Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 8 additions & 0 deletions apps/dask-gateway/secret.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -20,3 +20,11 @@ type: Opaque
stringData:
S3_ACCESSKEY: {{ s3.access_key }}
S3_SECRETKEY: {{ s3.secret_key }}
---
apiVersion: v1
kind: Secret
metadata:
name: ghcr-k8s
type: kubernetes.io/dockerconfigjson
stringData:
.dockerconfigjson: '{"auths":{"{{ github.registrySecret.registry }}":{"username":"{{ github.registrySecret.username }}","password":"{{ github.registrySecret.password }}","auth":"{{ (github.registrySecret.username + ':' + github.registrySecret.password) | b64encode }}"}}}'
6 changes: 6 additions & 0 deletions apps/dask-gateway/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -45,6 +45,8 @@ gateway:

def option_handler(options):
return {
"scheduler_core_limit": options.scheduler_core_limit,
"scheduler_memory_limit": "%fG" % options.scheduler_memory_limit,
"worker_cores": options.worker_cores,
"worker_memory": "%fG" % options.worker_memory,
"image": options.image,
Expand All @@ -62,6 +64,8 @@ gateway:
}

c.Backend.cluster_options = Options(
Float("scheduler_core_limit", 1, min=1, max=2, label="Scheduler Max Cores"),
Float("scheduler_memory_limit", 2, min=1, max=10, label="Scheduler Max Memory (GiB)"),
Float("worker_cores", 1, min=1, max=8, label="Worker Cores"),
Float("worker_memory", 4, min=1, max=32, label="Worker Memory (GiB)"),
String("image", default="ghcr.io/rs-python/rs-infra-core-dask-gateway:latest", label="Image"),
Expand All @@ -84,6 +88,8 @@ gateway:
name: ghcr.io/dask/dask-gateway
tag: "2024.1.0"
pullPolicy:
imagePullSecrets:
- name: ghcr-k8s
namespace: dask-gateway
scheduler:
extraPodConfig:
Expand Down
4 changes: 2 additions & 2 deletions apps/jupyterhub/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -22,9 +22,9 @@ helmCharts:
namespace: processing
repo: https://hub.jupyter.org/helm-chart/
releaseName: "{{ app_name }}"
version: 3.3.6
version: 4.1.0
valuesFile: values.yaml

resources:
- servicemonitor.yaml
- secret.yaml
- secret.yaml
2 changes: 1 addition & 1 deletion apps/jupyterhub/servicemonitor.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ metadata:
name: jupyterhub
spec:
endpoints:
- interval: 5s
- interval: 5s
port: http
path: /metrics
bearerTokenSecret:
Expand Down
35 changes: 21 additions & 14 deletions apps/jupyterhub/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -38,11 +38,16 @@ hub:
# Add initContainer to install itsdangerous without having to modify the image
initContainers:
- name: install-python-packages
image: python:3.9-slim
image: python:3.12-slim
command: ["sh", "-c", "pip install --target /srv/jupyterhub/ itsdangerous"]
volumeMounts:
- name: shared-volume
mountPath: /srv/jupyterhub
securityContext:
runAsUser: 1000
runAsNonRoot: true
extraEnv:
JUPYTERHUB_CRYPT_KEY: {{ jupyterhub.jupyterhub_crypt_key }}
extraVolumes:
- name: shared-volume
emptyDir: {}
Expand All @@ -62,7 +67,7 @@ hub:
username_claim: preferred_username
userdata_params:
state: state
# In order to use keycloak client's roles as authorization layer
auth_state_groups_key: oauth_user
claim_groups_key: realm_access.roles
allowed_groups:
- RS-JUPYTER-USER
Expand All @@ -71,9 +76,9 @@ hub:
scope:
- openid
enable_auth_state: true

manage_groups: true
JupyterHub:
admin: true
admin_access: true
authenticator_class: generic-oauth
extraConfig:
# After the user has logged in to JupyterHub, pass the authentication information
Expand Down Expand Up @@ -148,7 +153,7 @@ hub:
password:
image:
name: quay.io/jupyterhub/k8s-hub
tag: "3.3.6"
tag: "4.1.0"
pullPolicy:
pullSecrets: []
pdb:
Expand Down Expand Up @@ -278,7 +283,7 @@ proxy:
# tag is automatically bumped to new patch versions by the
# watch-dependencies.yaml workflow.
#
tag: "4.6.1" # https://github.com/jupyterhub/configurable-http-proxy/tags
tag: "4.6.3" # https://github.com/jupyterhub/configurable-http-proxy/tags
pullPolicy:
pullSecrets: []
extraCommandLineFlags: []
Expand Down Expand Up @@ -336,7 +341,7 @@ proxy:
# tag is automatically bumped to new patch versions by the
# watch-dependencies.yaml workflow.
#
tag: "v2.11.0" # ref: https://hub.docker.com/_/traefik?tab=tags
tag: "v3.3.1" # ref: https://hub.docker.com/_/traefik?tab=tags
pullPolicy:
pullSecrets: []
hsts:
Expand Down Expand Up @@ -388,7 +393,7 @@ proxy:
allowPrivilegeEscalation: false
image:
name: quay.io/jupyterhub/k8s-secret-sync
tag: "3.3.6"
tag: "4.1.0"
pullPolicy:
pullSecrets: []
resources: {}
Expand Down Expand Up @@ -419,7 +424,7 @@ singleuser:
networkTools:
image:
name: quay.io/jupyterhub/k8s-network-tools
tag: "3.3.6"
tag: "4.1.0"
pullPolicy:
pullSecrets: []
resources: {}
Expand Down Expand Up @@ -495,7 +500,9 @@ singleuser:
storageAccessModes: [ReadWriteOnce]
image:
name: ghcr.io/rs-python/rs-infra-core-jupyter
tag: "latest"
tag: "feat-rspy625-update-jupyter"
#name: quay.io/jupyterhub/k8s-singleuser-sample
#tag: "4.1.0"
pullPolicy: Always
pullSecrets: []
# - name: {{ github.registrySecret.name }}
Expand Down Expand Up @@ -618,7 +625,7 @@ scheduling:
# here. We aim to stay around 1 minor version behind the latest k8s
# version.
#
tag: "v1.26.15" # ref: https://github.com/kubernetes/kubernetes/tree/master/CHANGELOG
tag: "v1.30.8" # ref: https://github.com/kubernetes/kubernetes/tree/master/CHANGELOG
pullPolicy:
pullSecrets: []
nodeSelector:
Expand Down Expand Up @@ -655,7 +662,7 @@ scheduling:
#
# If you update this, also update prePuller.pause.image.tag
#
tag: "3.9"
tag: "3.10"
pullPolicy:
pullSecrets: []
revisionHistoryLimit:
Expand Down Expand Up @@ -714,7 +721,7 @@ prePuller:
# image and the configuration below relates to the hook-image-awaiter Job
image:
name: quay.io/jupyterhub/k8s-image-awaiter
tag: "3.3.6"
tag: "4.1.0"
pullPolicy:
pullSecrets: []
containerSecurityContext:
Expand Down Expand Up @@ -750,7 +757,7 @@ prePuller:
#
# If you update this, also update scheduling.userPlaceholder.image.tag
#
tag: "3.9"
tag: "3.10"
pullPolicy:
pullSecrets: []

Expand Down