mirror of
https://github.com/bitnami/charts.git
synced 2026-03-05 06:47:25 +08:00
[bitnami/kuberay] Release 1.0.1 (#24903)
* [bitnami/kuberay] Release 1.0.1 updating components versions Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com> * Update README.md with readme-generator-for-helm Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com> * Update CRDs automatically Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com> * [bitnami/kuberay] Update bitnami/ray image tag to fix issue with k8s probes Signed-off-by: Gonzalo Gomez Gracia <gonzalog@vmware.com> --------- Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com> Signed-off-by: Gonzalo Gomez Gracia <gonzalog@vmware.com> Co-authored-by: Gonzalo Gomez Gracia <gonzalog@vmware.com>
This commit is contained in:
@@ -1,6 +1,6 @@
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: oci://registry-1.docker.io/bitnamicharts
|
||||
version: 2.19.0
|
||||
digest: sha256:ac559eb57710d8904e266424ee364cd686d7e24517871f0c5c67f7c4500c2bcc
|
||||
generated: "2024-03-11T16:41:11.014308289+01:00"
|
||||
version: 2.19.1
|
||||
digest: sha256:c883732817d9aaa3304f7b3109262aa338959de15b432dc5a2dbde13d2e136a5
|
||||
generated: "2024-04-04T18:45:40.242015845Z"
|
||||
|
||||
@@ -6,13 +6,13 @@ annotations:
|
||||
licenses: Apache-2.0
|
||||
images: |
|
||||
- name: kuberay-apiserver
|
||||
image: docker.io/bitnami/kuberay-apiserver:1.0.0-debian-12-r12
|
||||
image: docker.io/bitnami/kuberay-apiserver:1.1.0-debian-12-r2
|
||||
- name: kuberay-operator
|
||||
image: docker.io/bitnami/kuberay-operator:1.0.0-debian-12-r15
|
||||
image: docker.io/bitnami/kuberay-operator:1.1.0-debian-12-r2
|
||||
- name: ray
|
||||
image: docker.io/bitnami/ray:2.9.3-debian-12-r0
|
||||
image: docker.io/bitnami/ray:2.10.0-debian-12-r1
|
||||
apiVersion: v2
|
||||
appVersion: 1.0.0
|
||||
appVersion: 1.1.0
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: oci://registry-1.docker.io/bitnamicharts
|
||||
@@ -32,4 +32,4 @@ maintainers:
|
||||
name: kuberay
|
||||
sources:
|
||||
- https://github.com/bitnami/charts/tree/main/bitnami/kuberay
|
||||
version: 1.0.0
|
||||
version: 1.0.1
|
||||
|
||||
@@ -153,100 +153,100 @@ As an alternative, use one of the preset configurations for pod affinity, pod an
|
||||
|
||||
### Kuberay Operator Parameters
|
||||
|
||||
| Name | Description | Value |
|
||||
| ------------------------------------------------------------ | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------- |
|
||||
| `operator.enabled` | Enable Kuberay Operator | `true` |
|
||||
| `operator.image.registry` | Kuberay Operator image registry | `REGISTRY_NAME` |
|
||||
| `operator.image.repository` | Kuberay Operator image repository | `REPOSITORY_NAME/kuberay-operator` |
|
||||
| `operator.image.digest` | Kuberay Operator image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` |
|
||||
| `operator.image.pullPolicy` | Kuberay Operator image pull policy | `IfNotPresent` |
|
||||
| `operator.image.pullSecrets` | Kuberay Operator image pull secrets | `[]` |
|
||||
| `operator.image.debug` | Enable Kuberay Operator image debug mode | `false` |
|
||||
| `operator.replicaCount` | Number of Kuberay Operator replicas to deploy | `1` |
|
||||
| `operator.containerPorts.metrics` | Kuberay Operator metrics container port | `8080` |
|
||||
| `operator.containerPorts.health` | Kuberay Operator health container port | `8082` |
|
||||
| `operator.livenessProbe.enabled` | Enable livenessProbe on Kuberay Operator containers | `true` |
|
||||
| `operator.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `5` |
|
||||
| `operator.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` |
|
||||
| `operator.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` |
|
||||
| `operator.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `5` |
|
||||
| `operator.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` |
|
||||
| `operator.readinessProbe.enabled` | Enable readinessProbe on Kuberay Operator containers | `true` |
|
||||
| `operator.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `5` |
|
||||
| `operator.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` |
|
||||
| `operator.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `5` |
|
||||
| `operator.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `5` |
|
||||
| `operator.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` |
|
||||
| `operator.startupProbe.enabled` | Enable startupProbe on Kuberay Operator containers | `false` |
|
||||
| `operator.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` |
|
||||
| `operator.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` |
|
||||
| `operator.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` |
|
||||
| `operator.startupProbe.failureThreshold` | Failure threshold for startupProbe | `5` |
|
||||
| `operator.startupProbe.successThreshold` | Success threshold for startupProbe | `1` |
|
||||
| `operator.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` |
|
||||
| `operator.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` |
|
||||
| `operator.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` |
|
||||
| `operator.watchAllNamespaces` | Watch for KubeRay resources in all namespaces | `true` |
|
||||
| `operator.watchNamespaces` | Watch for KubeRay resources in the given namespaces | `[]` |
|
||||
| `operator.enableBatchScheduler` | Enable batch scheduler component | `false` |
|
||||
| `operator.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if operator.resources is set (operator.resources is recommended for production). | `nano` |
|
||||
| `operator.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
|
||||
| `operator.podSecurityContext.enabled` | Enabled Kuberay Operator pods' Security Context | `true` |
|
||||
| `operator.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` |
|
||||
| `operator.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` |
|
||||
| `operator.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
|
||||
| `operator.podSecurityContext.fsGroup` | Set Kuberay Operator pod's Security Context fsGroup | `1001` |
|
||||
| `operator.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
|
||||
| `operator.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
|
||||
| `operator.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
|
||||
| `operator.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` |
|
||||
| `operator.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
|
||||
| `operator.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
|
||||
| `operator.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` |
|
||||
| `operator.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` |
|
||||
| `operator.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` |
|
||||
| `operator.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` |
|
||||
| `operator.command` | Override default container command (useful when using custom images) | `[]` |
|
||||
| `operator.args` | Override default container args (useful when using custom images) | `[]` |
|
||||
| `operator.automountServiceAccountToken` | Mount Service Account token in pod | `true` |
|
||||
| `operator.hostAliases` | Kuberay Operator pods host aliases | `[]` |
|
||||
| `operator.podLabels` | Extra labels for Kuberay Operator pods | `{}` |
|
||||
| `operator.podAnnotations` | Annotations for Kuberay Operator pods | `{}` |
|
||||
| `operator.podAffinityPreset` | Pod affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `operator.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `soft` |
