From 141fcb38cf2c2e34ea00352b761c36f248f3f799 Mon Sep 17 00:00:00 2001 From: Bitnami Bot Date: Thu, 4 Apr 2024 22:21:42 +0200 Subject: [PATCH] [bitnami/mongodb-sharded] Release 8.0.3 (#24906) * [bitnami/mongodb-sharded] Release 8.0.3 updating components versions Signed-off-by: Bitnami Containers * Update README.md with readme-generator-for-helm Signed-off-by: Bitnami Containers --------- Signed-off-by: Bitnami Containers Signed-off-by: Jonathan Gazeley --- bitnami/mongodb-sharded/Chart.lock | 6 +- bitnami/mongodb-sharded/Chart.yaml | 10 +- bitnami/mongodb-sharded/README.md | 914 ++++++++++++++-------------- bitnami/mongodb-sharded/values.yaml | 6 +- 4 files changed, 468 insertions(+), 468 deletions(-) diff --git a/bitnami/mongodb-sharded/Chart.lock b/bitnami/mongodb-sharded/Chart.lock index 0fe7ade3857aa0..033a9cdecf55b0 100644 --- a/bitnami/mongodb-sharded/Chart.lock +++ b/bitnami/mongodb-sharded/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.19.0 -digest: sha256:ac559eb57710d8904e266424ee364cd686d7e24517871f0c5c67f7c4500c2bcc -generated: "2024-03-18T19:30:39.581143361Z" + version: 2.19.1 +digest: sha256:c883732817d9aaa3304f7b3109262aa338959de15b432dc5a2dbde13d2e136a5 +generated: "2024-04-04T19:38:04.602378043Z" diff --git a/bitnami/mongodb-sharded/Chart.yaml b/bitnami/mongodb-sharded/Chart.yaml index cbf3e7b7aa03b1..e8eebd909dead0 100644 --- a/bitnami/mongodb-sharded/Chart.yaml +++ b/bitnami/mongodb-sharded/Chart.yaml @@ -6,13 +6,13 @@ annotations: licenses: Apache-2.0 images: | - name: mongodb-exporter - image: docker.io/bitnami/mongodb-exporter:0.40.0-debian-12-r13 + image: docker.io/bitnami/mongodb-exporter:0.40.0-debian-12-r14 - name: mongodb-sharded - image: docker.io/bitnami/mongodb-sharded:7.0.7-debian-12-r0 + image: docker.io/bitnami/mongodb-sharded:7.0.8-debian-12-r0 - name: os-shell - image: docker.io/bitnami/os-shell:12-debian-12-r16 + image: docker.io/bitnami/os-shell:12-debian-12-r18 apiVersion: v2 -appVersion: 7.0.7 +appVersion: 7.0.8 dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts @@ -35,4 +35,4 @@ maintainers: name: mongodb-sharded sources: - https://github.com/bitnami/charts/tree/main/bitnami/mongodb-sharded -version: 8.0.2 +version: 8.0.3 diff --git a/bitnami/mongodb-sharded/README.md b/bitnami/mongodb-sharded/README.md index aa97aba1df0fb6..c4d71cc7f37b90 100644 --- a/bitnami/mongodb-sharded/README.md +++ b/bitnami/mongodb-sharded/README.md @@ -174,346 +174,346 @@ The Bitnami Kibana chart supports mounting extra volumes (either PVCs, secrets o ### MongoDB(®) Sharded parameters -| Name | Description | Value | -| ---------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------------------- | -| `image.registry` | MongoDB(®) Sharded image registry | `REGISTRY_NAME` | -| `image.repository` | MongoDB(®) Sharded Image name | `REPOSITORY_NAME/mongodb-sharded` | -| `image.digest` | MongoDB(®) Sharded image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `image.pullPolicy` | MongoDB(®) Sharded image pull policy | `IfNotPresent` | -| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | -| `image.debug` | Specify if debug logs should be enabled | `false` | -| `auth.enabled` | Enable authentication | `true` | -| `auth.rootUser` | MongoDB(®) root user | `root` | -| `auth.rootPassword` | MongoDB(®) root password | `""` | -| `auth.replicaSetKey` | Key used for authentication in the replicaset | `""` | -| `auth.existingSecret` | Existing secret with MongoDB(®) credentials (keys: `mongodb-password`, `mongodb-root-password`, `mongodb-replica-set-key`) | `""` | -| `auth.usePasswordFile` | Mount credentials as files instead of using environment variables | `false` | -| `shards` | Number of shards to be created | `2` | -| `common.mongodbEnableNumactl` | Enable launch MongoDB instance prefixed with "numactl --interleave=all" | `false` | -| `common.useHostnames` | Enable DNS hostnames in the replica set config | `true` | -| `common.mongodbEnableIPv6` | Switch to enable/disable IPv6 on MongoDB® | `false` | -| `common.mongodbDirectoryPerDB` | Switch to enable/disable DirectoryPerDB on MongoDB® | `false` | -| `common.mongodbSystemLogVerbosity` | MongoDB® system log verbosity level | `0` | -| `common.mongodbDisableSystemLog` | Whether to disable MongoDB® system log or not | `false` | -| `common.mongodbInitRetryAttempts` | Maximum retries for checking the MongoDB® initialization status | `24` | -| `common.mongodbInitRetryDelay` | Time (in seconds) to wait between retries for checking the MongoDB® initialization status | `5` | -| `common.initScriptsCM` | Configmap with init scripts to execute | `""` | -| `common.initScriptsSecret` | Secret with init scripts to execute (for sensitive data) | `""` | -| `common.extraEnvVars` | An array to add extra env vars | `[]` | -| `common.extraEnvVarsCM` | Name of a ConfigMap containing extra env vars | `""` | -| `common.extraEnvVarsSecret` | Name of a Secret containing extra env vars | `""` | -| `common.sidecars` | Add sidecars to the pod | `[]` | -| `common.initContainers` | Add init containers to the pod | `[]` | -| `common.podAnnotations` | Additional pod annotations | `{}` | -| `common.podLabels` | Additional pod labels | `{}` | -| `common.extraVolumes` | Array to add extra volumes | `[]` | -| `common.extraVolumeMounts` | Array to add extra mounts (normally used with extraVolumes) | `[]` | -| `common.containerPorts.mongodb` | MongoDB container port | `27017` | -| `common.serviceAccount.create` | Whether to create a Service Account for all pods automatically | `true` | -| `common.serviceAccount.name` | Name of a Service Account to be used by all Pods | `""` | -| `common.serviceAccount.annotations` | Additional Service Account annotations (evaluated as a template) | `{}` | -| `common.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `false` | -| `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | -| `volumePermissions.image.registry` | Init container volume-permissions image registry | `REGISTRY_NAME` | -| `volumePermissions.image.repository` | Init container volume-permissions image name | `REPOSITORY_NAME/os-shell` | -| `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | -| `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` | -| `volumePermissions.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if volumePermissions.resources is set (volumePermissions.resources is recommended for production). | `nano` | -| `volumePermissions.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | -| `service.name` | Specify an explicit service name | `""` | -| `service.annotations` | Additional service annotations (evaluate as a template) | `{}` | -| `service.type` | Service type | `ClusterIP` | -| `service.externalTrafficPolicy` | External traffic policy | `Cluster` | -| `service.ports.mongodb` | MongoDB® service port | `27017` | -| `service.clusterIP` | Static clusterIP or None for headless services | `""` | -| `service.nodePorts.mongodb` | Specify the nodePort value for the LoadBalancer and NodePort service types. | `""` | -| `service.externalIPs` | External IP list to use with ClusterIP service type | `[]` | -| `service.loadBalancerIP` | Static IP Address to use for LoadBalancer service type | `""` | -| `service.loadBalancerSourceRanges` | List of IP ranges allowed access to load balancer (if supported) | `[]` | -| `service.extraPorts` | Extra ports to expose (normally used with the `sidecar` value) | `[]` | -| `service.sessionAffinity` | Session Affinity for Kubernetes service, can be "None" or "ClientIP" | `None` | -| `service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` | -| `service.headless.annotations` | Annotations for the headless service. | `{}` | -| `networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | -| `networkPolicy.allowExternal` | Don't require server label for connections | `true` | -| `networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | -| `networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | -| `networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | -| `networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | -| `networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | +| Name | Description | Value | +| ---------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------------------- | +| `image.registry` | MongoDB(®) Sharded image registry | `REGISTRY_NAME` | +| `image.repository` | MongoDB(®) Sharded Image name | `REPOSITORY_NAME/mongodb-sharded` | +| `image.digest` | MongoDB(®) Sharded image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `image.pullPolicy` | MongoDB(®) Sharded image pull policy | `IfNotPresent` | +| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | +| `image.debug` | Specify if debug logs should be enabled | `false` | +| `auth.enabled` | Enable authentication | `true` | +| `auth.rootUser` | MongoDB(®) root user | `root` | +| `auth.rootPassword` | MongoDB(®) root password | `""` | +| `auth.replicaSetKey` | Key used for authentication in the replicaset | `""` | +| `auth.existingSecret` | Existing secret with MongoDB(®) credentials (keys: `mongodb-password`, `mongodb-root-password`, `mongodb-replica-set-key`) | `""` | +| `auth.usePasswordFile` | Mount credentials as files instead of using environment variables | `false` | +| `shards` | Number of shards to be created | `2` | +| `common.mongodbEnableNumactl` | Enable launch MongoDB instance prefixed with "numactl --interleave=all" | `false` | +| `common.useHostnames` | Enable DNS hostnames in the replica set config | `true` | +| `common.mongodbEnableIPv6` | Switch to enable/disable IPv6 on MongoDB® | `false` | +| `common.mongodbDirectoryPerDB` | Switch to enable/disable DirectoryPerDB on MongoDB® | `false` | +| `common.mongodbSystemLogVerbosity` | MongoDB® system log verbosity level | `0` | +| `common.mongodbDisableSystemLog` | Whether to disable MongoDB® system log or not | `false` | +| `common.mongodbInitRetryAttempts` | Maximum retries for checking the MongoDB® initialization status | `24` | +| `common.mongodbInitRetryDelay` | Time (in seconds) to wait between retries for checking the MongoDB® initialization status | `5` | +| `common.initScriptsCM` | Configmap with init scripts to execute | `""` | +| `common.initScriptsSecret` | Secret with init scripts to execute (for sensitive data) | `""` | +| `common.extraEnvVars` | An array to add extra env vars | `[]` | +| `common.extraEnvVarsCM` | Name of a ConfigMap containing extra env vars | `""` | +| `common.extraEnvVarsSecret` | Name of a Secret containing extra env vars | `""` | +| `common.sidecars` | Add sidecars to the pod | `[]` | +| `common.initContainers` | Add init containers to the pod | `[]` | +| `common.podAnnotations` | Additional pod annotations | `{}` | +| `common.podLabels` | Additional pod labels | `{}` | +| `common.extraVolumes` | Array to add extra volumes | `[]` | +| `common.extraVolumeMounts` | Array to add extra mounts (normally used with extraVolumes) | `[]` | +| `common.containerPorts.mongodb` | MongoDB container port | `27017` | +| `common.serviceAccount.create` | Whether to create a Service Account for all pods automatically | `true` | +| `common.serviceAccount.name` | Name of a Service Account to be used by all Pods | `""` | +| `common.serviceAccount.annotations` | Additional Service Account annotations (evaluated as a template) | `{}` | +| `common.