| Giorgi Lekveishvili | b38f736 | 2023-06-05 13:36:02 +0400 | [diff] [blame] | 1 | image: |
| 2 | baseRepo: registry.k8s.io/sig-storage |
| 3 | smb: |
| 4 | repository: registry.k8s.io/sig-storage/smbplugin |
| 5 | tag: v1.11.0 |
| 6 | pullPolicy: IfNotPresent |
| 7 | csiProvisioner: |
| 8 | repository: registry.k8s.io/sig-storage/csi-provisioner |
| 9 | tag: v3.5.0 |
| 10 | pullPolicy: IfNotPresent |
| 11 | livenessProbe: |
| 12 | repository: registry.k8s.io/sig-storage/livenessprobe |
| 13 | tag: v2.10.0 |
| 14 | pullPolicy: IfNotPresent |
| 15 | nodeDriverRegistrar: |
| 16 | repository: registry.k8s.io/sig-storage/csi-node-driver-registrar |
| 17 | tag: v2.8.0 |
| 18 | pullPolicy: IfNotPresent |
| 19 | |
| 20 | serviceAccount: |
| 21 | create: true # When true, service accounts will be created for you. Set to false if you want to use your own. |
| 22 | controller: csi-smb-controller-sa |
| 23 | node: csi-smb-node-sa |
| 24 | |
| 25 | rbac: |
| 26 | create: true |
| 27 | name: smb |
| 28 | |
| 29 | driver: |
| 30 | name: smb.csi.k8s.io |
| 31 | |
| 32 | feature: |
| 33 | enableGetVolumeStats: true |
| 34 | |
| 35 | controller: |
| 36 | name: csi-smb-controller |
| 37 | replicas: 1 |
| 38 | dnsPolicy: ClusterFirstWithHostNet # available values: Default, ClusterFirstWithHostNet, ClusterFirst |
| 39 | metricsPort: 29644 |
| 40 | livenessProbe: |
| 41 | healthPort: 29642 |
| 42 | runOnMaster: false |
| 43 | runOnControlPlane: false |
| 44 | logLevel: 5 |
| 45 | workingMountDir: "/tmp" |
| 46 | resources: |
| 47 | csiProvisioner: |
| 48 | limits: |
| 49 | memory: 300Mi |
| 50 | requests: |
| 51 | cpu: 10m |
| 52 | memory: 20Mi |
| 53 | livenessProbe: |
| 54 | limits: |
| 55 | memory: 100Mi |
| 56 | requests: |
| 57 | cpu: 10m |
| 58 | memory: 20Mi |
| 59 | smb: |
| 60 | limits: |
| 61 | memory: 200Mi |
| 62 | requests: |
| 63 | cpu: 10m |
| 64 | memory: 20Mi |
| 65 | affinity: {} |
| 66 | nodeSelector: {} |
| 67 | tolerations: |
| 68 | - key: "node-role.kubernetes.io/master" |
| 69 | operator: "Exists" |
| 70 | effect: "NoSchedule" |
| 71 | - key: "node-role.kubernetes.io/controlplane" |
| 72 | operator: "Exists" |
| 73 | effect: "NoSchedule" |
| 74 | - key: "node-role.kubernetes.io/control-plane" |
| 75 | operator: "Exists" |
| 76 | effect: "NoSchedule" |
| 77 | |
| 78 | node: |
| 79 | maxUnavailable: 1 |
| 80 | logLevel: 5 |
| 81 | livenessProbe: |
| 82 | healthPort: 29643 |
| 83 | affinity: {} |
| 84 | nodeSelector: {} |
| 85 | |
| 86 | linux: |
| 87 | enabled: true |
| 88 | dsName: csi-smb-node # daemonset name |
| 89 | dnsPolicy: ClusterFirstWithHostNet # available values: Default, ClusterFirstWithHostNet, ClusterFirst |
| 90 | kubelet: /var/lib/kubelet |
| 91 | tolerations: |
| 92 | - operator: "Exists" |
| 93 | resources: |
| 94 | livenessProbe: |
| 95 | limits: |
| 96 | memory: 100Mi |
| 97 | requests: |
| 98 | cpu: 10m |
| 99 | memory: 20Mi |
| 100 | nodeDriverRegistrar: |
| 101 | limits: |
| 102 | memory: 100Mi |
| 103 | requests: |
| 104 | cpu: 10m |
| 105 | memory: 20Mi |
| 106 | smb: |
| 107 | limits: |
| 108 | memory: 200Mi |
| 109 | requests: |
| 110 | cpu: 10m |
| 111 | memory: 20Mi |
| 112 | |
| 113 | windows: |
| 114 | enabled: false |
| 115 | dsName: csi-smb-node-win # daemonset name |
| 116 | kubelet: 'C:\var\lib\kubelet' |
| 117 | removeSMBMappingDuringUnmount: true |
| 118 | tolerations: |
| 119 | - key: "node.kubernetes.io/os" |
| 120 | operator: "Exists" |
| 121 | effect: "NoSchedule" |
| 122 | resources: |
| 123 | livenessProbe: |
| 124 | limits: |
| 125 | memory: 150Mi |
| 126 | requests: |
| 127 | cpu: 10m |
| 128 | memory: 40Mi |
| 129 | nodeDriverRegistrar: |
| 130 | limits: |
| 131 | memory: 150Mi |
| 132 | requests: |
| 133 | cpu: 10m |
| 134 | memory: 40Mi |
| 135 | smb: |
| 136 | limits: |
| 137 | memory: 200Mi |
| 138 | requests: |
| 139 | cpu: 10m |
| 140 | memory: 40Mi |
| 141 | |
| 142 | customLabels: {} |
| 143 | ## Collection of annotations to add to all the pods |
| 144 | podAnnotations: {} |
| 145 | ## Collection of labels to add to all the pods |
| 146 | podLabels: {} |
| 147 | ## Leverage a PriorityClass to ensure your pods survive resource shortages |
| 148 | ## ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ |
| 149 | priorityClassName: system-cluster-critical |
| 150 | ## Security context give the opportunity to run container as nonroot by setting a securityContext |
| 151 | ## by example : |
| 152 | ## securityContext: { runAsUser: 1001 } |
| 153 | securityContext: { seccompProfile: {type: RuntimeDefault} } |