{{- include "seaweedfs.compat" . -}} {{- if .Values.worker.enabled }} {{- if and (not .Values.worker.adminServer) (not .Values.admin.enabled) }} {{- fail "worker.adminServer must be set if admin.enabled is false within the same release" -}} {{- end }} apiVersion: apps/v1 kind: Deployment metadata: name: {{ include "seaweedfs.fullname" . }}-worker namespace: {{ .Release.Namespace }} labels: app.kubernetes.io/name: {{ template "seaweedfs.name" . }} helm.sh/chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} app.kubernetes.io/managed-by: {{ .Release.Service }} app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/component: worker {{- if .Values.worker.annotations }} annotations: {{- toYaml .Values.worker.annotations | nindent 4 }} {{- end }} spec: replicas: {{ .Values.worker.replicas }} selector: matchLabels: app.kubernetes.io/name: {{ template "seaweedfs.name" . }} app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/component: worker template: metadata: labels: app.kubernetes.io/name: {{ template "seaweedfs.name" . }} helm.sh/chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} app.kubernetes.io/instance: {{ .Release.Name }} app.kubernetes.io/component: worker {{ with .Values.podLabels }} {{- toYaml . | nindent 8 }} {{- end }} {{- with .Values.worker.podLabels }} {{- toYaml . | nindent 8 }} {{- end }} annotations: {{ with .Values.podAnnotations }} {{- toYaml . | nindent 8 }} {{- end }} {{- with .Values.worker.podAnnotations }} {{- toYaml . | nindent 8 }} {{- end }} spec: restartPolicy: {{ default .Values.global.seaweedfs.restartPolicy .Values.worker.restartPolicy }} {{- if .Values.worker.affinity }} affinity: {{ tpl .Values.worker.affinity . | nindent 8 | trim }} {{- end }} {{- if .Values.worker.topologySpreadConstraints }} topologySpreadConstraints: {{ tpl .Values.worker.topologySpreadConstraints . | nindent 8 | trim }} {{- end }} {{- if .Values.worker.tolerations }} tolerations: {{ tpl .Values.worker.tolerations . | nindent 8 | trim }} {{- end }} {{- include "seaweedfs.imagePullSecrets" . | nindent 6 }} terminationGracePeriodSeconds: 60 {{- if .Values.worker.priorityClassName }} priorityClassName: {{ .Values.worker.priorityClassName | quote }} {{- end }} enableServiceLinks: false {{- if .Values.worker.serviceAccountName }} serviceAccountName: {{ .Values.worker.serviceAccountName | quote }} {{- end }} {{- if .Values.worker.initContainers }} initContainers: {{ tpl .Values.worker.initContainers . | nindent 8 | trim }} {{- end }} {{- if .Values.worker.podSecurityContext.enabled }} securityContext: {{- omit .Values.worker.podSecurityContext "enabled" | toYaml | nindent 8 }} {{- end }} containers: - name: seaweedfs image: {{ template "worker.image" . }} imagePullPolicy: {{ default "IfNotPresent" .Values.global.seaweedfs.imagePullPolicy }} env: - name: POD_IP valueFrom: fieldRef: fieldPath: status.podIP - name: POD_NAME valueFrom: fieldRef: fieldPath: metadata.name - name: NAMESPACE valueFrom: fieldRef: fieldPath: metadata.namespace - name: SEAWEEDFS_FULLNAME value: "{{ include "seaweedfs.fullname" . }}" {{- $mergedExtraEnvironmentVars := dict }} {{- include "seaweedfs.mergeExtraEnvironmentVars" (dict "global" .Values.global.seaweedfs "component" .Values.worker "target" $mergedExtraEnvironmentVars) }} {{- range $key := keys $mergedExtraEnvironmentVars | sortAlpha }} {{- $value := index $mergedExtraEnvironmentVars $key }} - name: {{ $key }} {{- if kindIs "string" $value }} value: {{ tpl $value $ | quote }} {{- else }} valueFrom: {{ toYaml $value | nindent 16 | trim }} {{- end -}} {{- end }} command: - "/bin/sh" - "-ec" - | exec /usr/bin/weed \ {{- if or (eq .Values.worker.logs.type "hostPath") (eq .Values.worker.logs.type "emptyDir") (eq .Values.worker.logs.type "existingClaim") }} -logdir=/logs \ {{- else }} -logtostderr=true \ {{- end }} {{- if .Values.worker.loggingOverrideLevel }} -v={{ .Values.worker.loggingOverrideLevel }} \ {{- else }} -v={{ .Values.global.seaweedfs.loggingLevel }} \ {{- end }} worker \ {{- if .Values.worker.adminServer }} -admin={{ .Values.worker.adminServer }} \ {{- else }} -admin={{ template "seaweedfs.fullname" . }}-admin.{{ .Release.Namespace }}:{{ .Values.admin.port }}{{ if .Values.admin.grpcPort }}.{{ .Values.admin.grpcPort }}{{ end }} \ {{- end }} -jobType={{ .Values.worker.jobType }} \ -maxDetect={{ .Values.worker.maxDetect }} \ -maxExecute={{ .Values.worker.maxExecute }} \ -workingDir={{ .Values.worker.workingDir }}{{- if or .Values.worker.metricsPort .Values.worker.metricsIp .Values.worker.extraArgs }} \{{ end }} {{- if .Values.worker.metricsPort }} -metricsPort={{ .Values.worker.metricsPort }}{{- if or .Values.worker.metricsIp .Values.worker.extraArgs }} \{{ end }} {{- end }} {{- if .Values.worker.metricsIp }} -metricsIp={{ .Values.worker.metricsIp }}{{- if .Values.worker.extraArgs }} \{{ end }} {{- end }} {{- range $index, $arg := .Values.worker.extraArgs }} {{ $arg }}{{- if lt $index (sub (len $.Values.worker.extraArgs) 1) }} \{{ end }} {{- end }} volumeMounts: {{- if or (eq .Values.worker.data.type "hostPath") (eq .Values.worker.data.type "emptyDir") (eq .Values.worker.data.type "existingClaim") }} - name: worker-data mountPath: {{ .Values.worker.workingDir }} {{- end }} {{- if or (eq .Values.worker.logs.type "hostPath") (eq .Values.worker.logs.type "emptyDir") (eq .Values.worker.logs.type "existingClaim") }} - name: worker-logs mountPath: /logs {{- end }} {{- if .Values.global.seaweedfs.enableSecurity }} - name: security-config readOnly: true mountPath: /etc/seaweedfs/security.toml subPath: security.toml - name: ca-cert readOnly: true mountPath: /usr/local/share/ca-certificates/ca/ - name: master-cert readOnly: true mountPath: /usr/local/share/ca-certificates/master/ - name: volume-cert readOnly: true mountPath: /usr/local/share/ca-certificates/volume/ - name: filer-cert readOnly: true mountPath: /usr/local/share/ca-certificates/filer/ - name: client-cert readOnly: true mountPath: /usr/local/share/ca-certificates/client/ - name: worker-cert readOnly: true mountPath: /usr/local/share/ca-certificates/worker/ {{- end }} {{ tpl .Values.worker.extraVolumeMounts . | nindent 12 | trim }} ports: {{- if .Values.worker.metricsPort }} - containerPort: {{ .Values.worker.metricsPort }} name: metrics {{- end }} {{- with .Values.worker.resources }} resources: {{- toYaml . | nindent 12 }} {{- end }} {{- if .Values.worker.livenessProbe.enabled }} livenessProbe: {{- if .Values.worker.livenessProbe.httpGet }} httpGet: path: {{ .Values.worker.livenessProbe.httpGet.path }} port: {{ .Values.worker.livenessProbe.httpGet.port }} {{- else if .Values.worker.livenessProbe.tcpSocket }} tcpSocket: port: {{ .Values.worker.livenessProbe.tcpSocket.port }} {{- end }} initialDelaySeconds: {{ .Values.worker.livenessProbe.initialDelaySeconds }} periodSeconds: {{ .Values.worker.livenessProbe.periodSeconds }} successThreshold: {{ .Values.worker.livenessProbe.successThreshold }} failureThreshold: {{ .Values.worker.livenessProbe.failureThreshold }} timeoutSeconds: {{ .Values.worker.livenessProbe.timeoutSeconds }} {{- end }} {{- if .Values.worker.readinessProbe.enabled }} readinessProbe: {{- if .Values.worker.readinessProbe.httpGet }} httpGet: path: {{ .Values.worker.readinessProbe.httpGet.path }} port: {{ .Values.worker.readinessProbe.httpGet.port }} {{- else if .Values.worker.readinessProbe.tcpSocket }} tcpSocket: port: {{ .Values.worker.readinessProbe.tcpSocket.port }} {{- end }} initialDelaySeconds: {{ .Values.worker.readinessProbe.initialDelaySeconds }} periodSeconds: {{ .Values.worker.readinessProbe.periodSeconds }} successThreshold: {{ .Values.worker.readinessProbe.successThreshold }} failureThreshold: {{ .Values.worker.readinessProbe.failureThreshold }} timeoutSeconds: {{ .Values.worker.readinessProbe.timeoutSeconds }} {{- end }} {{- if .Values.worker.containerSecurityContext.enabled }} securityContext: {{- omit .Values.worker.containerSecurityContext "enabled" | toYaml | nindent 12 }} {{- end }} {{- if .Values.worker.sidecars }} {{- include "common.tplvalues.render" (dict "value" .Values.worker.sidecars "context" $) | nindent 8 }} {{- end }} volumes: {{- if eq .Values.worker.data.type "hostPath" }} - name: worker-data hostPath: path: {{ .Values.worker.data.hostPathPrefix }}/seaweedfs-worker-data type: DirectoryOrCreate {{- end }} {{- if eq .Values.worker.data.type "emptyDir" }} - name: worker-data emptyDir: {} {{- end }} {{- if eq .Values.worker.data.type "existingClaim" }} - name: worker-data persistentVolumeClaim: claimName: {{ .Values.worker.data.claimName }} {{- end }} {{- if eq .Values.worker.logs.type "hostPath" }} - name: worker-logs hostPath: path: {{ .Values.worker.logs.hostPathPrefix }}/logs/seaweedfs/worker type: DirectoryOrCreate {{- end }} {{- if eq .Values.worker.logs.type "emptyDir" }} - name: worker-logs emptyDir: {} {{- end }} {{- if eq .Values.worker.logs.type "existingClaim" }} - name: worker-logs persistentVolumeClaim: claimName: {{ .Values.worker.logs.claimName }} {{- end }} {{- if .Values.global.seaweedfs.enableSecurity }} - name: security-config configMap: name: {{ include "seaweedfs.fullname" . }}-security-config - name: ca-cert secret: secretName: {{ include "seaweedfs.fullname" . }}-ca-cert - name: master-cert secret: secretName: {{ include "seaweedfs.fullname" . }}-master-cert - name: volume-cert secret: secretName: {{ include "seaweedfs.fullname" . }}-volume-cert - name: filer-cert secret: secretName: {{ include "seaweedfs.fullname" . }}-filer-cert - name: client-cert secret: secretName: {{ include "seaweedfs.fullname" . }}-client-cert - name: worker-cert secret: secretName: {{ include "seaweedfs.fullname" . }}-worker-cert {{- end }} {{ tpl .Values.worker.extraVolumes . | indent 8 | trim }} {{- if .Values.worker.nodeSelector }} nodeSelector: {{ tpl .Values.worker.nodeSelector . | indent 8 | trim }} {{- end }} {{- end }}