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `false` | +| `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory (for cases where the default k8s `runAsUser` and `fsUser` values do not work) | `false` | +| `volumePermissions.image.registry` | Init container volume-permissions image registry | `REGISTRY_NAME` | +| `volumePermissions.image.repository` | Init container volume-permissions image name | `REPOSITORY_NAME/os-shell` | +| `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` | +| `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` | +| `volumePermissions.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if volumePermissions.resources is set (volumePermissions.resources is recommended for production). | `nano` | +| `volumePermissions.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | +| `service.name` | Specify an explicit service name | `""` | +| `service.annotations` | Additional service annotations (evaluate as a template) | `{}` | +| `service.type` | Service type | `ClusterIP` | +| `service.externalTrafficPolicy` | External traffic policy | `Cluster` | +| `service.ports.mongodb` | MongoDB® service port | `27017` | +| `service.clusterIP` | Static clusterIP or None for headless services | `""` | +| `service.nodePorts.mongodb` | Specify the nodePort value for the LoadBalancer and NodePort service types. | `""` | +| `service.externalIPs` | External IP list to use with ClusterIP service type | `[]` | +| `service.loadBalancerIP` | Static IP Address to use for LoadBalancer service type | `""` | +| `service.loadBalancerSourceRanges` | List of IP ranges allowed access to load balancer (if supported) | `[]` | +| `service.extraPorts` | Extra ports to expose (normally used with the `sidecar` value) | `[]` | +| `service.sessionAffinity` | Session Affinity for Kubernetes service, can be "None" or "ClientIP" | `None` | +| `service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` | +| `service.headless.annotations` | Annotations for the headless service. | `{}` | +| `networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | +| `networkPolicy.allowExternal` | Don't require server label for connections | `true` | +| `networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | +| `networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | +| `networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | +| `networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | +| `networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | ### Config Server parameters -| Name | Description | Value | -| ------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | ------------------------------------------------------ | -| `configsvr.replicaCount` | Number of nodes in the replica set (the first node will be primary) | `1` | -| `configsvr.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if configsvr.resources is set (configsvr.resources is recommended for production). | `small` | -| `configsvr.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | -| `configsvr.automountServiceAccountToken` | Mount Service Account token in pod | `false` | -| `configsvr.hostAliases` | Deployment pod host aliases | `[]` | -| `configsvr.mongodbExtraFlags` | MongoDB® additional command line flags | `[]` | -| `configsvr.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` | -| `configsvr.priorityClassName` | Pod priority class name | `""` | -| `configsvr.podAffinityPreset` | Config Server Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `configsvr.podAntiAffinityPreset` | Config Server Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `configsvr.nodeAffinityPreset.type` | Config Server Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `configsvr.nodeAffinityPreset.key` | Config Server Node label key to match Ignored if `affinity` is set. | `""` | -| `configsvr.nodeAffinityPreset.values` | Config Server Node label values to match. Ignored if `affinity` is set. | `[]` | -| `configsvr.affinity` | Config Server Affinity for pod assignment | `{}` | -| `configsvr.nodeSelector` | Config Server Node labels for pod assignment | `{}` | -| `configsvr.tolerations` | Config Server Tolerations for pod assignment | `[]` | -| `configsvr.podManagementPolicy` | Statefulset's pod management policy, allows parallel startup of pods | `OrderedReady` | -| `configsvr.updateStrategy.type` | updateStrategy for MongoDB® Primary, Secondary and Arbiter statefulsets | `RollingUpdate` | -| `configsvr.config` | MongoDB® configuration file | `""` | -| `configsvr.configCM` | ConfigMap name with Config Server configuration file (cannot be used with configsvr.config) | `""` | -| `configsvr.extraEnvVars` | An array to add extra env vars | `[]` | -| `configsvr.extraEnvVarsCM` | Name of a ConfigMap containing extra env vars | `""` | -| `configsvr.extraEnvVarsSecret` | Name of a Secret containing extra env vars | `""` | -| `configsvr.sidecars` | Add sidecars to the pod | `[]` | -| `configsvr.initContainers` | Add init containers to the pod | `[]` | -| `configsvr.podAnnotations` | Additional pod annotations | `{}` | -| `configsvr.podLabels` | Additional pod labels | `{}` | -| `configsvr.extraVolumes` | Array to add extra volumes. Requires setting `extraVolumeMounts` | `[]` | -| `configsvr.extraVolumeMounts` | Array to add extra mounts (normally used with extraVolumes). Normally used with `extraVolumes` | `[]` | -| `configsvr.schedulerName` | Use an alternate scheduler, e.g. "stork". | `""` | -| `configsvr.pdb.create` | Enable pod disruption budget | `false` | -| `configsvr.pdb.minAvailable` | Minimum number of available config pods allowed (`0` to disable) | `0` | -| `configsvr.pdb.maxUnavailable` | Maximum number of unavailable config pods allowed (`0` to disable) | `1` | -| `configsvr.persistence.enabled` | Use a PVC to persist data | `true` | -| `configsvr.persistence.mountPath` | Path to mount the volume at | `/bitnami/mongodb` | -| `configsvr.persistence.subPath` | Subdirectory of the volume to mount at (evaluated as a template) | `""` | -| `configsvr.persistence.storageClass` | Storage class of backing PVC | `""` | -| `configsvr.persistence.accessModes` | Use volume as ReadOnly or ReadWrite | `["ReadWriteOnce"]` | -| `configsvr.persistence.size` | PersistentVolumeClaim size | `8Gi` | -| `configsvr.persistence.annotations` | Persistent Volume annotations | `{}` | -| `configsvr.persistence.resourcePolicy` | Setting it to "keep" to avoid removing PVCs during a helm delete operation. Leaving it empty will delete PVCs after the chart deleted | `""` | -| `configsvr.serviceAccount.create` | Specifies whether a ServiceAccount should be created for Config Server | `true` | -| `configsvr.serviceAccount.name` | Name of a Service Account to be used by Config Server | `""` | -| `configsvr.serviceAccount.annotations` | Additional Service Account annotations (evaluated as a template) | `{}` | -| `configsvr.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `false` | -| `configsvr.external.host` | Primary node of an external Config Server replicaset | `""` | -| `configsvr.external.rootPassword` | Root password of the external Config Server replicaset | `""` | -| `configsvr.external.replicasetName` | Replicaset name of an external Config Server | `""` | -| `configsvr.external.replicasetKey` | Replicaset key of an external Config Server | `""` | -| `configsvr.podSecurityContext.enabled` | Enable security context | `true` | -| `configsvr.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | -| `configsvr.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | -| `configsvr.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | -| `configsvr.podSecurityContext.fsGroup` | Group ID for the container | `1001` | -| `configsvr.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | -| `configsvr.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | -| `configsvr.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | -| `configsvr.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | -| `configsvr.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | -| `configsvr.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | -| `configsvr.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | -| `configsvr.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | -| `configsvr.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | -| `configsvr.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | -| `configsvr.command` | Override default container command (useful when using custom images) | `["/bin/bash","/entrypoint/replicaset-entrypoint.sh"]` | -| `configsvr.args` | Override default container args (useful when using custom images) | `[]` | -| `configsvr.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` | -| `configsvr.lifecycleHooks` | for the Config Server container(s) to automate configuration before or after startup | `{}` | -| `configsvr.livenessProbe.enabled` | Enable livenessProbe | `true` | -| `configsvr.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `60` | -| `configsvr.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `30` | -| `configsvr.