Skip to content

Commit ad5e14f

Browse files
authored
Merge pull request #277 from weaviate/jose/document-rbac-in-values
Document rbac's variables.
2 parents f9ea315 + 0e13c91 commit ad5e14f

File tree

1 file changed

+58
-34
lines changed

1 file changed

+58
-34
lines changed

weaviate/values.yaml

+58-34
Original file line numberDiff line numberDiff line change
@@ -25,15 +25,15 @@ args:
2525
- 'http'
2626
- '--config-file'
2727
- '/weaviate-config/conf.yaml'
28-
- --read-timeout=60s
28+
- --read-timeout=60s
2929
- --write-timeout=60s
3030

3131
# below is an example that can be used to set an arbitrary nofile limit at
3232
# startup:
3333
#
34-
# command:
34+
# command:
3535
# - "/bin/sh"
36-
# args:
36+
# args:
3737
# - "-c"
3838
# - "ulimit -n 65535 && /bin/weaviate --host 0.0.0.0 --port 8080 --scheme http --config-file /weaviate-config/conf.yaml"
3939

@@ -114,7 +114,7 @@ serviceAccountName:
114114
# Kubernetes Cluster domain name, used for resolving intra-cluster requests, i.e
115115
# between instances of weaviate.
116116
# Note: The final '.' on the end of the hostname makes it a FQDN, and is required for
117-
# DNS to resolve in all kubernetes environments.
117+
# DNS to resolve in all kubernetes environments.
118118
# See https://github.com/weaviate/weaviate-helm/issues/175 for details.
119119
clusterDomain: cluster.local.
120120

@@ -253,6 +253,14 @@ authentication:
253253
# client_id: ''
254254

255255
authorization:
256+
rbac:
257+
enabled: false
258+
# admins:
259+
# - admin_user1
260+
# - admin_user2
261+
# viewers:
262+
# - viewer_user1
263+
# - readonly_user1
256264
admin_list:
257265
enabled: false
258266
# users:
@@ -316,7 +324,7 @@ env:
316324
PROMETHEUS_MONITORING_ENABLED: false
317325
PROMETHEUS_MONITORING_GROUP: false
318326

319-
# Set a MEM limit for the Weaviate Pod so it can help you both increase GC-related
327+
# Set a MEM limit for the Weaviate Pod so it can help you both increase GC-related
320328
# performance as well as avoid GC-related out-of-memory (“OOM”) situations
321329
# GOMEMLIMIT: 6GiB
322330

@@ -337,7 +345,8 @@ env:
337345
# If using ENV Vars to set up API Keys make sure to have `authentication.apikey` block commented out
338346
# to avoid any future changes. ENV Vars has priority over the config above `authentication.apikey`.
339347
# If using `authentication.apikey `the below ENV Vars will be used because they have priority,
340-
# so comment them out to avoid any future changes.
348+
# so comment them out to avoid any future changes. The same applies for the RBAC configuration
349+
# under the authorization block.
341350
# Enables API key authentication. If it is set to 'false' the AUTHENTICATION_APIKEY_ALLOWED_KEYS
342351
# and AUTHENTICATION_APIKEY_USERS will not have any effect.
343352
# AUTHENTICATION_APIKEY_ENABLED: 'true'
@@ -351,6 +360,21 @@ env:
351360
# NOTE: Make sure to add the users to the authorization above overwise they will not be allowed to interact with Weaviate.
352361
# AUTHENTICATION_APIKEY_USERS: 'jane@doe.com,ian-smith'
353362

