Examples: query, "exact match", wildcard*, wild?ard, wild*rd
Fuzzy search: cake~ (finds cakes, bake)
Term boost: "red velvet"^4, chocolate^2
Field grouping: tags:(+work -"fun-stuff")
Escaping: Escape characters +-&|!(){}[]^"~*?:\ with \, e.g. \+
Range search: properties.timestamp:[1587729413488 TO *] (inclusive), properties.title:{A TO Z}(excluding A and Z)
Combinations: chocolate AND vanilla, chocolate OR vanilla, (chocolate OR vanilla) NOT "vanilla pudding"
Field search: properties.title:"The Title" AND text
Unanswered
Hi


clearml:
  cookieName: "clearml-token-k8s"
  cookieDomain: ""
  # -- Company name
  defaultCompany: "pixis"
  # -- Api Server basic auth key
  apiserverKey: GGS9F4M6XB2DXJ5AFT9F
  # -- Api Server basic auth secret
  apiserverSecret: 2oGujVFhPfaozhpuz2GzQfA5OyxmMsR3WVJpsCR5hrgHFs20PO
  # -- File Server basic auth key
  fileserverKey: XXCRJ123CEE2KSQ068WO
  # -- File Server basic auth secret
  fileserverSecret: YIy8EVAC7QCT4FtgitxAQGyW7xRHDZ4jpYlTE7HKiscpORl1hG
  # -- Readiness probe basic auth key
  readinessprobeKey: GK4PRTVT3706T25K6BA1
  # -- Readiness probe basic auth secret
  readinessprobeSecret: ymLh1ok5k5xNUQfS944Xdx9xjf0wueokqKM2dMZfHuH9ayItG2
  # -- Secure Auth secret
  secureAuthTokenSecret: ymLh1ok5k5xNUQfS944Xdx9xjf0wueokqKM2dMZfHuH9ayItG2
  # -- Test Server basic auth key
  testUserKey: "ENP39EQM4SLACGD5FXB7"
  # -- Test File Server basic auth secret
  testUserSecret: "lPcm0imbcBZ8mwgO7tpadutiS3gnJD05x9j7afwXPS35IKbpiQ"
  # -- Override the API Urls displayed when showing an example of the SDK's clearml.conf configuration
  clientConfigurationApiUrl: "
"
  # -- Override the Files Urls displayed when showing an example of the SDK's clearml.conf configuration
  clientConfigurationFilesUrl: "
"
  # -- Pass Clearml secrets using an existing secret
  # must contain the keys: apiserver_key, apiserver_secret, secure_auth_token_secret, test_user_key, test_user_secret
  existingSecret: ""

apiserver:
  enabled: true
  prepopulateEnabled: true
  serviceAccountName: clearml
  service:
    type: ClusterIP
  extraEnvs:
    - name: CLEARML_MONGODB_SERVICE_CONNECTION_STRING
      value: monogdburl
  ingress:
    enabled: true
    ingressClassName: alb
    hostName: clearml-api-dev.pixis.internal
    tlsSecretName: ""
    annotations:
      alb.ingress.kubernetes.io/backend-protocol: HTTP
      alb.ingress.kubernetes.io/certificate-arn: certificateurm
      alb.ingress.kubernetes.io/group.name: flyte
      alb.ingress.kubernetes.io/listen-ports: '[{"HTTP":80,"HTTPS": 443}]'
      alb.ingress.kubernetes.io/scheme: internal
      alb.ingress.kubernetes.io/ssl-passthrough: "true"
      alb.ingress.kubernetes.io/ssl-ports: https
      alb.ingress.kubernetes.io/target-type: ip
    path: "/"
  additionalConfigs:
    apiserver.conf: |
      auth {
        fixed_users {
          enabled: true
          pass_hashed: true
          users: [
            {
              username: "pai"
              password: "hassedpassword"
              name: "Pai team"
            },
            {
              username: "tcai"
              password: "hassedpassword"
              name: "TCai team"
            },
          ]
        }
      }  

fileserver:
  enabled: true
  serviceAccountName: clearml
  service:
    type: ClusterIP
  replicaCount: 1
  storage:
    enabled: true
  extraEnvs:
    - name: CLEARML_MONGODB_SERVICE_CONNECTION_STRING
      value: mongodburl
  ingress:
    enabled: true
    ingressClassName: alb
    hostName: clearml-files-dev.pixis.internal
    tlsSecretName: ""
    annotations:
      alb.ingress.kubernetes.io/backend-protocol: HTTP
      alb.ingress.kubernetes.io/certificate-arn: certificatearn
      alb.ingress.kubernetes.io/group.name: flyte
      alb.ingress.kubernetes.io/listen-ports: '[{"HTTP":80,"HTTPS": 443}]'
      alb.ingress.kubernetes.io/scheme: internal
      alb.ingress.kubernetes.io/ssl-passthrough: "true"
      alb.ingress.kubernetes.io/ssl-ports: https
      alb.ingress.kubernetes.io/target-type: ip
    path: "/"
  

webserver:
  enabled: true
  serviceAccountName: clearml
  service:
    type: ClusterIP
  extraEnvs:
    - name: CLEARML_MONGODB_SERVICE_CONNECTION_STRING
      value: mongodb url
  ingress:
    enabled: true
    ingressClassName: alb
    hostName: clearml-app-dev.pixis.internal
    tlsSecretName: ""
    annotations:
      alb.ingress.kubernetes.io/backend-protocol: HTTP
      alb.ingress.kubernetes.io/certificate-arn: certificate arn
      alb.ingress.kubernetes.io/group.name: flyte
      alb.ingress.kubernetes.io/listen-ports: '[{"HTTP":80,"HTTPS": 443}]'
      alb.ingress.kubernetes.io/scheme: internal
      alb.ingress.kubernetes.io/ssl-passthrough: "true"
      alb.ingress.kubernetes.io/ssl-ports: https
      alb.ingress.kubernetes.io/target-type: ip
    path: "/"
  

redis:
  enabled: true

mongodb:
  enabled: false

elasticsearch:
  enabled: true


externalServices:
  # -- Existing ElasticSearch connectionstring if elasticsearch.enabled is false (example in values.yaml)
  elasticsearchConnectionString: "[{\"host\":\"es_hostname1\",\"port\":9200},{\"host\":\"es_hostname2\",\"port\":9200},{\"host\":\"es_hostname3\",\"port\":9200}]"
  # -- Existing MongoDB connection string for BACKEND to use if mongodb.enabled is false (example in values.yaml)
  mongodbConnectionStringAuth: ""
  # -- Existing MongoDB connection string for AUTH to use if mongodb.enabled is false (example in values.yaml)
  mongodbConnectionStringBackend: ""
  
  
Posted 13 days ago
7 Views
0 Answers
13 days ago
13 days ago