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `20` | -| `configsvr.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `2` | -| `configsvr.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `configsvr.readinessProbe.enabled` | Enable readinessProbe | `true` | -| `configsvr.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `10` | -| `configsvr.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `30` | -| `configsvr.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `20` | -| `configsvr.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | -| `configsvr.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `configsvr.startupProbe.enabled` | Enable startupProbe | `true` | -| `configsvr.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `0` | -| `configsvr.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | -| `configsvr.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | -| `configsvr.startupProbe.failureThreshold` | Failure threshold for startupProbe | `30` | -| `configsvr.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `configsvr.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | -| `configsvr.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | -| `configsvr.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | +| Name | Description | Value | +| ------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------ | +| `configsvr.replicaCount` | Number of nodes in the replica set (the first node will be primary) | `1` | +| `configsvr.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if configsvr.resources is set (configsvr.resources is recommended for production). | `small` | +| `configsvr.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | +| `configsvr.automountServiceAccountToken` | Mount Service Account token in pod | `false` | +| `configsvr.hostAliases` | Deployment pod host aliases | `[]` | +| `configsvr.mongodbExtraFlags` | MongoDB® additional command line flags | `[]` | +| `configsvr.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` | +| `configsvr.priorityClassName` | Pod priority class name | `""` | +| `configsvr.podAffinityPreset` | Config Server Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `configsvr.podAntiAffinityPreset` | Config Server Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `configsvr.nodeAffinityPreset.type` | Config Server Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `configsvr.nodeAffinityPreset.key` | Config Server Node label key to match Ignored if `affinity` is set. | `""` | +| `configsvr.nodeAffinityPreset.values` | Config Server Node label values to match. Ignored if `affinity` is set. | `[]` | +| `configsvr.affinity` | Config Server Affinity for pod assignment | `{}` | +| `configsvr.nodeSelector` | Config Server Node labels for pod assignment | `{}` | +| `configsvr.tolerations` | Config Server Tolerations for pod assignment | `[]` | +| `configsvr.podManagementPolicy` | Statefulset's pod management policy, allows parallel startup of pods | `OrderedReady` | +| `configsvr.updateStrategy.type` | updateStrategy for MongoDB® Primary, Secondary and Arbiter statefulsets | `RollingUpdate` | +| `configsvr.config` | MongoDB® configuration file | `""` | +| `configsvr.configCM` | ConfigMap name with Config Server configuration file (cannot be used with configsvr.config) | `""` | +| `configsvr.extraEnvVars` | An array to add extra env vars | `[]` | +| `configsvr.extraEnvVarsCM` | Name of a ConfigMap containing extra env vars | `""` | +| `configsvr.extraEnvVarsSecret` | Name of a Secret containing extra env vars | `""` | +| `configsvr.sidecars` | Add sidecars to the pod | `[]` | +| `configsvr.initContainers` | Add init containers to the pod | `[]` | +| `configsvr.podAnnotations` | Additional pod annotations | `{}` | +| `configsvr.podLabels` | Additional pod labels | `{}` | +| `configsvr.extraVolumes` | Array to add extra volumes. Requires setting `extraVolumeMounts` | `[]` | +| `configsvr.extraVolumeMounts` | Array to add extra mounts (normally used with extraVolumes). Normally used with `extraVolumes` | `[]` | +| `configsvr.schedulerName` | Use an alternate scheduler, e.g. "stork". | `""` | +| `configsvr.pdb.create` | Enable pod disruption budget | `false` | +| `configsvr.pdb.minAvailable` | Minimum number of available config pods allowed (`0` to disable) | `0` | +| `configsvr.pdb.maxUnavailable` | Maximum number of unavailable config pods allowed (`0` to disable) | `1` | +| `configsvr.persistence.enabled` | Use a PVC to persist data | `true` | +| `configsvr.persistence.mountPath` | Path to mount the volume at | `/bitnami/mongodb` | +| `configsvr.persistence.subPath` | Subdirectory of the volume to mount at (evaluated as a template) | `""` | +| `configsvr.persistence.storageClass` | Storage class of backing PVC | `""` | +| `configsvr.persistence.accessModes` | Use volume as ReadOnly or ReadWrite | `["ReadWriteOnce"]` | +| `configsvr.persistence.size` | PersistentVolumeClaim size | `8Gi` | +| `configsvr.persistence.annotations` | Persistent Volume annotations | `{}` | +| `configsvr.persistence.resourcePolicy` | Setting it to "keep" to avoid removing PVCs during a helm delete operation. Leaving it empty will delete PVCs after the chart deleted | `""` | +| `configsvr.serviceAccount.create` | Specifies whether a ServiceAccount should be created for Config Server | `true` | +| `configsvr.serviceAccount.name` | Name of a Service Account to be used by Config Server | `""` | +| `configsvr.serviceAccount.annotations` | Additional Service Account annotations (evaluated as a template) | `{}` | +| `configsvr.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `false` | +| `configsvr.external.host` | Primary node of an external Config Server replicaset | `""` | +| `configsvr.external.rootPassword` | Root password of the external Config Server replicaset | `""` | +| `configsvr.external.replicasetName` | Replicaset name of an external Config Server | `""` | +| `configsvr.external.replicasetKey` | Replicaset key of an external Config Server | `""` | +| `configsvr.podSecurityContext.enabled` | Enable security context | `true` | +| `configsvr.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | +| `configsvr.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | +| `configsvr.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | +| `configsvr.podSecurityContext.fsGroup` | Group ID for the container | `1001` | +| `configsvr.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | +| `configsvr.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | +| `configsvr.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `configsvr.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | +| `configsvr.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | +| `configsvr.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | +| `configsvr.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | +| `configsvr.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | +| `configsvr.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | +| `configsvr.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | +| `configsvr.command` | Override default container command (useful when using custom images) | `["/bin/bash","/entrypoint/replicaset-entrypoint.sh"]` | +| `configsvr.args` | Override default container args (useful when using custom images) | `[]` | +| `configsvr.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` | +| `configsvr.lifecycleHooks` | for the Config Server container(s) to automate configuration before or after startup | `{}` | +| `configsvr.livenessProbe.enabled` | Enable livenessProbe | `true` | +| `configsvr.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `60` | +| `configsvr.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `30` | +| `configsvr.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `20` | +| `configsvr.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `2` | +| `configsvr.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `configsvr.readinessProbe.enabled` | Enable readinessProbe | `true` | +| `configsvr.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `10` | +| `configsvr.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `30` | +| `configsvr.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `20` | +| `configsvr.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | +| `configsvr.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `configsvr.startupProbe.enabled` | Enable startupProbe | `true` | +| `configsvr.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `0` | +| `configsvr.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | +| `configsvr.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | +| `configsvr.startupProbe.failureThreshold` | Failure threshold for startupProbe | `30` | +| `configsvr.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `configsvr.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | +| `configsvr.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | +| `configsvr.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | ### Mongos parameters -| Name | Description | Value | -| ---------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | -| `mongos.replicaCount` | Number of replicas | `1` | -| `mongos.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if mongos.resources is set (mongos.resources is recommended for production). | `small` | -| `mongos.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | -| `mongos.automountServiceAccountToken` | Mount Service Account token in pod | `false` | -| `mongos.hostAliases` | Deployment pod host aliases | `[]` | -| `mongos.mongodbExtraFlags` | MongoDB® additional command line flags | `[]` | -| `mongos.