|
||||
| `operator.pdb.create` | Enable/disable a Pod Disruption Budget creation | `false` |
|
||||
| `operator.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` |
|
||||
| `operator.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` |
|
||||
| `operator.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `operator.nodeAffinityPreset.key` | Node label key to match. Ignored if `server.affinity` is set | `""` |
|
||||
| `operator.nodeAffinityPreset.values` | Node label values to match. Ignored if `server.affinity` is set | `[]` |
|
||||
| `operator.affinity` | Affinity for Kuberay Operator pods assignment | `{}` |
|
||||
| `operator.nodeSelector` | Node labels for Kuberay Operator pods assignment | `{}` |
|
||||
| `operator.tolerations` | Tolerations for Kuberay Operator pods assignment | `[]` |
|
||||
| `operator.updateStrategy.type` | Kuberay Operator statefulset strategy type | `RollingUpdate` |
|
||||
| `operator.priorityClassName` | Kuberay Operator pods' priorityClassName | `""` |
|
||||
| `operator.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` |
|
||||
| `operator.schedulerName` | Name of the k8s scheduler (other than default) for Kuberay Operator pods | `""` |
|
||||
| `operator.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` |
|
||||
| `operator.lifecycleHooks` | for the Kuberay Operator container(s) to automate configuration before or after startup | `{}` |
|
||||
| `operator.extraEnvVars` | Array with extra environment variables to add to Kuberay Operator nodes | `[]` |
|
||||
| `operator.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Kuberay Operator nodes | `""` |
|
||||
| `operator.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Kuberay Operator nodes | `""` |
|
||||
| `operator.extraVolumes` | Optionally specify extra list of additional volumes for the Kuberay Operator pod(s) | `[]` |
|
||||
| `operator.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Kuberay Operator container(s) | `[]` |
|
||||
| `operator.sidecars` | Add additional sidecar containers to the Kuberay Operator pod(s) | `[]` |
|
||||
| `operator.initContainers` | Add additional init containers to the Kuberay Operator pod(s) | `[]` |
|
||||
| `operator.autoscaling.vpa.enabled` | Enable VPA | `false` |
|
||||
| `operator.autoscaling.vpa.annotations` | Annotations for VPA resource | `{}` |
|
||||
| `operator.autoscaling.vpa.controlledResources` | VPA List of resources that the vertical pod autoscaler can control. Defaults to cpu and memory | `[]` |
|
||||
| `operator.autoscaling.vpa.maxAllowed` | VPA Max allowed resources for the pod | `{}` |
|
||||
| `operator.autoscaling.vpa.minAllowed` | VPA Min allowed resources for the pod | `{}` |
|
||||
| `operator.autoscaling.vpa.updatePolicy.updateMode` | Autoscaling update policy Specifies whether recommended updates are applied when a Pod is started and whether recommended updates are applied during the life of a Pod | `Auto` |
|
||||
| `operator.autoscaling.hpa.enabled` | Enable autoscaling for operator | `false` |
|
||||
| `operator.autoscaling.hpa.minReplicas` | Minimum number of operator replicas | `""` |
|
||||
| `operator.autoscaling.hpa.maxReplicas` | Maximum number of operator replicas | `""` |
|
||||
| `operator.autoscaling.hpa.targetCPU` | Target CPU utilization percentage | `""` |
|
||||
| `operator.autoscaling.hpa.targetMemory` | Target Memory utilization percentage | `""` |
|
||||
| Name | Description | Value |
|
||||
| ------------------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------- |
|
||||
| `operator.enabled` | Enable Kuberay Operator | `true` |
|
||||
| `operator.image.registry` | Kuberay Operator image registry | `REGISTRY_NAME` |
|
||||
| `operator.image.repository` | Kuberay Operator image repository | `REPOSITORY_NAME/kuberay-operator` |
|
||||
| `operator.image.digest` | Kuberay Operator image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` |
|
||||
| `operator.image.pullPolicy` | Kuberay Operator image pull policy | `IfNotPresent` |
|
||||
| `operator.image.pullSecrets` | Kuberay Operator image pull secrets | `[]` |
|
||||
| `operator.image.debug` | Enable Kuberay Operator image debug mode | `false` |
|
||||
| `operator.replicaCount` | Number of Kuberay Operator replicas to deploy | `1` |
|
||||
| `operator.containerPorts.metrics` | Kuberay Operator metrics container port | `8080` |
|
||||
| `operator.containerPorts.health` | Kuberay Operator health container port | `8082` |
|
||||
| `operator.livenessProbe.enabled` | Enable livenessProbe on Kuberay Operator containers | `true` |
|
||||
| `operator.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `5` |
|
||||
| `operator.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` |
|
||||
| `operator.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` |
|
||||
| `operator.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `5` |
|
||||
| `operator.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` |
|
||||
| `operator.readinessProbe.enabled` | Enable readinessProbe on Kuberay Operator containers | `true` |
|
||||
| `operator.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `5` |
|
||||
| `operator.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` |
|
||||
| `operator.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `5` |
|
||||
| `operator.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `5` |
|
||||
| `operator.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` |
|
||||
| `operator.startupProbe.enabled` | Enable startupProbe on Kuberay Operator containers | `false` |
|
||||
| `operator.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` |
|
||||
| `operator.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` |
|
||||
| `operator.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` |
|
||||
| `operator.startupProbe.failureThreshold` | Failure threshold for startupProbe | `5` |
|
||||
| `operator.startupProbe.successThreshold` | Success threshold for startupProbe | `1` |
|
||||
| `operator.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` |
|
||||
| `operator.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` |
|
||||
| `operator.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` |
|
||||
| `operator.watchAllNamespaces` | Watch for KubeRay resources in all namespaces | `true` |
|
||||
| `operator.watchNamespaces` | Watch for KubeRay resources in the given namespaces | `[]` |
|
||||
| `operator.enableBatchScheduler` | Enable batch scheduler component | `false` |
|
||||
| `operator.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if operator.resources is set (operator.resources is recommended for production). | `nano` |
|
||||
| `operator.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
|
||||
| `operator.podSecurityContext.enabled` | Enabled Kuberay Operator pods' Security Context | `true` |
|
||||
| `operator.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` |
|
||||
| `operator.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` |
|
||||
| `operator.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
|
||||
| `operator.podSecurityContext.fsGroup` | Set Kuberay Operator pod's Security Context fsGroup | `1001` |
|
||||
| `operator.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
|
||||
| `operator.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
|
||||
| `operator.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
|
||||
| `operator.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` |
|
||||
