/port + + | ++ +```json +5432 +``` + + | ++ +Default TCP port + + | +
+ +service.type + + | ++ +k8s/service/type + + | ++ +```json +"ClusterIP" +``` + + | ++ +PostgresSQL service type + + | +
+ +test.postgis.containers + + | ++ +tpl/array + + | ++ +```json +null +``` + + | ++ +List of containers override for testing + + | +
+ +tls.ca_file + + | ++ +string + + | ++ +```json +"ca.crt" +``` + + | ++ +Subpath of the secret CA + + | +
+ +tls.cert_file + + | ++ +string + + | ++ +```json +"tls.crt" +``` + + | ++ +Subpath of the secret Cert file + + | +
+ +tls.enabled + + | ++ +bool + + | ++ +```json +false +``` + + | ++ +Enable to true if you can specify where the certificate is located. You must also enable securityContext.fsGroup if you want to use tls + + | +
+ +tls.key_file + + | ++ +string + + | ++ +```json +"tls.key" +``` + + | ++ +Subpath of the secret TLS key + + | +
+ +tls.secretName + + | ++ +string + + | ++ +```json +null +``` + + | ++ +Secret of a Certificate kind that stores the certificate + + | +