March 23, 2025
+ 12
The official Couchbase Helm Chart for the Autonomous Operator comes with a default configuration that can be customized to fit your deployment needs.

This page describes the parameters of the official Couchbase Helm Chart. In particular, this page describes the contents of the chart’s values.yaml, which contains the chart’s default values. Each of the deployed resources is listed and described, along with any user definable parameters.

For instructions on how to install and use the chart, including how to override and customize the chart’s values, refer to Helm Deployment.

The official Couchbase Helm Chart may only be used with Enterprise Edition products, such as Couchbase Server Enterprise Edition and Sync Gateway Enterprise Edition.

Table 1. Helm Chart Values
Key Type Default Description

admissionCA.cert

string

nil

A base64 encoded PEM format certificate

admissionCA.expiration

int

365

Expiry time of CA in days for generated certs

admissionCA.key

string

nil

A base64 encoded PEM format private key

admissionController.commandArgs

object

{"default-file-system-group":true,"validate-secrets":true,"validate-storage-classes":true}

Set of command-line flags to pass on to the Admission Controller to modify its behavior. Do not change.

admissionController.disableValidatingWebhook

bool

false

Disable the creation of Validation webhook. Setting to 'false' may be helpful when installing into a restricted environments (ie Strict mTLS), since disabling avoids performing resource fetching and validation from the Kubernetes API server.

admissionController.image

object

{"repository":"couchbase/admission-controller","tag":"2.3.0"}

Image specifies repository and tag of the Couchbase Admission container.

admissionController.imagePullPolicy

string

"IfNotPresent"

The policy for pulling images from the repository onto hosts. The imagePullPolicy value defaults to IfNotPresent, which means that images are only pulled if they’re not present on the Kubernetes node. Values allowed are Always, IfNotPresent, and Never.

admissionController.imagePullSecrets

list

[]

ImagePullSecrets is an optional list of references to secrets to use for pulling images

admissionController.name

string

"couchbase-admission-controller"

admissionController.nodeSelector

object

{}

Specify a node selection constraint for couchbase-admission-controller pod assignment. Ref: https://kubernetes.io/docs/user-guide/node-selection/

admissionController.resources

object

{}

Resource Limits and requests for Pod CPU and Memory

admissionController.runAsNonRoot

bool

true

Specify whether to run as a non-root user. Running as non-root ensures least privilege.

admissionController.scope

string

"ClusterRole"

RBAC Scope of the Admission Controller. Must be either 'Role' or 'ClusterRole'. When scope is 'ClusterRole' the admission controller is able to validate resources in all namespaces. 'Role' scope limits validation to a single a namespace.

admissionController.tolerations

list

[]

Tolerations are applied to pods, and allow (but do not require) the pods to schedule onto nodes with matching taints.

admissionController.verboseLogging

bool

false

Determines whether the admission controller should log all of its validation notices within the console. When set to false, only validation errors are logged within the pod’s console.

admissionSecret.cert

string

nil

PEM format certificate (auto-generated) override via --set-file

admissionSecret.key

string

nil

PEM format certificate (auto-generated) override via --set-file

admissionSecret.name

string

nil

Name of the secret (auto-generated)

admissionService.name

string

nil

Name of the service (auto-generated)

admissionService.port

int

443

Port service exposes

admissionService.targetPort

int

8443

backuprestores

object

{}

backups

object

{}

CouchbaseBackups runs a job which preserves data into backups

buckets.default.compressionMode

string

"passive"

CompressionMode defines how Couchbase server handles document compression. When off, documents are stored in memory, and transferred to the client uncompressed. When passive, documents are stored compressed in memory, and transferred to the client compressed when requested. When active, documents are stored compresses in memory and when transferred to the client. This field must be "off", "passive" or "active", defaulting to "passive". Be aware "off" in YAML 1.2 is a boolean, so must be quoted as a string in configuration files.

buckets.default.conflictResolution

string

"seqno"

ConflictResolution defines how XDCR handles concurrent write conflicts. Sequence number based resolution selects the document with the highest sequence number as the most recent. Timestamp based resolution selects the document that was written to most recently as the most recent. This field must be "seqno" (sequence based), or "lww" (timestamp based), defaulting to "seqno".

buckets.default.enableFlush

bool

false

EnableFlush defines whether a client can delete all documents in a bucket. This field defaults to false.

buckets.default.enableIndexReplica

bool

false

EnableIndexReplica defines whether indexes for this bucket are replicated. This field defaults to false.

buckets.default.evictionPolicy

string

"valueOnly"

EvictionPolicy controls how Couchbase handles memory exhaustion. Value only eviction flushes documents to disk but maintains document metadata in memory in order to improve query performance. Full eviction removes all data from memory after the document is flushed to disk. This field must be "valueOnly" or "fullEviction", defaulting to "valueOnly".

buckets.default.ioPriority

string

"low"

IOPriority controls how many threads a bucket has, per pod, to process reads and writes. This field must be "low" or "high", defaulting to "low". Modification of this field will cause a temporary service disruption as threads are restarted.

buckets.default.kind

string

"CouchbaseBucket"

The type of the bucket to create by default. Removed from CRD as only used by Helm.

buckets.default.maxTTL

string

nil

MaxTTL defines how long a document is permitted to exist for, without modification, until it is automatically deleted. This is a default and maximum time-to-live and may be set to a lower value by the client. If the client specifies a higher value, then it is truncated to the maximum durability. Documents are removed by Couchbase, after they have expired, when either accessed, the expiry pager is run, or the bucket is compacted. When set to 0, then documents are not expired by default. This field must be a duration in the range 0-2147483648s, defaulting to 0. More info: https://golang.org/pkg/time/#ParseDuration

buckets.default.memoryQuota

string

"100Mi"

MemoryQuota is a memory limit to the size of a bucket. When this limit is exceeded, documents will be evicted from memory to disk as defined by the eviction policy. The memory quota is defined per Couchbase pod running the data service. This field defaults to, and must be greater than or equal to 100Mi. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#resource-units-in-kubernetes

buckets.default.minimumDurability

string

nil

MiniumumDurability defines how durable a document write is by default, and can be made more durable by the client. This feature enables ACID transactions. When none, Couchbase server will respond when the document is in memory, it will become eventually consistent across the cluster. When majority, Couchbase server will respond when the document is replicated to at least half of the pods running the data service in the cluster. When majorityAndPersistActive, Couchbase server will respond when the document is replicated to at least half of the pods running the data service in the cluster and the document has been persisted to disk on the document master pod. When persistToMajority, Couchbase server will respond when the document is replicated and persisted to disk on at least half of the pods running the data service in the cluster. This field must be either "none", "majority", "majorityAndPersistActive" or "persistToMajority", defaulting to "none".

buckets.default.name

string

nil

Name is the name of the bucket within Couchbase server. By default the Operator will use the metadata.name field to define the bucket name. The metadata.name field only supports a subset of the supported character set. When specified, this field overrides metadata.name. Legal bucket names have a maximum length of 100 characters and may be composed of any character from "a-z", "A-Z", "0-9" and "-_%\.".

buckets.default.replicas

int

1

Replicas defines how many copies of documents Couchbase server maintains. This directly affects how fault tolerant a Couchbase cluster is. With a single replica, the cluster can tolerate one data pod going down and still service requests without data loss. The number of replicas also affect memory use. With a single replica, the effective memory quota for documents is halved, with two replicas it is one third. The number of replicas must be between 0 and 3, defaulting to 1.

buckets.default.scopes

object

{"managed":false,"resources":[],"selector":{"matchExpressions":{"key":null,"operator":null,"values":null},"matchLabels":null}}

Scopes defines whether the Operator manages scopes for the bucket or not, and the set of scopes defined for the bucket.

buckets.default.scopes.managed

bool

false

Managed defines whether scopes are managed for this bucket. This field is false by default, and the Operator will take no actions that will affect scopes and collections in this bucket. The default scope and collection will be present. When set to true, the Operator will manage user defined scopes, and optionally, their collections as defined by the CouchbaseScope, CouchbaseScopeGroup, CouchbaseCollection and CouchbaseCollectionGroup resource documentation. If this field is set to false while the already managed, then the Operator will leave whatever configuration is already present.

buckets.default.scopes.resources

list

[]

Resources is an explicit list of named resources that will be considered for inclusion in this bucket. If a resource reference doesn’t match a resource, then no error conditions are raised due to undefined resource creation ordering and eventual consistency.

buckets.default.scopes.selector

object

{"matchExpressions":{"key":null,"operator":null,"values":null},"matchLabels":null}

Selector allows resources to be implicitly considered for inclusion in this bucket. More info: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.21/#labelselector-v1-meta

buckets.default.scopes.selector.matchExpressions

object

{"key":null,"operator":null,"values":null}

matchExpressions is a list of label selector requirements. The requirements are ANDed.

buckets.default.scopes.selector.matchLabels

string

nil

matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed.

cluster.antiAffinity

bool

false

AntiAffinity forces the Operator to schedule different Couchbase server pods on different Kubernetes nodes. Anti-affinity reduces the likelihood of unrecoverable failure in the event of a node issue. Use of anti-affinity is highly recommended for production clusters.

cluster.autoResourceAllocation

object

{"cpuLimits":"4","cpuRequests":"2","enabled":false,"overheadPercent":25}

AutoResourceAllocation populates pod resource requests based on the services running on that pod. When enabled, this feature will calculate the memory request as the total of service allocations defined in spec.cluster, plus an overhead defined by spec.autoResourceAllocation.overheadPercent.Changing individual allocations for a service will cause a cluster upgrade as allocations are modified in the underlying pods. This field also allows default pod CPU requests and limits to be applied. All resource allocations can be overridden by explicitly configuring them in the spec.servers.resources field.

cluster.autoResourceAllocation.cpuLimits

string

"4"

CPULimits automatically populates the CPU limits across all Couchbase server pods. This field defaults to "4" CPUs. Explicitly specifying the CPU limit for a particular server class will override this value. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#resource-units-in-kubernetes

cluster.autoResourceAllocation.cpuRequests

string

"2"

CPURequests automatically populates the CPU requests across all Couchbase server pods. The default value of "2", is the minimum recommended number of CPUs required to run Couchbase Server. Explicitly specifying the CPU request for a particular server class will override this value. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#resource-units-in-kubernetes

cluster.autoResourceAllocation.enabled

bool

false

Enabled defines whether auto-resource allocation is enabled.