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` | -| `mongos.priorityClassName` | Pod priority class name | `""` | -| `mongos.podAffinityPreset` | Mongos Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `mongos.podAntiAffinityPreset` | Mongos Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `mongos.nodeAffinityPreset.type` | Mongos Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `mongos.nodeAffinityPreset.key` | Mongos Node label key to match Ignored if `affinity` is set. | `""` | -| `mongos.nodeAffinityPreset.values` | Mongos Node label values to match. Ignored if `affinity` is set. | `[]` | -| `mongos.affinity` | Mongos Affinity for pod assignment | `{}` | -| `mongos.nodeSelector` | Mongos Node labels for pod assignment | `{}` | -| `mongos.tolerations` | Mongos Tolerations for pod assignment | `[]` | -| `mongos.podManagementPolicy` | Statefulsets pod management policy, allows parallel startup of pods | `OrderedReady` | -| `mongos.updateStrategy.type` | updateStrategy for MongoDB® Primary, Secondary and Arbiter statefulsets | `RollingUpdate` | -| `mongos.config` | MongoDB® configuration file | `""` | -| `mongos.configCM` | ConfigMap name with MongoDB® configuration file (cannot be used with mongos.config) | `""` | -| `mongos.extraEnvVars` | An array to add extra env vars | `[]` | -| `mongos.extraEnvVarsCM` | Name of a ConfigMap containing extra env vars | `""` | -| `mongos.extraEnvVarsSecret` | Name of a Secret containing extra env vars | `""` | -| `mongos.sidecars` | Add sidecars to the pod | `[]` | -| `mongos.initContainers` | Add init containers to the pod | `[]` | -| `mongos.podAnnotations` | Additional pod annotations | `{}` | -| `mongos.podLabels` | Additional pod labels | `{}` | -| `mongos.extraVolumes` | Array to add extra volumes. Requires setting `extraVolumeMounts` | `[]` | -| `mongos.extraVolumeMounts` | Array to add extra volume mounts. Normally used with `extraVolumes`. | `[]` | -| `mongos.schedulerName` | Use an alternate scheduler, e.g. "stork". | `""` | -| `mongos.useStatefulSet` | Use StatefulSet instead of Deployment | `false` | -| `mongos.servicePerReplica.enabled` | Create one service per mongos replica (must be used with statefulset) | `false` | -| `mongos.servicePerReplica.annotations` | Additional service annotations (evaluate as a template) | `{}` | -| `mongos.servicePerReplica.type` | Service type | `ClusterIP` | -| `mongos.servicePerReplica.externalTrafficPolicy` | External traffic policy | `Cluster` | -| `mongos.servicePerReplica.port` | MongoDB® service port | `27017` | -| `mongos.servicePerReplica.clusterIPs` | Array of static clusterIPs for each MongoDB@reg; replica. Length must be the same as mongos.replicaCount | `[]` | -| `mongos.servicePerReplica.nodePorts` | Array of node ports used for each MongoDB@reg; replica. Length must be the same as mongos.replicaCount | `[]` | -| `mongos.servicePerReplica.externalIPs` | External IP list to use with ClusterIP service type | `[]` | -| `mongos.servicePerReplica.loadBalancerIPs` | Array of static IP Address to use for each replica LoadBalancer service type. Length must be the same as mongos.replicaCount | `[]` | -| `mongos.servicePerReplica.loadBalancerSourceRanges` | List of IP ranges allowed access to load balancer (if supported) | `[]` | -| `mongos.servicePerReplica.extraPorts` | Extra ports to expose (normally used with the `sidecar` value) | `[]` | -| `mongos.servicePerReplica.sessionAffinity` | Session Affinity for Kubernetes service, can be "None" or "ClientIP" | `None` | -| `mongos.servicePerReplica.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` | -| `mongos.pdb.create` | Enable pod disruption budget | `false` | -| `mongos.pdb.minAvailable` | Minimum number of available mongo pods allowed (`0` to disable) | `0` | -| `mongos.pdb.maxUnavailable` | Maximum number of unavailable mongo pods allowed (`0` to disable) | `1` | -| `mongos.serviceAccount.create` | Whether to create a Service Account for mongos automatically | `true` | -| `mongos.serviceAccount.name` | Name of a Service Account to be used by mongos | `""` | -| `mongos.serviceAccount.annotations` | Additional Service Account annotations (evaluated as a template) | `{}` | -| `mongos.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `false` | -| `mongos.podSecurityContext.enabled` | Enable security context | `true` | -| `mongos.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | -| `mongos.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | -| `mongos.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | -| `mongos.podSecurityContext.fsGroup` | Group ID for the container | `1001` | -| `mongos.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | -| `mongos.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | -| `mongos.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | -| `mongos.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | -| `mongos.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | -| `mongos.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | -| `mongos.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | -| `mongos.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | -| `mongos.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | -| `mongos.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | -| `mongos.command` | Override default container command (useful when using custom images) | `[]` | -| `mongos.args` | Override default container args (useful when using custom images) | `[]` | -| `mongos.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` | -| `mongos.lifecycleHooks` | for the Mongo container(s) to automate configuration before or after startup | `{}` | -| `mongos.livenessProbe.enabled` | Enable livenessProbe | `true` | -| `mongos.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `60` | -| `mongos.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `30` | -| `mongos.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `20` | -| `mongos.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `2` | -| `mongos.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `mongos.readinessProbe.enabled` | Enable readinessProbe | `true` | -| `mongos.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `10` | -| `mongos.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `30` | -| `mongos.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `20` | -| `mongos.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | -| `mongos.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `mongos.startupProbe.enabled` | Enable startupProbe | `false` | -| `mongos.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `0` | -| `mongos.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | -| `mongos.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | -| `mongos.startupProbe.failureThreshold` | Failure threshold for startupProbe | `30` | -| `mongos.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `mongos.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | -| `mongos.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | -| `mongos.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | +| Name | Description | Value | +| ---------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------- | +| `mongos.replicaCount` | Number of replicas | `1` | +| `mongos.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if mongos.resources is set (mongos.resources is recommended for production). | `small` | +| `mongos.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | +| `mongos.automountServiceAccountToken` | Mount Service Account token in pod | `false` | +| `mongos.hostAliases` | Deployment pod host aliases | `[]` | +| `mongos.mongodbExtraFlags` | MongoDB® additional command line flags | `[]` | +| `mongos.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` | +| `mongos.priorityClassName` | Pod priority class name | `""` | +| `mongos.podAffinityPreset` | Mongos Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `mongos.podAntiAffinityPreset` | Mongos Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `mongos.nodeAffinityPreset.type` | Mongos Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `mongos.nodeAffinityPreset.key` | Mongos Node label key to match Ignored if `affinity` is set. | `""` | +| `mongos.nodeAffinityPreset.values` | Mongos Node label values to match. Ignored if `affinity` is set. | `[]` | +| `mongos.affinity` | Mongos Affinity for pod assignment | `{}` | +| `mongos.nodeSelector` | Mongos Node labels for pod assignment | `{}` | +| `mongos.tolerations` | Mongos Tolerations for pod assignment | `[]` | +| `mongos.podManagementPolicy` | Statefulsets pod management policy, allows parallel startup of pods | `OrderedReady` | +| `mongos.updateStrategy.type` | updateStrategy for MongoDB® Primary, Secondary and Arbiter statefulsets | `RollingUpdate` | +| `mongos.config` | MongoDB® configuration file | `""` | +| `mongos.configCM` | ConfigMap name with MongoDB® configuration file (cannot be used with mongos.config) | `""` | +| `mongos.extraEnvVars` | An array to add extra env vars | `[]` | +| `mongos.extraEnvVarsCM` | Name of a ConfigMap containing extra env vars | `""` | +| `mongos.extraEnvVarsSecret` | Name of a Secret containing extra env vars | `""` | +| `mongos.sidecars` | Add sidecars to the pod | `[]` | +| `mongos.initContainers` | Add init containers to the pod | `[]` | +| `mongos.podAnnotations` | Additional pod annotations | `{}` | +| `mongos.podLabels` | Additional pod labels | `{}` | +| `mongos.extraVolumes` | Array to add extra volumes. Requires setting `extraVolumeMounts` | `[]` | +| `mongos.extraVolumeMounts` | Array to add extra volume mounts. Normally used with `extraVolumes`. | `[]` | +| `mongos.schedulerName` | Use an alternate scheduler, e.g. "stork". | `""` | +| `mongos.useStatefulSet` | Use StatefulSet instead of Deployment | `false` | +| `mongos.servicePerReplica.enabled` | Create one service per mongos replica (must be used with statefulset) | `false` | +| `mongos.servicePerReplica.annotations` | Additional service annotations (evaluate as a template) | `{}` | +| `mongos.servicePerReplica.type` | Service type | `ClusterIP` | +| `mongos.servicePerReplica.externalTrafficPolicy` | External traffic policy | `Cluster` | +| `mongos.servicePerReplica.port` | MongoDB® service port | `27017` | +| `mongos.servicePerReplica.clusterIPs` | Array of static clusterIPs for each MongoDB@reg; replica. Length must be the same as mongos.replicaCount | `[]` | +| `mongos.servicePerReplica.nodePorts` | Array of node ports used for each MongoDB@reg; replica. Length must be the same as mongos.replicaCount | `[]` | +| `mongos.servicePerReplica.externalIPs` | External IP list to use with ClusterIP service type | `[]` | +| `mongos.servicePerReplica.loadBalancerIPs` | Array of static IP Address to use for each replica LoadBalancer service type. Length must be the same as mongos.replicaCount | `[]` | +| `mongos.servicePerReplica.loadBalancerSourceRanges` | List of IP ranges allowed access to load balancer (if supported) | `[]` | +| `mongos.servicePerReplica.extraPorts` | Extra ports to expose (normally used with the `sidecar` value) | `[]` | +| `mongos.servicePerReplica.sessionAffinity` | Session Affinity for Kubernetes service, can be "None" or "ClientIP" | `None` | +| `mongos.servicePerReplica.