| `operator.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
|
||||
| `operator.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
|
||||
| `operator.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` |
|
||||
| `operator.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` |
|
||||
| `operator.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` |
|
||||
| `operator.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` |
|
||||
| `operator.command` | Override default container command (useful when using custom images) | `[]` |
|
||||
| `operator.args` | Override default container args (useful when using custom images) | `[]` |
|
||||
| `operator.automountServiceAccountToken` | Mount Service Account token in pod | `true` |
|
||||
| `operator.hostAliases` | Kuberay Operator pods host aliases | `[]` |
|
||||
| `operator.podLabels` | Extra labels for Kuberay Operator pods | `{}` |
|
||||
| `operator.podAnnotations` | Annotations for Kuberay Operator pods | `{}` |
|
||||
| `operator.podAffinityPreset` | Pod affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `operator.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `soft` |
|
||||
| `operator.pdb.create` | Enable/disable a Pod Disruption Budget creation | `false` |
|
||||
| `operator.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` |
|
||||
| `operator.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` |
|
||||
| `operator.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `operator.nodeAffinityPreset.key` | Node label key to match. Ignored if `server.affinity` is set | `""` |
|
||||
| `operator.nodeAffinityPreset.values` | Node label values to match. Ignored if `server.affinity` is set | `[]` |
|
||||
| `operator.affinity` | Affinity for Kuberay Operator pods assignment | `{}` |
|
||||
| `operator.nodeSelector` | Node labels for Kuberay Operator pods assignment | `{}` |
|
||||
| `operator.tolerations` | Tolerations for Kuberay Operator pods assignment | `[]` |
|
||||
| `operator.updateStrategy.type` | Kuberay Operator statefulset strategy type | `RollingUpdate` |
|
||||
| `operator.priorityClassName` | Kuberay Operator pods' priorityClassName | `""` |
|
||||
| `operator.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` |
|
||||
| `operator.schedulerName` | Name of the k8s scheduler (other than default) for Kuberay Operator pods | `""` |
|
||||
| `operator.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` |
|
||||
| `operator.lifecycleHooks` | for the Kuberay Operator container(s) to automate configuration before or after startup | `{}` |
|
||||
| `operator.extraEnvVars` | Array with extra environment variables to add to Kuberay Operator nodes | `[]` |
|
||||
| `operator.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Kuberay Operator nodes | `""` |
|
||||
| `operator.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Kuberay Operator nodes | `""` |
|
||||
| `operator.extraVolumes` | Optionally specify extra list of additional volumes for the Kuberay Operator pod(s) | `[]` |
|
||||
| `operator.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Kuberay Operator container(s) | `[]` |
|
||||
| `operator.sidecars` | Add additional sidecar containers to the Kuberay Operator pod(s) | `[]` |
|
||||
| `operator.initContainers` | Add additional init containers to the Kuberay Operator pod(s) | `[]` |
|
||||
| `operator.autoscaling.vpa.enabled` | Enable VPA | `false` |
|
||||
| `operator.autoscaling.vpa.annotations` | Annotations for VPA resource | `{}` |
|
||||
| `operator.autoscaling.vpa.controlledResources` | VPA List of resources that the vertical pod autoscaler can control. Defaults to cpu and memory | `[]` |
|
||||
| `operator.autoscaling.vpa.maxAllowed` | VPA Max allowed resources for the pod | `{}` |
|
||||
| `operator.autoscaling.vpa.minAllowed` | VPA Min allowed resources for the pod | `{}` |
|
||||
| `operator.autoscaling.vpa.updatePolicy.updateMode` | Autoscaling update policy Specifies whether recommended updates are applied when a Pod is started and whether recommended updates are applied during the life of a Pod | `Auto` |
|
||||
| `operator.autoscaling.hpa.enabled` | Enable autoscaling for operator | `false` |
|
||||
| `operator.autoscaling.hpa.minReplicas` | Minimum number of operator replicas | `""` |
|
||||
| `operator.autoscaling.hpa.maxReplicas` | Maximum number of operator replicas | `""` |
|
||||
| `operator.autoscaling.hpa.targetCPU` | Target CPU utilization percentage | `""` |
|
||||
| `operator.autoscaling.hpa.targetMemory` | Target Memory utilization percentage | `""` |
|
||||
|
||||
### Kuberay Operator Traffic Exposure Parameters
|
||||
|
||||
@@ -317,99 +317,99 @@ As an alternative, use one of the preset configurations for pod affinity, pod an
|
||||
|
||||
### Kuberay API Server Parameters
|
||||
|
||||
| Name | Description | Value |
|
||||
| ------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | ----------------------------------- |
|
||||
| `apiserver.enabled` | Enable Kuberay API Server | `true` |
|
||||
| `apiserver.image.registry` | Kuberay API Server image registry | `REGISTRY_NAME` |
|
||||
| `apiserver.image.repository` | Kuberay API Server image repository | `REPOSITORY_NAME/kuberay-apiserver` |
|
||||
| `apiserver.image.digest` | Kuberay API Server image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` |
|
||||
| `apiserver.image.pullPolicy` | Kuberay API Server image pull policy | `IfNotPresent` |
|
||||
| `apiserver.image.pullSecrets` | Kuberay API Server image pull secrets | `[]` |
|
||||
| `apiserver.image.debug` | Enable Kuberay API Server image debug mode | `false` |
|
||||
| `apiserver.replicaCount` | Number of Kuberay API Server replicas to deploy | `1` |
|
||||
| `apiserver.containerPorts.http` | Kuberay API Server http container port | `8888` |
|
||||
| `apiserver.containerPorts.grpc` | Kuberay API Server internal (HTTPS) container port | `8887` |
|
||||
| `apiserver.livenessProbe.enabled` | Enable livenessProbe on Kuberay API Server containers | `true` |
|
||||
| `apiserver.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `5` |
|
||||
| `apiserver.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` |
|
||||
| `apiserver.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` |
|
||||
| `apiserver.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `5` |
|
||||
| `apiserver.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` |
|
||||
| `apiserver.readinessProbe.enabled` | Enable readinessProbe on Kuberay API Server containers | `true` |
|
||||
| `apiserver.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `5` |
|
||||
| `apiserver.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` |
|
||||
| `apiserver.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `5` |
|
||||
| `apiserver.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `5` |
|
||||
| `apiserver.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` |
|
||||
| `apiserver.startupProbe.enabled` | Enable startupProbe on Kuberay API Server containers | `false` |
|
||||
| `apiserver.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` |
|
||||
| `apiserver.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` |
|
||||
| `apiserver.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` |
|
||||
| `apiserver.startupProbe.failureThreshold` | Failure threshold for startupProbe | `5` |
|
||||
| `apiserver.startupProbe.successThreshold` | Success threshold for startupProbe | `1` |
|
||||
| `apiserver.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` |
|
||||
