You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: helm-chart/kuberay-operator/README.md
+2-6Lines changed: 2 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -167,18 +167,14 @@ spec:
167
167
| featureGates[1].enabled | bool |`false`||
168
168
| metrics.enabled | bool |`true`| Whether KubeRay operator should emit control plane metrics. |
169
169
| operatorCommand | string |`"/manager"`| Path to the operator binary |
170
+
| useKubernetesProxy | bool |`false`||
170
171
| leaderElectionEnabled | bool |`true`| If leaderElectionEnabled is set to true, the KubeRay operator will use leader election for high availability. |
171
172
| rbacEnable | bool |`true`| If rbacEnable is set to false, no RBAC resources will be created, including the Role for leader election, the Role for Pods and Services, and so on. |
172
173
| crNamespacedRbacEnable | bool |`true`| When crNamespacedRbacEnable is set to true, the KubeRay operator will create a Role for RayCluster preparation (e.g., Pods, Services) and a corresponding RoleBinding for each namespace listed in the "watchNamespace" parameter. Please note that even if crNamespacedRbacEnable is set to false, the Role and RoleBinding for leader election will still be created. Note: (1) This variable is only effective when rbacEnable and singleNamespaceInstall are both set to true. (2) In most cases, it should be set to true, unless you are using a Kubernetes cluster managed by GitOps tools such as ArgoCD. |
173
174
| singleNamespaceInstall | bool |`false`| When singleNamespaceInstall is true: - Install namespaced RBAC resources such as Role and RoleBinding instead of cluster-scoped ones like ClusterRole and ClusterRoleBinding so that the chart can be installed by users with permissions restricted to a single namespace. (Please note that this excludes the CRDs, which can only be installed at the cluster scope.) - If "watchNamespace" is not set, the KubeRay operator will, by default, only listen to resource events within its own namespace. |
175
+
| watchNamespace | list |`[]`| The KubeRay operator will watch the custom resources in the namespaces listed in the "watchNamespace" parameter. |
174
176
| env | string |`nil`| Environment variables. |
175
177
| resources | object |`{"limits":{"cpu":"100m","memory":"512Mi"}}`| Resource requests and limits for containers. |
176
-
| livenessProbe.initialDelaySeconds | int |`10`||
177
-
| livenessProbe.periodSeconds | int |`5`||
178
-
| livenessProbe.failureThreshold | int |`5`||
179
-
| readinessProbe.initialDelaySeconds | int |`10`||
180
-
| readinessProbe.periodSeconds | int |`5`||
181
-
| readinessProbe.failureThreshold | int |`5`||
182
178
| podSecurityContext | object |`{}`| Set up `securityContext` to improve Pod security. |
183
179
| service.type | string |`"ClusterIP"`| Service type. |
0 commit comments