[bitnami/mlflow] fix: allowed minAvailable to be percentage, updated schema (#23555)

Signed-off-by: Thatcher Peskens <thatcher@t2studio.nl>
Signed-off-by: Carlos Rodríguez Hernández <carlosrh@vmware.com>
Co-authored-by: Carlos Rodríguez Hernández <carlosrh@vmware.com>
This commit is contained in:
Thatcher
2024-02-21 10:57:25 +01:00
committed by GitHub
parent be2533f8f4
commit d2e8689147
3 changed files with 168 additions and 113 deletions

View File

@@ -43,4 +43,4 @@ name: mlflow
sources:
- https://github.com/bitnami/containers/tree/main/bitnami/mlflow
- https://github.com/mlflow/mlflow
version: 0.10.0
version: 0.10.1

View File

@@ -100,17 +100,12 @@
"registry": {
"type": "string",
"description": "mlflow image registry",
"default": "docker.io"
"default": "REGISTRY_NAME"
},
"repository": {
"type": "string",
"description": "mlflow image repository",
"default": "bitnami/mlflow"
},
"tag": {
"type": "string",
"description": "mlflow image tag (immutable tags are recommended)",
"default": "2.7.1-debian-11-r0"
"default": "REPOSITORY_NAME/mlflow"
},
"digest": {
"type": "string",
@@ -141,17 +136,12 @@
"registry": {
"type": "string",
"description": "Git image registry",
"default": "docker.io"
"default": "REGISTRY_NAME"
},
"repository": {
"type": "string",
"description": "Git image repository",
"default": "bitnami/git"
},
"tag": {
"type": "string",
"description": "Git image tag (immutable tags are recommended)",
"default": "2.42.0-debian-11-r20"
"default": "REPOSITORY_NAME/git"
},
"digest": {
"type": "string",
@@ -337,20 +327,27 @@
"description": "Enabled mlflow pods' Security Context",
"default": true
},
"fsGroupChangePolicy": {
"type": "string",
"description": "Set filesystem group change policy",
"default": "Always"
},
"sysctls": {
"type": "array",
"description": "Set kernel settings using the sysctl interface",
"default": [],
"items": {}
},
"supplementalGroups": {
"type": "array",
"description": "Set filesystem extra groups",
"default": [],
"items": {}
},
"fsGroup": {
"type": "number",
"description": "Set mlflow pod's Security Context fsGroup",
"default": 1001
},
"seccompProfile": {
"type": "object",
"properties": {
"type": {
"type": "string",
"description": "Set container's Security Context seccomp profile",
"default": "RuntimeDefault"
}
}
}
}
},
@@ -372,6 +369,11 @@
"description": "Set containers' Security Context runAsGroup",
"default": 1001
},
"privileged": {
"type": "boolean",
"description": "Set containers' Security Context privileged",
"default": false
},
"runAsNonRoot": {
"type": "boolean",
"description": "Set containers' Security Context runAsNonRoot",
@@ -401,6 +403,16 @@
}
}
}
},
"seccompProfile": {
"type": "object",
"properties": {
"type": {
"type": "string",
"description": "Set container's Security Context seccomp profile",
"default": "RuntimeDefault"
}
}
}
}
},
@@ -507,6 +519,11 @@
"description": "Add an init container to run mlflow db upgrade",
"default": false
},
"automountServiceAccountToken": {
"type": "boolean",
"description": "Mount Service Account token in pod",
"default": false
},
"hostAliases": {
"type": "array",
"description": "mlflow pods host aliases",
@@ -542,9 +559,9 @@
"default": false
},
"minAvailable": {
"type": "number",
"type": "string",
"description": "Minimum number/percentage of pods that should remain scheduled",
"default": 1
"default": "1"
},
"maxUnavailable": {
"type": "string",
@@ -847,11 +864,6 @@
"description": "Ingress path type",
"default": "ImplementationSpecific"
},
"apiVersion": {
"type": "string",
"description": "Force Ingress API version (automatically detected if not set)",
"default": ""
},
"hostname": {
"type": "string",
"description": "Default host for the ingress record",
@@ -920,24 +932,33 @@
"enabled": {
"type": "boolean",
"description": "Enable creation of NetworkPolicy resources",
"default": false
"default": true
},
"allowExternal": {
"type": "boolean",
"description": "The Policy model to apply",
