diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-cephfs-csi-nodeplugin.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-cephfs-csi-nodeplugin.yaml index ff592c086..14faf5315 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-cephfs-csi-nodeplugin.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-cephfs-csi-nodeplugin.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: [""] resources: ["nodes"] diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-cephfs-external-provisioner-runner.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-cephfs-external-provisioner-runner.yaml index c958c5f37..1dca162b1 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-cephfs-external-provisioner-runner.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-cephfs-external-provisioner-runner.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: [""] resources: ["secrets"] diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rbd-csi-nodeplugin.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rbd-csi-nodeplugin.yaml index 73d6b2c24..46c33d507 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rbd-csi-nodeplugin.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rbd-csi-nodeplugin.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: [""] resources: ["secrets"] diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rbd-external-provisioner-runner.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rbd-external-provisioner-runner.yaml index ca8a4810b..b55592587 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rbd-external-provisioner-runner.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rbd-external-provisioner-runner.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: [""] resources: ["secrets"] diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-cluster-mgmt.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-cluster-mgmt.yaml index a2ebf8fb7..bbe8f9ee0 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-cluster-mgmt.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-cluster-mgmt.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: - "" diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-global.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-global.yaml index 6bd0d02a2..12b253efc 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-global.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-global.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: - "" @@ -72,6 +72,7 @@ rules: - cephblockpools - cephfilesystems - cephnfses + - cephnvmeofgateways - cephobjectstores - cephobjectstoreusers - cephobjectrealms @@ -96,6 +97,7 @@ rules: - cephblockpools/status - cephfilesystems/status - cephnfses/status + - cephnvmeofgateways/status - cephobjectstores/status - cephobjectstoreusers/status - cephobjectrealms/status @@ -115,6 +117,7 @@ rules: - cephblockpools/finalizers - cephfilesystems/finalizers - cephnfses/finalizers + - cephnvmeofgateways/finalizers - cephobjectstores/finalizers - cephobjectstoreusers/finalizers - cephobjectrealms/finalizers diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-mgr-cluster.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-mgr-cluster.yaml index f80427ce4..8f2d09ed5 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-mgr-cluster.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-mgr-cluster.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: - "" diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-mgr-system.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-mgr-system.yaml index 4e773537c..adbf48dea 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-mgr-system.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-mgr-system.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: - "" diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-object-bucket.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-object-bucket.yaml index 693a3d813..2a17e87de 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-object-bucket.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-object-bucket.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: [""] resources: ["secrets", "configmaps"] diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-osd.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-osd.yaml index 32533c40f..0828ded7a 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-osd.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-osd.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: - "" diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-system.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-system.yaml index f7312e9a3..dfb54dfde 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-system.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRole-rook-ceph-system.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: [""] resources: ["pods", "pods/log"] diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-cephfs-csi-nodeplugin-role.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-cephfs-csi-nodeplugin-role.yaml index fe4e6a701..5d235ea4c 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-cephfs-csi-nodeplugin-role.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-cephfs-csi-nodeplugin-role.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" subjects: - kind: ServiceAccount name: rook-csi-cephfs-plugin-sa diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-cephfs-csi-provisioner-role.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-cephfs-csi-provisioner-role.yaml index 3ba731a36..cfb7b110e 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-cephfs-csi-provisioner-role.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-cephfs-csi-provisioner-role.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" subjects: - kind: ServiceAccount name: rook-csi-cephfs-provisioner-sa diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rbd-csi-nodeplugin.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rbd-csi-nodeplugin.yaml index cf0418047..491b46fd7 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rbd-csi-nodeplugin.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rbd-csi-nodeplugin.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" subjects: - kind: ServiceAccount name: rook-csi-rbd-plugin-sa diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rbd-csi-provisioner-role.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rbd-csi-provisioner-role.yaml index 5bada78b4..d8763acb4 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rbd-csi-provisioner-role.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rbd-csi-provisioner-role.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" subjects: - kind: ServiceAccount name: rook-csi-rbd-provisioner-sa diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-global.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-global.yaml index c7b58b19d..32ad15be6 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-global.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-global.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-mgr-cluster.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-mgr-cluster.yaml index f7fda5834..605811e3f 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-mgr-cluster.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-mgr-cluster.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-object-bucket.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-object-bucket.yaml index 72a856eb4..23a18d860 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-object-bucket.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-object-bucket.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-osd.