cluster.autoResourceAllocation.overheadPercent

int

25

OverheadPercent defines the amount of memory above that required for individual services on a pod. For Couchbase Server this should be approximately 25%.

cluster.autoscaleStabilizationPeriod

string

nil

AutoscaleStabilizationPeriod defines how long after a rebalance the corresponding HorizontalPodAutoscaler should remain in maintenance mode. During maintenance mode all autoscaling is disabled since every HorizontalPodAutoscaler associated with the cluster becomes inactive. Since certain metrics can be unpredictable when Couchbase is rebalancing or upgrading, setting a stabilization period helps to prevent scaling recommendations from the HorizontalPodAutoscaler for a provided period of time. Values must be a valid Kubernetes duration of 0s or higher: https://golang.org/pkg/time/#ParseDuration A value of 0, puts the cluster in maintenance mode during rebalance but immediately exits this mode once the rebalance has completed. When undefined, the HPA is never put into maintenance mode during rebalance.

cluster.backup

object

{"image":"couchbase/operator-backup:1.2.0","imagePullSecrets":{"name":null},"managed":true,"nodeSelector":null,"objectEndpoint":{"secret":null,"url":null,"useVirtualPath":false},"resources":{"limits":null,"requests":null},"s3Secret":null,"selector":{"matchExpressions":{"key":null,"operator":null,"values":null},"matchLabels":null},"serviceAccountName":"couchbase-backup","tolerations":{"effect":null,"key":null,"operator":null,"tolerationSeconds":null,"value":null},"useIAMRole":false}

Backup defines whether the Operator should manage automated backups, and how to lookup backup resources. Refer to the documentation for supported values https://docs.couchbase.com/operator/current/howto-backup.html#enable-automated-backup

cluster.backup.image

string

"couchbase/operator-backup:1.2.0"

The Backup Image to run on backup pods.

cluster.backup.imagePullSecrets

object

{"name":null}

ImagePullSecrets allow you to use an image from private repositories and non-dockerhub ones.

cluster.backup.imagePullSecrets.name

string

nil

Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names TODO: Add other useful fields. apiVersion, kind, uid?

cluster.backup.managed

bool

true

Managed defines whether backups are managed by us or the clients.

cluster.backup.nodeSelector

string

nil

NodeSelector defines which nodes to constrain the pods that run any backup and restore operations to.

cluster.backup.objectEndpoint

object

{"secret":null,"url":null,"useVirtualPath":false}

ObjectEndpoint contains the configuration for connecting to a custom S3 compliant object store.

cluster.backup.objectEndpoint.secret

string

nil

The name of the secret, in this namespace, that contains the CA certificate for verification of a TLS endpoint (when required, e.g. not signed by a public CA). The secret must have the key with the name "tls.crt"

cluster.backup.objectEndpoint.url

string

nil

The host/address of the custom object endpoint.

cluster.backup.objectEndpoint.useVirtualPath

bool

false

UseVirtualPath will force the AWS SDK to use the new virtual style paths. by default alternative path style URLs which are often required by S3 compatible object stores.

cluster.backup.resources

object

{"limits":null,"requests":null}

Resources is the resource requirements for the backup and restore containers. Will be populated by defaults if not specified.

cluster.backup.resources.limits

string

nil

Limits describes the maximum amount of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/

cluster.backup.resources.requests

string

nil

Requests describes the minimum amount of compute resources required. If Requests is omitted for a container, it defaults to Limits if that is explicitly specified, otherwise to an implementation-defined value. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/

cluster.backup.s3Secret

string

nil

S3Secret contains the region and credentials for operating backups in S3. This field must be popluated when the spec.s3bucket field is specified for a backup or restore resource.

cluster.backup.selector

object

{"matchExpressions":{"key":null,"operator":null,"values":null},"matchLabels":null}

Selector allows CouchbaseBackup and CouchbaseBackupRestore resources to be filtered based on labels.

cluster.backup.selector.matchExpressions

object

{"key":null,"operator":null,"values":null}

matchExpressions is a list of label selector requirements. The requirements are ANDed.

cluster.backup.selector.matchLabels

string

nil

matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed.

cluster.backup.serviceAccountName

string

"couchbase-backup"

The Service Account to run backup (and restore) pods under. Without this backup pods will not be able to update status.

cluster.backup.tolerations

object

{"effect":null,"key":null,"operator":null,"tolerationSeconds":null,"value":null}

Tolerations specifies all backup and restore pod tolerations.

cluster.backup.tolerations.effect

string

nil

Effect indicates the taint effect to match. Empty means match all taint effects. When specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute.

cluster.backup.tolerations.key

string

nil

Key is the taint key that the toleration applies to. Empty means match all taint keys. If the key is empty, operator must be Exists; this combination means to match all values and all keys.

cluster.backup.tolerations.operator

string

nil

Operator represents a key’s relationship to the value. Valid operators are Exists and Equal. Defaults to Equal. Exists is equivalent to wildcard for value, so that a pod can tolerate all taints of a particular category.

cluster.backup.tolerations.tolerationSeconds

string

nil

TolerationSeconds represents the period of time the toleration (which must be of effect NoExecute, otherwise this field is ignored) tolerates the taint. By default, it is not set, which means tolerate the taint forever (do not evict). Zero and negative values will be treated as 0 (evict immediately) by the system.

cluster.backup.tolerations.value

string

nil

Value is the taint value the toleration matches to. If the operator is Exists, the value should be empty, otherwise just a regular string.

cluster.backup.useIAMRole

bool

false

UseIAMRole enables backup to fetch EC2 instance metadata. This allows the AWS SDK to use the EC2’s IAM Role for S3 access. UseIAMRole will ignore credentials in s3Secret.

cluster.buckets

object

{"managed":true,"selector":{"matchExpressions":{"key":null,"operator":null,"values":null},"matchLabels":null},"synchronize":false}

Buckets defines whether the Operator should manage buckets, and how to lookup bucket resources.

cluster.buckets.managed

bool

true

Managed defines whether buckets are managed by the Operator (true), or user managed (false). When Operator managed, all buckets must be defined with either CouchbaseBucket, CouchbaseEphemeralBucket or CouchbaseMemcachedBucket resources. Manual addition of buckets will be reverted by the Operator. When user managed, the Operator will not interrogate buckets at all. This field defaults to false.

cluster.buckets.selector

object

{"matchExpressions":{"key":null,"operator":null,"values":null},"matchLabels":null}

Selector is a label selector used to list buckets in the namespace that are managed by the Operator.

cluster.buckets.selector.matchExpressions

object

{"key":null,"operator":null,"values":null}

matchExpressions is a list of label selector requirements. The requirements are ANDed.

cluster.buckets.selector.matchLabels

string

nil

matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed.

cluster.buckets.synchronize

bool

false

Synchronize allows unmanaged buckets, scopes, and collections to be synchronized as Kubernetes resources by the Operator. This feature is intended for development only and should not be used for production workloads. The synchronization workflow starts with spec.buckets.managed being set to false, the user can manually create buckets, scopes, and collections using the Couchbase UI, or other tooling. When you wish to commit to Kubernetes resources, you must specify a unique label selector in the spec.buckets.selector field, and this field is set to true. The Operator will create Kubernetes resources for you, and upon completion set the cluster’s Synchronized status condition. You may then safely set spec.buckets.managed to true and the Operator will manage these resources as per usual. To update an already managed data topology, you must first set it to unmanaged, make any changes, and delete any old resources, then follow the standard synchronization workflow. The Operator can not, and will not, ever delete, or make modifications to resource specifications that are intended to be user managed, or managed by a life cycle management tool. These actions must be instigated by an end user. For a more complete experience, refer to the documentation for the cao save and cao restore CLI commands.

cluster.cluster

object

{"analyticsServiceMemoryQuota":"1Gi","autoCompaction":{"databaseFragmentationThreshold":{"percent":30,"size":null},"parallelCompaction":false,"timeWindow":{"abortCompactionOutsideWindow":false,"end":null,"start":null},"tombstonePurgeInterval":"72h","viewFragmentationThreshold":{"percent":30,"size":null}},"autoFailoverMaxCount":3,"autoFailoverOnDataDiskIssues":false,"autoFailoverOnDataDiskIssuesTimePeriod":"120s","autoFailoverServerGroup":false,"autoFailoverTimeout":"120s","clusterName":null,"data":{"readerThreads":null,"writerThreads":null},"dataServiceMemoryQuota":"256Mi","eventingServiceMemoryQuota":"256Mi","indexServiceMemoryQuota":"256Mi","indexStorageSetting":"memory_optimized","indexer":{"logLevel":"info","maxRollbackPoints":2,"memorySnapshotInterval":"200ms","stableSnapshotInterval":"5s","storageMode":"memory_optimized","threads":null,"numReplica":0,"redistributeIndexes":false},"query":{"backfillEnabled":true,"temporarySpace":"5Gi","temporarySpaceUnlimited":false},"queryServiceMemoryQuota":null,"searchServiceMemoryQuota":"256Mi"}

ClusterSettings define Couchbase cluster-wide settings such as memory allocation, failover characteristics and index settings.

cluster.cluster.analyticsServiceMemoryQuota

string

"1Gi"

AnalyticsServiceMemQuota is the amount of memory that should be allocated to the analytics service. This value is per-pod, and only applicable to pods belonging to server classes running the analytics service. This field must be a quantity greater than or equal to 1Gi. This field defaults to 1Gi. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#resource-units-in-kubernetes

cluster.cluster.autoCompaction

object

{"databaseFragmentationThreshold":{"percent":30,"size":null},"parallelCompaction":false,"timeWindow":{"abortCompactionOutsideWindow":false,"end":null,"start":null},"tombstonePurgeInterval":"72h","viewFragmentationThreshold":{"percent":30,"size":null}}

AutoCompaction allows the configuration of auto-compaction, including on what conditions disk space is reclaimed and when it is allowed to run.

cluster.cluster.autoCompaction.databaseFragmentationThreshold

object

{"percent":30,"size":null}

DatabaseFragmentationThreshold defines triggers for when database compaction should start.

cluster.cluster.autoCompaction.parallelCompaction

bool

false

ParallelCompaction controls whether database and view compactions can happen in parallel.

cluster.cluster.autoCompaction.timeWindow

object

{"abortCompactionOutsideWindow":false,"end":null,"start":null}

TimeWindow allows restriction of when compaction can occur.