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` | +| `mongos.pdb.create` | Enable pod disruption budget | `false` | +| `mongos.pdb.minAvailable` | Minimum number of available mongo pods allowed (`0` to disable) | `0` | +| `mongos.pdb.maxUnavailable` | Maximum number of unavailable mongo pods allowed (`0` to disable) | `1` | +| `mongos.serviceAccount.create` | Whether to create a Service Account for mongos automatically | `true` | +| `mongos.serviceAccount.name` | Name of a Service Account to be used by mongos | `""` | +| `mongos.serviceAccount.annotations` | Additional Service Account annotations (evaluated as a template) | `{}` | +| `mongos.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `false` | +| `mongos.podSecurityContext.enabled` | Enable security context | `true` | +| `mongos.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | +| `mongos.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | +| `mongos.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | +| `mongos.podSecurityContext.fsGroup` | Group ID for the container | `1001` | +| `mongos.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | +| `mongos.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | +| `mongos.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `mongos.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | +| `mongos.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | +| `mongos.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | +| `mongos.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | +| `mongos.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | +| `mongos.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | +| `mongos.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | +| `mongos.command` | Override default container command (useful when using custom images) | `[]` | +| `mongos.args` | Override default container args (useful when using custom images) | `[]` | +| `mongos.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` | +| `mongos.lifecycleHooks` | for the Mongo container(s) to automate configuration before or after startup | `{}` | +| `mongos.livenessProbe.enabled` | Enable livenessProbe | `true` | +| `mongos.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `60` | +| `mongos.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `30` | +| `mongos.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `20` | +| `mongos.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `2` | +| `mongos.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `mongos.readinessProbe.enabled` | Enable readinessProbe | `true` | +| `mongos.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `10` | +| `mongos.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `30` | +| `mongos.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `20` | +| `mongos.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | +| `mongos.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `mongos.startupProbe.enabled` | Enable startupProbe | `false` | +| `mongos.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `0` | +| `mongos.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | +| `mongos.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | +| `mongos.startupProbe.failureThreshold` | Failure threshold for startupProbe | `30` | +| `mongos.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `mongos.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | +| `mongos.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | +| `mongos.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | ### Shard configuration: Data node parameters -| Name | Description | Value | -| --------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------ | -| `shardsvr.dataNode.replicaCount` | Number of nodes in each shard replica set (the first node will be primary) | `1` | -| `shardsvr.dataNode.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if shardsvr.dataNode.resources is set (shardsvr.dataNode.resources is recommended for production). | `medium` | -| `shardsvr.dataNode.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | -| `shardsvr.dataNode.mongodbExtraFlags` | MongoDB® additional command line flags | `[]` | -| `shardsvr.dataNode.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` | -| `shardsvr.dataNode.priorityClassName` | Pod priority class name | `""` | -| `shardsvr.dataNode.podAffinityPreset` | Data nodes Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `shardsvr.dataNode.podAntiAffinityPreset` | Data nodes Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `shardsvr.dataNode.nodeAffinityPreset.type` | Data nodes Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `shardsvr.dataNode.nodeAffinityPreset.key` | Data nodes Node label key to match Ignored if `affinity` is set. | `""` | -| `shardsvr.dataNode.nodeAffinityPreset.values` | Data nodes Node label values to match. Ignored if `affinity` is set. | `[]` | -| `shardsvr.dataNode.affinity` | Data nodes Affinity for pod assignment | `{}` | -| `shardsvr.dataNode.nodeSelector` | Data nodes Node labels for pod assignment | `{}` | -| `shardsvr.dataNode.tolerations` | Data nodes Tolerations for pod assignment | `[]` | -| `shardsvr.dataNode.podManagementPolicy` | podManagementPolicy for the statefulset, allows parallel startup of pods | `OrderedReady` | -| `shardsvr.dataNode.updateStrategy.type` | updateStrategy for MongoDB® Primary, Secondary and Arbiter statefulsets | `RollingUpdate` | -| `shardsvr.dataNode.automountServiceAccountToken` | Mount Service Account token in pod | `false` | -| `shardsvr.dataNode.hostAliases` | Deployment pod host aliases | `[]` | -| `shardsvr.dataNode.config` | Entries for the MongoDB® config file | `""` | -| `shardsvr.dataNode.configCM` | ConfigMap name with MongoDB® configuration (cannot be used with shardsvr.dataNode.config) | `""` | -| `shardsvr.dataNode.extraEnvVars` | An array to add extra env vars | `[]` | -| `shardsvr.dataNode.extraEnvVarsCM` | Name of a ConfigMap containing extra env vars | `""` | -| `shardsvr.dataNode.extraEnvVarsSecret` | Name of a Secret containing extra env vars | `""` | -| `shardsvr.dataNode.sidecars` | Attach additional containers (evaluated as a template) | `[]` | -| `shardsvr.dataNode.initContainers` | Add init containers to the pod | `[]` | -| `shardsvr.dataNode.podAnnotations` | Additional pod annotations | `{}` | -| `shardsvr.dataNode.podLabels` | Additional pod labels | `{}` | -| `shardsvr.dataNode.extraVolumes` | Array to add extra volumes. Requires setting `extraVolumeMounts` | `[]` | -| `shardsvr.dataNode.extraVolumeMounts` | Array to add extra mounts. Normally used with `extraVolumes` | `[]` | -| `shardsvr.dataNode.schedulerName` | Use an alternate scheduler, e.g. "stork". | `""` | -| `shardsvr.dataNode.pdb.create` | Enable pod disruption budget | `false` | -| `shardsvr.dataNode.pdb.minAvailable` | Minimum number of available data pods allowed (`0` to disable) | `0` | -| `shardsvr.dataNode.pdb.maxUnavailable` | Maximum number of unavailable data pods allowed (`0` to disable) | `1` | -| `shardsvr.dataNode.serviceAccount.create` | Specifies whether a ServiceAccount should be created for shardsvr | `true` | -| `shardsvr.dataNode.serviceAccount.name` | Name of a Service Account to be used by shardsvr data pods | `""` | -| `shardsvr.dataNode.serviceAccount.annotations` | Additional Service Account annotations (evaluated as a template) | `{}` | -| `shardsvr.dataNode.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `false` | -| `shardsvr.dataNode.podSecurityContext.enabled` | Enable security context | `true` | -| `shardsvr.dataNode.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | -| `shardsvr.dataNode.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | -| `shardsvr.dataNode.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | -| `shardsvr.dataNode.podSecurityContext.fsGroup` | Group ID for the container | `1001` | -| `shardsvr.dataNode.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | -| `shardsvr.dataNode.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | -| `shardsvr.dataNode.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | -| `shardsvr.dataNode.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | -| `shardsvr.dataNode.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | -| `shardsvr.dataNode.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | -| `shardsvr.dataNode.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | -| `shardsvr.dataNode.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | -| `shardsvr.dataNode.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | -| `shardsvr.dataNode.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | -| `shardsvr.dataNode.command` | Override default container command (useful when using custom images) | `["/bin/bash","/entrypoint/replicaset-entrypoint.sh"]` | -| `shardsvr.dataNode.args` | Override default container args (useful when using custom images) | `[]` | -| `shardsvr.dataNode.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` | -| `shardsvr.dataNode.lifecycleHooks` | for the Data container(s) to automate configuration before or after startup | `{}` | -| `shardsvr.dataNode.livenessProbe.enabled` | Enable livenessProbe | `true` | -| `shardsvr.dataNode.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `60` | -| `shardsvr.dataNode.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `30` | -| `shardsvr.dataNode.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `20` | -| `shardsvr.dataNode.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `2` | -| `shardsvr.dataNode.