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-osd.yaml index 49cb76896..9d0d312f9 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-osd.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-osd.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-system.yaml b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-system.yaml index 5d2f15b3c..c211873f4 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-system.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ClusterRoleBinding-rook-ceph-system.yaml @@ -7,11 +7,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/rook-ceph/ConfigMap-rook-ceph-operator-config.yaml b/clusters/cl01tl/manifests/rook-ceph/ConfigMap-rook-ceph-operator-config.yaml index d1571a068..82d41bf4a 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ConfigMap-rook-ceph-operator-config.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ConfigMap-rook-ceph-operator-config.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" data: ROOK_LOG_LEVEL: "INFO" ROOK_CEPH_COMMANDS_TIMEOUT_SECONDS: "15" @@ -39,15 +39,15 @@ data: CSI_CEPHFS_FSGROUPPOLICY: "File" CSI_NFS_FSGROUPPOLICY: "File" CSI_CEPHFS_KERNEL_MOUNT_OPTIONS: "ms_mode=secure" - ROOK_CSI_CEPH_IMAGE: "quay.io/cephcsi/cephcsi:v3.15.0" - ROOK_CSI_REGISTRAR_IMAGE: "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.13.0" - ROOK_CSI_PROVISIONER_IMAGE: "registry.k8s.io/sig-storage/csi-provisioner:v5.2.0" - ROOK_CSI_SNAPSHOTTER_IMAGE: "registry.k8s.io/sig-storage/csi-snapshotter:v8.2.1" - ROOK_CSI_ATTACHER_IMAGE: "registry.k8s.io/sig-storage/csi-attacher:v4.8.1" - ROOK_CSI_RESIZER_IMAGE: "registry.k8s.io/sig-storage/csi-resizer:v1.13.2" + ROOK_CSI_CEPH_IMAGE: "quay.io/cephcsi/cephcsi:v3.16.0" + ROOK_CSI_REGISTRAR_IMAGE: "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.15.0" + ROOK_CSI_PROVISIONER_IMAGE: "registry.k8s.io/sig-storage/csi-provisioner:v6.0.0" + ROOK_CSI_SNAPSHOTTER_IMAGE: "registry.k8s.io/sig-storage/csi-snapshotter:v8.4.0" + ROOK_CSI_ATTACHER_IMAGE: "registry.k8s.io/sig-storage/csi-attacher:v4.10.0" + ROOK_CSI_RESIZER_IMAGE: "registry.k8s.io/sig-storage/csi-resizer:v2.0.0" ROOK_CSI_IMAGE_PULL_POLICY: "IfNotPresent" CSI_ENABLE_CSIADDONS: "false" - ROOK_CSIADDONS_IMAGE: "quay.io/csiaddons/k8s-sidecar:v0.13.0" + ROOK_CSIADDONS_IMAGE: "quay.io/csiaddons/k8s-sidecar:v0.14.0" CSI_ENABLE_CROSS_NAMESPACE_VOLUME_DATA_SOURCE: "false" CSI_ENABLE_TOPOLOGY: "false" ROOK_CSI_ENABLE_NFS: "false" diff --git a/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephclusters.ceph.rook.io.yaml b/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephclusters.ceph.rook.io.yaml index 1fcb957c3..f03400e91 100644 --- a/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephclusters.ceph.rook.io.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephclusters.ceph.rook.io.yaml @@ -961,15 +961,13 @@ spec: volumeAttributesClassName may be used to set the VolumeAttributesClass used by this claim. If specified, the CSI driver will create or update the volume with the attributes defined in the corresponding VolumeAttributesClass. This has a different purpose than storageClassName, - it can be changed after the claim is created. An empty string value means that no VolumeAttributesClass - will be applied to the claim but it's not allowed to reset this field to empty string once it is set. - If unspecified and the PersistentVolumeClaim is unbound, the default VolumeAttributesClass - will be set by the persistentvolume controller if it exists. + it can be changed after the claim is created. An empty string or nil value indicates that no + VolumeAttributesClass will be applied to the claim. If the claim enters an Infeasible error state, + this field can be reset to its previous value (including nil) to cancel the modification. If the resource referred to by volumeAttributesClass does not exist, this PersistentVolumeClaim will be set to a Pending state, as reflected by the modifyVolumeStatus field, until such as a resource exists. More info: https://kubernetes.io/docs/concepts/storage/volume-attributes-classes/ - (Beta) Using this field requires the VolumeAttributesClass feature gate to be enabled (off by default). type: string volumeMode: description: |- @@ -1187,15 +1185,13 @@ spec: volumeAttributesClassName may be used to set the VolumeAttributesClass used by this claim. If specified, the CSI driver will create or update the volume with the attributes defined in the corresponding VolumeAttributesClass. This has a different purpose than storageClassName, - it can be changed after the claim is created. An empty string value means that no VolumeAttributesClass - will be applied to the claim but it's not allowed to reset this field to empty string once it is set. - If unspecified and the PersistentVolumeClaim is unbound, the default VolumeAttributesClass - will be set by the persistentvolume controller if it exists. + it can be changed after the claim is created. An empty string or nil value indicates that no + VolumeAttributesClass will be applied to the claim. If the claim enters an Infeasible error state, + this field can be reset to its previous value (including nil) to cancel the modification. If the resource referred to by volumeAttributesClass does not exist, this PersistentVolumeClaim will be set to a Pending state, as reflected by the modifyVolumeStatus field, until such as a resource exists. More info: https://kubernetes.io/docs/concepts/storage/volume-attributes-classes/ - (Beta) Using this field requires the VolumeAttributesClass feature gate to be enabled (off by default). type: string volumeMode: description: |- @@ -1420,15 +1416,13 @@ spec: volumeAttributesClassName may be used to set the VolumeAttributesClass used by this claim. If specified, the CSI driver will create or update the volume with the attributes defined in the corresponding VolumeAttributesClass. This has a different purpose than storageClassName, - it can be changed after the claim is created. An empty string value means that no VolumeAttributesClass - will be applied to the claim but it's not allowed to reset this field to empty string once it is set. - If unspecified and the PersistentVolumeClaim is unbound, the default VolumeAttributesClass - will be set by the persistentvolume controller if it exists. + it can be changed after the claim is created. An empty string or nil value indicates that no + VolumeAttributesClass will be applied to the claim. If the claim enters an Infeasible error state, + this field can be reset to its previous value (including nil) to cancel the modification. If the resource referred to by volumeAttributesClass does not exist, this PersistentVolumeClaim will be set to a Pending state, as reflected by the modifyVolumeStatus field, until such as a resource exists. More info: https://kubernetes.io/docs/concepts/storage/volume-attributes-classes/ - (Beta) Using this field requires the VolumeAttributesClass feature gate to be enabled (off by default). type: string volumeMode: description: |- @@ -2245,7 +2239,7 @@ spec: Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container. - This is an alpha field and requires enabling the + This field depends on the DynamicResourceAllocation feature gate. This field is immutable. It can only be set for containers. @@ -2570,7 +2564,7 @@ spec: Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container. - This is an alpha field and requires enabling the + This field depends on the DynamicResourceAllocation feature gate. This field is immutable. It can only be set for containers. @@ -2828,15 +2822,13 @@ spec: volumeAttributesClassName may be used to set the VolumeAttributesClass