mirror of
https://github.com/bitnami/charts.git
synced 2026-03-06 06:58:50 +08:00
[bitnami/mlflow] fix: allowed minAvailable to be percentage, updated schema (#23555)
Signed-off-by: Thatcher Peskens <thatcher@t2studio.nl> Signed-off-by: Carlos Rodríguez Hernández <carlosrh@vmware.com> Co-authored-by: Carlos Rodríguez Hernández <carlosrh@vmware.com>
This commit is contained in:
@@ -43,4 +43,4 @@ name: mlflow
|
||||
sources:
|
||||
- https://github.com/bitnami/containers/tree/main/bitnami/mlflow
|
||||
- https://github.com/mlflow/mlflow
|
||||
version: 0.10.0
|
||||
version: 0.10.1
|
||||
|
||||
@@ -100,17 +100,12 @@
|
||||
"registry": {
|
||||
"type": "string",
|
||||
"description": "mlflow image registry",
|
||||
"default": "docker.io"
|
||||
"default": "REGISTRY_NAME"
|
||||
},
|
||||
"repository": {
|
||||
"type": "string",
|
||||
"description": "mlflow image repository",
|
||||
"default": "bitnami/mlflow"
|
||||
},
|
||||
"tag": {
|
||||
"type": "string",
|
||||
"description": "mlflow image tag (immutable tags are recommended)",
|
||||
"default": "2.7.1-debian-11-r0"
|
||||
"default": "REPOSITORY_NAME/mlflow"
|
||||
},
|
||||
"digest": {
|
||||
"type": "string",
|
||||
@@ -141,17 +136,12 @@
|
||||
"registry": {
|
||||
"type": "string",
|
||||
"description": "Git image registry",
|
||||
"default": "docker.io"
|
||||
"default": "REGISTRY_NAME"
|
||||
},
|
||||
"repository": {
|
||||
"type": "string",
|
||||
"description": "Git image repository",
|
||||
"default": "bitnami/git"
|
||||
},
|
||||
"tag": {
|
||||
"type": "string",
|
||||
"description": "Git image tag (immutable tags are recommended)",
|
||||
"default": "2.42.0-debian-11-r20"
|
||||
"default": "REPOSITORY_NAME/git"
|
||||
},
|
||||
"digest": {
|
||||
"type": "string",
|
||||
@@ -337,20 +327,27 @@
|
||||
"description": "Enabled mlflow pods' Security Context",
|
||||
"default": true
|
||||
},
|
||||
"fsGroupChangePolicy": {
|
||||
"type": "string",
|
||||
"description": "Set filesystem group change policy",
|
||||
"default": "Always"
|
||||
},
|
||||
"sysctls": {
|
||||
"type": "array",
|
||||
"description": "Set kernel settings using the sysctl interface",
|
||||
"default": [],
|
||||
"items": {}
|
||||
},
|
||||
"supplementalGroups": {
|
||||
"type": "array",
|
||||
"description": "Set filesystem extra groups",
|
||||
"default": [],
|
||||
"items": {}
|
||||
},
|
||||
"fsGroup": {
|
||||
"type": "number",
|
||||
"description": "Set mlflow pod's Security Context fsGroup",
|
||||
"default": 1001
|
||||
},
|
||||
"seccompProfile": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"type": {
|
||||
"type": "string",
|
||||
"description": "Set container's Security Context seccomp profile",
|
||||
"default": "RuntimeDefault"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
@@ -372,6 +369,11 @@
|
||||
"description": "Set containers' Security Context runAsGroup",
|
||||
"default": 1001
|
||||
},
|
||||
"privileged": {
|
||||
"type": "boolean",
|
||||
"description": "Set containers' Security Context privileged",
|
||||
"default": false
|
||||
},
|
||||
"runAsNonRoot": {
|
||||
"type": "boolean",
|
||||
"description": "Set containers' Security Context runAsNonRoot",
|
||||
@@ -401,6 +403,16 @@
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"seccompProfile": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"type": {
|
||||
"type": "string",
|
||||
"description": "Set container's Security Context seccomp profile",
|
||||
"default": "RuntimeDefault"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
@@ -507,6 +519,11 @@
|
||||
"description": "Add an init container to run mlflow db upgrade",
|
||||
"default": false
|
||||
},
|
||||
"automountServiceAccountToken": {
|
||||
"type": "boolean",
|
||||
"description": "Mount Service Account token in pod",
|
||||