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `shardsvr.dataNode.readinessProbe.enabled` | Enable readinessProbe | `true` | -| `shardsvr.dataNode.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `10` | -| `shardsvr.dataNode.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `30` | -| `shardsvr.dataNode.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `20` | -| `shardsvr.dataNode.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | -| `shardsvr.dataNode.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `shardsvr.dataNode.startupProbe.enabled` | Enable startupProbe | `false` | -| `shardsvr.dataNode.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `0` | -| `shardsvr.dataNode.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | -| `shardsvr.dataNode.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | -| `shardsvr.dataNode.startupProbe.failureThreshold` | Failure threshold for startupProbe | `30` | -| `shardsvr.dataNode.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `shardsvr.dataNode.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | -| `shardsvr.dataNode.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | -| `shardsvr.dataNode.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | +| Name | Description | Value | +| --------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------ | +| `shardsvr.dataNode.replicaCount` | Number of nodes in each shard replica set (the first node will be primary) | `1` | +| `shardsvr.dataNode.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if shardsvr.dataNode.resources is set (shardsvr.dataNode.resources is recommended for production). | `medium` | +| `shardsvr.dataNode.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | +| `shardsvr.dataNode.mongodbExtraFlags` | MongoDB® additional command line flags | `[]` | +| `shardsvr.dataNode.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` | +| `shardsvr.dataNode.priorityClassName` | Pod priority class name | `""` | +| `shardsvr.dataNode.podAffinityPreset` | Data nodes Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `shardsvr.dataNode.podAntiAffinityPreset` | Data nodes Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `shardsvr.dataNode.nodeAffinityPreset.type` | Data nodes Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `shardsvr.dataNode.nodeAffinityPreset.key` | Data nodes Node label key to match Ignored if `affinity` is set. | `""` | +| `shardsvr.dataNode.nodeAffinityPreset.values` | Data nodes Node label values to match. Ignored if `affinity` is set. | `[]` | +| `shardsvr.dataNode.affinity` | Data nodes Affinity for pod assignment | `{}` | +| `shardsvr.dataNode.nodeSelector` | Data nodes Node labels for pod assignment | `{}` | +| `shardsvr.dataNode.tolerations` | Data nodes Tolerations for pod assignment | `[]` | +| `shardsvr.dataNode.podManagementPolicy` | podManagementPolicy for the statefulset, allows parallel startup of pods | `OrderedReady` | +| `shardsvr.dataNode.updateStrategy.type` | updateStrategy for MongoDB® Primary, Secondary and Arbiter statefulsets | `RollingUpdate` | +| `shardsvr.dataNode.automountServiceAccountToken` | Mount Service Account token in pod | `false` | +| `shardsvr.dataNode.hostAliases` | Deployment pod host aliases | `[]` | +| `shardsvr.dataNode.config` | Entries for the MongoDB® config file | `""` | +| `shardsvr.dataNode.configCM` | ConfigMap name with MongoDB® configuration (cannot be used with shardsvr.dataNode.config) | `""` | +| `shardsvr.dataNode.extraEnvVars` | An array to add extra env vars | `[]` | +| `shardsvr.dataNode.extraEnvVarsCM` | Name of a ConfigMap containing extra env vars | `""` | +| `shardsvr.dataNode.extraEnvVarsSecret` | Name of a Secret containing extra env vars | `""` | +| `shardsvr.dataNode.sidecars` | Attach additional containers (evaluated as a template) | `[]` | +| `shardsvr.dataNode.initContainers` | Add init containers to the pod | `[]` | +| `shardsvr.dataNode.podAnnotations` | Additional pod annotations | `{}` | +| `shardsvr.dataNode.podLabels` | Additional pod labels | `{}` | +| `shardsvr.dataNode.extraVolumes` | Array to add extra volumes. Requires setting `extraVolumeMounts` | `[]` | +| `shardsvr.dataNode.extraVolumeMounts` | Array to add extra mounts. Normally used with `extraVolumes` | `[]` | +| `shardsvr.dataNode.schedulerName` | Use an alternate scheduler, e.g. "stork". | `""` | +| `shardsvr.dataNode.pdb.create` | Enable pod disruption budget | `false` | +| `shardsvr.dataNode.pdb.minAvailable` | Minimum number of available data pods allowed (`0` to disable) | `0` | +| `shardsvr.dataNode.pdb.maxUnavailable` | Maximum number of unavailable data pods allowed (`0` to disable) | `1` | +| `shardsvr.dataNode.serviceAccount.create` | Specifies whether a ServiceAccount should be created for shardsvr | `true` | +| `shardsvr.dataNode.serviceAccount.name` | Name of a Service Account to be used by shardsvr data pods | `""` | +| `shardsvr.dataNode.serviceAccount.annotations` | Additional Service Account annotations (evaluated as a template) | `{}` | +| `shardsvr.dataNode.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `false` | +| `shardsvr.dataNode.podSecurityContext.enabled` | Enable security context | `true` | +| `shardsvr.dataNode.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | +| `shardsvr.dataNode.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | +| `shardsvr.dataNode.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | +| `shardsvr.dataNode.podSecurityContext.fsGroup` | Group ID for the container | `1001` | +| `shardsvr.dataNode.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | +| `shardsvr.dataNode.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | +| `shardsvr.dataNode.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `shardsvr.dataNode.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | +| `shardsvr.dataNode.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | +| `shardsvr.dataNode.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | +| `shardsvr.dataNode.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | +| `shardsvr.dataNode.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | +| `shardsvr.dataNode.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | +| `shardsvr.dataNode.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | +| `shardsvr.dataNode.command` | Override default container command (useful when using custom images) | `["/bin/bash","/entrypoint/replicaset-entrypoint.sh"]` | +| `shardsvr.dataNode.args` | Override default container args (useful when using custom images) | `[]` | +| `shardsvr.dataNode.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` | +| `shardsvr.dataNode.lifecycleHooks` | for the Data container(s) to automate configuration before or after startup | `{}` | +| `shardsvr.dataNode.livenessProbe.enabled` | Enable livenessProbe | `true` | +| `shardsvr.dataNode.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `60` | +| `shardsvr.dataNode.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `30` | +| `shardsvr.dataNode.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `20` | +| `shardsvr.dataNode.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `2` | +| `shardsvr.dataNode.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `shardsvr.dataNode.readinessProbe.enabled` | Enable readinessProbe | `true` | +| `shardsvr.dataNode.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `10` | +| `shardsvr.dataNode.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `30` | +| `shardsvr.dataNode.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `20` | +| `shardsvr.dataNode.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | +| `shardsvr.dataNode.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `shardsvr.dataNode.startupProbe.enabled` | Enable startupProbe | `false` | +| `shardsvr.dataNode.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `0` | +| `shardsvr.dataNode.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | +| `shardsvr.dataNode.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | +| `shardsvr.dataNode.startupProbe.failureThreshold` | Failure threshold for startupProbe | `30` | +| `shardsvr.dataNode.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `shardsvr.dataNode.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | +| `shardsvr.dataNode.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | +| `shardsvr.dataNode.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | ### Shard configuration: Persistence parameters @@ -530,135 +530,135 @@ The Bitnami Kibana chart supports mounting extra volumes (either PVCs, secrets o ### Shard configuration: Arbiter parameters -| Name | Description | Value | -| -------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------- | -| `shardsvr.arbiter.replicaCount` | Number of arbiters in each shard replica set (the first node will be primary) | `0` | -| `shardsvr.arbiter.automountServiceAccountToken` | Mount Service Account token in pod | `false` | -| `shardsvr.arbiter.hostAliases` | Deployment pod host aliases | `[]` | -| `shardsvr.arbiter.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if shardsvr.arbiter.resources is set (shardsvr.arbiter.resources is recommended for production). | `small` | -| `shardsvr.arbiter.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | -| `shardsvr.arbiter.mongodbExtraFlags` | MongoDB® additional command line flags | `[]` | -| `shardsvr.arbiter.