used by this claim. If specified, the CSI driver will create or update the volume with the attributes defined in the corresponding VolumeAttributesClass. This has a different purpose than storageClassName, - it can be changed after the claim is created. An empty string value means that no VolumeAttributesClass - will be applied to the claim but it's not allowed to reset this field to empty string once it is set. - If unspecified and the PersistentVolumeClaim is unbound, the default VolumeAttributesClass - will be set by the persistentvolume controller if it exists. + it can be changed after the claim is created. An empty string or nil value indicates that no + VolumeAttributesClass will be applied to the claim. If the claim enters an Infeasible error state, + this field can be reset to its previous value (including nil) to cancel the modification. If the resource referred to by volumeAttributesClass does not exist, this PersistentVolumeClaim will be set to a Pending state, as reflected by the modifyVolumeStatus field, until such as a resource exists. More info: https://kubernetes.io/docs/concepts/storage/volume-attributes-classes/ - (Beta) Using this field requires the VolumeAttributesClass feature gate to be enabled (off by default). type: string volumeMode: description: |- @@ -3917,7 +3909,7 @@ spec: Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container. - This is an alpha field and requires enabling the + This field depends on the DynamicResourceAllocation feature gate. This field is immutable. It can only be set for containers. @@ -4182,15 +4174,13 @@ spec: volumeAttributesClassName may be used to set the VolumeAttributesClass used by this claim. If specified, the CSI driver will create or update the volume with the attributes defined in the corresponding VolumeAttributesClass. This has a different purpose than storageClassName, - it can be changed after the claim is created. An empty string value means that no VolumeAttributesClass - will be applied to the claim but it's not allowed to reset this field to empty string once it is set. - If unspecified and the PersistentVolumeClaim is unbound, the default VolumeAttributesClass - will be set by the persistentvolume controller if it exists. + it can be changed after the claim is created. An empty string or nil value indicates that no + VolumeAttributesClass will be applied to the claim. If the claim enters an Infeasible error state, + this field can be reset to its previous value (including nil) to cancel the modification. If the resource referred to by volumeAttributesClass does not exist, this PersistentVolumeClaim will be set to a Pending state, as reflected by the modifyVolumeStatus field, until such as a resource exists. More info: https://kubernetes.io/docs/concepts/storage/volume-attributes-classes/ - (Beta) Using this field requires the VolumeAttributesClass feature gate to be enabled (off by default). type: string volumeMode: description: |- @@ -4434,15 +4424,13 @@ spec: volumeAttributesClassName may be used to set the VolumeAttributesClass used by this claim. If specified, the CSI driver will create or update the volume with the attributes defined in the corresponding VolumeAttributesClass. This has a different purpose than storageClassName, - it can be changed after the claim is created. An empty string value means that no VolumeAttributesClass - will be applied to the claim but it's not allowed to reset this field to empty string once it is set. - If unspecified and the PersistentVolumeClaim is unbound, the default VolumeAttributesClass - will be set by the persistentvolume controller if it exists. + it can be changed after the claim is created. An empty string or nil value indicates that no + VolumeAttributesClass will be applied to the claim. If the claim enters an Infeasible error state, + this field can be reset to its previous value (including nil) to cancel the modification. If the resource referred to by volumeAttributesClass does not exist, this PersistentVolumeClaim will be set to a Pending state, as reflected by the modifyVolumeStatus field, until such as a resource exists. More info: https://kubernetes.io/docs/concepts/storage/volume-attributes-classes/ - (Beta) Using this field requires the VolumeAttributesClass feature gate to be enabled (off by default). type: string volumeMode: description: |- diff --git a/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephcosidrivers.ceph.rook.io.yaml b/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephcosidrivers.ceph.rook.io.yaml index 567ea221b..313af3f6a 100644 --- a/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephcosidrivers.ceph.rook.io.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephcosidrivers.ceph.rook.io.yaml @@ -571,7 +571,7 @@ spec: Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container. - This is an alpha field and requires enabling the + This field depends on the DynamicResourceAllocation feature gate. This field is immutable. It can only be set for containers. diff --git a/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephfilesystemmirrors.ceph.rook.io.yaml b/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephfilesystemmirrors.ceph.rook.io.yaml index 2d2f85b62..e29dca627 100644 --- a/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephfilesystemmirrors.ceph.rook.io.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephfilesystemmirrors.ceph.rook.io.yaml @@ -582,7 +582,7 @@ spec: Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container. - This is an alpha field and requires enabling the + This field depends on the DynamicResourceAllocation feature gate. This field is immutable. It can only be set for containers. diff --git a/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephfilesystems.ceph.rook.io.yaml b/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephfilesystems.ceph.rook.io.yaml index 7e31d53ce..34dfe82e9 100644 --- a/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephfilesystems.ceph.rook.io.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephfilesystems.ceph.rook.io.yaml @@ -1153,7 +1153,7 @@ spec: Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container. - This is an alpha field and requires enabling the + This field depends on the DynamicResourceAllocation feature gate. This field is immutable. It can only be set for containers. diff --git a/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephnfses.ceph.rook.io.yaml b/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephnfses.ceph.rook.io.yaml index 288551b03..98527541b 100644 --- a/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephnfses.ceph.rook.io.