| `apiserver.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` |
|
||||
| `apiserver.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` |
|
||||
| `apiserver.watchAllNamespaces` | Watch for KubeRay resources in all namespaces | `true` |
|
||||
| `apiserver.watchNamespaces` | Watch for KubeRay resources in the given namespaces | `[]` |
|
||||
| `apiserver.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if apiserver.resources is set (apiserver.resources is recommended for production). | `nano` |
|
||||
| `apiserver.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
|
||||
| `apiserver.podSecurityContext.enabled` | Enabled Kuberay API Server pods' Security Context | `true` |
|
||||
| `apiserver.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` |
|
||||
| `apiserver.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` |
|
||||
| `apiserver.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
|
||||
| `apiserver.podSecurityContext.fsGroup` | Set Kuberay API Server pod's Security Context fsGroup | `1001` |
|
||||
| `apiserver.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
|
||||
| `apiserver.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
|
||||
| `apiserver.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
|
||||
| `apiserver.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` |
|
||||
| `apiserver.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
|
||||
| `apiserver.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
|
||||
| `apiserver.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` |
|
||||
| `apiserver.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` |
|
||||
| `apiserver.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` |
|
||||
| `apiserver.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` |
|
||||
| `apiserver.command` | Override default container command (useful when using custom images) | `[]` |
|
||||
| `apiserver.args` | Override default container args (useful when using custom images) | `[]` |
|
||||
| `apiserver.automountServiceAccountToken` | Mount Service Account token in pod | `true` |
|
||||
| `apiserver.hostAliases` | Kuberay API Server pods host aliases | `[]` |
|
||||
| `apiserver.podLabels` | Extra labels for Kuberay API Server pods | `{}` |
|
||||
| `apiserver.podAnnotations` | Annotations for Kuberay API Server pods | `{}` |
|
||||
| `apiserver.podAffinityPreset` | Pod affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `apiserver.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `soft` |
|
||||
| `apiserver.pdb.create` | Enable/disable a Pod Disruption Budget creation | `false` |
|
||||
| `apiserver.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` |
|
||||
| `apiserver.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` |
|
||||
| `apiserver.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `apiserver.nodeAffinityPreset.key` | Node label key to match. Ignored if `server.affinity` is set | `""` |
|
||||
| `apiserver.nodeAffinityPreset.values` | Node label values to match. Ignored if `server.affinity` is set | `[]` |
|
||||
| `apiserver.affinity` | Affinity for Kuberay API Server pods assignment | `{}` |
|
||||
| `apiserver.nodeSelector` | Node labels for Kuberay API Server pods assignment | `{}` |
|
||||
| `apiserver.tolerations` | Tolerations for Kuberay API Server pods assignment | `[]` |
|
||||
| `apiserver.updateStrategy.type` | Kuberay API Server statefulset strategy type | `RollingUpdate` |
|
||||
| `apiserver.priorityClassName` | Kuberay API Server pods' priorityClassName | `""` |
|
||||
| `apiserver.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` |
|
||||
| `apiserver.schedulerName` | Name of the k8s scheduler (other than default) for Kuberay API Server pods | `""` |
|
||||
| `apiserver.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` |
|
||||
| `apiserver.lifecycleHooks` | for the Kuberay API Server container(s) to automate configuration before or after startup | `{}` |
|
||||
| `apiserver.extraEnvVars` | Array with extra environment variables to add to Kuberay API Server nodes | `[]` |
|
||||
| `apiserver.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Kuberay API Server nodes | `""` |
|
||||
| `apiserver.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Kuberay API Server nodes | `""` |
|
||||
| `apiserver.extraVolumes` | Optionally specify extra list of additional volumes for the Kuberay API Server pod(s) | `[]` |
|
||||
| `apiserver.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Kuberay API Server container(s) | `[]` |
|
||||
| `apiserver.sidecars` | Add additional sidecar containers to the Kuberay API Server pod(s) | `[]` |
|
||||
| `apiserver.initContainers` | Add additional init containers to the Kuberay API Server pod(s) | `[]` |
|
||||
| `apiserver.autoscaling.vpa.enabled` | Enable VPA | `false` |
|
||||
| `apiserver.autoscaling.vpa.annotations` | Annotations for VPA resource | `{}` |
|
||||
| `apiserver.autoscaling.vpa.controlledResources` | VPA List of resources that the vertical pod autoscaler can control. Defaults to cpu and memory | `[]` |
|
||||
| `apiserver.autoscaling.vpa.maxAllowed` | VPA Max allowed resources for the pod | `{}` |
|
||||
| `apiserver.autoscaling.vpa.minAllowed` | VPA Min allowed resources for the pod | `{}` |
|
||||
| `apiserver.autoscaling.vpa.updatePolicy.updateMode` | Autoscaling update policy Specifies whether recommended updates are applied when a Pod is started and whether recommended updates are applied during the life of a Pod | `Auto` |
|
||||
| `apiserver.autoscaling.hpa.enabled` | Enable autoscaling for apiserver | `false` |
|
||||
| `apiserver.autoscaling.hpa.minReplicas` | Minimum number of apiserver replicas | `""` |
|
||||
| `apiserver.autoscaling.hpa.maxReplicas` | Maximum number of apiserver replicas | `""` |
|
||||
| `apiserver.autoscaling.hpa.targetCPU` | Target CPU utilization percentage | `""` |
|
||||
| `apiserver.autoscaling.hpa.targetMemory` | Target Memory utilization percentage | `""` |
|
||||
| Name | Description | Value |
|
||||
| ------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------- |
|
||||
| `apiserver.enabled` | Enable Kuberay API Server | `true` |
|
||||
| `apiserver.image.registry` | Kuberay API Server image registry | `REGISTRY_NAME` |
|
||||
| `apiserver.image.repository` | Kuberay API Server image repository | `REPOSITORY_NAME/kuberay-apiserver` |
|
||||
| `apiserver.image.digest` | Kuberay API Server image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag image tag (immutable tags are recommended) | `""` |
|
||||
| `apiserver.image.pullPolicy` | Kuberay API Server image pull policy | `IfNotPresent` |
|
||||
| `apiserver.image.pullSecrets` | Kuberay API Server image pull secrets | `[]` |
|
||||
| `apiserver.image.debug` | Enable Kuberay API Server image debug mode | `false` |
|
||||
| `apiserver.replicaCount` | Number of Kuberay API Server replicas to deploy | `1` |
|
||||
| `apiserver.containerPorts.http` | Kuberay API Server http container port | `8888` |
|
||||
| `apiserver.containerPorts.grpc` | Kuberay API Server internal (HTTPS) container port | `8887` |
|
||||
| `apiserver.livenessProbe.enabled` | Enable livenessProbe on Kuberay API Server containers | `true` |
|
||||
| `apiserver.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `5` |
|
||||
| `apiserver.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` |
|
||||
| `apiserver.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` |
|
||||
| `apiserver.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `5` |
