@@ -25,15 +25,15 @@ args:
25
25
- ' http'
26
26
- ' --config-file'
27
27
- ' /weaviate-config/conf.yaml'
28
- - --read-timeout=60s
28
+ - --read-timeout=60s
29
29
- --write-timeout=60s
30
30
31
31
# below is an example that can be used to set an arbitrary nofile limit at
32
32
# startup:
33
33
#
34
- # command:
34
+ # command:
35
35
# - "/bin/sh"
36
- # args:
36
+ # args:
37
37
# - "-c"
38
38
# - "ulimit -n 65535 && /bin/weaviate --host 0.0.0.0 --port 8080 --scheme http --config-file /weaviate-config/conf.yaml"
39
39
@@ -114,7 +114,7 @@ serviceAccountName:
114
114
# Kubernetes Cluster domain name, used for resolving intra-cluster requests, i.e
115
115
# between instances of weaviate.
116
116
# Note: The final '.' on the end of the hostname makes it a FQDN, and is required for
117
- # DNS to resolve in all kubernetes environments.
117
+ # DNS to resolve in all kubernetes environments.
118
118
# See https://github.com/weaviate/weaviate-helm/issues/175 for details.
119
119
clusterDomain : cluster.local.
120
120
@@ -253,6 +253,14 @@ authentication:
253
253
# client_id: ''
254
254
255
255
authorization :
256
+ rbac :
257
+ enabled : false
258
+ # admins:
259
+ # - admin_user1
260
+ # - admin_user2
261
+ # viewers:
262
+ # - viewer_user1
263
+ # - readonly_user1
256
264
admin_list :
257
265
enabled : false
258
266
# users:
316
324
PROMETHEUS_MONITORING_ENABLED : false
317
325
PROMETHEUS_MONITORING_GROUP : false
318
326
319
- # Set a MEM limit for the Weaviate Pod so it can help you both increase GC-related
327
+ # Set a MEM limit for the Weaviate Pod so it can help you both increase GC-related
320
328
# performance as well as avoid GC-related out-of-memory (“OOM”) situations
321
329
# GOMEMLIMIT: 6GiB
322
330
337
345
# If using ENV Vars to set up API Keys make sure to have `authentication.apikey` block commented out
338
346
# to avoid any future changes. ENV Vars has priority over the config above `authentication.apikey`.
339
347
# If using `authentication.apikey `the below ENV Vars will be used because they have priority,
340
- # so comment them out to avoid any future changes.
348
+ # so comment them out to avoid any future changes. The same applies for the RBAC configuration
349
+ # under the authorization block.
341
350
# Enables API key authentication. If it is set to 'false' the AUTHENTICATION_APIKEY_ALLOWED_KEYS
342
351
# and AUTHENTICATION_APIKEY_USERS will not have any effect.
343
352
# AUTHENTICATION_APIKEY_ENABLED: 'true'
@@ -351,6 +360,21 @@ env:
351
360
# NOTE: Make sure to add the users to the authorization above overwise they will not be allowed to interact with Weaviate.
352
361
# AUTHENTICATION_APIKEY_USERS: 'jane@doe.com,ian-smith'
353
362
363
+ # Enabling RBAC authorization. It is mutually exclusive with the AUTHORIZATION_ADMIN_LISTS variable. Either RBAC or the
364
+ # admin lists mechanism can be used.
365
+ # AUTHORIZATION_ENABLE_RBAC: "true"
366
+
367
+ # Users with admin's RBAC role. List one or more user identities, separated by commas, which will
368
+ # have the admin role assigned to. This role provides all permissions to the user, but it's required at least
369
+ # in one of the user for managing the cluster.
370
+ # AUTHORIZATION_ADMIN_USERS: "admin-user"
371
+
372
+ # Users with viewer's RBAC role. List one or more user identities, separated by commas, which will
373
+ # have the viewer role assigned to. This role allows read permissions in all different areas. Once assigned via
374
+ # config, it can't be revoked via API AuthZ calls.
375
+ # AUTHORIZATION_VIEWER_USERS: "viewer-user"
376
+
377
+
354
378
envSecrets :
355
379
# create a Kubernetes secret with AUTHENTICATION_APIKEY_ALLOWED_KEYS key and its respective value
356
380
# AUTHENTICATION_APIKEY_ALLOWED_KEYS: name-of-the-k8s-secret-containing-the-comma-separated-api-keys
@@ -362,7 +386,7 @@ offload:
362
386
# If one is using AWS EKS and has already configured K8s Service Account
363
387
# that holds the AWS credentials one can pass a name of that service account
364
388
# here using this setting.
365
- # NOTE: the root `serviceAccountName` config has priority over this one, and
389
+ # NOTE: the root `serviceAccountName` config has priority over this one, and
366
390
# if the root one is set this one will NOT overwrite it. This one is here for
367
391
# backwards compatibility.
368
392
serviceAccountName :
@@ -371,7 +395,7 @@ offload:
371
395
# Configure bucket where data should be saved, this setting is mandatory
372
396
OFFLOAD_S3_BUCKET : weaviate-offload
373
397
374
- # Optional setting. Defaults to AWS S3 (s3.amazonaws.com).
398
+ # Optional setting. Defaults to AWS S3 (s3.amazonaws.com).
375
399
# Set this option if you have a MinIO storage configured in your environment
376
400
# and want to use it instead of the AWS S3.
377
401
# OFFLOAD_S3_ENDPOINT: custom.minio.endpoint.address
@@ -384,7 +408,7 @@ offload:
384
408
# Set this option if you wan't Weaviate to create
385
409
# the bucket used for offloading tenants. Otherwise,
386
410
# if set to false Weaviate expects the bucket to be
387
- # already created with the OFFLOAD_S3_BUCKET name
411
+ # already created with the OFFLOAD_S3_BUCKET name
388
412
# OFFLOAD_S3_BUCKET_AUTO_CREATE: true
389
413
390
414
# You can pass environment AWS settings here:
@@ -417,13 +441,13 @@ backups:
417
441
envconfig :
418
442
# Configure folder where backups should be saved
419
443
BACKUP_FILESYSTEM_PATH : /tmp/backups
420
-
444
+
421
445
s3 :
422
446
enabled : false
423
447
# If one is using AWS EKS and has already configured K8s Service Account
424
448
# that holds the AWS credentials one can pass a name of that service account
425
449
# here using this setting.
426
- # NOTE: the root `serviceAccountName` config has priority over this one, and
450
+ # NOTE: the root `serviceAccountName` config has priority over this one, and
427
451
# if the root one is set this one will NOT overwrite it. This one is here for
428
452
# backwards compatibility.
429
453
serviceAccountName :
@@ -432,17 +456,17 @@ backups:
432
456
# Configure bucket where backups should be saved, this setting is mandatory
433
457
BACKUP_S3_BUCKET : weaviate-backups
434
458
435
- # Optional setting. Defaults to empty string.
459
+ # Optional setting. Defaults to empty string.
436
460
# Set this option if you want to save backups to a given location
437
461
# inside the bucket
438
462
# BACKUP_S3_PATH: path/inside/bucket
439
463
440
- # Optional setting. Defaults to AWS S3 (s3.amazonaws.com).
464
+ # Optional setting. Defaults to AWS S3 (s3.amazonaws.com).
441
465
# Set this option if you have a MinIO storage configured in your environment
442
466
# and want to use it instead of the AWS S3.
443
467
# BACKUP_S3_ENDPOINT: custom.minio.endpoint.address
444
468
445
- # Optional setting. Defaults to true.
469
+ # Optional setting. Defaults to true.
446
470
# Set this option if you don't want to use SSL.
447
471
# BACKUP_S3_USE_SSL: true
448
472
@@ -455,7 +479,7 @@ backups:
455
479
# You can pass the User credentials (access-key id and access-secret-key) in 2 ways:
456
480
# 1. by setting the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY plain values in the `secrets` section below
457
481
# this chart will create a kubernetes secret for you with these key-values pairs
458
- # 2. create Kubernetes secret/s with AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY keys and their respective values
482
+ # 2. create Kubernetes secret/s with AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY keys and their respective values
459
483
# Set the Key and the secret where it is set in `envSecrets` section below
460
484
secrets : {}
461
485
# AWS_ACCESS_KEY_ID: access-key-id (plain text)
@@ -503,7 +527,7 @@ backups:
503
527
# Configure container where backups should be saved, this setting is mandatory
504
528
BACKUP_AZURE_CONTAINER : weaviate-backups
505
529
506
- # Optional setting. Defaults to empty string.
530
+ # Optional setting. Defaults to empty string.
507
531
# Set this option if you want to save backups to a given location
508
532
# inside the container
509
533
# BACKUP_AZURE_PATH: path/inside/container
@@ -514,7 +538,7 @@ backups:
514
538
# 1. by setting the AZURE_STORAGE_ACCOUNT and AZURE_STORAGE_KEY
515
539
# or AZURE_STORAGE_CONNECTION_STRING plain values in the `secrets` section below
516
540
# this chart will create a kubernetes secret for you with these key-values pairs
517
- # 2. create Kubernetes secret/s with AZURE_STORAGE_ACCOUNT and AZURE_STORAGE_KEY
541
+ # 2. create Kubernetes secret/s with AZURE_STORAGE_ACCOUNT and AZURE_STORAGE_KEY
518
542
# or AZURE_STORAGE_CONNECTION_STRING and their respective values
519
543
# Set the Key and the secret where it is set in `envSecrets` section below
520
544
secrets : {}
@@ -660,7 +684,7 @@ modules:
660
684
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
661
685
# applies to passageQueryService below
662
686
securityContext : {}
663
-
687
+
664
688
# It is possible to add a ServiceAccount to this module's Pods, it can be
665
689
# used in cases where the module is in a private registry and you want to
666
690
# give access to the registry only to this pod.
@@ -728,13 +752,13 @@ modules:
728
752
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
729
753
# applies to passageQueryService below
730
754
securityContext : {}
731
-
755
+
732
756
# It is possible to add a ServiceAccount to this module's Pods, it can be
733
757
# used in cases where the module is in a private registry and you want to
734
758
# give access to the registry only to this pod.
735
759
# NOTE: if not set the root `serviceAccountName` config will be used.
736
760
serviceAccountName :
737
-
761
+
738
762
# You can guide where the pods are scheduled on a per-module basis,
739
763
# as well as for Weaviate overall. Each module accepts nodeSelector,
740
764
# tolerations, and affinity configuration. If it is set on a per-
@@ -797,7 +821,7 @@ modules:
797
821
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
798
822
# applies to passageQueryService below
799
823
securityContext : {}
800
-
824
+
801
825
# It is possible to add a ServiceAccount to this module's Pods, it can be
802
826
# used in cases where the module is in a private registry and you want to
803
827
# give access to the registry only to this pod.
@@ -818,7 +842,7 @@ modules:
818
842
# These models run only on CPU only and on x86_64 arch
819
843
# The ML model is containerized in a Weaviate compatible way.
820
844
# If you want to run a different model that published ones you can follow the
821
- # tutorial from here on how to create such a container: https://github.com/weaviate/t2v-gpt4all-models
845
+ # tutorial from here on how to create such a container: https://github.com/weaviate/t2v-gpt4all-models
822
846
text2vec-gpt4all :
823
847
824
848
# Enable deployment of this module
@@ -827,7 +851,7 @@ modules:
827
851
# You can set directly an inference URL of this module without deploying it with this release.
828
852
# You can do so by setting a value for the `inferenceUrl` here AND by setting the `enable` to `false`
829
853
inferenceUrl : {}
830
-
854
+
831
855
# The configuration below is ignored if enabled==false
832
856
tag : all-MiniLM-L6-v2
833
857
repo : semitechnologies/gpt4all-inference
@@ -859,7 +883,7 @@ modules:
859
883
# security Context for the Contextionary Pods. The configurations are the same as setting them
860
884
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
861
885
securityContext : {}
862
-
886
+
863
887
# It is possible to add a ServiceAccount to this module's Pods, it can be
864
888
# used in cases where the module is in a private registry and you want to
865
889
# give access to the registry only to this pod.
@@ -1306,7 +1330,7 @@ modules:
1306
1330
# security Context for the Contextionary Pods. The configurations are the same as setting them
1307
1331
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
1308
1332
securityContext : {}
1309
-
1333
+
1310
1334
# It is possible to add a ServiceAccount to this module's Pods, it can be
1311
1335
# used in cases where the module is in a private registry and you want to
1312
1336
# give access to the registry only to this pod.
@@ -1552,7 +1576,7 @@ modules:
1552
1576
# security Context for the Contextionary Pods. The configurations are the same as setting them
1553
1577
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
1554
1578
securityContext : {}
1555
-
1579
+
1556
1580
# It is possible to add a ServiceAccount to this module's Pods, it can be
1557
1581
# used in cases where the module is in a private registry and you want to
1558
1582
# give access to the registry only to this pod.
@@ -1569,7 +1593,7 @@ modules:
1569
1593
affinity :
1570
1594
1571
1595
# The reranker-cohere module uses Cohere API
1572
- # to dynamically compute a score for the relevance
1596
+ # to dynamically compute a score for the relevance
1573
1597
# of the query with each of the initial search results.
1574
1598
# More information about Cohere API can be found here: https://docs.cohere.com/docs/rerank-guide
1575
1599
reranker-cohere :
@@ -1582,7 +1606,7 @@ modules:
1582
1606
apiKey : ' '
1583
1607
1584
1608
# The reranker-voyageai module uses VoaygeAI API
1585
- # to dynamically compute a score for the relevance
1609
+ # to dynamically compute a score for the relevance
1586
1610
# of the query with each of the initial search results.
1587
1611
# More information about Cohere API can be found here: https://www.voyageai.com/
1588
1612
reranker-voyageai :
@@ -1595,7 +1619,7 @@ modules:
1595
1619
apiKey : ' '
1596
1620
1597
1621
# The reranker-jinaai module uses JinaAI API
1598
- # to dynamically compute a score for the relevance
1622
+ # to dynamically compute a score for the relevance
1599
1623
# of the query with each of the initial search results.
1600
1624
# More information about Cohere API can be found here: https://jina.ai/reranker
1601
1625
reranker-jinaai :
@@ -1607,7 +1631,7 @@ modules:
1607
1631
# an environment variable
1608
1632
apiKey : ' '
1609
1633
1610
- # The reranker-transformers module uses Cross-Encoders for
1634
+ # The reranker-transformers module uses Cross-Encoders for
1611
1635
# sentence pair scoring and sentence pair classification tasks.
1612
1636
# More information about Cross-Encoders can be found here:
1613
1637
# https://www.sbert.net/examples/applications/cross-encoder/README.html
@@ -1665,7 +1689,7 @@ modules:
1665
1689
# security Context for the Contextionary Pods. The configurations are the same as setting them
1666
1690
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
1667
1691
securityContext : {}
1668
-
1692
+
1669
1693
# It is possible to add a ServiceAccount to this module's Pods, it can be
1670
1694
# used in cases where the module is in a private registry and you want to
1671
1695
# give access to the registry only to this pod.
@@ -1722,7 +1746,7 @@ modules:
1722
1746
# security Context for the Contextionary Pods. The configurations are the same as setting them
1723
1747
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
1724
1748
securityContext : {}
1725
-
1749
+
1726
1750
# It is possible to add a ServiceAccount to this module's Pods, it can be
1727
1751
# used in cases where the module is in a private registry and you want to
1728
1752
# give access to the registry only to this pod.
@@ -1796,7 +1820,7 @@ modules:
1796
1820
# security Context for the Contextionary Pods. The configurations are the same as setting them
1797
1821
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
1798
1822
securityContext : {}
1799
-
1823
+
1800
1824
# It is possible to add a ServiceAccount to this module's Pods, it can be
1801
1825
# used in cases where the module is in a private registry and you want to
1802
1826
# give access to the registry only to this pod.
@@ -1867,7 +1891,7 @@ modules:
1867
1891
# security Context for the Contextionary Pods. The configurations are the same as setting them
1868
1892
# as described here: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
1869
1893
securityContext : {}
1870
-
1894
+
1871
1895
# It is possible to add a ServiceAccount to this module's Pods, it can be
1872
1896
# used in cases where the module is in a private registry and you want to
1873
1897
# give access to the registry only to this pod.
0 commit comments