cluster.cluster.autoCompaction.tombstonePurgeInterval

string

"72h"

TombstonePurgeInterval controls how long to wait before purging tombstones. This field must be in the range 1h-1440h, defaulting to 72h. More info: https://golang.org/pkg/time/#ParseDuration

cluster.cluster.autoCompaction.viewFragmentationThreshold

object

{"percent":30,"size":null}

ViewFragmentationThreshold defines triggers for when view compaction should start.

cluster.cluster.autoFailoverMaxCount

int

3

AutoFailoverMaxCount is the maximum number of automatic failovers Couchbase server will allow before not allowing any more. This field must be between 1-3, default 3.

cluster.cluster.autoFailoverOnDataDiskIssues

bool

false

AutoFailoverOnDataDiskIssues defines whether Couchbase server should failover a pod if a disk issue was detected.

cluster.cluster.autoFailoverOnDataDiskIssuesTimePeriod

string

"120s"

AutoFailoverOnDataDiskIssuesTimePeriod defines how long to wait for transient errors before failing over a faulty disk. This field must be in the range 5-3600s, defaulting to 120s. More info: https://golang.org/pkg/time/#ParseDuration

cluster.cluster.autoFailoverServerGroup

bool

false

AutoFailoverServerGroup whether to enable failing over a server group.

cluster.cluster.autoFailoverTimeout

string

"120s"

AutoFailoverTimeout defines how long Couchbase server will wait between a pod being witnessed as down, until when it will failover the pod. Couchbase server will only failover pods if it deems it safe to do so, and not result in data loss. This field must be in the range 5-3600s, defaulting to 120s. More info: https://golang.org/pkg/time/#ParseDuration

cluster.cluster.clusterName

string

nil

ClusterName defines the name of the cluster, as displayed in the Couchbase UI. By default, the cluster name is that specified in the CouchbaseCluster resource’s metadata.

cluster.cluster.data

object

{"readerThreads":null,"writerThreads":null}

Data allows the data service to be configured.

cluster.cluster.data.readerThreads

string

nil

ReaderThreads allows the number of threads used by the data service, per pod, to be altered. This value must be between 4 and 64 threads, and should only be increased where there are sufficient CPU resources allocated for their use. If not specified, this defaults to the default value set by Couchbase Server.

cluster.cluster.data.writerThreads

string

nil

ReaderThreads allows the number of threads used by the data service, per pod, to be altered. This setting is especially relevant when using "durable writes", increasing this field will have a large impact on performance. This value must be between 4 and 64 threads, and should only be increased where there are sufficient CPU resources allocated for their use. If not specified, this defaults to the default value set by Couchbase Server.

cluster.cluster.dataServiceMemoryQuota

string

"256Mi"

DataServiceMemQuota is the amount of memory that should be allocated to the data service. This value is per-pod, and only applicable to pods belonging to server classes running the data service. This field must be a quantity greater than or equal to 256Mi. This field defaults to 256Mi. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#resource-units-in-kubernetes

cluster.cluster.eventingServiceMemoryQuota

string

"256Mi"

EventingServiceMemQuota is the amount of memory that should be allocated to the eventing service. This value is per-pod, and only applicable to pods belonging to server classes running the eventing service. This field must be a quantity greater than or equal to 256Mi. This field defaults to 256Mi. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#resource-units-in-kubernetes

cluster.cluster.indexServiceMemoryQuota

string

"256Mi"

IndexServiceMemQuota is the amount of memory that should be allocated to the index service. This value is per-pod, and only applicable to pods belonging to server classes running the index service. This field must be a quantity greater than or equal to 256Mi. This field defaults to 256Mi. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#resource-units-in-kubernetes

cluster.cluster.indexStorageSetting

string

"memory_optimized"

DEPRECATED - by indexer. The index storage mode to use for secondary indexing. This field must be one of "memory_optimized" or "plasma", defaulting to "memory_optimized". This field is immutable and cannot be changed unless there are no server classes running the index service in the cluster.

cluster.cluster.indexer

object

{"logLevel":"info","maxRollbackPoints":2,"memorySnapshotInterval":"200ms","stableSnapshotInterval":"5s","storageMode":"memory_optimized","threads":null,"numReplica":0,"redistributeIndexes":false}

Indexer allows the indexer to be configured.

cluster.cluster.indexer.logLevel

string

"info"

LogLevel controls the verbosity of indexer logs. This field must be one of "silent", "fatal", "error", "warn", "info", "verbose", "timing", "debug" or "trace", defaulting to "info".

cluster.cluster.indexer.maxRollbackPoints

int

2

MaxRollbackPoints controls the number of checkpoints that can be rolled back to. The default is 2, with a minimum of 1.

cluster.cluster.indexer.memorySnapshotInterval

string

"200ms"

MemorySnapshotInterval controls when memory indexes should be snapshotted. This defaults to 200ms, and must be greater than or equal to 1ms.

cluster.cluster.indexer.stableSnapshotInterval

string

"5s"

StableSnapshotInterval controls when disk indexes should be snapshotted. This defaults to 5s, and must be greater than or equal to 1ms.

cluster.cluster.indexer.storageMode

string

"memory_optimized"

StorageMode controls the underlying storage engine for indexes. Once set it can only be modified if there are no nodes in the cluster running the index service. The field must be one of "memory_optimized" or "plasma", defaulting to "memory_optimized".

cluster.cluster.indexer.threads

string

nil

Threads controls the number of processor threads to use for indexing. A value of 0 means 1 per CPU. This attribute must be greater than or equal to 0, defaulting to 0.

cluster.cluster.indexer.numReplica

int

0

NumberOfReplica specifies number of secondary index replicas to be created by the Index Service whenever CREATE INDEX is invoked. The default is 0, with a minimum of 0.

cluster.cluster.indexer.redistributeIndexes

bool

false

RedistributeIndexes when true, Couchbase Server redistributes indexes when rebalance occurs, in order to optimize performance. If false (the default), such redistribution does not occur.

cluster.cluster.query

object

{"backfillEnabled":true,"temporarySpace":"5Gi","temporarySpaceUnlimited":false}

Query allows the query service to be configured.

cluster.cluster.query.backfillEnabled

bool

true

BackfillEnabled allows the query service to backfill.

cluster.cluster.query.temporarySpace

string

"5Gi"

TemporarySpace allows the temporary storage used by the query service backfill, per-pod, to be modified. This field requires backfillEnabled to be set to true in order to have any effect. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#resource-units-in-kubernetes

cluster.cluster.query.temporarySpaceUnlimited

bool

false

TemporarySpaceUnlimited allows the temporary storage used by the query service backfill, per-pod, to be unconstrained. This field requires backfillEnabled to be set to true in order to have any effect. This field overrides temporarySpace.

cluster.cluster.queryServiceMemoryQuota

string

nil

QueryServiceMemQuota is a dummy field. By default, Couchbase server provides no memory resource constraints for the query service, so this has no effect on Couchbase server. It is, however, used when the spec.autoResourceAllocation feature is enabled, and is used to define the amount of memory reserved by the query service for use with Kubernetes resource scheduling. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#resource-units-in-kubernetes

cluster.cluster.searchServiceMemoryQuota

string

"256Mi"

SearchServiceMemQuota is the amount of memory that should be allocated to the search service. This value is per-pod, and only applicable to pods belonging to server classes running the search service. This field must be a quantity greater than or equal to 256Mi. This field defaults to 256Mi. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#resource-units-in-kubernetes

cluster.enableOnlineVolumeExpansion

bool

false

EnableOnlineVolumeExpansion enables online expansion of Persistent Volumes. You can only expand a PVC if its storage class’s "allowVolumeExpansion" field is set to true. Additionally, Kubernetes feature "ExpandInUsePersistentVolumes" must be enabled in order to expand the volumes which are actively bound to Pods. Volumes can only be expanded and not reduced to a smaller size. See: https://kubernetes.io/docs/concepts/storage/persistent-volumes/#resizing-an- in-use-persistentvolumeclaim If "EnableOnlineVolumeExpansion" is enabled for use within an environment that does not actually support online volume and file system expansion then the cluster will fallback to rolling upgrade procedure to create a new set of Pods for use with resized Volumes. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes/#expanding-persistent-volumes-claims

cluster.enablePreviewScaling

bool

false

DEPRECATED - This option only exists for backwards compatibility and no longer restricts autoscaling to ephemeral services. EnablePreviewScaling enables autoscaling for stateful services and buckets.

cluster.hibernate

bool

false

Hibernate is whether to hibernate the cluster.

cluster.hibernationStrategy

string

nil

HibernationStrategy defines how to hibernate the cluster. When Immediate the Operator will immediately delete all pods and take no further action until the hibernate field is set to false.

cluster.image

string

"couchbase/server:7.0.2"

Image is the container image name that will be used to launch Couchbase server instances. Updating this field will cause an automatic upgrade of the cluster.

cluster.logging

object

{"audit":{"disabledEvents":null,"disabledUsers":null,"enabled":false,"garbageCollection":{"sidecar":{"age":"1h","enabled":false,"image":"busybox:1.33.1","interval":"20m","resources":{"limits":null,"requests":null}}},"rotation":{"interval":"15m","size":"20Mi"}},"logRetentionCount":null,"logRetentionTime":null,"server":{"configurationName":"fluent-bit-config","enabled":false,"manageConfiguration":true,"sidecar":{"configurationMountPath":"/fluent-bit/config/","image":"couchbase/fluent-bit:1.1.1","resources":{"limits":null,"requests":null}}}}

Logging defines Operator logging options.

cluster.logging.audit

object

{"disabledEvents":null,"disabledUsers":null,"enabled":false,"garbageCollection":{"sidecar":{"age":"1h","enabled":false,"image":"busybox:1.33.1","interval":"20m","resources":{"limits":null,"requests":null}}},"rotation":{"interval":"15m","size":"20Mi"}}

Used to manage the audit configuration directly

cluster.logging.audit.disabledEvents

string

nil

The list of event ids to disable for auditing purposes. This is passed to the REST API with no verification by the operator. Refer to the documentation for details: https://docs.couchbase.com/server/current/audit-event-reference/audit-event-reference.html

cluster.logging.audit.disabledUsers

string

nil

The list of users to ignore for auditing purposes. This is passed to the REST API with minimal validation it meets an acceptable regex pattern. Refer to the documentation for full details on how to configure this: https://docs.couchbase.com/server/current/manage/manage-security/manage-auditing.html#ignoring-events-by-user

cluster.logging.audit.enabled

bool

false

Enabled is a boolean that enables the audit capabilities.