|
||||
| `apiserver.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` |
|
||||
| `apiserver.readinessProbe.enabled` | Enable readinessProbe on Kuberay API Server containers | `true` |
|
||||
| `apiserver.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `5` |
|
||||
| `apiserver.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` |
|
||||
| `apiserver.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `5` |
|
||||
| `apiserver.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `5` |
|
||||
| `apiserver.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` |
|
||||
| `apiserver.startupProbe.enabled` | Enable startupProbe on Kuberay API Server containers | `false` |
|
||||
| `apiserver.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` |
|
||||
| `apiserver.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` |
|
||||
| `apiserver.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `5` |
|
||||
| `apiserver.startupProbe.failureThreshold` | Failure threshold for startupProbe | `5` |
|
||||
| `apiserver.startupProbe.successThreshold` | Success threshold for startupProbe | `1` |
|
||||
| `apiserver.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` |
|
||||
| `apiserver.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` |
|
||||
| `apiserver.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` |
|
||||
| `apiserver.watchAllNamespaces` | Watch for KubeRay resources in all namespaces | `true` |
|
||||
| `apiserver.watchNamespaces` | Watch for KubeRay resources in the given namespaces | `[]` |
|
||||
| `apiserver.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if apiserver.resources is set (apiserver.resources is recommended for production). | `nano` |
|
||||
| `apiserver.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
|
||||
| `apiserver.podSecurityContext.enabled` | Enabled Kuberay API Server pods' Security Context | `true` |
|
||||
| `apiserver.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` |
|
||||
| `apiserver.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` |
|
||||
| `apiserver.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
|
||||
| `apiserver.podSecurityContext.fsGroup` | Set Kuberay API Server pod's Security Context fsGroup | `1001` |
|
||||
| `apiserver.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
|
||||
| `apiserver.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
|
||||
| `apiserver.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
|
||||
| `apiserver.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` |
|
||||
| `apiserver.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
|
||||
| `apiserver.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
|
||||
| `apiserver.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` |
|
||||
| `apiserver.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` |
|
||||
| `apiserver.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` |
|
||||
| `apiserver.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` |
|
||||
| `apiserver.command` | Override default container command (useful when using custom images) | `[]` |
|
||||
| `apiserver.args` | Override default container args (useful when using custom images) | `[]` |
|
||||
| `apiserver.automountServiceAccountToken` | Mount Service Account token in pod | `true` |
|
||||
| `apiserver.hostAliases` | Kuberay API Server pods host aliases | `[]` |
|
||||
| `apiserver.podLabels` | Extra labels for Kuberay API Server pods | `{}` |
|
||||
| `apiserver.podAnnotations` | Annotations for Kuberay API Server pods | `{}` |
|
||||
| `apiserver.podAffinityPreset` | Pod affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `apiserver.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `soft` |
|
||||
| `apiserver.pdb.create` | Enable/disable a Pod Disruption Budget creation | `false` |
|
||||
| `apiserver.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` |
|
||||
| `apiserver.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` |
|
||||
| `apiserver.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `apiserver.nodeAffinityPreset.key` | Node label key to match. Ignored if `server.affinity` is set | `""` |
|
||||
| `apiserver.nodeAffinityPreset.values` | Node label values to match. Ignored if `server.affinity` is set | `[]` |
|
||||
| `apiserver.affinity` | Affinity for Kuberay API Server pods assignment | `{}` |
|
||||
| `apiserver.nodeSelector` | Node labels for Kuberay API Server pods assignment | `{}` |
|
||||
| `apiserver.tolerations` | Tolerations for Kuberay API Server pods assignment | `[]` |
|
||||
| `apiserver.updateStrategy.type` | Kuberay API Server statefulset strategy type | `RollingUpdate` |
|
||||
| `apiserver.priorityClassName` | Kuberay API Server pods' priorityClassName | `""` |
|
||||
| `apiserver.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` |
|
||||
| `apiserver.schedulerName` | Name of the k8s scheduler (other than default) for Kuberay API Server pods | `""` |
|
||||
| `apiserver.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` |
|
||||
| `apiserver.lifecycleHooks` | for the Kuberay API Server container(s) to automate configuration before or after startup | `{}` |
|
||||
| `apiserver.extraEnvVars` | Array with extra environment variables to add to Kuberay API Server nodes | `[]` |
|
||||
| `apiserver.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Kuberay API Server nodes | `""` |
|
||||
| `apiserver.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Kuberay API Server nodes | `""` |
|
||||
| `apiserver.extraVolumes` | Optionally specify extra list of additional volumes for the Kuberay API Server pod(s) | `[]` |
|
||||
| `apiserver.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Kuberay API Server container(s) | `[]` |
|
||||
| `apiserver.sidecars` | Add additional sidecar containers to the Kuberay API Server pod(s) | `[]` |
|
||||
| `apiserver.initContainers` | Add additional init containers to the Kuberay API Server pod(s) | `[]` |
|
||||
| `apiserver.autoscaling.vpa.enabled` | Enable VPA | `false` |
|
||||
| `apiserver.autoscaling.vpa.annotations` | Annotations for VPA resource | `{}` |
|
||||
| `apiserver.autoscaling.vpa.controlledResources` | VPA List of resources that the vertical pod autoscaler can control. Defaults to cpu and memory | `[]` |
|
||||
| `apiserver.autoscaling.vpa.maxAllowed` | VPA Max allowed resources for the pod | `{}` |
|
||||
| `apiserver.autoscaling.vpa.minAllowed` | VPA Min allowed resources for the pod | `{}` |
|
||||
| `apiserver.autoscaling.vpa.updatePolicy.updateMode` | Autoscaling update policy Specifies whether recommended updates are applied when a Pod is started and whether recommended updates are applied during the life of a Pod | `Auto` |
|
||||
| `apiserver.autoscaling.hpa.enabled` | Enable autoscaling for apiserver | `false` |
|
||||
| `apiserver.autoscaling.hpa.minReplicas` | Minimum number of apiserver replicas | `""` |
|
||||
| `apiserver.autoscaling.hpa.maxReplicas` | Maximum number of apiserver replicas | `""` |
|
||||
| `apiserver.autoscaling.hpa.targetCPU` | Target CPU utilization percentage | `""` |
|
||||
| `apiserver.autoscaling.hpa.targetMemory` | Target Memory utilization percentage | `""` |
|
||||
|
||||
### Kuberay API Server Traffic Exposure Parameters
|
||||
|
||||
@@ -489,113 +489,113 @@ As an alternative, use one of the preset configurations for pod affinity, pod an
|
||||
|
||||
### Ray Cluster Head Parameters
|
||||
|
||||
| Name | Description | Value |
|
||||