"default": false
|
||||
},
|
||||
"hostAliases": {
|
||||
"type": "array",
|
||||
"description": "mlflow pods host aliases",
|
||||
@@ -542,9 +559,9 @@
|
||||
"default": false
|
||||
},
|
||||
"minAvailable": {
|
||||
"type": "number",
|
||||
"type": "string",
|
||||
"description": "Minimum number/percentage of pods that should remain scheduled",
|
||||
"default": 1
|
||||
"default": "1"
|
||||
},
|
||||
"maxUnavailable": {
|
||||
"type": "string",
|
||||
@@ -847,11 +864,6 @@
|
||||
"description": "Ingress path type",
|
||||
"default": "ImplementationSpecific"
|
||||
},
|
||||
"apiVersion": {
|
||||
"type": "string",
|
||||
"description": "Force Ingress API version (automatically detected if not set)",
|
||||
"default": ""
|
||||
},
|
||||
"hostname": {
|
||||
"type": "string",
|
||||
"description": "Default host for the ingress record",
|
||||
@@ -920,24 +932,33 @@
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"description": "Enable creation of NetworkPolicy resources",
|
||||
"default": false
|
||||
"default": true
|
||||
},
|
||||
"allowExternal": {
|
||||
"type": "boolean",
|
||||
"description": "The Policy model to apply",
|
||||
"default": true
|
||||
},
|
||||
"allowExternalEgress": {
|
||||
"type": "boolean",
|
||||
"description": "Allow the pod to access any range of port and all destinations.",
|
||||
"default": true
|
||||
},
|
||||
"extraIngress": {
|
||||
"type": "array",
|
||||
"description": "Add extra ingress rules to the NetworkPolicy",
|
||||
"default": [],
|
||||
"items": {}
|
||||
"default": "[]",
|
||||
"items": {
|
||||
"type": "string"
|
||||
}
|
||||
},
|
||||
"extraEgress": {
|
||||
"type": "array",
|
||||
"description": "Add extra ingress rules to the NetworkPolicy",
|
||||
"default": [],
|
||||
"items": {}
|
||||
"default": "[]",
|
||||
"items": {
|
||||
"type": "string"
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
@@ -1039,26 +1060,6 @@
|
||||
"description": "Enable the export of Prometheus metrics",
|
||||
"default": false
|
||||
},
|
||||
"annotations": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"prometheus": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"io/scrape": {
|
||||
"type": "string",
|
||||
"description": "",
|
||||
"default": "true"
|
||||
},
|
||||
"io/port": {
|
||||
"type": "string",
|
||||
"description": "",
|
||||
"default": "{{ .Values.tracking.service.ports.http }}"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"serviceMonitor": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
@@ -1329,20 +1330,27 @@
|
||||
"description": "Enabled Run pods' Security Context",
|
||||
"default": true
|
||||
},
|
||||
"fsGroupChangePolicy": {
|
||||
"type": "string",
|
||||
"description": "Set filesystem group change policy",
|
||||
"default": "Always"
|
||||
},
|
||||
"sysctls": {
|
||||
"type": "array",
|
||||
"description": "Set kernel settings using the sysctl interface",
|
||||
"default": [],
|
||||
"items": {}
|
||||
},
|
||||
"supplementalGroups": {
|
||||
"type": "array",
|
||||
"description": "Set filesystem extra groups",
|
||||
"default": [],
|
||||
"items": {}
|
||||
},
|
||||
"fsGroup": {
|
||||
"type": "number",
|
||||
"description": "Set Run pod's Security Context fsGroup",
|
||||
"default": 1001
|
||||
},
|
||||
"seccompProfile": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"type": {
|
||||
"type": "string",
|
||||
"description": "Set Run container's Security Context seccomp profile",
|
||||
"default": "RuntimeDefault"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
@@ -1369,6 +1377,11 @@
|
||||
"description": "Set Run containers' Security Context runAsNonRoot",
|
||||
"default": true
|
||||
},
|
||||
"privileged": {
|
||||
"type": "boolean",
|
||||
"description": "Set Run containers' Security Context privileged",
|
||||
"default": false
|