cluster.logging.audit.garbageCollection

object

{"sidecar":{"age":"1h","enabled":false,"image":"busybox:1.33.1","interval":"20m","resources":{"limits":null,"requests":null}}}

Handle all optional garbage collection (GC) configuration for the audit functionality. This is not part of the audit REST API, it is intended to handle GC automatically for the audit logs. By default the Couchbase Server rotates the audit logs but does not clean up the rotated logs. This is left as an operation for the cluster administrator to manage, the operator allows for us to automate this: https://docs.couchbase.com/server/current/manage/manage-security/manage-auditing.html

cluster.logging.audit.rotation

object

{"interval":"15m","size":"20Mi"}

The interval to optionally rotate the audit log. This is passed to the REST API, see here for details: https://docs.couchbase.com/server/current/manage/manage-security/manage-auditing.html

cluster.logging.logRetentionCount

string

nil

LogRetentionCount gives the number of persistent log PVCs to keep.

cluster.logging.logRetentionTime

string

nil

LogRetentionTime gives the time to keep persistent log PVCs alive for.

cluster.logging.server

object

{"configurationName":"fluent-bit-config","enabled":false,"manageConfiguration":true,"sidecar":{"configurationMountPath":"/fluent-bit/config/","image":"couchbase/fluent-bit:1.1.1","resources":{"limits":null,"requests":null}}}

Specification of all logging configuration required to manage the sidecar containers in each pod.

cluster.logging.server.configurationName

string

"fluent-bit-config"

ConfigurationName is the name of the Secret to use holding the logging configuration in the namespace. A Secret is used to ensure we can safely store credentials but this can be populated from plaintext if acceptable too. If it does not exist then one will be created with defaults in the namespace so it can be easily updated whilst running. Note that if running multiple clusters in the same kubernetes namespace then you should use a separate Secret for each, otherwise the first cluster will take ownership (if created) and the Secret will be cleaned up when that cluster is removed. If running clusters in separate namespaces then they will be separate Secrets anyway.

cluster.logging.server.enabled

bool

false

Enabled is a boolean that enables the logging sidecar container.

cluster.logging.server.manageConfiguration

bool

true

A boolean which indicates whether the operator should manage the configuration or not. If omitted then this defaults to true which means the operator will attempt to reconcile it to default values. To use a custom configuration make sure to set this to false. Note that the ownership of any Secret is not changed so if a Secret is created externally it can be updated by the operator but it’s ownership stays the same so it will be cleaned up when it’s owner is.

cluster.logging.server.sidecar

object

{"configurationMountPath":"/fluent-bit/config/","image":"couchbase/fluent-bit:1.1.1","resources":{"limits":null,"requests":null}}

Any specific logging sidecar container configuration.

cluster.monitoring

object

{}

Monitoring defines any Operator managed integration into 3rd party monitoring infrastructure.

cluster.name

string

nil

Name of the cluster, defaults to name of chart release

cluster.networking

object

{"addressFamily":null,"adminConsoleServiceTemplate":{"metadata":{"annotations":null,"labels":null},"spec":{"clusterIP":null,"clusterIPs":null,"externalIPs":null,"externalName":null,"externalTrafficPolicy":null,"healthCheckNodePort":null,"internalTrafficPolicy":null,"ipFamilies":null,"ipFamilyPolicy":null,"loadBalancerClass":null,"loadBalancerIP":null,"loadBalancerSourceRanges":null,"sessionAffinity":null,"sessionAffinityConfig":{"clientIP":{"timeoutSeconds":null}},"type":"NodePort"}},"adminConsoleServices":["data"],"disableUIOverHTTP":false,"disableUIOverHTTPS":false,"dns":{"domain":null},"exposeAdminConsole":true,"exposedFeatureServiceTemplate":{"metadata":{"annotations":null,"labels":null},"spec":{"clusterIP":null,"clusterIPs":null,"externalIPs":null,"externalName":null,"externalTrafficPolicy":null,"healthCheckNodePort":null,"internalTrafficPolicy":null,"ipFamilies":null,"ipFamilyPolicy":null,"loadBalancerClass":null,"loadBalancerIP":null,"loadBalancerSourceRanges":null,"sessionAffinity":null,"sessionAffinityConfig":{"clientIP":{"timeoutSeconds":null}},"type":"NodePort"}},"exposedFeatureTrafficPolicy":null,"exposedFeatures":["client","xdcr"],"loadBalancerSourceRanges":null,"networkPlatform":null,"serviceAnnotations":null,"waitForAddressReachable":"10m","waitForAddressReachableDelay":"2m"}

Networking defines Couchbase cluster networking options such as network topology, TLS and DDNS settings.

cluster.networking.addressFamily

string

nil

AddressFamily allows the manual selection of the address family to use. When this field is not set, Couchbase server will default to using IPv4 for internal communication and also support IPv6 on dual stack systems. Setting this field to either IPv4 or IPv6 will force Couchbase to use the selected protocol for internal communication, and also disable all other protocols to provide added security and simplicty when defining firewall rules. Disabling of address families is only supported in Couchbase Server 7.0.2+.

cluster.networking.adminConsoleServiceTemplate

object

{"metadata":{"annotations":null,"labels":null},"spec":{"clusterIP":null,"clusterIPs":null,"externalIPs":null,"externalName":null,"externalTrafficPolicy":null,"healthCheckNodePort":null,"internalTrafficPolicy":null,"ipFamilies":null,"ipFamilyPolicy":null,"loadBalancerClass":null,"loadBalancerIP":null,"loadBalancerSourceRanges":null,"sessionAffinity":null,"sessionAffinityConfig":{"clientIP":{"timeoutSeconds":null}},"type":"NodePort"}}

AdminConsoleServiceTemplate provides a template used by the Operator to create and manage the admin console service. This allows services to be annotated, the service type defined and any other options that Kubernetes provides. When using a LoadBalancer service type, TLS and dynamic DNS must also be enabled. The Operator reserves the right to modify or replace any field. More info: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.21/#service-v1-core

cluster.networking.adminConsoleServiceTemplate.metadata

object

{"annotations":null,"labels":null}

Standard objects metadata. This is a curated version for use with Couchbase resource templates.

cluster.networking.adminConsoleServiceTemplate.spec

object

{"clusterIP":null,"clusterIPs":null,"externalIPs":null,"externalName":null,"externalTrafficPolicy":null,"healthCheckNodePort":null,"internalTrafficPolicy":null,"ipFamilies":null,"ipFamilyPolicy":null,"loadBalancerClass":null,"loadBalancerIP":null,"loadBalancerSourceRanges":null,"sessionAffinity":null,"sessionAffinityConfig":{"clientIP":{"timeoutSeconds":null}},"type":"NodePort"}

ServiceSpec describes the attributes that a user creates on a service.

cluster.networking.adminConsoleServices

list

["data"]

DEPRECATED - not required by Couchbase Server 6.5.0 onward. AdminConsoleServices is a selector to choose specific services to expose via the admin console. This field may contain any of "data", "index", "query", "search", "eventing" and "analytics". Each service may only be included once.

cluster.networking.disableUIOverHTTP

bool

false

DisableUIOverHTTP is used to explicitly enable and disable UI access over the HTTP protocol. If not specified, this field defaults to false.

cluster.networking.disableUIOverHTTPS

bool

false

DisableUIOverHTTPS is used to explicitly enable and disable UI access over the HTTPS protocol. If not specified, this field defaults to false.

cluster.networking.dns

object

{"domain":null}

DNS defines information required for Dynamic DNS support.

cluster.networking.dns.domain

string

nil

Domain is the domain to create pods in. When populated the Operator will annotate the admin console and per-pod services with the key "external-dns.alpha.kubernetes.io/hostname". These annotations can be used directly by a Kubernetes External-DNS controller to replicate load balancer service IP addresses into a public DNS server.

cluster.networking.exposeAdminConsole

bool

true

ExposeAdminConsole creates a service referencing the admin console. The service is configured by the adminConsoleServiceTemplate field.

cluster.networking.exposedFeatureServiceTemplate

object

{"metadata":{"annotations":null,"labels":null},"spec":{"clusterIP":null,"clusterIPs":null,"externalIPs":null,"externalName":null,"externalTrafficPolicy":null,"healthCheckNodePort":null,"internalTrafficPolicy":null,"ipFamilies":null,"ipFamilyPolicy":null,"loadBalancerClass":null,"loadBalancerIP":null,"loadBalancerSourceRanges":null,"sessionAffinity":null,"sessionAffinityConfig":{"clientIP":{"timeoutSeconds":null}},"type":"NodePort"}}

ExposedFeatureServiceTemplate provides a template used by the Operator to create and manage per-pod services. This allows services to be annotated, the service type defined and any other options that Kubernetes provides. When using a LoadBalancer service type, TLS and dynamic DNS must also be enabled. The Operator reserves the right to modify or replace any field. More info: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.21/#service-v1-core

cluster.networking.exposedFeatureServiceTemplate.metadata

object

{"annotations":null,"labels":null}

Standard objects metadata. This is a curated version for use with Couchbase resource templates.

cluster.networking.exposedFeatureServiceTemplate.spec

object

{"clusterIP":null,"clusterIPs":null,"externalIPs":null,"externalName":null,"externalTrafficPolicy":null,"healthCheckNodePort":null,"internalTrafficPolicy":null,"ipFamilies":null,"ipFamilyPolicy":null,"loadBalancerClass":null,"loadBalancerIP":null,"loadBalancerSourceRanges":null,"sessionAffinity":null,"sessionAffinityConfig":{"clientIP":{"timeoutSeconds":null}},"type":"NodePort"}

ServiceSpec describes the attributes that a user creates on a service.

cluster.networking.exposedFeatureTrafficPolicy

string

nil

DEPRECATED - by exposedFeatureServiceTemplate. ExposedFeatureTrafficPolicy defines how packets should be routed from a load balancer service to a Couchbase pod. When local, traffic is routed directly to the pod. When cluster, traffic is routed to any node, then forwarded on. While cluster routing may be slower, there are some situations where it is required for connectivity. This field must be either "Cluster" or "Local", defaulting to "Local",

cluster.networking.exposedFeatures

list

["client","xdcr"]

