alfresco-search-service
A Helm chart for deploying Alfresco Search Service
Checkout alfresco-content-services chart’s doc for an example of how to leverage this chart from an umbrella chart.
Homepage: https://www.alfresco.com
Source Code
Requirements
| Repository | Name | Version |
|---|---|---|
| alfresco-insight-zeppelin | 4.3.0 | |
| https://alfresco.github.io/alfresco-helm-charts/ | alfresco-common | 4.0.0 |
Values
| Key | Type | Default | Description |
|---|---|---|---|
| additionalLabels | object | {} | Additional labels to be added to all resources (deployments, statefulsets, services, pods, etc.) Example: Product: k8s Environment: DEV |
| affinity | string | "" | Pod affinity, passed thru tpl function |
| alfresco-insight-zeppelin.enabled | bool | false | |
| environment.SOLR_CREATE_ALFRESCO_DEFAULTS | string | "alfresco,archive" | |
| global.additionalLabels | object | {} | Global additional labels that can be set at parent/umbrella chart level These will be merged with chart-level additionalLabels, with chart-level taking precedence |
| global.alfrescoRegistryPullSecrets | string | "quay-registry-secret" | |
| ingress.annotations | object | {} | |
| ingress.className | string | "nginx" | |
| ingress.enabled | bool | false | Expose the solr endpoint - make sure authentication is properly configured if you do so |
| ingress.hosts[0].paths[0].path | string | "/solr" | |
| ingress.hosts[0].paths[0].pathType | string | "Prefix" | |
| ingress.tls | list | [] | |
| initContainer.image.pullPolicy | string | "IfNotPresent" | |
| initContainer.image.repository | string | "busybox" | |
| initContainer.image.tag | string | "1.37" | |
| initContainer.resources.limits.memory | string | "20Mi" | |
| initContainer.resources.requests.memory | string | "5Mi" | |
| insightEngineImage.internalPort | string | nil | container’s port search service is listening on change if your custom image use a different port. |
| insightEngineImage.pullPolicy | string | "IfNotPresent" | |
| insightEngineImage.repository | string | "quay.io/alfresco/insight-engine" | |
| insightEngineImage.tag | string | "2.0.17" | |
| livenessProbe.failureThreshold | int | 1 | |
| livenessProbe.initialDelaySeconds | int | 130 | |
| livenessProbe.periodSeconds | int | 20 | |
| livenessProbe.timeoutSeconds | int | 10 | |
| nodeSelector | object | {} | |
| persistence.accessModes[0] | string | "ReadWriteOnce" | |
| persistence.baseSize | string | "10Gi" | Capacity of the PVC for persistency |
| persistence.enabled | bool | true | When disabled, data is lost when pod is terminated/rescheduled |
| persistence.existingClaim | string | nil | Provide a pre-existing PVC for persistency |
| persistence.search.data.mountPath | string | "/opt/alfresco-search-services/data" | |
| persistence.search.data.subPath | string | "alfresco-content-services/solr-data" | |
| persistence.storageClass | string | nil | Bind PVC based on storageClass (e.g. dynamic provisioning) |
| podSecurityContext.fsGroup | int | 33007 | |
| podSecurityContext.runAsGroup | int | 33007 | |
| podSecurityContext.runAsNonRoot | bool | true | |
| podSecurityContext.runAsUser | int | 33007 | |
| readinessProbe.initialDelaySeconds | int | 60 | |
| readinessProbe.periodSeconds | int | 20 | |
| readinessProbe.timeoutSeconds | int | 10 | |
| repository.existingConfigMap.keys.host | string | "SOLR_ALFRESCO_HOST" | Key within the configmap holding the repository hostname |
| repository.existingConfigMap.keys.port | string | "SOLR_ALFRESCO_PORT" | Key within the configmap holding the repository port |
| repository.existingConfigMap.keys.securecomms | string | "SOLR_ALFRESCO_SECURE_COMMS" | Key within the configmap holding the repository security level |
| repository.existingConfigMap.name | string | nil | Name of a pre-existing configmap containing Alfresco repository URL |
| repository.existingSecret.keys.sharedSecret | string | "SOLR_ALFRESCO_SECURECOMMS_SECRET" | Key within the secret holding the repository shared secret |
| repository.existingSecret.name | string | nil | Alternatively, provide a pre-existing secret containing the shared secret used with repository when securecomms is secret |
| repository.host | string | nil | Alfresco repository hostname |
| repository.port | string | nil | Alfresco repository port |
| repository.securecomms | string | "secret" | Alfresco repository security level to use when tracking the repo (‘none’ or ‘secret’) |
| repository.sharedSecret | string | nil | Shared secret used with repository when securecomms is secret |
| resources.limits.cpu | string | "4" | |
| resources.limits.memory | string | "2000Mi" | |
| resources.requests.cpu | string | "0.50" | |
| resources.requests.memory | string | "1200Mi" | |
| searchServicesImage.internalPort | string | nil | container’s port search service is listening on change if your custom image use a different port. |
| searchServicesImage.pullPolicy | string | "IfNotPresent" | |
| searchServicesImage.repository | string | "quay.io/alfresco/search-services" | |
| searchServicesImage.tag | string | "2.0.17" | |
| service.name | string | "solr" | |
| service.type | string | "ClusterIP" | |
| serviceAccount.annotations | object | {} | Annotations to add to the service account |
| serviceAccount.automount | bool | true | Automatically mount a ServiceAccount’s API credentials? |
| serviceAccount.create | bool | true | Specifies whether a service account should be created |
| serviceAccount.name | string | "" | The name of the service account to use. If not set and create is true, a name is generated using the fullname template |
| tolerations | list | [] | |
| type | string | "search-services" | set alfresco-insight-zeppelin.enabled=true As the Docker Image for Insight Engine is not publicly available the alfrescoRegistryPullSecrets has to be set More information can be found on https://github.com/Alfresco/acs-deployment/blob/master/docs/helm/registry-authentication.md |