||||
},
|
||||
"readOnlyRootFilesystem": {
|
||||
"type": "boolean",
|
||||
"description": "Set Run containers' Security Context runAsNonRoot",
|
||||
@@ -1393,6 +1406,16 @@
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"seccompProfile": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"type": {
|
||||
"type": "string",
|
||||
"description": "Set Run container's Security Context seccomp profile",
|
||||
"default": "RuntimeDefault"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
@@ -1406,6 +1429,11 @@
|
||||
"description": "Name of the runtime class to be used by pod(s)",
|
||||
"default": ""
|
||||
},
|
||||
"automountServiceAccountToken": {
|
||||
"type": "boolean",
|
||||
"description": "Mount Service Account token in pod",
|
||||
"default": false
|
||||
},
|
||||
"hostAliases": {
|
||||
"type": "array",
|
||||
"description": "run pods host aliases",
|
||||
@@ -1534,6 +1562,42 @@
|
||||
"default": [],
|
||||
"items": {}
|
||||
},
|
||||
"networkPolicy": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"description": "Enable creation of NetworkPolicy resources",
|
||||
"default": true
|
||||
},
|
||||
"allowExternal": {
|
||||
"type": "boolean",
|
||||
"description": "The Policy model to apply",
|
||||
"default": true
|
||||
},
|
||||
"allowExternalEgress": {
|
||||
"type": "boolean",
|
||||
"description": "Allow the pod to access any range of port and all destinations.",
|
||||
"default": true
|
||||
},
|
||||
"extraIngress": {
|
||||
"type": "array",
|
||||
"description": "Add extra ingress rules to the NetworkPolicy",
|
||||
"default": "[]",
|
||||
"items": {
|
||||
"type": "string"
|
||||
}
|
||||
},
|
||||
"extraEgress": {
|
||||
"type": "array",
|
||||
"description": "Add extra ingress rules to the NetworkPolicy",
|
||||
"default": "[]",
|
||||
"items": {
|
||||
"type": "string"
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"source": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
@@ -1586,7 +1650,7 @@
|
||||
"create": {
|
||||
"type": "boolean",
|
||||
"description": "Enable creation of ServiceAccount for Run pods",
|
||||
"default": false
|
||||
"default": true
|
||||
},
|
||||
"name": {
|
||||
"type": "string",
|
||||
@@ -1686,17 +1750,12 @@
|
||||
"registry": {
|
||||
"type": "string",
|
||||
"description": "OS Shell + Utility image registry",
|
||||
"default": "docker.io"
|
||||
"default": "REGISTRY_NAME"
|
||||
},
|
||||
"repository": {
|
||||
"type": "string",
|
||||
"description": "OS Shell + Utility image repository",
|
||||
"default": "bitnami/os-shell"
|
||||
},
|
||||
"tag": {
|
||||
"type": "string",
|
||||
"description": "OS Shell + Utility image tag (immutable tags are recommended)",
|
||||
"default": "11-debian-11-r81"
|
||||
"default": "REPOSITORY_NAME/os-shell"
|
||||
},
|
||||
"pullPolicy": {
|
||||
"type": "string",
|
||||
@@ -1752,17 +1811,12 @@
|
||||
"registry": {
|
||||
"type": "string",
|
||||
"description": "Init container wait-container image registry",
|
||||
"default": "docker.io"
|
||||
"default": "REGISTRY_NAME"
|
||||
},
|
||||
"repository": {
|
||||
"type": "string",
|
||||
"description": "Init container wait-container image name",
|
||||
"default": "bitnami/os-shell"
|
||||
},
|
||||
"tag": {
|
||||
"type": "string",
|
||||
"description": "Init container wait-container image tag",
|
||||
"default": "11-debian-11-r83"
|
||||
"default": "REPOSITORY_NAME/os-shell"
|
||||
},
|
||||
"digest": {
|
||||
"type": "string",
|
||||
@@ -1777,8 +1831,10 @@
|
||||
"pullSecrets": {
|
||||
"type": "array",
|
||||
"description": "Specify docker-registry secret names as an array",
|
||||
"default": [],
|
||||
"items": {}
|
||||
"default": "[]",
|
||||
"items": {
|
||||
"type": "string"
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
@@ -1787,27 +1843,32 @@