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` | -| `shardsvr.arbiter.priorityClassName` | Pod priority class name | `""` | -| `shardsvr.arbiter.podAffinityPreset` | Arbiter's Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `shardsvr.arbiter.podAntiAffinityPreset` | Arbiter's Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `shardsvr.arbiter.nodeAffinityPreset.type` | Arbiter's Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `shardsvr.arbiter.nodeAffinityPreset.key` | Arbiter's Node label key to match Ignored if `affinity` is set. | `""` | -| `shardsvr.arbiter.nodeAffinityPreset.values` | Arbiter's Node label values to match. Ignored if `affinity` is set. | `[]` | -| `shardsvr.arbiter.affinity` | Arbiter's Affinity for pod assignment | `{}` | -| `shardsvr.arbiter.nodeSelector` | Arbiter's Node labels for pod assignment | `{}` | -| `shardsvr.arbiter.tolerations` | Arbiter's Tolerations for pod assignment | `[]` | -| `shardsvr.arbiter.podManagementPolicy` | Statefulset's pod management policy, allows parallel startup of pods | `OrderedReady` | -| `shardsvr.arbiter.updateStrategy.type` | updateStrategy for MongoDB® Primary, Secondary and Arbiter statefulsets | `RollingUpdate` | -| `shardsvr.arbiter.config` | MongoDB® configuration file | `""` | -| `shardsvr.arbiter.configCM` | ConfigMap name with MongoDB® configuration file (cannot be used with shardsvr.arbiter.config) | `""` | -| `shardsvr.arbiter.extraEnvVars` | An array to add extra env vars | `[]` | -| `shardsvr.arbiter.extraEnvVarsCM` | Name of a ConfigMap containing extra env vars | `""` | -| `shardsvr.arbiter.extraEnvVarsSecret` | Name of a Secret containing extra env vars | `""` | -| `shardsvr.arbiter.sidecars` | Add sidecars to the pod | `[]` | -| `shardsvr.arbiter.initContainers` | Add init containers to the pod | `[]` | -| `shardsvr.arbiter.podAnnotations` | Additional pod annotations | `{}` | -| `shardsvr.arbiter.podLabels` | Additional pod labels | `{}` | -| `shardsvr.arbiter.extraVolumes` | Array to add extra volumes | `[]` | -| `shardsvr.arbiter.extraVolumeMounts` | Array to add extra mounts (normally used with extraVolumes) | `[]` | -| `shardsvr.arbiter.schedulerName` | Use an alternate scheduler, e.g. "stork". | `""` | -| `shardsvr.arbiter.serviceAccount.create` | Specifies whether a ServiceAccount should be created for shardsvr arbiter nodes | `true` | -| `shardsvr.arbiter.serviceAccount.name` | Name of a Service Account to be used by shardsvr arbiter pods | `""` | -| `shardsvr.arbiter.serviceAccount.annotations` | Additional Service Account annotations (evaluated as a template) | `{}` | -| `shardsvr.arbiter.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `false` | -| `shardsvr.arbiter.podSecurityContext.enabled` | Enable security context | `true` | -| `shardsvr.arbiter.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | -| `shardsvr.arbiter.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | -| `shardsvr.arbiter.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | -| `shardsvr.arbiter.podSecurityContext.fsGroup` | Group ID for the container | `1001` | -| `shardsvr.arbiter.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | -| `shardsvr.arbiter.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | -| `shardsvr.arbiter.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | -| `shardsvr.arbiter.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | -| `shardsvr.arbiter.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | -| `shardsvr.arbiter.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | -| `shardsvr.arbiter.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | -| `shardsvr.arbiter.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | -| `shardsvr.arbiter.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | -| `shardsvr.arbiter.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | -| `shardsvr.arbiter.command` | Override default container command (useful when using custom images) | `[]` | -| `shardsvr.arbiter.args` | Override default container args (useful when using custom images) | `[]` | -| `shardsvr.arbiter.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` | -| `shardsvr.arbiter.lifecycleHooks` | for the arbiter container(s) to automate configuration before or after startup | `{}` | -| `shardsvr.arbiter.livenessProbe.enabled` | Enable livenessProbe | `true` | -| `shardsvr.arbiter.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `60` | -| `shardsvr.arbiter.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `30` | -| `shardsvr.arbiter.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `20` | -| `shardsvr.arbiter.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `2` | -| `shardsvr.arbiter.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `shardsvr.arbiter.readinessProbe.enabled` | Enable readinessProbe | `true` | -| `shardsvr.arbiter.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `10` | -| `shardsvr.arbiter.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `30` | -| `shardsvr.arbiter.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `20` | -| `shardsvr.arbiter.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | -| `shardsvr.arbiter.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `shardsvr.arbiter.startupProbe.enabled` | Enable startupProbe | `false` | -| `shardsvr.arbiter.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `0` | -| `shardsvr.arbiter.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | -| `shardsvr.arbiter.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | -| `shardsvr.arbiter.startupProbe.failureThreshold` | Failure threshold for startupProbe | `30` | -| `shardsvr.arbiter.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `shardsvr.arbiter.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | -| `shardsvr.arbiter.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | -| `shardsvr.arbiter.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | +| Name | Description | Value | +| -------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------- | +| `shardsvr.arbiter.replicaCount` | Number of arbiters in each shard replica set (the first node will be primary) | `0` | +| `shardsvr.arbiter.automountServiceAccountToken` | Mount Service Account token in pod | `false` | +| `shardsvr.arbiter.hostAliases` | Deployment pod host aliases | `[]` | +| `shardsvr.arbiter.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if shardsvr.arbiter.resources is set (shardsvr.arbiter.resources is recommended for production). | `small` | +| `shardsvr.arbiter.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | +| `shardsvr.arbiter.mongodbExtraFlags` | MongoDB® additional command line flags | `[]` | +| `shardsvr.arbiter.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` | +| `shardsvr.arbiter.priorityClassName` | Pod priority class name | `""` | +| `shardsvr.arbiter.podAffinityPreset` | Arbiter's Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `shardsvr.arbiter.podAntiAffinityPreset` | Arbiter's Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `shardsvr.arbiter.nodeAffinityPreset.type` | Arbiter's Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `shardsvr.arbiter.nodeAffinityPreset.key` | Arbiter's Node label key to match Ignored if `affinity` is set. | `""` | +| `shardsvr.arbiter.nodeAffinityPreset.values` | Arbiter's Node label values to match. Ignored if `affinity` is set. | `[]` | +| `shardsvr.arbiter.affinity` | Arbiter's Affinity for pod assignment | `{}` | +| `shardsvr.arbiter.nodeSelector` | Arbiter's Node labels for pod assignment | `{}` | +| `shardsvr.arbiter.tolerations` | Arbiter's Tolerations for pod assignment | `[]` | +| `shardsvr.arbiter.podManagementPolicy` | Statefulset's pod management policy, allows parallel startup of pods | `OrderedReady` | +| `shardsvr.arbiter.updateStrategy.type` | updateStrategy for MongoDB® Primary, Secondary and Arbiter statefulsets | `RollingUpdate` | +| `shardsvr.arbiter.config` | MongoDB® configuration file | `""` | +| `shardsvr.arbiter.configCM` | ConfigMap name with MongoDB® configuration file (cannot be used with shardsvr.arbiter.config) | `""` | +| `shardsvr.arbiter.extraEnvVars` | An array to add extra env vars | `[]` | +| `shardsvr.arbiter.extraEnvVarsCM` | Name of a ConfigMap containing extra env vars | `""` | +| `shardsvr.arbiter.extraEnvVarsSecret` | Name of a Secret containing extra env vars | `""` | +| `shardsvr.arbiter.sidecars` | Add sidecars to the pod | `[]` | +| `shardsvr.arbiter.initContainers` | Add init containers to the pod | `[]` | +| `shardsvr.arbiter.podAnnotations` | Additional pod annotations | `{}` | +| `shardsvr.arbiter.podLabels` | Additional pod labels | `{}` | +| `shardsvr.arbiter.extraVolumes` | Array to add extra volumes | `[]` | +| `shardsvr.arbiter.extraVolumeMounts` | Array to add extra mounts (normally used with extraVolumes) | `[]` | +| `shardsvr.arbiter.schedulerName` | Use an alternate scheduler, e.g. "stork". | `""` | +| `shardsvr.arbiter.serviceAccount.create` | Specifies whether a ServiceAccount should be created for shardsvr arbiter nodes | `true` | +| `shardsvr.arbiter.serviceAccount.name` | Name of a Service Account to be used by shardsvr arbiter pods | `""` | +| `shardsvr.arbiter.serviceAccount.annotations` | Additional Service Account annotations (evaluated as a template) | `{}` | +| `shardsvr.arbiter.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `false` | +| `shardsvr.arbiter.podSecurityContext.enabled` | Enable security context | `true` | +| `shardsvr.arbiter.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | +| `shardsvr.arbiter.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | +| `shardsvr.arbiter.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | +| `shardsvr.arbiter.podSecurityContext.fsGroup` | Group ID for the container | `1001` | +| `shardsvr.arbiter.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | +| `shardsvr.arbiter.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | +| `shardsvr.arbiter.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `shardsvr.arbiter.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | +| `shardsvr.arbiter.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | +| `shardsvr.arbiter.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | +| `shardsvr.arbiter.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | +| `shardsvr.arbiter.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | +| `shardsvr.arbiter.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | +| `shardsvr.arbiter.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | +| `shardsvr.arbiter.command` | Override default container command (useful when using custom images) | `[]` | +| `shardsvr.arbiter.args` | Override default container args (useful when using custom images) | `[]` | +| `shardsvr.arbiter.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` | +| `shardsvr.arbiter.lifecycleHooks` | for the arbiter container(s) to automate configuration before or after startup | `{}` | +| `shardsvr.arbiter.livenessProbe.enabled` | Enable livenessProbe | `true` | +| `shardsvr.arbiter.