apiVersion: {{ template "common.capabilities.statefulset.apiVersion" . }} kind: StatefulSet metadata: name: {{ include "elasticsearch.data.fullname" . }} labels: {{- include "common.labels.standard" . | nindent 4 }} app.kubernetes.io/component: data ## Istio Labels: https://istio.io/docs/ops/deployment/requirements/ app: data spec: updateStrategy: type: {{ .Values.data.updateStrategy.type }} {{- if (eq "OnDelete" .Values.data.updateStrategy.type) }} rollingUpdate: null {{- else if .Values.data.updateStrategy.rollingUpdatePartition }} rollingUpdate: partition: {{ .Values.data.updateStrategy.rollingUpdatePartition }} {{- end }} selector: matchLabels: {{- include "common.labels.matchLabels" . | nindent 6 }} app.kubernetes.io/component: data podManagementPolicy: Parallel {{- if not .Values.data.autoscaling.enabled }} replicas: {{ .Values.data.replicas }} {{- end }} serviceName: {{ template "elasticsearch.data.fullname" . }} template: metadata: labels: {{- include "common.labels.standard" . | nindent 8 }} app.kubernetes.io/component: data ## Istio Labels: https://istio.io/docs/ops/deployment/requirements/ app: data {{- if .Values.data.podLabels }} {{- include "common.tplvalues.render" (dict "value" .Values.data.podLabels "context" $) | nindent 8 }} {{- end }} annotations: {{- if and (include "elasticsearch.createTlsSecret" .) (not .Values.security.tls.data.existingSecret) }} checksum/tls: {{ include (print $.Template.BasePath "/tls-secret.yaml") . | sha256sum }} {{- end }} {{- if .Values.data.podAnnotations }} {{- include "common.tplvalues.render" (dict "value" .Values.data.podAnnotations "context" $) | nindent 8 }} {{- end }} spec: {{- include "elasticsearch.imagePullSecrets" . | nindent 6 }} {{- if .Values.data.priorityClassName }} priorityClassName: {{ .Values.data.priorityClassName | quote }} {{- end }} {{- if .Values.data.affinity }} affinity: {{- include "common.tplvalues.render" (dict "value" .Values.data.affinity "context" $) | nindent 8 }} {{- else }} affinity: podAffinity: {{- include "common.affinities.pods" (dict "type" .Values.data.podAffinityPreset "component" "data" "context" $) | nindent 10 }} podAntiAffinity: {{- include "common.affinities.pods" (dict "type" .Values.data.podAntiAffinityPreset "component" "data" "context" $) | nindent 10 }} nodeAffinity: {{- include "common.affinities.nodes" (dict "type" .Values.data.nodeAffinityPreset.type "key" .Values.data.nodeAffinityPreset.key "values" .Values.data.nodeAffinityPreset.values) | nindent 10 }} {{- end }} {{- if .Values.data.hostAliases }} hostAliases: {{- include "common.tplvalues.render" (dict "value" .Values.data.hostAliases "context" $) | nindent 8 }} {{- end }} {{- if .Values.data.schedulerName }} schedulerName: {{ .Values.data.schedulerName }} {{- end }} {{- if .Values.data.nodeSelector }} nodeSelector: {{- include "common.tplvalues.render" (dict "value" .Values.data.nodeSelector "context" $) | nindent 8 }} {{- end }} {{- if .Values.data.tolerations }} tolerations: {{- include "common.tplvalues.render" (dict "value" .Values.data.tolerations "context" $) | nindent 8 }} {{- end }} {{- if .Values.data.topologySpreadConstraints }} topologySpreadConstraints: {{- include "common.tplvalues.render" (dict "value" .Values.data.topologySpreadConstraints "context" $) | nindent 8 }} {{- end }} serviceAccountName: {{ template "elasticsearch.data.serviceAccountName" . }} {{- if or .Values.data.podSecurityContext.enabled .Values.data.securityContext.enabled }} securityContext: {{- if .Values.data.podSecurityContext.enabled }} {{- omit .Values.data.podSecurityContext "enabled" | toYaml | nindent 8 }} {{- else }} fsGroup: {{ .Values.data.securityContext.fsGroup }} {{- end }} {{- end }} {{- if or .Values.data.initContainers .Values.sysctlImage.enabled (and .Values.volumePermissions.enabled .Values.data.persistence.enabled) }} initContainers: {{- if .Values.sysctlImage.enabled }} ## Image that performs the sysctl operation to modify Kernel settings (needed sometimes to avoid boot errors) - name: sysctl image: {{ include "elasticsearch.sysctl.image" . }} imagePullPolicy: {{ .Values.image.pullPolicy | quote }} command: - /bin/bash - -ec - | {{- include "elasticsearch.sysctlIfLess" (dict "key" "vm.max_map_count" "value" "262144") | nindent 14 }} {{- include "elasticsearch.sysctlIfLess" (dict "key" "fs.file-max" "value" "65536") | nindent 14 }} securityContext: privileged: true {{- if .Values.sysctlImage.resources }} resources: {{- toYaml .Values.sysctlImage.resources | nindent 12 }} {{- end }} {{- end }} {{- if and .Values.volumePermissions.enabled .Values.data.persistence.enabled }} - name: volume-permissions image: {{ include "elasticsearch.volumePermissions.image" . }} imagePullPolicy: {{ .Values.volumePermissions.image.pullPolicy | quote }} command: - /bin/bash - -ec - | chown -R {{ .Values.data.securityContext.runAsUser }}:{{ .Values.data.securityContext.fsGroup }} //bitnami/elasticsearch/data securityContext: runAsUser: 0 {{- if .Values.volumePermissions.resources }} resources: {{- toYaml .Values.volumePermissions.resources | nindent 12 }} {{- end }} volumeMounts: - name: data mountPath: "/bitnami/elasticsearch/data" {{- end }} {{- if .Values.data.initContainers }} {{- include "common.tplvalues.render" (dict "value" .Values.data.initContainers "context" $) | nindent 8 }} {{- end }} {{- end }} containers: - name: elasticsearch image: {{ include "elasticsearch.image" . }} imagePullPolicy: {{ .Values.image.pullPolicy | quote }} {{- if or .Values.data.containerSecurityContext.enabled .Values.data.securityContext.enabled }} securityContext: {{- if .Values.data.containerSecurityContext.enabled }} {{- omit .Values.data.containerSecurityContext "enabled" | toYaml | nindent 12 }} {{- else }} runAsUser: {{ .Values.data.securityContext.runAsUser }} {{- end }} {{- end }} {{- if .Values.diagnosticMode.enabled }} command: {{- include "common.tplvalues.render" (dict "value" .Values.diagnosticMode.command "context" $) | nindent 12 }} args: {{- include "common.tplvalues.render" (dict "value" .Values.diagnosticMode.args "context" $) | nindent 12 }} {{- end }} env: - name: MY_POD_NAME valueFrom: fieldRef: fieldPath: metadata.name - name: BITNAMI_DEBUG value: {{ ternary "true" "false" (or .Values.image.debug .Values.diagnosticMode.enabled) | quote }} - name: ELASTICSEARCH_CLUSTER_NAME value: {{ .Values.name | quote }} - name: ELASTICSEARCH_CLUSTER_HOSTS value: {{ include "elasticsearch.hosts" . | quote }} - name: ELASTICSEARCH_TOTAL_NODES value: {{ add (ternary .Values.master.autoscaling.minReplicas .Values.master.replicas .Values.master.autoscaling.enabled) (ternary .Values.data.autoscaling.minReplicas .Values.data.replicas .Values.data.autoscaling.enabled) | quote }} {{- if .Values.plugins }} - name: ELASTICSEARCH_PLUGINS value: {{ .Values.plugins | quote }} {{- end }} {{- if .Values.snapshotRepoPath }} - name: ELASTICSEARCH_FS_SNAPSHOT_REPO_PATH value: {{ .Values.snapshotRepoPath | quote }} {{- end }} - name: ELASTICSEARCH_HEAP_SIZE value: {{ .Values.data.heapSize | quote }} - name: ELASTICSEARCH_IS_DEDICATED_NODE value: "yes" - name: ELASTICSEARCH_NODE_TYPE value: "data" - name: ELASTICSEARCH_ADVERTISED_HOSTNAME value: "$(MY_POD_NAME).{{ include "elasticsearch.data.fullname" . }}.{{ .Release.Namespace }}.svc.{{ .Values.clusterDomain }}" {{- if .Values.security.enabled }} {{- include "elasticsearch.configure.security" . | nindent 12 }} {{- end }} {{- if .Values.extraEnvVars }} {{- include "common.tplvalues.render" ( dict "value" .Values.extraEnvVars "context" $ ) | nindent 12 }} {{- end }} {{- if or .Values.extraEnvVarsConfigMap .Values.extraEnvVarsSecret }} envFrom: {{- if .Values.extraEnvVarsConfigMap }} - configMapRef: name: {{ include "common.tplvalues.render" ( dict "value" .Values.extraEnvVarsConfigMap "context" $ ) }} {{- end }} {{- if .Values.extraEnvVarsSecret }} - secretRef: name: {{ include "common.tplvalues.render" ( dict "value" .Values.extraEnvVarsSecret "context" $ ) }} {{- end }} {{- end }} ports: - name: http containerPort: 9200 - name: transport containerPort: 9300 {{- if not .Values.diagnosticMode.enabled }} {{- if .Values.data.startupProbe.enabled }} startupProbe: initialDelaySeconds: {{ .Values.data.startupProbe.initialDelaySeconds }} periodSeconds: {{ .Values.data.startupProbe.periodSeconds }} timeoutSeconds: {{ .Values.data.startupProbe.timeoutSeconds }} successThreshold: {{ .Values.data.startupProbe.successThreshold }} failureThreshold: {{ .Values.data.startupProbe.failureThreshold }} exec: command: - /opt/bitnami/scripts/elasticsearch/healthcheck.sh {{- else if .Values.data.customStartupProbe }} startupProbe: {{- include "common.tplvalues.render" (dict "value" .Values.data.customStartupProbe "context" $) | nindent 12 }} {{- end }} {{- if .Values.data.livenessProbe.enabled }} livenessProbe: initialDelaySeconds: {{ .Values.data.livenessProbe.initialDelaySeconds }} periodSeconds: {{ .Values.data.livenessProbe.periodSeconds }} timeoutSeconds: {{ .Values.data.livenessProbe.timeoutSeconds }} successThreshold: {{ .Values.data.livenessProbe.successThreshold }} failureThreshold: {{ .Values.data.livenessProbe.failureThreshold }} exec: command: - /opt/bitnami/scripts/elasticsearch/healthcheck.sh {{- else if .Values.data.customLivenessProbe }} livenessProbe: {{- include "common.tplvalues.render" (dict "value" .Values.data.customLivenessProbe "context" $) | nindent 12 }} {{- end }} {{- if .Values.data.readinessProbe.enabled }} readinessProbe: initialDelaySeconds: {{ .Values.data.readinessProbe.initialDelaySeconds }} periodSeconds: {{ .Values.data.readinessProbe.periodSeconds }} timeoutSeconds: {{ .Values.data.readinessProbe.timeoutSeconds }} successThreshold: {{ .Values.data.readinessProbe.successThreshold }} failureThreshold: {{ .Values.data.readinessProbe.failureThreshold }} exec: command: - /opt/bitnami/scripts/elasticsearch/healthcheck.sh {{- else if .Values.data.customReadinessProbe }} readinessProbe: {{- include "common.tplvalues.render" (dict "value" .Values.data.customReadinessProbe "context" $) | nindent 12 }} {{- end }} {{- end }} {{- if .Values.data.resources }} resources: {{- toYaml .Values.data.resources | nindent 12 }} {{- end }} volumeMounts: {{- if .Values.config }} - mountPath: /opt/bitnami/elasticsearch/config/elasticsearch.yml name: "config" subPath: elasticsearch.yml {{- end }} {{- if .Values.extraConfig }} - mountPath: /opt/bitnami/elasticsearch/config/my_elasticsearch.yml name: config subPath: my_elasticsearch.yml {{- end }} - name: "data" mountPath: "/bitnami/elasticsearch/data" {{- if .Values.security.enabled }} - name: elasticsearch-certificates mountPath: /opt/bitnami/elasticsearch/config/certs readOnly: true {{- end }} {{- if .Values.extraVolumeMounts }} {{- toYaml .Values.extraVolumeMounts | nindent 12 }} {{- end }} {{- if .Values.initScripts }} - name: custom-init-scripts mountPath: /docker-entrypoint-initdb.d/init-scripts {{- end }} {{- if .Values.initScriptsCM }} - name: custom-init-scripts-cm mountPath: /docker-entrypoint-initdb.d/init-scripts-cm {{- end }} {{- if .Values.initScriptsSecret }} - name: custom-init-scripts-secret mountPath: /docker-entrypoint-initdb.d/init-scripts-secret {{- end }} {{- if .Values.data.sidecars }} {{- include "common.tplvalues.render" ( dict "value" .Values.data.sidecars "context" $) | nindent 8 }} {{- end }} volumes: {{- if or .Values.config .Values.extraConfig }} - name: "config" configMap: name: {{ template "common.names.fullname" . }} {{- end }} {{- if .Values.security.enabled }} - name: elasticsearch-certificates secret: secretName: {{ include "elasticsearch.data.tlsSecretName" . }} defaultMode: 256 {{- end }} {{- if .Values.extraVolumes }} {{- toYaml .Values.extraVolumes | nindent 8 }} {{- end }} {{- if .Values.initScripts }} - name: custom-init-scripts configMap: name: {{ template "elasticsearch.initScripts" . }} {{- end }} {{- if .Values.initScriptsCM }} - name: custom-init-scripts-cm configMap: name: {{ template "elasticsearch.initScriptsCM" . }} {{- end }} {{- if .Values.initScriptsSecret }} - name: custom-init-scripts-secret secret: secretName: {{ template "elasticsearch.initScriptsSecret" . }} defaultMode: 0755 {{- end }} {{- if not .Values.data.persistence.enabled }} - name: "data" emptyDir: {} {{- else if .Values.data.persistence.existingClaim }} - name: "data" persistentVolumeClaim: claimName: {{ .Values.data.persistence.existingClaim }} {{- else }} volumeClaimTemplates: - metadata: name: "data" {{- if .Values.data.persistence.annotations }} annotations: {{- toYaml .Values.data.persistence.annotations | nindent 10 }} {{- end }} spec: accessModes: {{- toYaml .Values.data.persistence.accessModes | nindent 10 }} {{ $storage := dict "global" .Values.global "local" .Values.data }} {{ include "elasticsearch.storageClass" $storage }} resources: requests: storage: {{ .Values.data.persistence.size | quote }} {{- if .Values.data.persistence.selector }} selector: {{- include "common.tplvalues.render" (dict "value" .Values.data.persistence.selector "context" $) | nindent 10 }} {{- else if .Values.data.persistence.existingVolume }} selector: matchLabels: volume: {{ .Values.data.persistence.existingVolume }} {{- end }} {{- end }}