"default": true
},
"allowExternalEgress": {
"type": "boolean",
"description": "Allow the pod to access any range of port and all destinations.",
"default": true
},
"extraIngress": {
"type": "array",
"description": "Add extra ingress rules to the NetworkPolicy",
"default": [],
"items": {}
"default": "[]",
"items": {
"type": "string"
}
},
"extraEgress": {
"type": "array",
"description": "Add extra ingress rules to the NetworkPolicy",
"default": [],
"items": {}
"default": "[]",
"items": {
"type": "string"
}
}
}
},
@@ -1039,26 +1060,6 @@
"description": "Enable the export of Prometheus metrics",
"default": false
},
"annotations": {
"type": "object",
"properties": {
"prometheus": {
"type": "object",
"properties": {
"io/scrape": {
"type": "string",
"description": "",
"default": "true"
},
"io/port": {
"type": "string",
"description": "",
"default": "{{ .Values.tracking.service.ports.http }}"
}
}
}
}
},
"serviceMonitor": {
"type": "object",
"properties": {
@@ -1329,20 +1330,27 @@
"description": "Enabled Run pods' Security Context",
"default": true
},
"fsGroupChangePolicy": {
"type": "string",
"description": "Set filesystem group change policy",
"default": "Always"
},
"sysctls": {
"type": "array",
"description": "Set kernel settings using the sysctl interface",
"default": [],
"items": {}
},
"supplementalGroups": {
"type": "array",
"description": "Set filesystem extra groups",
"default": [],
"items": {}
},
"fsGroup": {
"type": "number",
"description": "Set Run pod's Security Context fsGroup",
"default": 1001
},
"seccompProfile": {
"type": "object",
"properties": {
"type": {
"type": "string",
"description": "Set Run container's Security Context seccomp profile",
"default": "RuntimeDefault"
}
}
}
}
},
@@ -1369,6 +1377,11 @@
"description": "Set Run containers' Security Context runAsNonRoot",
"default": true
},
"privileged": {
"type": "boolean",
"description": "Set Run containers' Security Context privileged",
"default": false
},
"readOnlyRootFilesystem": {
"type": "boolean",
"description": "Set Run containers' Security Context runAsNonRoot",
@@ -1393,6 +1406,16 @@
}
}
}
},
"seccompProfile": {
"type": "object",
"properties": {
"type": {
"type": "string",
"description": "Set Run container's Security Context seccomp profile",
"default": "RuntimeDefault"
}
}
}
}
},
@@ -1406,6 +1429,11 @@
"description": "Name of the runtime class to be used by pod(s)",
"default": ""
},
"automountServiceAccountToken": {
"type": "boolean",
"description": "Mount Service Account token in pod",
"default": false
},
"hostAliases": {
"type": "array",
"description": "run pods host aliases",
@@ -1534,6 +1562,42 @@
"default": [],
"items": {}
},
"networkPolicy": {
"type": "object",
"properties": {
"enabled": {
"type": "boolean",
"description": "Enable creation of NetworkPolicy resources",
"default": true
},
"allowExternal": {
"type": "boolean",
"description": "The Policy model to apply",
"default": true
},
"allowExternalEgress": {
"type": "boolean",
"description": "Allow the pod to access any range of port and all destinations.",
"default": true
},
"extraIngress": {
"type": "array",
"description": "Add extra ingress rules to the NetworkPolicy",
"default": "[]",
"items": {
"type": "string"
}
},
"extraEgress": {
"type": "array",
"description": "Add extra ingress rules to the NetworkPolicy",
"default": "[]",
"items": {
"type": "string"
}
}
}
},
"source": {
"type": "object",
"properties": {
@@ -1586,7 +1650,7 @@
"create": {
"type": "boolean",
"description": "Enable creation of ServiceAccount for Run pods",
"default": false
"default": true
},
"name": {
"type": "string",
@@ -1686,17 +1750,12 @@
"registry": {
"type": "string",
"description": "OS Shell + Utility image registry",
"default": "docker.io"
"default": "REGISTRY_NAME"
},
"repository": {
"type": "string",
"description": "OS Shell + Utility image repository",
"default": "bitnami/os-shell"
},
"tag": {
"type": "string",