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephnfses.ceph.rook.io.yaml @@ -257,6 +257,25 @@ spec: type: array x-kubernetes-list-type: atomic type: object + podCertificate: + properties: + certificateChainPath: + type: string + credentialBundlePath: + type: string + keyPath: + type: string + keyType: + type: string + maxExpirationSeconds: + format: int32 + type: integer + signerName: + type: string + required: + - keyType + - signerName + type: object secret: properties: items: @@ -510,6 +529,25 @@ spec: type: array x-kubernetes-list-type: atomic type: object + podCertificate: + properties: + certificateChainPath: + type: string + credentialBundlePath: + type: string + keyPath: + type: string + keyType: + type: string + maxExpirationSeconds: + format: int32 + type: integer + signerName: + type: string + required: + - keyType + - signerName + type: object secret: properties: items: @@ -792,6 +830,25 @@ spec: type: array x-kubernetes-list-type: atomic type: object + podCertificate: + properties: + certificateChainPath: + type: string + credentialBundlePath: + type: string + keyPath: + type: string + keyType: + type: string + maxExpirationSeconds: + format: int32 + type: integer + signerName: + type: string + required: + - keyType + - signerName + type: object secret: properties: items: @@ -885,7 +942,7 @@ spec: Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container. - This is an alpha field and requires enabling the + This field depends on the DynamicResourceAllocation feature gate. This field is immutable. It can only be set for containers. @@ -1117,6 +1174,25 @@ spec: type: array x-kubernetes-list-type: atomic type: object + podCertificate: + properties: + certificateChainPath: + type: string + credentialBundlePath: + type: string + keyPath: + type: string + keyType: + type: string + maxExpirationSeconds: + format: int32 + type: integer + signerName: + type: string + required: + - keyType + - signerName + type: object secret: properties: items: @@ -1888,7 +1964,7 @@ spec: Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container. - This is an alpha field and requires enabling the + This field depends on the DynamicResourceAllocation feature gate. This field is immutable. It can only be set for containers. diff --git a/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephnvmeofgateways.ceph.rook.io.yaml b/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephnvmeofgateways.ceph.rook.io.yaml new file mode 100644 index 000000000..01ef5d810 --- /dev/null +++ b/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephnvmeofgateways.ceph.rook.io.yaml @@ -0,0 +1,913 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + controller-gen.kubebuilder.io/version: v0.19.0 + helm.sh/resource-policy: keep + name: cephnvmeofgateways.ceph.rook.io +spec: + group: ceph.rook.io + names: + kind: CephNVMeOFGateway + listKind: CephNVMeOFGatewayList + plural: cephnvmeofgateways + shortNames: + - nvmeof + singular: cephnvmeofgateway + scope: Namespaced + versions: + - additionalPrinterColumns: + - jsonPath: .status.phase + name: Phase + type: string + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + name: v1 + schema: + openAPIV3Schema: + description: CephNVMeOFGateway represents a Ceph NVMe-oF Gateway + properties: + apiVersion: + description: |- + APIVersion defines the versioned schema of this representation of an object. + Servers should convert recognized schemas to the latest internal value, and + may reject unrecognized values. + More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources + type: string + kind: + description: |- + Kind is a string value representing the REST resource this object represents. + Servers may infer this from the endpoint the client submits requests to. + Cannot be updated. + In CamelCase. + More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds + type: string + metadata: + type: object + spec: + description: NVMeOFGatewaySpec represents the spec of an NVMe-oF gateway + properties: + annotations: + additionalProperties: + type: string + description: The annotations-related configuration to add/set on each Pod related object. + type: object + configMapRef: + description: |- + ConfigMapRef is the name of the ConfigMap containing nvmeof.conf configuration + If not specified, a default configuration will be generated + minLength: 1 + type: string + group: + description: Group is the gateway group name for high availability (ANA group) + minLength: 1 + type: string + hostNetwork: + description: Whether host networking is enabled for the gateway. If not set, the network settings from the cluster CR will be applied. + type: boolean + image: + description: |- + Image is the container image to use for the NVMe-oF gateway daemon. + For example, quay.io/ceph/nvmeof:1.5 + minLength: 1 + type: string + instances: + description: The number of active gateway instances + minimum: 1 + type: integer + labels: + additionalProperties: + type: string + description: The labels-related configuration to add/set on each Pod related object. + type: object + livenessProbe: + description: |- + A liveness-probe to verify that gateway has valid run-time state. + If LivenessProbe.Disabled is false and LivenessProbe.Probe is nil uses default probe. + properties: + disabled: + description: Disabled determines whether probe is disable or not + type: boolean + probe: + description: |- + Probe describes a health check to be performed against a container to determine whether it is + alive or ready to receive traffic. + properties: + exec: + description: Exec specifies a command to execute in the container. + properties: + command: + description: |- + Command is the command line to execute inside the container, the working directory for the + command is root ('/') in the container's filesystem. The command is simply exec'd, it is + not run inside a shell, so traditional shell instructions ('|', etc) won't work. To use + a shell, you need to explicitly call out to that shell. + Exit status of 0 is treated as live/healthy and non-zero is unhealthy. + items: + type: string + type: array + x-kubernetes-list-type: atomic + type: object + failureThreshold: + description: |- + Minimum consecutive failures for the probe to be considered failed after having succeeded. + Defaults to 3. Minimum value is 1. + format: int32 + type: integer + grpc: + description: GRPC specifies a GRPC HealthCheckRequest. + properties: + port: + description: Port number of the gRPC service. Number must be in the range 1 to 65535. + format: int32 + type: integer + service: + default: "" + description: |- + Service is the name of the service to place in the gRPC HealthCheckRequest + (see https://github.com/grpc/grpc/blob/master/doc/health-checking.md). + + If this is not specified, the default behavior is defined by gRPC. + type: string + required: + - port + type: object + httpGet: + description: HTTPGet specifies an HTTP GET request to perform. + properties: + host: + description: |- + Host name to connect to, defaults to the pod IP. You probably want to set + "Host" in httpHeaders instead. + type: string + httpHeaders: + description: Custom headers to set in the request. HTTP allows repeated headers. + items: + description: HTTPHeader describes a custom header to be used in HTTP probes + properties: + name: + description: |- + The header field name. + This will be canonicalized upon output, so case-variant names will be understood as the same header. + type: string + value: + description: The header field value + type: string + required: + - name + - value + type: object + type: array + x-kubernetes-list-type: atomic + path: + description: Path to access on the HTTP server. + type: string + port: + anyOf: + - type: integer + - type: string + description: |- + Name or number of the port to access on the container. + Number must be in the range 1 to 65535. + Name must be an IANA_SVC_NAME. + x-kubernetes-int-or-string: true + scheme: + description: |- + Scheme to use for connecting to the host. + Defaults to HTTP. + type: string + required: + - port + type: object + initialDelaySeconds: + description: |- + Number of seconds after the container has started before liveness probes are initiated. + More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes + format: int32 + type: integer + periodSeconds: + description: |- + How often (in seconds) to perform the probe. + Default to 10 seconds. Minimum value is 1. + format: int32 + type: integer + successThreshold: + description: |- + Minimum consecutive successes for the probe to be considered successful after having failed. + Defaults to 1. Must be 1 for liveness and