ExposedFeatures is a list of Couchbase features to expose when using a networking model that exposes the Couchbase cluster externally to Kubernetes. This field also triggers the creation of per-pod services used by clients to connect to the Couchbase cluster. When admin, only the administrator port is exposed, allowing remote administration. When xdcr, only the services required for remote replication are exposed. The xdcr feature is only required when the cluster is the destination of an XDCR replication. When client, all services are exposed as required for client SDK operation. This field may contain any of "admin", "xdcr" and "client". Each feature may only be included once.

cluster.networking.loadBalancerSourceRanges

string

nil

DEPRECATED - by adminConsoleServiceTemplate and exposedFeatureServiceTemplate. LoadBalancerSourceRanges applies only when an exposed service is of type LoadBalancer and limits the source IP ranges that are allowed to use the service. Items must use IPv4 class-less interdomain routing (CIDR) notation e.g. 10.0.0.0/16.

cluster.networking.networkPlatform

string

nil

NetworkPlatform is used to enable support for various networking technologies. This field must be one of "Istio".

cluster.networking.serviceAnnotations

string

nil

DEPRECATED - by adminConsoleServiceTemplate and exposedFeatureServiceTemplate. ServiceAnnotations allows services to be annotated with custom labels. Operator annotations are merged on top of these so have precedence as they are required for correct operation.

cluster.networking.waitForAddressReachable

string

"10m"

WaitForAddressReachable is used to set the timeout between when polling of external addresses is started, and when it is deemed a failure. Polling of DNS name availability inherently dangerous due to negative caching, so prefer the use of an initial waitForAddressReachableDelay to allow propagation.

cluster.networking.waitForAddressReachableDelay

string

"2m"

WaitForAddressReachableDelay is used to defer operator checks that ensure external addresses are reachable before new nodes are balanced in to the cluster. This prevents negative DNS caching while waiting for external-DDNS controllers to propagate addresses.

cluster.paused

bool

false

Paused is to pause the control of the operator for the Couchbase cluster. This does not pause the cluster itself, instead stopping the operator from taking any action.

cluster.platform

string

nil

Platform gives a hint as to what platform we are running on and how to configure services. This field must be one of "aws", "gke" or "azure".

cluster.recoveryPolicy

string

nil

RecoveryPolicy controls how aggressive the Operator is when recovering cluster topology. When PrioritizeDataIntegrity, the Operator will delegate failover exclusively to Couchbase server, relying on it to only allow recovery when safe to do so. When PrioritizeUptime, the Operator will wait for a period after the expected auto-failover of the cluster, before forcefully failing-over the pods. This may cause data loss, and is only expected to be used on clusters with ephemeral data, where the loss of the pod means that the data is known to be unrecoverable. This field must be either "PrioritizeDataIntegrity" or "PrioritizeUptime", defaulting to "PrioritizeDataIntegrity".

cluster.rollingUpgrade

object

{"maxUpgradable":null,"maxUpgradablePercent":null}

When spec.upgradeStrategy is set to RollingUpgrade it will, by default, upgrade one pod at a time. If this field is specified then that number can be increased.

cluster.rollingUpgrade.maxUpgradable

string

nil

MaxUpgradable allows the number of pods affected by an upgrade at any one time to be increased. By default a rolling upgrade will upgrade one pod at a time. This field allows that limit to be removed. This field must be greater than zero. The smallest of maxUpgradable and maxUpgradablePercent takes precedence if both are defined.

cluster.rollingUpgrade.maxUpgradablePercent

string

nil

MaxUpgradablePercent allows the number of pods affected by an upgrade at any one time to be increased. By default a rolling upgrade will upgrade one pod at a time. This field allows that limit to be removed. This field must be an integer percentage, e.g. "10%", in the range 1% to 100%. Percentages are relative to the total cluster size, and rounded down to the nearest whole number, with a minimum of 1. For example, a 10 pod cluster, and 25% allowed to upgrade, would yield 2.5 pods per iteration, rounded down to 2. The smallest of maxUpgradable and maxUpgradablePercent takes precedence if both are defined.

cluster.security

object

{"adminSecret":"","password":"","rbac":{"managed":true,"selector":{"matchExpressions":{"key":null,"operator":null,"values":null},"matchLabels":null}},"username":"Administrator"}

Security defines Couchbase cluster security options such as the administrator account username and password, and user RBAC settings.

cluster.security.adminSecret

string

""

AdminSecret is the name of a Kubernetes secret to use for administrator authentication. The admin secret must contain the keys "username" and "password". The password data must be at least 6 characters in length, and not contain the any of the characters ()<>,;:\"/[]?={}.

cluster.security.password

string

""

Cluster administrator pasword, auto-generated when empty

cluster.security.rbac

object

{"managed":true,"selector":{"matchExpressions":{"key":null,"operator":null,"values":null},"matchLabels":null}}

Couchbase RBAC Users

cluster.security.rbac.managed

bool

true

Managed defines whether RBAC is managed by us or the clients.

cluster.security.rbac.selector

object

{"matchExpressions":{"key":null,"operator":null,"values":null},"matchLabels":null}

Selector is a label selector used to list RBAC resources in the namespace that are managed by the Operator.

cluster.security.username

string

"Administrator"

Cluster administrator username

cluster.securityContext

object

{"fsGroup":1000,"fsGroupChangePolicy":null,"runAsGroup":null,"runAsNonRoot":true,"runAsUser":1000,"seLinuxOptions":{"level":null,"role":null,"type":null,"user":null},"seccompProfile":{"localhostProfile":null,"type":null},"supplementalGroups":null,"sysctls":[],"windowsOptions":{}}

SecurityContext allows the configuration of the security context for all Couchbase server pods. When using persistent volumes you may need to set the fsGroup field in order to write to the volume. For non-root clusters you must also set runAsUser to 1000, corresponding to the Couchbase user in official container images. More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/

cluster.securityContext.fsGroup

int

1000

A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR’d with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows.

cluster.securityContext.fsGroupChangePolicy

string

nil

fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows.

cluster.securityContext.runAsGroup

string

nil

The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows.

cluster.securityContext.runAsNonRoot

bool

true

Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.

cluster.securityContext.runAsUser

int

1000

The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows.

cluster.securityContext.seLinuxOptions

object

{"level":null,"role":null,"type":null,"user":null}

The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows.

cluster.securityContext.seLinuxOptions.level

string

nil

Level is SELinux level label that applies to the container.

cluster.securityContext.seLinuxOptions.role

string

nil

Role is a SELinux role label that applies to the container.

cluster.securityContext.seLinuxOptions.type

string

nil

Type is a SELinux type label that applies to the container.

cluster.securityContext.seLinuxOptions.user

string

nil

User is a SELinux user label that applies to the container.

cluster.securityContext.seccompProfile

object

{"localhostProfile":null,"type":null}

The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows.

cluster.securityContext.seccompProfile.localhostProfile

string

nil

localhostProfile indicates a profile defined in a file on the node should be used. The profile must be preconfigured on the node to work. Must be a descending path, relative to the kubelet’s configured seccomp profile location. Must only be set if type is "Localhost".

cluster.securityContext.seccompProfile.type

string

nil

type indicates which kind of seccomp profile will be applied. Valid options are: Localhost - a profile defined in a file on the node should be used. RuntimeDefault - the container runtime default profile should be used. Unconfined - no profile should be applied.

cluster.securityContext.supplementalGroups

string

nil

A list of groups applied to the first process run in each container, in addition to the container’s primary GID. If unspecified, no groups will be added to any container. Note that this field cannot be set when spec.os.name is windows.

cluster.securityContext.sysctls

list

[]

Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows.

cluster.securityContext.windowsOptions

object

{}

The Windows specific settings applied to all containers. If unspecified, the options within a container’s SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux.

cluster.serverGroups

string

nil

ServerGroups define the set of availability zones you want to distribute pods over, and construct Couchbase server groups for. By default, most cloud providers will label nodes with the key "topology.kubernetes.io/zone", the values associated with that key are used here to provide explicit scheduling by the Operator. You may manually label nodes using the "topology.kubernetes.io/zone" key, to provide failure-domain aware scheduling when none is provided for you. Global server groups are applied to all server classes, and may be overridden on a per-server class basis to give more control over scheduling and server groups.

cluster.servers

object

{"default":{"autoscaleEnabled":false,"env":[],"envFrom":[],"pod":{"spec":{}},"services":["data","index","query","search","analytics","eventing"],"size":3}}

Servers defines server classes for the Operator to provision and manage. A server class defines what services are running and how many members make up that class. Specifying multiple server classes allows the Operator to provision clusters with Multi-Dimensional Scaling (MDS). At least one server class must be defined, and at least one server class must be running the data service.

cluster.servers.default

object

{"autoscaleEnabled":false,"env":[],"envFrom":[],"pod":{"spec":{}},"services":["data","index","query","search","analytics","eventing"],"size":3}

Name for the server configuration. It must be unique.

cluster.servers.default.autoscaleEnabled

bool

false

AutoscaledEnabled defines whether the autoscaling feature is enabled for this class. When true, the Operator will create a CouchbaseAutoscaler resource for this server class. The CouchbaseAutoscaler implements the Kubernetes scale API and can be controlled by the Kubernetes horizontal pod autoscaler (HPA).

cluster.servers.default.env

list

[]

Env allows the setting of environment variables in the Couchbase server container.

cluster.servers.default.envFrom

list

[]

EnvFrom allows the setting of environment variables in the Couchbase server container.

cluster.servers.default.pod

object

{"spec":{}}

Pod defines a template used to create pod for each Couchbase server instance. Modifying pod metadata such as labels and annotations will update the pod in-place. Any other modification will result in a cluster upgrade in order to fulfill the request. The Operator reserves the right to modify or replace any field. More info: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.21/#pod-v1-core

cluster.servers.default.services

list

["data","index","query","search","analytics","eventing"]

Services is the set of Couchbase services to run on this server class. At least one class must contain the data service. The field may contain any of "data", "index", "query", "search", "eventing" or "analytics". Each service may only be specified once.

cluster.servers.default.size

int

3

Size is the expected requested of the server class. This field must be greater than or equal to 1.

cluster.softwareUpdateNotifications

bool

false

SoftwareUpdateNotifications enables software update notifications in the UI. When enabled, the UI will alert when a Couchbase server upgrade is available.