| ---------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- |
|
||||
| `cluster.head.rayStartParams` | Set Ray start parameters | `{}` |
|
||||
| `cluster.head.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if cluster.head.resources is set (cluster.head.resources is recommended for production). | `medium` |
|
||||
| `cluster.head.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
|
||||
| `cluster.head.podSecurityContext.enabled` | Enabled Ray Cluster Worker (common) pods' Security Context | `true` |
|
||||
| `cluster.head.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` |
|
||||
| `cluster.head.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` |
|
||||
| `cluster.head.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
|
||||
| `cluster.head.podSecurityContext.fsGroup` | Set Ray Cluster Worker (common) pod's Security Context fsGroup | `1001` |
|
||||
| `cluster.head.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
|
||||
| `cluster.head.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
|
||||
| `cluster.head.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
|
||||
| `cluster.head.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` |
|
||||
| `cluster.head.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
|
||||
| `cluster.head.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
|
||||
| `cluster.head.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` |
|
||||
| `cluster.head.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` |
|
||||
| `cluster.head.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` |
|
||||
| `cluster.head.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` |
|
||||
| `cluster.head.command` | Override default container command (useful when using custom images) | `[]` |
|
||||
| `cluster.head.args` | Override default container args (useful when using custom images) | `[]` |
|
||||
| `cluster.head.automountServiceAccountToken` | Mount Service Account token in pod | `false` |
|
||||
| `cluster.head.hostAliases` | Ray Cluster Worker (common) pods host aliases | `[]` |
|
||||
| `cluster.head.podLabels` | Extra labels for Ray Cluster Worker (common) pods | `{}` |
|
||||
| `cluster.head.podAnnotations` | Annotations for Ray Cluster Worker (common) pods | `{}` |
|
||||
| `cluster.head.podAffinityPreset` | Pod affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `cluster.head.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `soft` |
|
||||
| `cluster.head.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `cluster.head.nodeAffinityPreset.key` | Node label key to match. Ignored if `server.affinity` is set | `""` |
|
||||
| `cluster.head.nodeAffinityPreset.values` | Node label values to match. Ignored if `server.affinity` is set | `[]` |
|
||||
| `cluster.head.affinity` | Affinity for Ray Cluster Worker (common) pods assignment | `{}` |
|
||||
| `cluster.head.nodeSelector` | Node labels for Ray Cluster Worker (common) pods assignment | `{}` |
|
||||
| `cluster.head.tolerations` | Tolerations for Ray Cluster Worker (common) pods assignment | `[]` |
|
||||
| `cluster.head.priorityClassName` | Ray Cluster Worker (common) pods' priorityClassName | `""` |
|
||||
| `cluster.head.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` |
|
||||
| `cluster.head.schedulerName` | Name of the k8s scheduler (other than default) for Ray Cluster Worker (common) pods | `""` |
|
||||
| `cluster.head.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` |
|
||||
| `cluster.head.lifecycleHooks` | for the Ray Cluster Worker (common) container(s) to automate configuration before or after startup | `{}` |
|
||||
| `cluster.head.extraEnvVars` | Array with extra environment variables to add to Ray Cluster Worker (common) nodes | `[]` |
|
||||
| `cluster.head.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Ray Cluster Worker (common) nodes | `""` |
|
||||
| `cluster.head.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Ray Cluster Worker (common) nodes | `""` |
|
||||
| `cluster.head.extraVolumes` | Optionally specify extra list of additional volumes for the Ray Cluster Worker (common) pod(s) | `[]` |
|
||||
| `cluster.head.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Ray Cluster Worker (common) container(s) | `[]` |
|
||||
| `cluster.head.sidecars` | Add additional sidecar containers to the Ray Cluster Worker (common) pod(s) | `[]` |
|
||||
| `cluster.head.initContainers` | Add additional init containers to the Ray Cluster Worker (common) pod(s) | `[]` |
|
||||
| `cluster.head.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` |
|
||||
| `cluster.head.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` |
|
||||
| `cluster.head.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` |
|
||||
| Name | Description | Value |
|
||||
| ---------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------- |
|
||||
| `cluster.head.rayStartParams` | Set Ray start parameters | `{}` |
|
||||
| `cluster.head.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if cluster.head.resources is set (cluster.head.resources is recommended for production). | `medium` |
|
||||
| `cluster.head.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
|
||||
| `cluster.head.podSecurityContext.enabled` | Enabled Ray Cluster Worker (common) pods' Security Context | `true` |
|
||||
| `cluster.head.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` |
|
||||
| `cluster.head.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` |
|
||||
| `cluster.head.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
|
||||
| `cluster.head.podSecurityContext.fsGroup` | Set Ray Cluster Worker (common) pod's Security Context fsGroup | `1001` |
|
||||
| `cluster.head.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
|
||||
| `cluster.head.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
|
||||
| `cluster.head.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
|
||||
| `cluster.head.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` |
|
||||
| `cluster.head.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
|
||||
| `cluster.head.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
|
||||
| `cluster.head.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` |
|
||||
| `cluster.head.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` |
|
||||
| `cluster.head.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` |
|
||||
| `cluster.head.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` |
|
||||
| `cluster.head.command` | Override default container command (useful when using custom images) | `[]` |
|
||||
| `cluster.head.args` | Override default container args (useful when using custom images) | `[]` |
|
||||
| `cluster.head.automountServiceAccountToken` | Mount Service Account token in pod | `false` |
|
||||
| `cluster.head.hostAliases` | Ray Cluster Worker (common) pods host aliases | `[]` |
|
||||
| `cluster.head.podLabels` | Extra labels for Ray Cluster Worker (common) pods | `{}` |
|
||||
| `cluster.head.podAnnotations` | Annotations for Ray Cluster Worker (common) pods | `{}` |
|
||||
| `cluster.head.podAffinityPreset` | Pod affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `cluster.head.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `soft` |
|
||||
| `cluster.head.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `cluster.head.nodeAffinityPreset.key` | Node label key to match. Ignored if `server.affinity` is set | `""` |
|
||||
| `cluster.head.nodeAffinityPreset.values` | Node label values to match. Ignored if `server.affinity` is set | `[]` |