startup. Minimum value is 1. + format: int32 + type: integer + tcpSocket: + description: TCPSocket specifies a connection to a TCP port. + properties: + host: + description: 'Optional: Host name to connect to, defaults to the pod IP.' + type: string + port: + anyOf: + - type: integer + - type: string + description: |- + Number or name of the port to access on the container. + Number must be in the range 1 to 65535. + Name must be an IANA_SVC_NAME. + x-kubernetes-int-or-string: true + required: + - port + type: object + terminationGracePeriodSeconds: + format: int64 + type: integer + timeoutSeconds: + description: |- + Number of seconds after which the probe times out. + Defaults to 1 second. Minimum value is 1. + More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes + format: int32 + type: integer + type: object + type: object + nvmeofConfig: + additionalProperties: + additionalProperties: + type: string + type: object + description: |- + NVMeOFConfig is a map of section names to key-value pairs for nvmeof.conf configuration + This allows users to override or add configuration options without needing to manage a ConfigMap + type: object + placement: + properties: + nodeAffinity: + properties: + preferredDuringSchedulingIgnoredDuringExecution: + items: + properties: + preference: + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + type: string + values: + items: + type: string + type: array + x-kubernetes-list-type: atomic + required: + - key + - operator + type: object + type: array + x-kubernetes-list-type: atomic + matchFields: + items: + properties: + key: + type: string + operator: + type: string + values: + items: + type: string + type: array + x-kubernetes-list-type: atomic + required: + - key + - operator + type: object + type: array + x-kubernetes-list-type: atomic + type: object + x-kubernetes-map-type: atomic + weight: + format: int32 + type: integer + required: + - preference + - weight + type: object + type: array + x-kubernetes-list-type: atomic + requiredDuringSchedulingIgnoredDuringExecution: + properties: + nodeSelectorTerms: + items: + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + type: string + values: + items: + type: string + type: array + x-kubernetes-list-type: atomic + required: + - key + - operator + type: object + type: array + x-kubernetes-list-type: atomic + matchFields: + items: + properties: + key: + type: string + operator: + type: string + values: + items: + type: string + type: array + x-kubernetes-list-type: atomic + required: + - key + - operator + type: object + type: array + x-kubernetes-list-type: atomic + type: object + x-kubernetes-map-type: atomic + type: array + x-kubernetes-list-type: atomic + required: + - nodeSelectorTerms + type: object + x-kubernetes-map-type: atomic + type: object + podAffinity: + properties: + preferredDuringSchedulingIgnoredDuringExecution: + items: + properties: + podAffinityTerm: + properties: + labelSelector: + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + type: string + values: + items: + type: string + type: array + x-kubernetes-list-type: atomic + required: + - key + - operator + type: object + type: array + x-kubernetes-list-type: atomic + matchLabels: + additionalProperties: + type: string + type: object + type: object + x-kubernetes-map-type: atomic + matchLabelKeys: + items: + type: string + type: array + x-kubernetes-list-type: atomic + mismatchLabelKeys: + items: + type: string + type: array + x-kubernetes-list-type: atomic + namespaceSelector: + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + type: string + values: + items: + type: string + type: array + x-kubernetes-list-type: atomic + required: + - key + - operator + type: object + type: array + x-kubernetes-list-type: atomic + matchLabels: + additionalProperties: + type: string + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + items: + type: string + type: array + x-kubernetes-list-type: atomic + topologyKey: + type: string + required: + - topologyKey + type: object + weight: + format: int32 + type: integer + required: + - podAffinityTerm + - weight + type: object + type: array + x-kubernetes-list-type: atomic + requiredDuringSchedulingIgnoredDuringExecution: + items: + properties: + labelSelector: + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + type: string + values: + items: + type: string + type: array + x-kubernetes-list-type: atomic + required: + - key + - operator + type: object + type: array + x-kubernetes-list-type: atomic + matchLabels: + additionalProperties: + type: string + type: object + type: object + x-kubernetes-map-type: atomic + matchLabelKeys: + items: + type: string + type: array + x-kubernetes-list-type: atomic + mismatchLabelKeys: + items: + type: string + type: array + x-kubernetes-list-type: atomic + namespaceSelector: + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + type: string + values: + items: + type: string + type: array + x-kubernetes-list-type: atomic + required: + - key + - operator + type: object + type: array + x-kubernetes-list-type: atomic + matchLabels: + additionalProperties: + type: string + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + items: + type: string + type: array + x-kubernetes-list-type: atomic + topologyKey: + type: string + required: + - topologyKey + type: object + type: array + x-kubernetes-list-type: atomic + type: object + podAntiAffinity: + properties: + preferredDuringSchedulingIgnoredDuringExecution: + items: + properties: + podAffinityTerm: + properties: + labelSelector: + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + type: string + values: + items: + type: string + type: array + x-kubernetes-list-type: atomic + required: + - key + - operator + type: object + type: array + x-kubernetes-list-type: atomic + matchLabels: + additionalProperties: + type: string + type: object + type: object + x-kubernetes-map-type: atomic + matchLabelKeys: + items: + type: string + type: array + x-kubernetes-list-type: atomic + mismatchLabelKeys: + items: + type: string + type: array + x-kubernetes-list-type: atomic + namespaceSelector: + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + type: string + values: + items: + type: string + type: array + x-kubernetes-list-type: atomic + required: + - key + - operator + type: object + type: array + x-kubernetes-list-type: atomic + matchLabels: + additionalProperties: + type: string + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + items: + type: string + type: array + x-kubernetes-list-type: atomic + topologyKey: + type: string + required: + - topologyKey + type: object + weight: + format: int32 + type: integer + required: + - podAffinityTerm + - weight + type: object + type: array + x-kubernetes-list-type: atomic + requiredDuringSchedulingIgnoredDuringExecution: + items: + properties: + labelSelector: + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + type: string + values: + items: + type: string + type: array + x-kubernetes-list-type: atomic + required: + - key + - operator + type: object + type: array + x-kubernetes-list-type: atomic + matchLabels: + additionalProperties: + type: string + type: object + type: object + x-kubernetes-map-type: atomic + matchLabelKeys: + items: + type: string + type: array + x-kubernetes-list-type: atomic + mismatchLabelKeys: + items: + type: string + type: array + x-kubernetes-list-type: atomic + namespaceSelector: + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + type: string + values: + items: + type: string + type: array + x-kubernetes-list-type: atomic + required: + - key + - operator + type: object + type: array + x-kubernetes-list-type: atomic + matchLabels: + additionalProperties: + type: string + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + items: + type: string + type: array + x-kubernetes-list-type: atomic + topologyKey: + type: string + required: + - topologyKey + type: object + type: array + x-kubernetes-list-type: atomic + type: object + tolerations: + items: + properties: + effect: + type: string + key: + type: string + operator: + type: string + tolerationSeconds: + format: int64 + type: integer + value: + type: string + type: object + type: array + topologySpreadConstraints: + items: + properties: + labelSelector: + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + type: string + values: + items: + type: string + type: array + x-kubernetes-list-type: atomic + required: + - key + - operator + type: object + type: array + x-kubernetes-list-type: atomic + matchLabels: + additionalProperties: + type: string + type: object + type: object + x-kubernetes-map-type: atomic + matchLabelKeys: + items: + type: string + type: array + x-kubernetes-list-type: atomic + maxSkew: + format: int32 + type: integer + minDomains: + format: int32 + type: integer + nodeAffinityPolicy: + type: string + nodeTaintsPolicy: + type: string + topologyKey: + type: string + whenUnsatisfiable: + type: string + required: + - maxSkew + - topologyKey + - whenUnsatisfiable + type: object + type: array + type: object + pool: + description: Pool is the RADOS pool where NVMe-oF configuration is stored + minLength: 1 + type: string + ports: + description: Ports configuration for the NVMe-oF gateway + properties: + discoveryPort: + description: 'DiscoveryPort is the port for discovery service (default: 8009)' + format: int32 + maximum: 65535 + minimum: 1 + type: integer + gatewayPort: + description: 'GatewayPort is the port for the gateway service (default: 5500)' + format: int32 + maximum: 65535 + minimum: 1 + type: integer + ioPort: + description: 'IOPort is the port for NVMe-oF IO traffic (default: 4420)' + format: int32 + maximum: 65535 + minimum: 1 + type: integer + monitorPort: + description: 'MonitorPort is the port for the monitor service (default: 5499)' + format: int32 + maximum: 65535 + minimum: 1 + type: integer + type: object + priorityClassName: + description: PriorityClassName sets the priority class on the pods + type: string + resources: + description: Resources set resource requests and limits + properties: + claims: + description: |- + Claims lists the names of resources, defined in spec.resourceClaims, + that are used by this container. + + This field depends on the + DynamicResourceAllocation feature gate. + + This field is immutable. It can only be set for containers. + items: + description: ResourceClaim references one entry in PodSpec.ResourceClaims. + properties: + name: + description: |- + Name must match the name of one entry in pod.spec.resourceClaims of + the Pod where this field is used. It makes that resource available + inside a container. + type: string + request: + description: |- + Request is the name chosen for a request in the referenced claim. + If empty, everything from the claim is made available, otherwise + only the result of this request. + type: string + required: + - name + type: object + type: array + x-kubernetes-list-map-keys: + - name + x-kubernetes-list-type: map + limits: + additionalProperties: + anyOf: + - type: integer + - type: string + pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ + x-kubernetes-int-or-string: true + description: |- + Limits describes the maximum amount of compute resources allowed. + More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ + type: object + requests: + additionalProperties: + anyOf: + - type: integer + - type: string + pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ + x-kubernetes-int-or-string: true + description: |- + Requests describes the minimum amount of compute resources required. + If Requests is omitted for a container, it defaults to Limits if that is explicitly specified, + otherwise to an implementation-defined value. Requests cannot exceed Limits. + More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ + type: object + type: object + required: + - group + - image + - instances + - pool + type: object + status: + description: NVMeOFGatewayStatus represents the status of Ceph NVMe-oF Gateway + properties: + cephx: + properties: + daemon: + description: Daemon shows the CephX key status for local Ceph daemons associated with this resources. + properties: + keyCephVersion: + description: |- + KeyCephVersion reports the Ceph version that created the current generation's keys. This is + same string format as reported by `CephCluster.status.version.version` to allow them to be + compared. E.g., `20.2.0-0`. + For all newly-created resources, this field set to the version of Ceph that created the key. + The special value "Uninitialized" indicates that keys are being created for the first time. + An empty string indicates that the version is unknown, as expected in brownfield deployments. + type: string + keyGeneration: + description: |- + KeyGeneration represents the CephX key generation for the last successful reconcile. + For all newly-created resources, this field is set to `1`. + When keys are rotated due to any rotation policy, the generation is incremented or updated to + the configured policy generation. + Generation `0` indicates that keys existed prior to the implementation of key tracking. + format: int32 + type: integer + type: object + type: object + conditions: + items: + description: Condition represents a status condition on any Rook-Ceph Custom Resource. + properties: + lastHeartbeatTime: + format: date-time + type: string + lastTransitionTime: + format: date-time + type: string + message: + type: string + reason: + description: ConditionReason is a reason for a condition + type: string + status: + type: string + type: + description: ConditionType represent a resource's status + type: string + type: object + type: array + observedGeneration: + description: ObservedGeneration is the latest generation observed by the controller. + format: int64 + type: integer + phase: + type: string + type: object + required: + - metadata + - spec + type: object + served: true + storage: true + subresources: + status: {} diff --git a/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephobjectstores.ceph.rook.io.yaml b/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephobjectstores.ceph.rook.io.yaml index 786a3c53e..514da54f8 100644 --- a/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephobjectstores.ceph.rook.io.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephobjectstores.ceph.rook.io.yaml @@ -494,6 +494,25 @@ spec: type: array x-kubernetes-list-type: atomic type: object + podCertificate: + properties: + certificateChainPath: + type: string + credentialBundlePath: + type: string + keyPath: + type: string + keyType: + type: string + maxExpirationSeconds: + format: int32 + type: integer + signerName: + type: string + required: + - keyType + - signerName + type: object secret: properties: items: @@ -640,7 +659,7 @@ spec: Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container. - This is an alpha field and requires enabling the + This field depends on the DynamicResourceAllocation feature gate. This field is immutable. It can only be set for containers. @@ -1238,7 +1257,7 @@ spec: Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container. - This is an alpha field and requires enabling the + This field depends on the DynamicResourceAllocation feature gate. This field is immutable. It can only be set for containers. @@ -2188,6 +2207,11 @@ spec: phase: description: ConditionType represent a resource's status type: string + replicas: + format: int32 + type: integer + selector: + type: string type: object x-kubernetes-preserve-unknown-fields: true required: @@ -2197,4 +2221,8 @@ spec: served: true storage: true subresources: + scale: + labelSelectorPath: .status.selector + specReplicasPath: .spec.gateway.instances + statusReplicasPath: .status.replicas status: {} diff --git a/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephrbdmirrors.ceph.rook.io.yaml b/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephrbdmirrors.ceph.rook.io.yaml index e971ea8cc..c1d1ac966 100644 --- a/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephrbdmirrors.ceph.rook.io.