"description": "OS Shell + Utility image tag (immutable tags are recommended)",
"default": "11-debian-11-r81"
"default": "REPOSITORY_NAME/os-shell"
},
"pullPolicy": {
"type": "string",
@@ -1752,17 +1811,12 @@
"registry": {
"type": "string",
"description": "Init container wait-container image registry",
"default": "docker.io"
"default": "REGISTRY_NAME"
},
"repository": {
"type": "string",
"description": "Init container wait-container image name",
"default": "bitnami/os-shell"
},
"tag": {
"type": "string",
"description": "Init container wait-container image tag",
"default": "11-debian-11-r83"
"default": "REPOSITORY_NAME/os-shell"
},
"digest": {
"type": "string",
@@ -1777,8 +1831,10 @@
"pullSecrets": {
"type": "array",
"description": "Specify docker-registry secret names as an array",
"default": [],
"items": {}
"default": "[]",
"items": {
"type": "string"
}
}
}
},
@@ -1787,27 +1843,32 @@
"properties": {
"enabled": {
"type": "boolean",
"description": "Enabled APISIX containers' Security Context",
"description": "Enabled containers' Security Context",
"default": true
},
"runAsUser": {
"type": "number",
"description": "Set APISIX containers' Security Context runAsUser",
"description": "Set containers' Security Context runAsUser",
"default": 1001
},
"runAsNonRoot": {
"type": "boolean",
"description": "Set APISIX containers' Security Context runAsNonRoot",
"description": "Set containers' Security Context runAsNonRoot",
"default": true
},
"privileged": {
"type": "boolean",
"description": "Set containers' Security Context privileged",
"default": false
},
"readOnlyRootFilesystem": {
"type": "boolean",
"description": "Set APISIX containers' Security Context runAsNonRoot",
"description": "Set containers' Security Context runAsNonRoot",
"default": true
},
"allowPrivilegeEscalation": {
"type": "boolean",
"description": "Set APISIX container's privilege escalation",
"description": "Set container's privilege escalation",
"default": false
},
"capabilities": {
@@ -1815,7 +1876,7 @@
"properties": {
"drop": {
"type": "array",
"description": "Set APISIX container's Security Context runAsNonRoot",
"description": "Set container's Security Context runAsNonRoot",
"default": [
"ALL"
],
@@ -1824,6 +1885,16 @@
}
}
}
},
"seccompProfile": {
"type": "object",
"properties": {
"type": {
"type": "string",
"description": "Set container's Security Context seccomp profile",
"default": "RuntimeDefault"
}
}
}
}
}
@@ -1884,26 +1955,6 @@
}
}
}
},
"initdb": {
"type": "object",
"properties": {
"scripts": {
"type": "object",
"properties": {
"create_auth_db": {
"type": "object",
"properties": {
"sh": {
"type": "string",
"description": "",
"default": "#!/bin/bash\nPGPASSWORD=$POSTGRES_POSTGRES_PASSWORD psql -U postgres <<< \"CREATE DATABASE {{ include \"mlflow.v0.database-auth.name\" . }}\"\nPGPASSWORD=$POSTGRES_POSTGRES_PASSWORD psql -U postgres <<< \"GRANT ALL PRIVILEGES ON DATABASE {{ include \"mlflow.v0.database-auth.name\" . }} to {{ .Values.auth.username }}\"\nPGPASSWORD=$POSTGRES_POSTGRES_PASSWORD psql -U postgres <<< \"ALTER DATABASE {{ include \"mlflow.v0.database-auth.name\" . }} OWNER TO {{ .Values.auth.username }}\"\n"
}
}
}
}
}
}
}
}
}
@@ -2096,8 +2147,13 @@
"type": "string",
"description": "External S3 bucket",
"default": "mlflow"
},
"serveArtifacts": {
"type": "boolean",
"description": "Whether artifact serving is enabled",
"default": true
}
}
}
}
}
}

View File

@@ -320,12 +320,11 @@ tracking:
## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb
## @param tracking.pdb.create Enable/disable a Pod Disruption Budget creation
## @param tracking.pdb.minAvailable Minimum number/percentage of pods that should remain scheduled
## @param tracking.pdb.maxUnavailable Maximum number/percentage of pods that may be made unavailable
##
pdb:
create: false
minAvailable: 1
minAvailable: "1"
maxUnavailable: ""
## Autoscaling configuration
## ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/