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `60` | +| `shardsvr.arbiter.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `30` | +| `shardsvr.arbiter.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `20` | +| `shardsvr.arbiter.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `2` | +| `shardsvr.arbiter.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `shardsvr.arbiter.readinessProbe.enabled` | Enable readinessProbe | `true` | +| `shardsvr.arbiter.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `10` | +| `shardsvr.arbiter.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `30` | +| `shardsvr.arbiter.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `20` | +| `shardsvr.arbiter.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | +| `shardsvr.arbiter.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `shardsvr.arbiter.startupProbe.enabled` | Enable startupProbe | `false` | +| `shardsvr.arbiter.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `0` | +| `shardsvr.arbiter.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | +| `shardsvr.arbiter.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` | +| `shardsvr.arbiter.startupProbe.failureThreshold` | Failure threshold for startupProbe | `30` | +| `shardsvr.arbiter.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `shardsvr.arbiter.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | +| `shardsvr.arbiter.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | +| `shardsvr.arbiter.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | ### Metrics parameters -| Name | Description | Value | -| ----------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------- | -| `metrics.enabled` | Start a side-car prometheus exporter | `false` | -| `metrics.image.registry` | MongoDB® exporter image registry | `REGISTRY_NAME` | -| `metrics.image.repository` | MongoDB® exporter image name | `REPOSITORY_NAME/mongodb-exporter` | -| `metrics.image.digest` | MongoDB® exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `metrics.image.pullPolicy` | MongoDB® exporter image pull policy | `Always` | -| `metrics.image.pullSecrets` | MongoDB® exporter image pull secrets | `[]` | -| `metrics.useTLS` | Whether to connect to MongoDB® with TLS | `false` | -| `metrics.extraArgs` | String with extra arguments to the metrics exporter | `""` | -| `metrics.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if metrics.resources is set (metrics.resources is recommended for production). | `nano` | -| `metrics.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | -| `metrics.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | -| `metrics.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | -| `metrics.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | -| `metrics.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | -| `metrics.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | -| `metrics.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | -| `metrics.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | -| `metrics.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | -| `metrics.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | -| `metrics.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | -| `metrics.livenessProbe.enabled` | Enable livenessProbe | `false` | -| `metrics.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `15` | -| `metrics.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `5` | -| `metrics.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | -| `metrics.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `3` | -| `metrics.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `metrics.readinessProbe.enabled` | Enable readinessProbe | `false` | -| `metrics.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `5` | -| `metrics.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `5` | -| `metrics.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `1` | -| `metrics.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `3` | -| `metrics.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `metrics.startupProbe.enabled` | Enable startupProbe | `false` | -| `metrics.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `0` | -| `metrics.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | -| `metrics.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `2` | -| `metrics.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | -| `metrics.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `metrics.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | -| `metrics.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | -| `metrics.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | -| `metrics.containerPorts.metrics` | Port of the Prometheus metrics container | `9216` | -| `metrics.podAnnotations` | Metrics exporter pod Annotation | `{}` | -| `metrics.podMonitor.enabled` | Create PodMonitor Resource for scraping metrics using PrometheusOperator | `false` | -| `metrics.podMonitor.namespace` | Namespace where podmonitor resource should be created | `monitoring` | -| `metrics.podMonitor.interval` | Specify the interval at which metrics should be scraped | `30s` | -| `metrics.podMonitor.scrapeTimeout` | Specify the timeout after which the scrape is ended | `""` | -| `metrics.podMonitor.additionalLabels` | Additional labels that can be used so PodMonitors will be discovered by Prometheus | `{}` | +| Name | Description | Value | +| ----------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------- | +| `metrics.enabled` | Start a side-car prometheus exporter | `false` | +| `metrics.image.registry` | MongoDB® exporter image registry | `REGISTRY_NAME` | +| `metrics.image.repository` | MongoDB® exporter image name | `REPOSITORY_NAME/mongodb-exporter` | +| `metrics.image.digest` | MongoDB® exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `metrics.image.pullPolicy` | MongoDB® exporter image pull policy | `Always` | +| `metrics.image.pullSecrets` | MongoDB® exporter image pull secrets | `[]` | +| `metrics.useTLS` | Whether to connect to MongoDB® with TLS | `false` | +| `metrics.extraArgs` | String with extra arguments to the metrics exporter | `""` | +| `metrics.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if metrics.resources is set (metrics.resources is recommended for production). | `nano` | +| `metrics.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | +| `metrics.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | +| `metrics.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | +| `metrics.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `metrics.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | +| `metrics.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | +| `metrics.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | +| `metrics.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | +| `metrics.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | +| `metrics.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | +| `metrics.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | +| `metrics.livenessProbe.enabled` | Enable livenessProbe | `false` | +| `metrics.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `15` | +| `metrics.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `5` | +| `metrics.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` | +| `metrics.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `3` | +| `metrics.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `metrics.readinessProbe.enabled` | Enable readinessProbe | `false` | +| `metrics.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `5` | +| `metrics.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `5` | +| `metrics.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `1` | +| `metrics.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `3` | +| `metrics.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `metrics.startupProbe.enabled` | Enable startupProbe | `false` | +| `metrics.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `0` | +| `metrics.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | +| `metrics.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `2` | +| `metrics.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | +| `metrics.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `metrics.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | +| `metrics.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | +| `metrics.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | +| `metrics.containerPorts.metrics` | Port of the Prometheus metrics container | `9216` | +| `metrics.podAnnotations` | Metrics exporter pod Annotation | `{}` | +| `metrics.podMonitor.enabled` | Create PodMonitor Resource for scraping metrics using PrometheusOperator | `false` | +| `metrics.podMonitor.namespace` | Namespace where podmonitor resource should be created | `monitoring` | +| `metrics.podMonitor.interval` | Specify the interval at which metrics should be scraped | `30s` | +| `metrics.podMonitor.scrapeTimeout` | Specify the timeout after which the scrape is ended | `""` | +| `metrics.podMonitor.additionalLabels` | Additional labels that can be used so PodMonitors will be discovered by Prometheus | `{}` | Specify each parameter using the `--set key=value[,key=value]` argument to `helm install`. For example, diff --git a/bitnami/mongodb-sharded/values.yaml b/bitnami/mongodb-sharded/values.yaml index 3b041235ef9a97..33e8a43ebbb7c6 100644 --- a/bitnami/mongodb-sharded/values.yaml +++ b/bitnami/mongodb-sharded/values.yaml @@ -85,7 +85,7 @@ diagnosticMode: image: registry: docker.io repository: bitnami/mongodb-sharded - tag: 7.0.7-debian-12-r0 + tag: 7.0.8-debian-12-r0 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' @@ -253,7 +253,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 12-debian-12-r16 + tag: 12-debian-12-r18 digest: "" pullPolicy: IfNotPresent ## Optionally specify an array of imagePullSecrets. @@ -1751,7 +1751,7 @@ metrics: image: registry: docker.io repository: bitnami/mongodb-exporter - tag: 0.40.0-debian-12-r13 + tag: 0.40.0-debian-12-r14 digest: "" pullPolicy: Always ## Optionally specify an array of imagePullSecrets.