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"description": "Enabled APISIX containers' Security Context",
|
||||
"description": "Enabled containers' Security Context",
|
||||
"default": true
|
||||
},
|
||||
"runAsUser": {
|
||||
"type": "number",
|
||||
"description": "Set APISIX containers' Security Context runAsUser",
|
||||
"description": "Set containers' Security Context runAsUser",
|
||||
"default": 1001
|
||||
},
|
||||
"runAsNonRoot": {
|
||||
"type": "boolean",
|
||||
"description": "Set APISIX containers' Security Context runAsNonRoot",
|
||||
"description": "Set containers' Security Context runAsNonRoot",
|
||||
"default": true
|
||||
},
|
||||
"privileged": {
|
||||
"type": "boolean",
|
||||
"description": "Set containers' Security Context privileged",
|
||||
"default": false
|
||||
},
|
||||
"readOnlyRootFilesystem": {
|
||||
"type": "boolean",
|
||||
"description": "Set APISIX containers' Security Context runAsNonRoot",
|
||||
"description": "Set containers' Security Context runAsNonRoot",
|
||||
"default": true
|
||||
},
|
||||
"allowPrivilegeEscalation": {
|
||||
"type": "boolean",
|
||||
"description": "Set APISIX container's privilege escalation",
|
||||
"description": "Set container's privilege escalation",
|
||||
"default": false
|
||||
},
|
||||
"capabilities": {
|
||||
@@ -1815,7 +1876,7 @@
|
||||
"properties": {
|
||||
"drop": {
|
||||
"type": "array",
|
||||
"description": "Set APISIX container's Security Context runAsNonRoot",
|
||||
"description": "Set container's Security Context runAsNonRoot",
|
||||
"default": [
|
||||
"ALL"
|
||||
],
|
||||
@@ -1824,6 +1885,16 @@
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"seccompProfile": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"type": {
|
||||
"type": "string",
|
||||
"description": "Set container's Security Context seccomp profile",
|
||||
"default": "RuntimeDefault"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1884,26 +1955,6 @@
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"initdb": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"scripts": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"create_auth_db": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"sh": {
|
||||
"type": "string",
|
||||
"description": "",
|
||||
"default": "#!/bin/bash\nPGPASSWORD=$POSTGRES_POSTGRES_PASSWORD psql -U postgres <<< \"CREATE DATABASE {{ include \"mlflow.v0.database-auth.name\" . }}\"\nPGPASSWORD=$POSTGRES_POSTGRES_PASSWORD psql -U postgres <<< \"GRANT ALL PRIVILEGES ON DATABASE {{ include \"mlflow.v0.database-auth.name\" . }} to {{ .Values.auth.username }}\"\nPGPASSWORD=$POSTGRES_POSTGRES_PASSWORD psql -U postgres <<< \"ALTER DATABASE {{ include \"mlflow.v0.database-auth.name\" . }} OWNER TO {{ .Values.auth.username }}\"\n"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -2096,8 +2147,13 @@
|
||||
"type": "string",
|
||||
"description": "External S3 bucket",
|
||||
"default": "mlflow"
|
||||
},
|
||||
"serveArtifacts": {
|
||||
"type": "boolean",
|
||||
"description": "Whether artifact serving is enabled",
|
||||
"default": true
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -320,12 +320,11 @@ tracking:
|
||||
## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb
|
||||
## @param tracking.pdb.create Enable/disable a Pod Disruption Budget creation
|
||||
## @param tracking.pdb.minAvailable Minimum number/percentage of pods that should remain scheduled
|
||||
|
||||
## @param tracking.pdb.maxUnavailable Maximum number/percentage of pods that may be made unavailable
|
||||
##
|
||||
pdb:
|
||||
create: false
|
||||
minAvailable: 1
|
||||
minAvailable: "1"
|
||||
maxUnavailable: ""
|
||||
## Autoscaling configuration
|
||||
## ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/
|
||||
|
||||
Reference in New Issue
Block a user