363+
# Enabling RBAC authorization. It is mutually exclusive with the AUTHORIZATION_ADMIN_LISTS variable. Either RBAC or the
364+
# admin lists mechanism can be used.
365+
# AUTHORIZATION_ENABLE_RBAC: "true"
366+
367+
# Users with admin's RBAC role. List one or more user identities, separated by commas, which will
368+
# have the admin role assigned to. This role provides all permissions to the user, but it's required at least
369+
# in one of the user for managing the cluster.
370+
# AUTHORIZATION_ADMIN_USERS: "admin-user"
371+
372+
# Users with viewer's RBAC role. List one or more user identities, separated by commas, which will
373+
# have the viewer role assigned to. This role allows read permissions in all different areas. Once assigned via
374+
# config, it can't be revoked via API AuthZ calls.
375+
# AUTHORIZATION_VIEWER_USERS: "viewer-user"
376+
377+
354378
envSecrets:
355379
# create a Kubernetes secret with AUTHENTICATION_APIKEY_ALLOWED_KEYS key and its respective value
356380
# AUTHENTICATION_APIKEY_ALLOWED_KEYS: name-of-the-k8s-secret-containing-the-comma-separated-api-keys
@@ -362,7 +386,7 @@ offload:
362386
# If one is using AWS EKS and has already configured K8s Service Account
363387
# that holds the AWS credentials one can pass a name of that service account
364388
# here using this setting.
365-
# NOTE: the root `serviceAccountName` config has priority over this one, and
389+
# NOTE: the root `serviceAccountName` config has priority over this one, and
366390
# if the root one is set this one will NOT overwrite it. This one is here for
367391
# backwards compatibility.
368392
serviceAccountName:
@@ -371,7 +395,7 @@ offload:
371395
# Configure bucket where data should be saved, this setting is mandatory
372396
OFFLOAD_S3_BUCKET: weaviate-offload
373397

374-
# Optional setting. Defaults to AWS S3 (s3.amazonaws.com).
398+
# Optional setting. Defaults to AWS S3 (s3.amazonaws.com).
375399
# Set this option if you have a MinIO storage configured in your environment
376400
# and want to use it instead of the AWS S3.
377401
# OFFLOAD_S3_ENDPOINT: custom.minio.endpoint.address
@@ -384,7 +408,7 @@ offload:
384408
# Set this option if you wan't Weaviate to create
385409
# the bucket used for offloading tenants. Otherwise,
386410
# if set to false Weaviate expects the bucket to be
387-
# already created with the OFFLOAD_S3_BUCKET name
411+
# already created with the OFFLOAD_S3_BUCKET name
388412
# OFFLOAD_S3_BUCKET_AUTO_CREATE: true
389413

390414
# You can pass environment AWS settings here:
@@ -417,13 +441,13 @@ backups:
417441
envconfig:
418442
# Configure folder where backups should be saved
419443
BACKUP_FILESYSTEM_PATH: /tmp/backups
420-
444+
421445
s3:
422446
enabled: false
423447
# If one is using AWS EKS and has already configured K8s Service Account
424448
# that holds the AWS credentials one can pass a name of that service account
425449
# here using this setting.
426-
# NOTE: the root `serviceAccountName` config has priority over this one, and
450+
# NOTE: the root `serviceAccountName` config has priority over this one, and
427451
# if the root one is set this one will NOT overwrite it. This one is here for
428452
# backwards compatibility.
429453
serviceAccountName:
@@ -432,17 +456,17 @@ backups:
432456
# Configure bucket where backups should be saved, this setting is mandatory
433457
BACKUP_S3_BUCKET: weaviate-backups
434458

435-
# Optional setting. Defaults to empty string.
459+
# Optional setting. Defaults to empty string.
436460
# Set this option if you want to save backups to a given location
437461
# inside the bucket
438462
# BACKUP_S3_PATH: path/inside/bucket
439463

440-
# Optional setting. Defaults to AWS S3 (s3.amazonaws.com).
464+
# Optional setting. Defaults to AWS S3 (s3.amazonaws.com).
441465
# Set this option if you have a MinIO storage configured in your environment
442466
# and want to use it instead of the AWS S3.
443467
# BACKUP_S3_ENDPOINT: custom.minio.endpoint.address
444468

445-
# Optional setting. Defaults to true.
469+
# Optional setting. Defaults to true.
446470
# Set this option if you don't want to use SSL.
447471
# BACKUP_S3_USE_SSL: true
448472

@@ -455,7 +479,7 @@ backups:
455479
# You can pass the User credentials (access-key id and access-secret-key) in 2 ways:
456480
# 1. by setting the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY plain values in the `secrets` section below
457481
# this chart will create a kubernetes secret for you with these key-values pairs
458-
# 2. create Kubernetes secret/s with AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY keys and their respective values
482+
# 2. create Kubernetes secret/s with AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY keys and their respective values
459483
# Set the Key and the secret where it is set in `envSecrets` section below
460484
secrets: {}
461485
# AWS_ACCESS_KEY_ID: access-key-id (plain text)
@@ -503,7 +527,7 @@ backups:
503527
# Configure container where backups should be saved, this setting is mandatory
504528
BACKUP_AZURE_CONTAINER: weaviate-backups
505529

506-
# Optional setting. Defaults to empty string.
530+
# Optional setting. Defaults to empty string.
507531
# Set this option if you want to save backups to a given location
508532
# inside the container
509533
# BACKUP_AZURE_PATH: path/inside/container
@@ -514,7 +538,7 @@ backups:
514538
# 1. by setting the AZURE_STORAGE_ACCOUNT and AZURE_STORAGE_KEY
515539
# or AZURE_STORAGE_CONNECTION_STRING plain values in the `secrets` section below
516540
# this chart will create a kubernetes secret for you with these key-values pairs
517-
# 2. create Kubernetes secret/s with AZURE_STORAGE_ACCOUNT and AZURE_STORAGE_KEY
541+
# 2. create Kubernetes secret/s with AZURE_STORAGE_ACCOUNT and AZURE_STORAGE_KEY
518542
# or AZURE_STORAGE_CONNECTION_STRING and their respective values
519543
# Set the Key and the secret where it is set in `envSecrets` section below
520544
secrets: {}
@@ -660,7 +684,7 @@ modules:
660684
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
661685
# applies to passageQueryService below
662686
securityContext: {}
663-
687+
664688
# It is possible to add a ServiceAccount to this module's Pods, it can be
665689
# used in cases where the module is in a private registry and you want to
666690
# give access to the registry only to this pod.
@@ -728,13 +752,13 @@ modules:
728752
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
729753
# applies to passageQueryService below
730754
securityContext: {}
731-
755+
732756
# It is possible to add a ServiceAccount to this module's Pods, it can be
733757
# used in cases where the module is in a private registry and you want to
734758
# give access to the registry only to this pod.
735759
# NOTE: if not set the root `serviceAccountName` config will be used.
736760
serviceAccountName:
737-
761+
738762
# You can guide where the pods are scheduled on a per-module basis,
739763
# as well as for Weaviate overall. Each module accepts nodeSelector,
740764
# tolerations, and affinity configuration. If it is set on a per-
@@ -797,7 +821,7 @@ modules:
797821
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
798822
# applies to passageQueryService below
799823
securityContext: {}
800-
824+
801825
# It is possible to add a ServiceAccount to this module's Pods, it can be
802826
# used in cases where the module is in a private registry and you want to
803827
# give access to the registry only to this pod.
@@ -818,7 +842,7 @@ modules:
818842
# These models run only on CPU only and on x86_64 arch
819843
# The ML model is containerized in a Weaviate compatible way.
820844
# If you want to run a different model that published ones you can follow the
821-
# tutorial from here on how to create such a container: https://github.com/weaviate/t2v-gpt4all-models
845+
# tutorial from here on how to create such a container: https://github.com/weaviate/t2v-gpt4all-models
822846
text2vec-gpt4all:
823847