cluster.upgradeStrategy

string

nil

UpgradeStrategy controls how aggressive the Operator is when performing a cluster upgrade. When a rolling upgrade is requested, pods are upgraded one at a time. This strategy is slower, however less disruptive. When an immediate upgrade strategy is requested, all pods are upgraded at the same time. This strategy is faster, but more disruptive. This field must be either "RollingUpgrade" or "ImmediateUpgrade", defaulting to "RollingUpgrade".

cluster.volumeClaimTemplates

object

{"metadata":{"annotations":null,"labels":null,"name":null},"spec":{"accessModes":null,"dataSourceRef":{"apiGroup":null,"kind":null,"name":null},"resources":{"limits":null,"requests":null},"selector":{"matchExpressions":{"key":null,"operator":null,"values":null},"matchLabels":null},"storageClassName":null,"volumeMode":null,"volumeName":null}}

VolumeClaimTemplates define the desired characteristics of a volume that can be requested/claimed by a pod, for example the storage class to use and the volume size. Volume claim templates are referred to by name by server class volume mount configuration.

cluster.volumeClaimTemplates.metadata

object

{"annotations":null,"labels":null,"name":null}

Standard objects metadata. This is a curated version for use with Couchbase resource templates.

cluster.volumeClaimTemplates.metadata.annotations

string

nil

Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: http://kubernetes.io/docs/user-guide/annotations

cluster.volumeClaimTemplates.metadata.labels

string

nil

Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: http://kubernetes.io/docs/user-guide/labels

cluster.volumeClaimTemplates.metadata.name

string

nil

Name must be unique within a namespace. Is required when creating resources, although some resources may allow a client to request the generation of an appropriate name automatically. Name is primarily intended for creation idempotence and configuration definition. Cannot be updated. More info: http://kubernetes.io/docs/user-guide/identifiers#names

cluster.volumeClaimTemplates.spec

object

{"accessModes":null,"dataSourceRef":{"apiGroup":null,"kind":null,"name":null},"resources":{"limits":null,"requests":null},"selector":{"matchExpressions":{"key":null,"operator":null,"values":null},"matchLabels":null},"storageClassName":null,"volumeMode":null,"volumeName":null}

PersistentVolumeClaimSpec describes the common attributes of storage devices and allows a Source for provider-specific attributes

cluster.volumeClaimTemplates.spec.accessModes

string

nil

AccessModes contains the desired access modes the volume should have. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes-1

cluster.volumeClaimTemplates.spec.dataSourceRef

object

{"apiGroup":null,"kind":null,"name":null}

Specifies the object from which to populate the volume with data, if a non-empty volume is desired. This may be any local object from a non- empty API group (non core object) or a PersistentVolumeClaim object. When this field is specified, volume binding will only succeed if the type of the specified object matches some installed volume populator or dynamic provisioner. This field will replace the functionality of the DataSource field and as such if both fields are non-empty, they must have the same value. For backwards compatibility, both fields (DataSource and DataSourceRef) will be set to the same value automatically if one of them is empty and the other is non-empty. There are two important differences between DataSource and DataSourceRef: * While DataSource only allows two specific types of objects, DataSourceRef allows any non-core object, as well as PersistentVolumeClaim objects. * While DataSource ignores disallowed values (dropping them), DataSourceRef preserves all values, and generates an error if a disallowed value is specified. (Alpha) Using this field requires the AnyVolumeDataSource feature gate to be enabled.

cluster.volumeClaimTemplates.spec.resources

object

{"limits":null,"requests":null}

Resources represents the minimum resources the volume should have. If RecoverVolumeExpansionFailure feature is enabled users are allowed to specify resource requirements that are lower than previous value but must still be higher than capacity recorded in the status field of the claim. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#resources

cluster.volumeClaimTemplates.spec.selector

object

{"matchExpressions":{"key":null,"operator":null,"values":null},"matchLabels":null}

A label query over volumes to consider for binding.

cluster.volumeClaimTemplates.spec.storageClassName

string

nil

Name of the StorageClass required by the claim. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#class-1

cluster.volumeClaimTemplates.spec.volumeMode

string

nil

volumeMode defines what type of volume is required by the claim. Value of Filesystem is implied when not included in claim spec.

cluster.volumeClaimTemplates.spec.volumeName

string

nil

VolumeName is the binding reference to the PersistentVolume backing this claim.

cluster.xdcr

object

{"managed":false,"remoteClusters":{"authenticationSecret":null,"hostname":null,"name":null,"replications":{"selector":{"matchExpressions":{"key":null,"operator":null,"values":null},"matchLabels":null}},"tls":{"secret":null},"uuid":null}}

XDCR defines whether the Operator should manage XDCR, remote clusters and how to lookup replication resources.

cluster.xdcr.managed

bool

false

Managed defines whether XDCR is managed by the operator or not.

cluster.xdcr.remoteClusters

object

{"authenticationSecret":null,"hostname":null,"name":null,"replications":{"selector":{"matchExpressions":{"key":null,"operator":null,"values":null},"matchLabels":null}},"tls":{"secret":null},"uuid":null}

RemoteClusters is a set of named remote clusters to establish replications to.

cluster.xdcr.remoteClusters.authenticationSecret

string

nil

AuthenticationSecret is a secret used to authenticate when establishing a remote connection. It is only required when not using mTLS. The secret must contain a username (secret key "username") and password (secret key "password").

cluster.xdcr.remoteClusters.hostname

string

nil

Hostname is the connection string to use to connect the remote cluster.

cluster.xdcr.remoteClusters.name

string

nil

Name of the remote cluster.

cluster.xdcr.remoteClusters.replications

object

{"selector":{"matchExpressions":{"key":null,"operator":null,"values":null},"matchLabels":null}}

Replications are replication streams from this cluster to the remote one. This field defines how to look up CouchbaseReplication resources. By default any CouchbaseReplication resources in the namespace will be considered.

cluster.xdcr.remoteClusters.tls

object

{"secret":null}

TLS if specified references a resource containing the necessary certificate data for an encrypted connection.

cluster.xdcr.remoteClusters.uuid

string

nil

UUID of the remote cluster. The UUID of a CouchbaseCluster resource is advertised in the status.clusterId field of the resource.

collectiongroups

object

{}

Uncomment to create a "couchbasecollectiongroups" resource Defines a group of collections. A collection is a data container, defined on Couchbase Server, within a bucket whose type is either Couchbase or Ephemeral. See https://docs.couchbase.com/operator/current/resource/couchbasecollectiongroup.html

collections

object

{}

Uncomment to create a "couchbasecollections" resource A collection is a data container, defined on Couchbase Server, within a bucket whose type is either Couchbase or Ephemeral. See https://docs.couchbase.com/operator/current/resource/couchbasecollection.html

coredns

object

{"searches":["default.svc.cluster.local","svc.cluster.local","cluster.local"],"service":null}

Coredns service configuration to be applied to pods for cross-cluster deployments

coredns.searches

list

["default.svc.cluster.local","svc.cluster.local","cluster.local"]

Search list for host-name lookup

coredns.service

string

nil

Name of Kubernetes service which exposes DNS endpoints

couchbaseOperator.commandArgs

object

{"pod-create-timeout":"10m"}

Set of command-line flags to pass on to the Operator to modify its behavior. see: https://docs.couchbase.com/operator/2.0/reference-operator-configuration.html#command-line-arguments

couchbaseOperator.commandArgs.pod-create-timeout

string

"10m"

Pod creation timeout. The Operator allows the timeout of pod creation to be manually configured. It is primarily intended for use on cloud platforms where the deployment of multiple volumes and pulling of a Couchbase Server container image may take a longer time than the default timeout period.

couchbaseOperator.image

object

{"repository":"couchbase/operator","tag":"2.3.0"}

Image specifies repository and tag of the Couchbase Operator container.

couchbaseOperator.imagePullPolicy

string

"IfNotPresent"

The policy for pulling images from the repository onto hosts. The imagePullPolicy value defaults to IfNotPresent, which means that images are only pulled if they’re not present on the Kubernetes node. Values allowed are Always, IfNotPresent, and Never.

couchbaseOperator.imagePullSecrets

list

[]

ImagePullSecrets is an optional list of references to secrets to use for pulling images.

couchbaseOperator.name

string

"couchbase-operator"

Name of the couchbase operator Deployment

couchbaseOperator.nodeSelector

object

{}

Specify a node selection constraint for couchbase-admission-operator pod assignment. — Ref: https://kubernetes.io/docs/user-guide/node-selection/

couchbaseOperator.resources

object

{}

Resource Limits and requests for Pod CPU and Memory

couchbaseOperator.scope

string

"Role"

RBAC Scope of the Operator. Must be either 'Role' or 'ClusterRole'

couchbaseOperator.tolerations

list

[]

Tolerations are applied to pods, and allow (but do not require) the pods to schedule onto nodes with matching taints.

install.admissionController

bool

true

Install the admission controller

install.couchbaseCluster

bool

true

Install couchbase cluster

install.couchbaseOperator

bool

true

Install the couchbase operator

install.syncGateway

bool

false

Install sync gateway

scopegroups

object

{}

Uncomment to create a "couchbasescopegroups" resource CouchbaseScopeGroup represents a logical unit of data storage that sits between buckets and collections e.g. a bucket may contain multiple scopes, and a scope may contain multiple collections. See https://docs.couchbase.com/operator/current/resource/couchbasescopegroup.html

scopes

object

{}

Uncomment to create a "couchbasescopes" resource A scope is simply a single-tier namespace for a group of collections to exist within. Collections within a scope must all have unique names, but collections in different scopes may share the same name. This property allows multi-tenancy. See https://docs.couchbase.com/operator/current/resource/couchbasescope.html

syncGateway.admin.enabled

bool

false

Defines if the admin API will be exposed by sync gateway

syncGateway.affinity

object

{}

Affinity to apply to the pods

syncGateway.config

object

{"databases":{"db":{"allow_conflicts":false,"bucket":"default","cacert":null,"enable_shared_bucket_access":true,"password":null,"revs_limit":20,"server":null,"username":null,"users":{"GUEST":{"admin_channels":[""],"disabled":false}}}},"logging":{"console":{"enabled":true,"log_keys":[""],"log_level":"debug"}}}

Database config

syncGateway.config.databases

object

{"db":{"allow_conflicts":false,"bucket":"default","cacert":null,"enable_shared_bucket_access":true,"password":null,"revs_limit":20,"server":null,"username":null,"users":{"GUEST":{"admin_channels":["*"],"disabled":false}}}}