|
||||
| `cluster.head.affinity` | Affinity for Ray Cluster Worker (common) pods assignment | `{}` |
|
||||
| `cluster.head.nodeSelector` | Node labels for Ray Cluster Worker (common) pods assignment | `{}` |
|
||||
| `cluster.head.tolerations` | Tolerations for Ray Cluster Worker (common) pods assignment | `[]` |
|
||||
| `cluster.head.priorityClassName` | Ray Cluster Worker (common) pods' priorityClassName | `""` |
|
||||
| `cluster.head.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` |
|
||||
| `cluster.head.schedulerName` | Name of the k8s scheduler (other than default) for Ray Cluster Worker (common) pods | `""` |
|
||||
| `cluster.head.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` |
|
||||
| `cluster.head.lifecycleHooks` | for the Ray Cluster Worker (common) container(s) to automate configuration before or after startup | `{}` |
|
||||
| `cluster.head.extraEnvVars` | Array with extra environment variables to add to Ray Cluster Worker (common) nodes | `[]` |
|
||||
| `cluster.head.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Ray Cluster Worker (common) nodes | `""` |
|
||||
| `cluster.head.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Ray Cluster Worker (common) nodes | `""` |
|
||||
| `cluster.head.extraVolumes` | Optionally specify extra list of additional volumes for the Ray Cluster Worker (common) pod(s) | `[]` |
|
||||
| `cluster.head.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Ray Cluster Worker (common) container(s) | `[]` |
|
||||
| `cluster.head.sidecars` | Add additional sidecar containers to the Ray Cluster Worker (common) pod(s) | `[]` |
|
||||
| `cluster.head.initContainers` | Add additional init containers to the Ray Cluster Worker (common) pod(s) | `[]` |
|
||||
| `cluster.head.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` |
|
||||
| `cluster.head.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` |
|
||||
| `cluster.head.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` |
|
||||
|
||||
### Ray Cluster Worker Parameters
|
||||
|
||||
| Name | Description | Value |
|
||||
| ------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- |
|
||||
| `cluster.worker.common.rayStartParams` | Set Ray start parameters | `{}` |
|
||||
| `cluster.worker.common.replicaCount` | Number of Ray Cluster Worker (common) replicas to deploy | `1` |
|
||||
| `cluster.worker.common.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` |
|
||||
| `cluster.worker.common.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` |
|
||||
| `cluster.worker.common.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` |
|
||||
| `cluster.worker.common.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if cluster.worker.common.resources is set (cluster.worker.common.resources is recommended for production). | `small` |
|
||||
| `cluster.worker.common.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
|
||||
| `cluster.worker.common.podSecurityContext.enabled` | Enabled Ray Cluster Worker (common) pods' Security Context | `true` |
|
||||
| `cluster.worker.common.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` |
|
||||
| `cluster.worker.common.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` |
|
||||
| `cluster.worker.common.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
|
||||
| `cluster.worker.common.podSecurityContext.fsGroup` | Set Ray Cluster Worker (common) pod's Security Context fsGroup | `1001` |
|
||||
| `cluster.worker.common.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
|
||||
| `cluster.worker.common.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
|
||||
| `cluster.worker.common.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
|
||||
| `cluster.worker.common.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` |
|
||||
| `cluster.worker.common.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
|
||||
| `cluster.worker.common.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
|
||||
| `cluster.worker.common.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` |
|
||||
| `cluster.worker.common.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` |
|
||||
| `cluster.worker.common.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` |
|
||||
| `cluster.worker.common.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` |
|
||||
| `cluster.worker.common.command` | Override default container command (useful when using custom images) | `[]` |
|
||||
| `cluster.worker.common.args` | Override default container args (useful when using custom images) | `[]` |
|
||||
| `cluster.worker.common.automountServiceAccountToken` | Mount Service Account token in pod | `false` |
|
||||
| `cluster.worker.common.hostAliases` | Ray Cluster Worker (common) pods host aliases | `[]` |
|
||||
| `cluster.worker.common.podLabels` | Extra labels for Ray Cluster Worker (common) pods | `{}` |
|
||||
| `cluster.worker.common.podAnnotations` | Annotations for Ray Cluster Worker (common) pods | `{}` |
|
||||
| `cluster.worker.common.podAffinityPreset` | Pod affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `cluster.worker.common.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `soft` |
|
||||
| `cluster.worker.common.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `cluster.worker.common.nodeAffinityPreset.key` | Node label key to match. Ignored if `server.affinity` is set | `""` |
|
||||
| `cluster.worker.common.nodeAffinityPreset.values` | Node label values to match. Ignored if `server.affinity` is set | `[]` |
|
||||
| `cluster.worker.common.affinity` | Affinity for Ray Cluster Worker (common) pods assignment | `{}` |
|
||||
| `cluster.worker.common.nodeSelector` | Node labels for Ray Cluster Worker (common) pods assignment | `{}` |
|
||||
| `cluster.worker.common.tolerations` | Tolerations for Ray Cluster Worker (common) pods assignment | `[]` |
|
||||
| `cluster.worker.common.priorityClassName` | Ray Cluster Worker (common) pods' priorityClassName | `""` |
|
||||
| `cluster.worker.common.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` |
|
||||
| `cluster.worker.common.schedulerName` | Name of the k8s scheduler (other than default) for Ray Cluster Worker (common) pods | `""` |
|
||||
| `cluster.worker.common.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` |
|
||||
| `cluster.worker.common.lifecycleHooks` | for the Ray Cluster Worker (common) container(s) to automate configuration before or after startup | `{}` |
|
||||
| `cluster.worker.common.extraEnvVars` | Array with extra environment variables to add to Ray Cluster Worker (common) nodes | `[]` |
|
||||
| `cluster.worker.common.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Ray Cluster Worker (common) nodes | `""` |
|
||||
| `cluster.worker.common.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Ray Cluster Worker (common) nodes | `""` |
|
||||
| `cluster.worker.common.extraVolumes` | Optionally specify extra list of additional volumes for the Ray Cluster Worker (common) pod(s) | `[]` |
|
||||
| `cluster.worker.common.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Ray Cluster Worker (common) container(s) | `[]` |
|
||||
| `cluster.worker.common.sidecars` | Add additional sidecar containers to the Ray Cluster Worker (common) pod(s) | `[]` |
|
||||
| `cluster.worker.common.initContainers` | Add additional init containers to the Ray Cluster Worker (common) pod(s) | `[]` |
|
||||
| `cluster.worker.groupSpecs` | Set worker groupspec parameters | `[]` |
|
||||
| `cluster.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` |