824848
# Enable deployment of this module
@@ -827,7 +851,7 @@ modules:
827851
# You can set directly an inference URL of this module without deploying it with this release.
828852
# You can do so by setting a value for the `inferenceUrl` here AND by setting the `enable` to `false`
829853
inferenceUrl: {}
830-
854+
831855
# The configuration below is ignored if enabled==false
832856
tag: all-MiniLM-L6-v2
833857
repo: semitechnologies/gpt4all-inference
@@ -859,7 +883,7 @@ modules:
859883
# security Context for the Contextionary Pods. The configurations are the same as setting them
860884
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
861885
securityContext: {}
862-
886+
863887
# It is possible to add a ServiceAccount to this module's Pods, it can be
864888
# used in cases where the module is in a private registry and you want to
865889
# give access to the registry only to this pod.
@@ -1306,7 +1330,7 @@ modules:
13061330
# security Context for the Contextionary Pods. The configurations are the same as setting them
13071331
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
13081332
securityContext: {}
1309-
1333+
13101334
# It is possible to add a ServiceAccount to this module's Pods, it can be
13111335
# used in cases where the module is in a private registry and you want to
13121336
# give access to the registry only to this pod.
@@ -1552,7 +1576,7 @@ modules:
15521576
# security Context for the Contextionary Pods. The configurations are the same as setting them
15531577
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
15541578
securityContext: {}
1555-
1579+
15561580
# It is possible to add a ServiceAccount to this module's Pods, it can be
15571581
# used in cases where the module is in a private registry and you want to
15581582
# give access to the registry only to this pod.
@@ -1569,7 +1593,7 @@ modules:
15691593
affinity:
15701594

15711595
# The reranker-cohere module uses Cohere API
1572-
# to dynamically compute a score for the relevance
1596+
# to dynamically compute a score for the relevance
15731597
# of the query with each of the initial search results.
15741598
# More information about Cohere API can be found here: https://docs.cohere.com/docs/rerank-guide
15751599
reranker-cohere:
@@ -1582,7 +1606,7 @@ modules:
15821606
apiKey: ''
15831607

15841608
# The reranker-voyageai module uses VoaygeAI API
1585-
# to dynamically compute a score for the relevance
1609+
# to dynamically compute a score for the relevance
15861610
# of the query with each of the initial search results.
15871611
# More information about Cohere API can be found here: https://www.voyageai.com/
15881612
reranker-voyageai:
@@ -1595,7 +1619,7 @@ modules:
15951619
apiKey: ''
15961620

15971621
# The reranker-jinaai module uses JinaAI API
1598-
# to dynamically compute a score for the relevance
1622+
# to dynamically compute a score for the relevance
15991623
# of the query with each of the initial search results.
16001624
# More information about Cohere API can be found here: https://jina.ai/reranker
16011625
reranker-jinaai:
@@ -1607,7 +1631,7 @@ modules:
16071631
# an environment variable
16081632
apiKey: ''
16091633

1610-
# The reranker-transformers module uses Cross-Encoders for
1634+
# The reranker-transformers module uses Cross-Encoders for
16111635
# sentence pair scoring and sentence pair classification tasks.
16121636
# More information about Cross-Encoders can be found here:
16131637
# https://www.sbert.net/examples/applications/cross-encoder/README.html
@@ -1665,7 +1689,7 @@ modules:
16651689
# security Context for the Contextionary Pods. The configurations are the same as setting them
16661690
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
16671691
securityContext: {}
1668-
1692+
16691693
# It is possible to add a ServiceAccount to this module's Pods, it can be
16701694
# used in cases where the module is in a private registry and you want to
16711695
# give access to the registry only to this pod.
@@ -1722,7 +1746,7 @@ modules:
17221746
# security Context for the Contextionary Pods. The configurations are the same as setting them
17231747
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
17241748
securityContext: {}
1725-
1749+
17261750
# It is possible to add a ServiceAccount to this module's Pods, it can be
17271751
# used in cases where the module is in a private registry and you want to
17281752
# give access to the registry only to this pod.
@@ -1796,7 +1820,7 @@ modules:
17961820
# security Context for the Contextionary Pods. The configurations are the same as setting them
17971821
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
17981822
securityContext: {}
1799-
1823+
18001824
# It is possible to add a ServiceAccount to this module's Pods, it can be
18011825
# used in cases where the module is in a private registry and you want to
18021826
# give access to the registry only to this pod.
@@ -1867,7 +1891,7 @@ modules:
18671891
# security Context for the Contextionary Pods. The configurations are the same as setting them
18681892
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
18691893
securityContext: {}
1870-
1894+
18711895
# It is possible to add a ServiceAccount to this module's Pods, it can be
18721896
# used in cases where the module is in a private registry and you want to
18731897
# give access to the registry only to this pod.

0 commit comments

Comments
 (0)