Databases is a list containing bucket replication configs

syncGateway.config.databases.db.bucket

string

"default"

Bucket replicated to sync gateway

syncGateway.config.databases.db.cacert

string

nil

Optional ca.cert for tls connection (auto-generated when tls.generate true)

syncGateway.config.databases.db.password

string

nil

Password of db admin, defaults to cluster admin password

syncGateway.config.databases.db.server

string

nil

Server to connect db to, defaults to cluster server

syncGateway.config.databases.db.username

string

nil

Username of db admin, defaults to cluster admin username

syncGateway.config.databases.db.users

object

{"GUEST":{"admin_channels":["*"],"disabled":false}}

Guest user config

syncGateway.config.databases.db.users.GUEST.admin_channels

list

["*"]

Channels guest user may access. defaults to all channels

syncGateway.config.databases.db.users.GUEST.disabled

bool

false

Disable creation of guest user

syncGateway.configSecret

string

nil

Optional secret to use with prepoulated database config

syncGateway.exposeServiceType

string

"ClusterIP"

Type of service to use for exposing Sync Gateway Set as empty string to prevent service creation

syncGateway.image

object

{"repository":"couchbase/sync-gateway","tag":"2.8.0-enterprise"}

Image of the sync gateway container

syncGateway.imagePullPolicy

string

"IfNotPresent"

syncGateway.kind

string

"Deployment"

Kind of resource to use when installing sync gateway resource. suppports (Deployment

Statefulset)

syncGateway.labels

object

{}

Labels to apply to the deployment resource

syncGateway.monitoring.prometheus.enabled

bool

false

Defines whether Prometheus metric collection is enabled

syncGateway.monitoring.prometheus.image

object

{"repository":"couchbasesamples/sync-gateway-prometheus-exporter","tag":"latest"}

Image used by the Sync Gateway to perform metric collection (injected as a "sidecar" in each Sync Gateway Pod)

syncGateway.monitoring.prometheus.resources

object

{}

syncGateway.name

string

nil

Name of the sync gateway pod. defaults to name of chart

syncGateway.nodeSelector

object

{}

Which nodes to run the pods on

syncGateway.podLabels

object

{}

Labels to apply to the pods

syncGateway.replicas

int

1

How many sync gateway pods to create horizontally scale the deployment

syncGateway.resources

object

{}

Resources to apply to the pods

syncGateway.revisionHistoryLimit

string

nil

Optional set to change cleanup policy

syncGateway.service.annotations

object

{}

Additional annotations to add to the Sync Gateway service. Useful for setting cloud provider specific annotations controlling the services deployed.

syncGateway.service.externalTrafficPolicy

string

nil

Optionally configure traffic policy for LoadBalancer and NodePort

syncGateway.tolerations

list

[]

Tolerations are applied to pods, and allow (but do not require) the pods to schedule onto nodes with matching taints.

syncGateway.volumeClaimTemplates

list

[{"metadata":{"name":"data"},"spec":{"accessModes":["ReadWriteOnce"],"resources":{"requests":{"storage":"1Gi"}},"storageClassName":"default"}}]

Volume claim template to define size of persistent volumes to provide for stateful sets

syncGateway.volumeMounts

list

[{"mountPath":"/dbs","name":"data","readOnly":true}]

Location within sync gateway to back with persistent volume

tls.expiration

int

365

Expiry time of CA in days for generated certs

tls.generate

bool

false

Enable to auto create certs

tls.legacy

bool

false

Legacy TLS configuration with static format which requires PKCS#1 formatted keys. Legacy format is used implicitly during upgrade when old static keys exist. The default is 'false' which supports additional formats and multiple root CAs.

tls.nodeToNodeEncryption

string

nil

This field defines whether node-to-node encryption is enabled. Must be either 'All' or 'ControlPlaneOnly'. If not specified, data between Couchbase Server nodes is not encrypted.

users

object

{}

About Resource Names

All resources/objects created by the Couchbase Chart adhere to the following naming scheme: <release-name>-<component-name>

  • <release-name>

    • This is name of the installed instance.

  • <component-name>

    • This is the name of the Operator, Admission, and Couchbase component..

    • If the resource is created for the Operator, then <component-name> will be whatever is specified in couchbaseOperator.name.

    • If the resource is created for the admission controller, then <component-name> will be whatever is specified in admissionController.name.

    • If the resource is created for the Couchbase cluster, then <component-name> will be whatever is specified in cluster.name.

Specifying Your Own Resources

The chart allows you to override certain resources such as TLS certificates with ones that you’ve already created. In this case, the names of the resources are determined by you and not the chart, and therefore do not adhere to the naming scheme described in the previous section. Check the specs below for the value you are attempting to override for additional information on what type of resource is expected and how it should be formatted.

Install Values

Installation values for selective deployment of components within the chart.

yaml
# Select what to install install: # install the couchbase operator couchbaseOperator: true # install the admission controller admissionController: true # install couchbase cluster couchbaseCluster: true # install sync gateway syncGateway: false

The Couchbase Chart is capable of installing the Operator, Admission Controller, Couchbase Cluster, and Sync Gateway.

couchbaseOperator

This field specifies whether or not the Couchbase Autonomous Operator will be installed.

Field Rules:

The couchbaseOperator field defaults to true.

admissionController

This field specifies whether or not the Couchbase Admission Controller will be installed.

Field Rules:

The admissionController field defaults to true.

couchbaseCluster

This field specifies whether or not a Couchbase Cluster will be installed.

Field Rules:

The couchbaseCluster field defaults to true.

syncGateway

This field specifies whether or not an instance of the Sync Gateway will be installed.

Field Rules:

The syncGateway field defaults to false.

Couchbase Cluster

The cluster configuration represents the CouchbaseCluster resources to be installed. If install.couchbaseCluster is set to false then the cluster will not be installed.

cluster

yaml
cluster: name: security: username: Administrator password: adminSecret:

name

The name of the cluster to create.

Value rules: The couchbaseCluster.name value defaults to the name of the chart if not specified. Must be unique from any other clusters in the namespace.

username

The username to use as the cluster admin.

This should only be used for experimental and test clusters. Consider using adminSecret to provide a secret containing your own username and password.

Value rules: The couchbaseCluster.username value is a string set to Administrator by default.

password

The password to use as the cluster admin.

This should only be used for experimental and test clusters. Consider using adminSecret to provide a secret containing your own username and password.

Value rules: The couchbaseCluster.password value is a string that is auto-generated by default.

adminSecret

The secret to use for overriding the auto-generated secret. When specified the username and password from the secret are used for Administrator login.

Value rules: The couchbaseCluster.adminSecret value is the name of a Kubernetes secret and is not set by default.

Persistent Volumes

The best way to create a cluster with persistent volumes is to make a custom value file. The following example shows how volume mounts can be added to created a persisted cluster.

Create a file named values-persistent.yaml with the following values:

yaml
cluster: servers: default: pod: volumeMounts: default: couchbase data: couchbase securityContext: fsGroup: 1000 volumeClaimTemplates: - metadata: name: couchbase spec: storageClassName: "default" resources: requests: storage: 1Gi

Install the Couchbase Helm Chart using the custom value file:

console
helm install my-release -f values-persistent.yaml couchbase/couchbase-operator

additional values

All of the remaining values which can be overridden in this spec are described in the CouchbaseCluster documentation.

TLS

Certificates can be auto-generated or overridden by user supplied certs. Also since Couchbase certs are represented as plain Kubernetes secrets, the secret itself can be overridden.

yaml
tls: generate: false legacy: false expiration: 365 nodeToNodeEncryption: All

generate

This value determines whether the chart should create the cluster with TLS.

Value rules: The tls.generate is a boolean which defaults to false. When set to true all of the certs and keys required for TLS will be auto-generated unless manually specified. When value is false certs are not generated, but manual Secrets can be provided by overriding cluster.networking.tls.

legacy

This value determines whether legacy or Native TLS format will be used.

Value rules: The tls.legacy is a boolean which defaults to false. When value is 'true' legacy TLS configuration with static format which requires PKCS#1 formatted keys. When value is 'false' native TLS is used and a root CA is generated along with separate client and server keys.

expiration

Expiration of CA in days

Value rules: The couchbaseTLS.expiration defaults to 365 days.

nodeToNodeEncryption

This field defines whether node-to-node encryption is enabled.

When set to All, all data between Couchbase server nodes is encrypted. When set to ControlPlaneOnly, only internal Couchbase server messages are encrypted, user data is not. If not specified, data between Couchbase Server nodes is not encrypted.

As with all encryption protocols, this setting may negatively affect performance with the increased data protection.

Field rules: This field is optional and must be either All or ControlPlaneOnly.

Custom TLS

Create cluster with auto-generated TLS certs

console
helm install my-release --set tls.generate=true -f values-persistent.yaml couchbase/couchbase-operator

Use manually created secrets . Create a file named tls_values.yaml with the following custom override values for the Couchbase Chart:

yaml
cluster: networking: tls: rootCAs: - secure-couchbase-cluster-ca-tls secretSource: clientSecretName: secure-couchbase-cluster-operator-tls serverSecretName: secure-couchbase-cluster-server-tls

Refer to TLS Concept documentation for additional information about available security options.

console
helm install my-release -f tls_values.yaml couchbase/couchbase-operator

Buckets

The buckets configuration represent CouchbaseBucket resources to be installed by the cluster.

yaml
buckets: default: name: default kind: CouchbaseBucket
Buckets are automatically provisioned with label selectors matching the corresponding Couchbase cluster.

At least one bucket will be created whenever install.CouchbaseCluster is set to true (if you don’t actively configure at least one bucket, then a default bucket is created automatically). If zero buckets are desired, then you must disable bucket creation completely by setting the contents to null.

yaml
buckets: null
The buckets field must be explicitly set to null in order to avoid bucket creation. Even if the section is completely empty, unless buckets: null is specified, the default bucket will be created.

name

This value determines the name of the bucket to create within Couchbase Server.

Value rules: The bucket.name value is a string. This value is optional and when not set, the object key name is used instead. The object key name is used for the Kubernetes CRD, whereas this value is used for the bucket name that is recognized within the Couchbase Server application.

kind

This is the type of the bucket to create and can be one of the supported types provided by Couchbase Server.