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/CustomResourceDefinition-cephrbdmirrors.ceph.rook.io.yaml @@ -599,7 +599,7 @@ spec: Claims lists the names of resources, defined in spec.resourceClaims, that are used by this container. - This is an alpha field and requires enabling the + This field depends on the DynamicResourceAllocation feature gate. This field is immutable. It can only be set for containers. diff --git a/clusters/cl01tl/manifests/rook-ceph/Deployment-rook-ceph-operator.yaml b/clusters/cl01tl/manifests/rook-ceph/Deployment-rook-ceph-operator.yaml index 8ef383b8e..da80fd115 100644 --- a/clusters/cl01tl/manifests/rook-ceph/Deployment-rook-ceph-operator.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/Deployment-rook-ceph-operator.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" spec: replicas: 1 selector: @@ -24,7 +24,7 @@ spec: metadata: labels: app: rook-ceph-operator - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" spec: tolerations: - effect: NoExecute @@ -33,7 +33,7 @@ spec: tolerationSeconds: 5 containers: - name: rook-ceph-operator - image: "docker.io/rook/ceph:v1.18.9" + image: "docker.io/rook/ceph:v1.19.0" imagePullPolicy: IfNotPresent args: ["ceph", "operator"] securityContext: @@ -51,6 +51,8 @@ spec: env: - name: ROOK_CURRENT_NAMESPACE_ONLY value: "false" + - name: ROOK_RECONCILE_CONCURRENT_CLUSTERS + value: "1" - name: ROOK_HOSTPATH_REQUIRES_PRIVILEGED value: "false" - name: ROOK_DISABLE_DEVICE_HOTPLUG diff --git a/clusters/cl01tl/manifests/rook-ceph/Role-cephfs-external-provisioner-cfg.yaml b/clusters/cl01tl/manifests/rook-ceph/Role-cephfs-external-provisioner-cfg.yaml index a63650553..5758c8c3a 100644 --- a/clusters/cl01tl/manifests/rook-ceph/Role-cephfs-external-provisioner-cfg.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/Role-cephfs-external-provisioner-cfg.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: ["coordination.k8s.io"] resources: ["leases"] diff --git a/clusters/cl01tl/manifests/rook-ceph/Role-rbd-external-provisioner-cfg.yaml b/clusters/cl01tl/manifests/rook-ceph/Role-rbd-external-provisioner-cfg.yaml index 79c96394a..8c54d6278 100644 --- a/clusters/cl01tl/manifests/rook-ceph/Role-rbd-external-provisioner-cfg.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/Role-rbd-external-provisioner-cfg.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: ["coordination.k8s.io"] resources: ["leases"] diff --git a/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-cmd-reporter.yaml b/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-cmd-reporter.yaml index 33e4df59f..421a79d4f 100644 --- a/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-cmd-reporter.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-cmd-reporter.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: - "" diff --git a/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-mgr.yaml b/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-mgr.yaml index dafa42977..76546c77a 100644 --- a/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-mgr.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-mgr.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: - "" diff --git a/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-monitoring-mgr.yaml b/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-monitoring-mgr.yaml index 4159a22b6..e47640d5b 100644 --- a/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-monitoring-mgr.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-monitoring-mgr.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: - monitoring.coreos.com diff --git a/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-monitoring.yaml b/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-monitoring.yaml index 4ee855ca3..4d33cd34a 100644 --- a/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-monitoring.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-monitoring.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: - "monitoring.coreos.com" diff --git a/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-osd.yaml b/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-osd.yaml index 77e79ddd5..4a89808fd 100644 --- a/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-osd.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-osd.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: [""] resources: ["secrets"] diff --git a/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-purge-osd.yaml b/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-purge-osd.yaml index 2cedb1ef9..87a26b9f7 100644 --- a/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-purge-osd.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-purge-osd.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: [""] resources: ["configmaps"] diff --git a/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-system.yaml b/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-system.yaml index 58a3add67..8ae76b3ad 100644 --- a/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-system.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/Role-rook-ceph-system.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" rules: - apiGroups: - "" diff --git a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-cephfs-csi-provisioner-role-cfg.yaml b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-cephfs-csi-provisioner-role-cfg.yaml index 8e780cb76..a2020d43f 100644 --- a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-cephfs-csi-provisioner-role-cfg.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-cephfs-csi-provisioner-role-cfg.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" subjects: - kind: ServiceAccount name: rook-csi-cephfs-provisioner-sa diff --git a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rbd-csi-provisioner-role-cfg.yaml b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rbd-csi-provisioner-role-cfg.yaml index 2d7a79b81..00bd0add5 100644 --- a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rbd-csi-provisioner-role-cfg.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rbd-csi-provisioner-role-cfg.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" subjects: - kind: ServiceAccount name: rook-csi-rbd-provisioner-sa diff --git a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-cluster-mgmt.yaml b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-cluster-mgmt.yaml index afbd33d32..bc64118fb 100644 --- a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-cluster-mgmt.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-cluster-mgmt.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-cmd-reporter.yaml b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-cmd-reporter.yaml index 8206ebbe5..622817851 100644 --- a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-cmd-reporter.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-cmd-reporter.