-
Notifications
You must be signed in to change notification settings - Fork 7
Expand file tree
/
Copy pathvalues.yaml
More file actions
205 lines (179 loc) · 4.64 KB
/
values.yaml
File metadata and controls
205 lines (179 loc) · 4.64 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
# Default values for code-interpreter.
# This is a YAML-formatted file.
# Declare variables to be passed into your templates.
replicaCount: 1
image:
repository: onyxdotapp/code-interpreter
pullPolicy: Always
# Overrides the image tag whose default is the chart appVersion.
tag: "latest"
imagePullSecrets: []
nameOverride: ""
fullnameOverride: ""
serviceAccount:
# Specifies whether a service account should be created
create: true
# Automatically mount a ServiceAccount's API credentials?
automount: true
# Annotations to add to the service account
annotations: {}
# The name of the service account to use.
# If not set and create is true, a name is generated using the fullname template
name: ""
podAnnotations: {}
podLabels: {}
podSecurityContext:
runAsNonRoot: true
runAsUser: 1000
fsGroup: 1000
securityContext:
capabilities:
drop:
- ALL
readOnlyRootFilesystem: false
runAsNonRoot: true
runAsUser: 1000
allowPrivilegeEscalation: false
service:
type: ClusterIP
port: 8000
targetPort: 8000
annotations: {}
# NodePort configuration (when type is NodePort)
# nodePort: 30000
ingress:
enabled: false
className: ""
annotations: {}
# kubernetes.io/ingress.class: nginx
# kubernetes.io/tls-acme: "true"
# cert-manager.io/cluster-issuer: letsencrypt-prod
hosts:
- host: code-interpreter.local
paths:
- path: /
pathType: ImplementationSpecific
tls: []
# - secretName: code-interpreter-tls
# hosts:
# - code-interpreter.local
resources:
limits:
cpu: 1000m
memory: 512Mi
requests:
cpu: 100m
memory: 128Mi
# Additional volumes on the output Deployment definition.
volumes: []
# - name: foo
# secret:
# secretName: mysecret
# optional: false
# Additional volumeMounts on the output Deployment definition.
volumeMounts: []
# - name: foo
# mountPath: "/etc/foo"
# readOnly: true
nodeSelector: {}
tolerations: []
affinity: {}
# Code Interpreter specific configuration
codeInterpreter:
# Execution limits
maxExecTimeoutMs: 60000
maxOutputBytes: "1000000"
cpuTimeLimitSec: 5
memoryLimitMb: 256
# API server configuration
host: "0.0.0.0"
port: 8000
# Kubernetes executor configuration
kubernetesExecutor:
namespace: "" # Empty means use the same namespace as the service
image: "" # Empty means used the default in code: `
serviceAccount: "" # Empty means use default service account for pods
# Resource limits for execution pods
podResources:
limits:
cpu: "1"
memory: "256Mi"
requests:
cpu: "100m"
memory: "64Mi"
# RBAC configuration
rbac:
# Specifies whether RBAC resources should be created
create: true
# Additional rules for the Role
additionalRules: []
# ConfigMap for additional configuration
configMap:
# Create a ConfigMap with additional configuration
create: false
# Additional environment variables from ConfigMap
data: {}
# CUSTOM_ENV: "value"
# Secret for sensitive configuration
secret:
# Create a Secret with sensitive configuration
create: false
# Additional environment variables from Secret
data: {}
# API_KEY: "base64-encoded-value"
# Health check probes
livenessProbe:
httpGet:
path: /health
port: http
initialDelaySeconds: 10
periodSeconds: 10
timeoutSeconds: 5
failureThreshold: 3
readinessProbe:
httpGet:
path: /health
port: http
initialDelaySeconds: 5
periodSeconds: 5
timeoutSeconds: 3
failureThreshold: 3
# Network Policy
# Note: this policy applies to the code-interpreter SERVICE pod, not the
# ephemeral executor pods. Executor pods are locked down separately by the
# `*-executor` NetworkPolicy in templates/networkpolicy.yaml.
networkPolicy:
enabled: true
policyTypes:
- Ingress
- Egress
ingress:
# Allow ingress on the HTTP port from anywhere in the cluster (so the
# api-server pods can call us) AND from the node itself (so the kubelet
# health probes succeed). An empty `from` matches all sources.
- ports:
- protocol: TCP
port: 8000
egress:
# DNS
- ports:
- protocol: UDP
port: 53
- protocol: TCP
port: 53
# Kubernetes API server — required for the kubernetes executor backend
# to create/exec/delete executor pods. The api-server is reached on TCP
# 443 inside the cluster.
- ports:
- protocol: TCP
port: 443
# Extra environment variables
extraEnvVars: []
# - name: EXTRA_VAR
# value: "extra-value"
# Extra environment variables from ConfigMaps or Secrets
extraEnvFrom: []
# - configMapRef:
# name: my-configmap
# - secretRef:
# name: my-secret