131 lines
4.1 KiB
YAML
131 lines
4.1 KiB
YAML
# StatefulSet to run the actual vault server cluster.
|
|
{{- if (or (and (ne (.Values.server.enabled | toString) "-") .Values.server.enabled) (and (eq (.Values.server.enabled | toString) "-") .Values.global.enabled)) }}
|
|
apiVersion: apps/v1
|
|
kind: StatefulSet
|
|
metadata:
|
|
name: {{ template "vault.fullname" . }}-server
|
|
labels:
|
|
app: {{ template "vault.name" . }}
|
|
chart: {{ template "vault.chart" . }}
|
|
heritage: {{ .Release.Service }}
|
|
release: {{ .Release.Name }}
|
|
spec:
|
|
serviceName: {{ template "vault.fullname" . }}-server
|
|
podManagementPolicy: Parallel
|
|
replicas: {{ .Values.server.replicas }}
|
|
selector:
|
|
matchLabels:
|
|
app: {{ template "vault.name" . }}
|
|
chart: {{ template "vault.chart" . }}
|
|
release: {{ .Release.Name }}
|
|
component: server
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app: {{ template "vault.name" . }}
|
|
chart: {{ template "vault.chart" . }}
|
|
release: {{ .Release.Name }}
|
|
component: server
|
|
spec:
|
|
affinity:
|
|
podAntiAffinity:
|
|
requiredDuringSchedulingIgnoredDuringExecution:
|
|
- labelSelector:
|
|
matchLabels:
|
|
app: {{ template "vault.name" . }}
|
|
release: "{{ .Release.Name }}"
|
|
component: server
|
|
topologyKey: kubernetes.io/hostname
|
|
terminationGracePeriodSeconds: 10
|
|
securityContext:
|
|
fsGroup: 1000
|
|
volumes:
|
|
- name: config
|
|
configMap:
|
|
name: {{ template "vault.fullname" . }}-server-config
|
|
{{- range .Values.server.extraVolumes }}
|
|
- name: userconfig-{{ .name }}
|
|
{{ .type }}:
|
|
{{- if (eq .type "configMap") }}
|
|
name: {{ .name }}
|
|
{{- else if (eq .type "secret") }}
|
|
secretName: {{ .name }}
|
|
{{- end }}
|
|
{{- end }}
|
|
containers:
|
|
- name: vault
|
|
securityContext:
|
|
fsGroup: 1000
|
|
# TODO: confirm Vault needs this
|
|
privileged: true
|
|
image: "{{ default .Values.global.image .Values.server.image }}"
|
|
env:
|
|
- name: POD_IP
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: status.podIP
|
|
- name: NAMESPACE
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
- name: VAULT_ADDR
|
|
value: "http://localhost:8200"
|
|
command:
|
|
- "/bin/sh"
|
|
- "-ec"
|
|
- |
|
|
vault server -config=/vault/config/ \
|
|
{{- range .Values.server.extraVolumes }}
|
|
{{- if .load }}
|
|
-config-dir=/vault/userconfig/{{ .name }} \
|
|
{{- end }}
|
|
{{- end }}
|
|
|
|
volumeMounts:
|
|
- name: data
|
|
mountPath: /vault/data
|
|
- name: config
|
|
mountPath: /vault/config
|
|
{{- range .Values.server.extraVolumes }}
|
|
- name: userconfig-{{ .name }}
|
|
readOnly: true
|
|
mountPath: /vault/userconfig/{{ .name }}
|
|
{{- end }}
|
|
lifecycle:
|
|
preStop:
|
|
exec:
|
|
command:
|
|
- vault step-down
|
|
ports:
|
|
- containerPort: 8200
|
|
name: http
|
|
readinessProbe:
|
|
# Check status; unsealed vault servers return 0
|
|
# The exit code reflects the seal status:
|
|
# 0 - unsealed
|
|
# 1 - error
|
|
# 2 - sealed
|
|
exec:
|
|
command:
|
|
- "/bin/sh"
|
|
- "-ec"
|
|
- |
|
|
vault status
|
|
failureThreshold: 2
|
|
initialDelaySeconds: 5
|
|
periodSeconds: 3
|
|
successThreshold: 1
|
|
timeoutSeconds: 5
|
|
volumeClaimTemplates:
|
|
- metadata:
|
|
name: data
|
|
spec:
|
|
accessModes:
|
|
- ReadWriteOnce
|
|
resources:
|
|
requests:
|
|
storage: {{ .Values.server.storage }}
|
|
{{- if .Values.server.storageClass }}
|
|
storageClassName: {{ .Values.server.storageClass }}
|
|
{{- end }}
|
|
{{- end }}
|