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role diff --git a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-mgr-system.yaml b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-mgr-system.yaml index 33aa928e8..b71a36bff 100644 --- a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-mgr-system.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-mgr-system.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-mgr.yaml b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-mgr.yaml index 68afe6563..5c1d6fc90 100644 --- a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-mgr.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-mgr.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role diff --git a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-monitoring-mgr.yaml b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-monitoring-mgr.yaml index d9a7b4a41..fa9e52965 100644 --- a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-monitoring-mgr.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-monitoring-mgr.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role diff --git a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-monitoring.yaml b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-monitoring.yaml index e2d74620c..eb68a320e 100644 --- a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-monitoring.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-monitoring.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role diff --git a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-osd.yaml b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-osd.yaml index 28f5770ca..a430ddd91 100644 --- a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-osd.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-osd.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role diff --git a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-purge-osd.yaml b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-purge-osd.yaml index 7eca80075..068347d44 100644 --- a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-purge-osd.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-purge-osd.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role diff --git a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-system.yaml b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-system.yaml index 115983bdd..fd4257281 100644 --- a/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-system.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/RoleBinding-rook-ceph-system.yaml @@ -8,11 +8,11 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role diff --git a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-cmd-reporter.yaml b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-cmd-reporter.yaml index af31cf376..25d0f6971 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-cmd-reporter.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-cmd-reporter.yaml @@ -8,8 +8,8 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" diff --git a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-default.yaml b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-default.yaml index 3a87dccf1..98558b052 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-default.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-default.yaml @@ -8,8 +8,8 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" diff --git a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-mgr.yaml b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-mgr.yaml index 3fa930fe2..1e6fea42a 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-mgr.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-mgr.yaml @@ -8,8 +8,8 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" diff --git a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-osd.yaml b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-osd.yaml index 3f06101a6..fafbb4aa0 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-osd.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-osd.yaml @@ -8,8 +8,8 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" diff --git a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-purge-osd.yaml b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-purge-osd.yaml index ab02cc3d3..7fb478e56 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-purge-osd.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-purge-osd.yaml @@ -8,8 +8,8 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" diff --git a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-rgw.yaml b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-rgw.yaml index 1851efc1f..349683980 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-rgw.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-rgw.yaml @@ -8,8 +8,8 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" diff --git a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-system.yaml b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-system.yaml index d484182a2..4a050bc35 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-system.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-ceph-system.yaml @@ -8,8 +8,8 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" diff --git a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-csi-cephfs-plugin-sa.yaml b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-csi-cephfs-plugin-sa.yaml index a69600a82..95e8e2e72 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-csi-cephfs-plugin-sa.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-csi-cephfs-plugin-sa.yaml @@ -8,8 +8,8 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" diff --git a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-csi-cephfs-provisioner-sa.yaml b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-csi-cephfs-provisioner-sa.yaml index 8ba1fa165..843e6bbe2 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-csi-cephfs-provisioner-sa.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-csi-cephfs-provisioner-sa.yaml @@ -8,8 +8,8 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" diff --git a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-csi-rbd-plugin-sa.yaml b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-csi-rbd-plugin-sa.yaml index f3d1ea2fc..904a2707d 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-csi-rbd-plugin-sa.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-csi-rbd-plugin-sa.yaml @@ -8,8 +8,8 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" diff --git a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-csi-rbd-provisioner-sa.yaml b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-csi-rbd-provisioner-sa.yaml index 706e69986..cce914e08 100644 --- a/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-csi-rbd-provisioner-sa.yaml +++ b/clusters/cl01tl/manifests/rook-ceph/ServiceAccount-rook-csi-rbd-provisioner-sa.yaml @@ -8,8 +8,8 @@ metadata: storage-backend: ceph app.kubernetes.io/name: rook-ceph app.kubernetes.io/instance: rook-ceph - app.kubernetes.io/version: v1.18.9 + app.kubernetes.io/version: v1.19.0 app.kubernetes.io/part-of: rook-ceph-operator app.kubernetes.io/managed-by: Helm app.kubernetes.io/created-by: helm - helm.sh/chart: "rook-ceph-v1.18.9" + helm.sh/chart: "rook-ceph-v1.19.0" diff --git a/clusters/cl01tl/manifests/whodb/Deployment-whodb.yaml b/clusters/cl01tl/manifests/whodb/Deployment-whodb.yaml index c5be99ae0..789b46d4a 100644 --- a/clusters/cl01tl/manifests/whodb/Deployment-whodb.yaml +++ b/clusters/cl01tl/manifests/whodb/Deployment-whodb.yaml @@ -39,7 +39,7 @@ spec: value: ollama-server-2.ollama - name: WHODB_OLLAMA_PORT value: "11434" - image: clidey/whodb:0.88.0 + image: clidey/whodb:0.89.0 imagePullPolicy: IfNotPresent name: main resources: