|
| 1 | +# JobSet Helm Chart |
| 2 | +   |
| 3 | + |
| 4 | +This Helm chart installs the JobSet Controller in your Kubernetes cluster. JobSet is a Kubernetes controller that manages groups of related Jobs as a single unit. |
| 5 | + |
| 6 | +## Installing the Chart |
| 7 | + |
| 8 | +To install the chart with the release name `jobset`: |
| 9 | + |
| 10 | +```bash |
| 11 | +helm install jobset ./charts/jobset |
| 12 | +``` |
| 13 | + |
| 14 | +## Configuration |
| 15 | + |
| 16 | +| Key | Type | Default | Description | |
| 17 | +|-------------------------------------------|--------|------------------------------|-------------| |
| 18 | +| affinity | object | `{}` | | |
| 19 | +| certManager.certificate.duration | string | `"8760h"` | | |
| 20 | +| certManager.certificate.renewBefore | string | `"720h"` | | |
| 21 | +| certManager.enabled | bool | `true` | | |
| 22 | +| crds.enabled | bool | `true` | | |
| 23 | +| crds.install | bool | `true` | | |
| 24 | +| fullnameOverride | string | `""` | | |
| 25 | +| image.pullPolicy | string | `"IfNotPresent"` | | |
| 26 | +| image.repository | string | `"jobset-controller"` | | |
| 27 | +| image.tag | string | `""` | | |
| 28 | +| imagePullSecrets | list | `[]` | | |
| 29 | +| leaderElection.enabled | bool | `true` | | |
| 30 | +| leaderElection.resourceName | string | `"jobset-leader-election"` | | |
| 31 | +| manager.healthProbe.livenessInitialDelay | int | `15` | | |
| 32 | +| manager.healthProbe.livenessPath | string | `"/healthz"` | | |
| 33 | +| manager.healthProbe.livenessTimeout | int | `30` | | |
| 34 | +| manager.healthProbe.port | int | `8081` | | |
| 35 | +| manager.healthProbe.readinessInitialDelay | int | `5` | | |
| 36 | +| manager.healthProbe.readinessPath | string | `"/readyz"` | | |
| 37 | +| manager.healthProbe.readinessTimeout | int | `30` | | |
| 38 | +| metrics.enabled | bool | `true` | | |
| 39 | +| metrics.service.port | int | `8443` | | |
| 40 | +| metrics.service.type | string | `"ClusterIP"` | | |
| 41 | +| metrics.serviceMonitor.enabled | bool | `false` | | |
| 42 | +| metrics.serviceMonitor.interval | string | `"30s"` | | |
| 43 | +| metrics.serviceMonitor.labels | object | `{}` | | |
| 44 | +| metrics.serviceMonitor.scrapeTimeout | string | `"10s"` | | |
| 45 | +| nameOverride | string | `""` | | |
| 46 | +| nodeSelector | object | `{}` | | |
| 47 | +| podAnnotations | object | `{}` | | |
| 48 | +| podSecurityContext.runAsNonRoot | bool | `true` | | |
| 49 | +| podSecurityContext.seccompProfile.type | string | `"RuntimeDefault"` | | |
| 50 | +| rbac.create | bool | `true` | | |
| 51 | +| rbac.createAggregateRoles | bool | `true` | | |
| 52 | +| replicaCount | int | `1` | | |
| 53 | +| resources.limits.cpu | int | `2` | | |
| 54 | +| resources.limits.memory | string | `"512Mi"` | | |
| 55 | +| resources.requests.cpu | string | `"500m"` | | |
| 56 | +| resources.requests.memory | string | `"128Mi"` | | |
| 57 | +| securityContext.allowPrivilegeEscalation | bool | `false` | | |
| 58 | +| securityContext.capabilities.drop[0] | string | `"ALL"` | | |
| 59 | +| serviceAccount.annotations | object | `{}` | | |
| 60 | +| serviceAccount.create | bool | `true` | | |
| 61 | +| serviceAccount.name | string | `""` | | |
| 62 | +| tolerations | list | `[]` | | |
| 63 | +| webhook.certManager.enabled | bool | `true` | | |
| 64 | +| webhook.certManager.issuerGroup | string | `"cert-manager.io"` | | |
| 65 | +| webhook.certManager.issuerKind | string | `"Issuer"` | | |
| 66 | +| webhook.certManager.issuerName | string | `"jobset-selfsigned-issuer"` | | |
| 67 | +| webhook.enabled | bool | `true` | | |
| 68 | +| webhook.mutatingWebhook.failurePolicy | string | `"Fail"` | | |
| 69 | +| webhook.mutatingWebhook.timeoutSeconds | int | `10` | | |
| 70 | +| webhook.port | int | `9443` | | |
| 71 | +| webhook.service.port | int | `443` | | |
| 72 | +| webhook.service.type | string | `"ClusterIP"` | | |
| 73 | +| webhook.validatingWebhook.failurePolicy | string | `"Fail"` | | |
| 74 | +| webhook.validatingWebhook.timeoutSeconds | int | `10` | | |
0 commit comments