Value rules: The bucket.kind value takes one of the supported values: CouchbaseBucket, CouchbaseEphemeralBucket, or CouchbaseMemcachedBucket. This value is optional and defaults to CouchbaseBucket when not set.

additional values

All of the remaining values which can be overridden in this spec are described in the CouchbaseCluster documentation.

Users

The users configuration represent CouchbaseUser, CouchbaseGroup, and CouchbaseRoleBinding resources to be installed by the cluster. Users are installed whenever install.CouchbaseCluster is set to true.

yaml
users: developer: # username (1) autobind: true password: password authSecret: authDomain: local roles: - name: bucket_admin bucket: default
1 The username is set from the key of each user configuration. NOTE: Users are automatically provisioned with label selectors matching the corresponding Couchbase cluster.

autobind

Value rules: The user.<name>.autobind value is a boolean. If autobind is set, then Users are automatically created alongside groups with specified roles. To manually create groups and bind users then set autobind to 'false' and specify groups and rolebindings resources

password

The user password.

This should only be used for experimental and test clusters. Consider using authSecret or setting authDomain: external to improve security .

Value rules: The user.<name>.password value is a string. This value is required when authDomain is local.

authSecret

The Kubernetes Secret containing the user password.

Value rules: The user.<name>.authSecret value is a string. This value is optional and must refer to a Kubernetes Secret resource when specified. The Secret must contain the path data.password with the base64 encoded value of the secret

authDomain

The Couchbase RBAC Domain to use when authenticating the user.

Value rules: The user.<name>.authDomain value is a string. This value is required and must be either local or external.

roles

The Couchbase Roles to assign to the user

Value rules: The user.<name>.roles value is a list. This value is required and must provide the name of a valid Couchbase Server role. If the Couchbase Server role is a bucket role, then the name of a bucket value may also be provided. If the name of a bucket is not provided for a bucket role then the value defaults to * which means the role applies to all buckets.

Refer to CouchbaseGroups documentation for list of Administrator and Bucket roles.

Backups

This object defines parameters and variables for automated backup. When set, the chart will create a backup job.

yaml
backups: default-backup: name: my-backup strategy: full_incremental full: schedule: "0 3 * * 0" incremental: schedule: "0 3 * * 1-6"

All of the provided values for this spec are described here in the Couchbase Cluster Configuration documentation.

Backup Restores

This object defines parameters and variables for automated backup restores. When set, the chart will create a backup restore job.

yaml
backuprestores: default-restore: name: my-restore backup: my-backup repo: cb-example-2020-11-12T19_00_03 start: int: 1 str: oldest end: int: 1 str: latest backOffLimit: 2 logRetention: 24h

All of the provided values for this spec are described here in the Couchbase Cluster Configuration documentation.

Sync Gateway

The Sync Gateway configuration provides defaults for deploying Sync Gateway along with associated services. The Sync Gateway server is installed when install.syncGateway is set to true. When installed, Sync Gateway is automatically connected to Couchbase cluster.

yaml
syncGateway: name: config: logging: console: enabled: true log_level: "debug" log_keys: - "*" databases: db: bucket: default users: GUEST: disabled: false admin_channels: ["*"] server: username: password: allow_conflicts: false revs_limit: 20 enable_shared_bucket_access: true cacert: exposeServiceType: ClusterIP image: repository: couchbase/sync-gateway tag: 2.8.3-enterprise imagePullPolicy: IfNotPresent configSecret:
If you install a bucket with a name other than default then you will need to update databases.db.bucket accordingly.

exposeServiceType

The type of service to use for exposing the Sync Gateway server.

Value rules: The exposeServiceType value is a string. This value is optional and defaults to ClusterIP. When specified the value must be either ClusterIP, NOodePort, or LoadBalancer. When the value is not specified then the exposing service is not created.

configSecret

A Kubernetes Secret containing values that override config.databases This allows for sync-gateway configurations to be shared across clusters, since the Secret will contain the same configuration information about connecting to a particular Couchbase Cluster.

Value rules: The configSecret value is a string This value is optional. When specified the content of the Secret will be used to override the values of config.databases.

coredns

DNS settings to apply to the Couchbase and Sync Gateway Deployments

yaml
coredns: service: searches: - default.svc.cluster.local - svc.cluster.local - cluster.local

coredns.service

The name of a Kubernetes Service resource which exposes Kubernetes DNS. By default the kube-dns service is used, but user may decide to install CoreDNS for Inter-Cluster Deployments.

Value rules: The coredns.service value is a string. This value is optional. When specified the value must refer to a Kubernetes Service resource that is capable of providing DNS to the Sync Gateway server.

coredns.searches

The search domains to use when looking up hostnames

Value rules: The coredns.searches value is an optional list of strings.

Autonomous Operator

The Helm chart deploys the Operator as a Kubernetes Deployment.

yaml
couchbaseOperator: name: "couchbase-operator" image: repository: couchbase/operator tag: 2.8.0 imagePullPolicy: IfNotPresent imagePullSecrets: [] commandArgs: pod-create-timeout: 10m resources: {} nodeSelector: {} tolerations: []

commandArgs

This spec allows you to specify command line arguments to pass on to the Operator.

value rules: The commandArgs value is a key-value map of arguments that can be used to modify the behavior of the Operator image. The -pod-create-timeout: argument is set to 10m by default, which means that the Operator will wait 10 minutes for a Couchbase Server Pod to start. The -debug: argument can also be used here, and set to debug for more verbose logging.

Additional Values

The couchbaseOperator parameters are described in the Operator Deployment Settings documentation.

Admission Controller

yaml
admissionController: name: "couchbase-admission-controller" image: repository: couchbase/admission-controller tag: 2.8.0 imagePullPolicy: IfNotPresent imagePullSecrets: [] verboseLogging: true

The Helm chart deploys the admission controller as a Kubernetes Deployment.

name

This field specifies the name of the admission controller deployment.

Field Rules:

The name field defaults to couchbase-admission-controller.

image

yaml
image: repository: couchbase/admission-controller tag: 2.8.0

The repository and tag to use for pulling the admission controller image.

Field Rules:

The image.repository value can refer to any repository. The image.tag field can refer to any version of the admission controller image in the repository.

imagePullPolicy

The policy for pulling images from the repository onto hosts.

Field Rules:

The imagePullPolicy value defaults to IfNotPresent, which means that images are only pulled if they’re not present on the Kubernetes node. Values allowed are Always, IfNotPresent, and Never.

imagePullSecrets

An optional list referencing secrets to use for pulling the image.

Field Rules:

The imagePullSecrets value is a list which is not set by default. Refer to the Operator documentation about creating pull secrets. When using the Helm CLI to override pull secrets, the list should be denoted as a comma delimited list within curly braces:

console
helm install --set admissionController.imagePullSecrets={pullsecret1,pullsecret2} couchbase/couchbase-operator

verboseLogging

Determines whether the admission controller should log all of its validation notices within the console.

Field Rules:

The verboseLogging field is a boolean value that is set to false by default, which means only validation errors are logged within the pod’s console.

Admission Service

yaml
admissionService: name: port: 443 targetPort: 8443

The admission service is used by the webhooks to access the admission operator. Certificates are auto-generated for this service whenever this object is enabled. The admission service is always created when install.admissionController is set to true.

name

Name of the admission service.

port

Port exposed by the admission service to the validation webhooks.

targetPort

Port of the admission controller targeted by the admission Service.

Field Rules:

The name value defaults to whatever is specified in admissionController.name.

Admission Controller Certificate Authority

yaml
admissionCA: cert: key: expiration: 365

The admissionCA spec specifies the CA certificates that are applied to validating webhooks.

By default, the CA certificate and key is auto-generated. The following example shows how to use a self-signed certificate:

  1. Create Certificates

    Use OpenSSL to create myCA.key and myCA.pem in your current directory:

    console
    openssl genrsa -out myCA.key 2048 openssl req -x509 -new -nodes -key myCA.key -sha256 -days 1825 -outform PEM -out myCA.pem
  2. Install the chart with certificates

    Use --set-file to import the files from your current directory:

    console
    helm install --set-file admissionCA.cert=myCA.pem \ --set-file admissionCA.key=myCA.key \ couchbase/couchbase-operator

Refer to the TLS documentation for manually creating certificates and keys that can be used to override the auto-generated secret.

cert

The PEM format CA certificate.

Field Rules:

The cert value defaults to an auto-generated CA certificate.

key

The PEM format CA key.

Field Rules:

The key value defaults to an auto-generated CA key.

expiration

Expiration of CA certificate in days.

Field Rules:

The expiration value defaults to 365 days.

Admission Controller Secret

yaml
admissionSecret: name: cert: key:

The admissionSecret spec specifies the secret for the admission controller to use for validating cluster specs securely over the admission service.

To use a custom secret, you will also need to provide the CA that was used to generate the certificates and keys within the secret. The following example shows how to use a self-signed CA and client:

  1. Create CA and client certificates

    Use EasyRSA CA and signed client cert with DNS cb-example.default.svc

    console
    ./easyrsa build-ca nopasss ./easyrsa --subject-alt-name=DNS:cb-example.default.svc build-server-full admission-controller nopas
  2. Install chart with client certificates

    Install chart with custom certs and be sure to set admissionService.name to DNS name.

    This example also sets --namespace default option since this is also included in the DNS of cert we created:

    console
    helm install --namespace ci-testcluster \ --set admissionService.name=ci-testcluster \ --set-file admissionCA.cert=/home/ubuntu/easy-rsa/easyrsa3/pki/ca.crt \ --set-file admissionCA.key=/home/ubuntu/easy-rsa/easyrsa3/pki/private/ca.key \ --set-file admissionSecret.cert=/home/ubuntu/easy-rsa/easyrsa3/pki/issued/admission-controller.crt \ --set-file admissionSecret.key=/home/ubuntu/easy-rsa/easyrsa3/pki/private/admission-controller.key \ couchbase/couchbase-operator

name

This value is the name of the secret that contains the certificates for the admission operator. This value must refer to a native Kubernetes secret which contains values for TLS cert and key.

Field Rules:

The admissionSecret.name value defaults to the name of the admission controller deployment.

cert

PEM format certificate to use as the admission controller’s public key during validation.

Field Rules:

The admissionSecret.cert value is auto-generated by default from admissionCA.

key

PEM format key to use as the admission controllers private key during validation.

Field Rules:

The admissionSecret.key value is auto-generated by default from admissionCA.