|
||||
| `cluster.serviceAccount.name` | The name of the ServiceAccount to use. | `""` |
|
||||
| `cluster.serviceAccount.annotations` | Additional Service Account annotations (evaluated as a template) | `{}` |
|
||||
| `cluster.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `false` |
|
||||
| Name | Description | Value |
|
||||
| ------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------- |
|
||||
| `cluster.worker.common.rayStartParams` | Set Ray start parameters | `{}` |
|
||||
| `cluster.worker.common.replicaCount` | Number of Ray Cluster Worker (common) replicas to deploy | `1` |
|
||||
| `cluster.worker.common.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` |
|
||||
| `cluster.worker.common.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` |
|
||||
| `cluster.worker.common.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` |
|
||||
| `cluster.worker.common.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if cluster.worker.common.resources is set (cluster.worker.common.resources is recommended for production). | `small` |
|
||||
| `cluster.worker.common.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
|
||||
| `cluster.worker.common.podSecurityContext.enabled` | Enabled Ray Cluster Worker (common) pods' Security Context | `true` |
|
||||
| `cluster.worker.common.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` |
|
||||
| `cluster.worker.common.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` |
|
||||
| `cluster.worker.common.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` |
|
||||
| `cluster.worker.common.podSecurityContext.fsGroup` | Set Ray Cluster Worker (common) pod's Security Context fsGroup | `1001` |
|
||||
| `cluster.worker.common.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
|
||||
| `cluster.worker.common.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` |
|
||||
| `cluster.worker.common.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
|
||||
| `cluster.worker.common.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` |
|
||||
| `cluster.worker.common.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
|
||||
| `cluster.worker.common.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
|
||||
| `cluster.worker.common.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` |
|
||||
| `cluster.worker.common.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` |
|
||||
| `cluster.worker.common.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` |
|
||||
| `cluster.worker.common.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` |
|
||||
| `cluster.worker.common.command` | Override default container command (useful when using custom images) | `[]` |
|
||||
| `cluster.worker.common.args` | Override default container args (useful when using custom images) | `[]` |
|
||||
| `cluster.worker.common.automountServiceAccountToken` | Mount Service Account token in pod | `false` |
|
||||
| `cluster.worker.common.hostAliases` | Ray Cluster Worker (common) pods host aliases | `[]` |
|
||||
| `cluster.worker.common.podLabels` | Extra labels for Ray Cluster Worker (common) pods | `{}` |
|
||||
| `cluster.worker.common.podAnnotations` | Annotations for Ray Cluster Worker (common) pods | `{}` |
|
||||
| `cluster.worker.common.podAffinityPreset` | Pod affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `cluster.worker.common.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `soft` |
|
||||
| `cluster.worker.common.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `server.affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
||||
| `cluster.worker.common.nodeAffinityPreset.key` | Node label key to match. Ignored if `server.affinity` is set | `""` |
|
||||
| `cluster.worker.common.nodeAffinityPreset.values` | Node label values to match. Ignored if `server.affinity` is set | `[]` |
|
||||
| `cluster.worker.common.affinity` | Affinity for Ray Cluster Worker (common) pods assignment | `{}` |
|
||||
| `cluster.worker.common.nodeSelector` | Node labels for Ray Cluster Worker (common) pods assignment | `{}` |
|
||||
| `cluster.worker.common.tolerations` | Tolerations for Ray Cluster Worker (common) pods assignment | `[]` |
|
||||
| `cluster.worker.common.priorityClassName` | Ray Cluster Worker (common) pods' priorityClassName | `""` |
|
||||
| `cluster.worker.common.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `[]` |
|
||||
| `cluster.worker.common.schedulerName` | Name of the k8s scheduler (other than default) for Ray Cluster Worker (common) pods | `""` |
|
||||
| `cluster.worker.common.terminationGracePeriodSeconds` | Seconds Redmine pod needs to terminate gracefully | `""` |
|
||||
| `cluster.worker.common.lifecycleHooks` | for the Ray Cluster Worker (common) container(s) to automate configuration before or after startup | `{}` |
|
||||
| `cluster.worker.common.extraEnvVars` | Array with extra environment variables to add to Ray Cluster Worker (common) nodes | `[]` |
|
||||
| `cluster.worker.common.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Ray Cluster Worker (common) nodes | `""` |
|
||||
| `cluster.worker.common.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Ray Cluster Worker (common) nodes | `""` |
|
||||
| `cluster.worker.common.extraVolumes` | Optionally specify extra list of additional volumes for the Ray Cluster Worker (common) pod(s) | `[]` |
|
||||
| `cluster.worker.common.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the Ray Cluster Worker (common) container(s) | `[]` |
|
||||
| `cluster.worker.common.sidecars` | Add additional sidecar containers to the Ray Cluster Worker (common) pod(s) | `[]` |
|
||||
| `cluster.worker.common.initContainers` | Add additional init containers to the Ray Cluster Worker (common) pod(s) | `[]` |
|
||||
| `cluster.worker.groupSpecs` | Set worker groupspec parameters | `[]` |
|
||||
| `cluster.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` |
|
||||
| `cluster.serviceAccount.name` | The name of the ServiceAccount to use. | `""` |
|
||||
| `cluster.serviceAccount.annotations` | Additional Service Account annotations (evaluated as a template) | `{}` |
|
||||
| `cluster.serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `false` |
|
||||
|
||||
The above parameters map to the env variables defined in [bitnami/kuberay](https://github.com/bitnami/containers/tree/main/bitnami/kuberay). For more information please refer to the [bitnami/kuberay](https://github.com/bitnami/containers/tree/main/bitnami/kuberay) image documentation.
|
||||
|
||||
|
||||
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@@ -82,7 +82,7 @@ diagnosticMode:
|
||||
rayImage:
|
||||
registry: docker.io
|
||||
repository: bitnami/ray
|
||||
tag: 2.9.3-debian-12-r0
|
||||
tag: 2.10.0-debian-12-r2
|
||||
digest: ""
|
||||
## Specify a imagePullPolicy
|
||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||
@@ -119,7 +119,7 @@ operator:
|
||||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/kuberay-operator
|
||||
tag: 1.0.0-debian-12-r15
|
||||
tag: 1.1.0-debian-12-r2
|
||||
digest: ""
|
||||
## Specify a imagePullPolicy
|
||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||
@@ -771,7 +771,7 @@ apiserver:
|
||||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/kuberay-apiserver
|
||||
tag: 1.0.0-debian-12-r12
|
||||
tag: 1.1.0-debian-12-r2
|
||||
digest: ""
|
||||
## Specify a imagePullPolicy
|
||||
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
|
||||
|
||||
Reference in New Issue
Block a user