You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jun 22, 2024. It is now read-only.
Copy file name to clipboardExpand all lines: charts/selenium-grid/README.md
+11-10Lines changed: 11 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,9 +29,11 @@ This chart enables the creation of a Selenium Grid Server in Kubernetes.
29
29
*[Configuration of Secure Communication (HTTPS)](#configuration-of-secure-communication-https)
30
30
*[Secure Communication](#secure-communication)
31
31
*[Node Registration](#node-registration)
32
+
*[Configuration of tracing observability](#configuration-of-tracing-observability)
32
33
*[Configuration of Selenium Grid chart](#configuration-of-selenium-grid-chart)
33
34
*[Configuration of KEDA](#configuration-of-keda)
34
35
*[Configuration of Ingress NGINX Controller](#configuration-of-ingress-nginx-controller)
36
+
*[Configuration of Jaeger](#configuration-of-jaeger)
35
37
*[Configuration for Selenium-Hub](#configuration-for-selenium-hub)
36
38
*[Configuration for isolated components](#configuration-for-isolated-components)
37
39
<!-- TOC -->
@@ -204,7 +206,7 @@ helm uninstall selenium-grid
204
206
205
207
By default, ingress is enabled without annotations set. If NGINX ingress controller is used, you need to set few annotations to override the default timeout values to avoid 504 errors (see [#1808](https://github.com/SeleniumHQ/docker-selenium/issues/1808)). Since in Selenium Grid the default of `SE_NODE_SESSION_TIMEOUT` and `SE_SESSION_REQUEST_TIMEOUT` is `300` seconds.
206
208
207
-
In order to make user experience better, there are few annotations will be set by default if NGINX ingress controller is used. Mostly relates to timeouts and buffer sizes.
209
+
To make the user experience better, there are few annotations will be set by default if NGINX ingress controller is used. Mostly relates to timeouts and buffer sizes.
208
210
209
211
If you are not using NGINX ingress controller, you can disable these default annotations by setting `ingress.nginx` to `nil` (aka null) via Helm CLI `--set ingress.nginx=null`) or via an override-values.yaml as below:
You can generate a dummy self-signed certificate specify for your `hostname`, assign it to spec `ingress.tls` and NGINX ingress controller default certificate (if it is enabled inline). For example:
253
+
You can generate a test double self-signed certificate specify for your `hostname`, assign it to spec `ingress.tls` and NGINX ingress controller default certificate (if it is enabled inline). For example:
252
254
253
255
```yaml
254
256
tls:
@@ -338,7 +340,7 @@ chromeNode:
338
340
targetPort: 7900
339
341
# NodePort will be assigned randomly if not set
340
342
edgeNode:
341
-
ports: # You also can give object following manifest of container ports
343
+
ports: # You also can give objects following manifest of container ports
342
344
- containerPort: 5900
343
345
name: vnc
344
346
protocol: TCP
@@ -366,7 +368,7 @@ Other settings of probe support to override under `.startupProbe` `.readinessPro
366
368
successThreshold
367
369
```
368
370
369
-
You can easily configure the probes (as Kubernetes [supports](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/)) to override the default settings. For example:
371
+
You can configure the probes (as Kubernetes [supports](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/)) to override the default settings. For example:
370
372
371
373
```yaml
372
374
edgeNode:
@@ -429,7 +431,7 @@ Files in `.extraScripts` will be mounted to the container with the same name wit
429
431
430
432
#### Video recorder
431
433
432
-
The video recorder is a sidecar that is deployed with the browser nodes. It is responsible for recording the video of the browser session. The video recorder is disabled by default. To enable it, you need to set the following values:
434
+
The video recorder is a sidecar deployed with the browser nodes. It is responsible for recording the video of the browser session. The video recorder is disabled by default. To enable it, you need to set the following values:
433
435
434
436
```yaml
435
437
videoRecorder:
@@ -445,7 +447,6 @@ from selenium import webdriver
In Node will perform query GraphQL in Hub based on Node SessionId and extract the value of `se:recordVideo` in capabilities before deciding to start video recording process or not. You can customize by reading on section [Configuration extra scripts mount to container](#configuration-extra-scripts-mount-to-container).
Those 2 ways are equivalent. You can choose one of them or combine them together. When both config file and ENV vars are set, value in `upload.conf` will take precedence.
513
+
Those two ways are equivalent. You can choose one of them or combine them. When both config file and ENV vars are set, value in `upload.conf` will take precedence.
513
514
514
-
Beside the configuration, the script for entry point of uploader container also needed. You can override the script via `--set-file uploaderConfigMap.extraScripts.upload\.sh=/path/to/your_script.sh` or set via YAML values. For example:
515
+
Besides the configuration, the script for entry point of uploader container also needed. You can override the script via `--set-file uploaderConfigMap.extraScripts.upload\.sh=/path/to/your_script.sh` or set via YAML values. For example:
515
516
516
517
```yaml
517
518
uploaderConfigMap:
@@ -555,7 +556,7 @@ Selenium Grid supports secure communication between components. Refer to the [in
555
556
556
557
In the chart, there is directory [certs](./certs) contains the default certificate, private key (as PKCS8 format), and Java Keystore (JKS) to teach Java about secure connection (since we are using a non-standard CA) for your trial, local testing purpose. You can generate your own self-signed certificate put them in that default directory by using script [cert.sh](./certs/cert.sh) with adjust needed information. The certificate, private key, truststore are mounted to the components via `Secret`.
557
558
558
-
There are multiple ways to configure your certificate, private key, truststore to the components. You can choose one of them or combine them together.
559
+
There are multiple ways to configure your certificate, private key, truststore to the components. You can choose one of them or combine them.
559
560
560
561
- Use the default directory [certs](./certs). Rename your own files to be same as the default files and replace them. Give `--set tls.enabled=true` to enable secure communication.
561
562
@@ -608,7 +609,7 @@ ingress-nginx:
608
609
609
610
#### Node Registration
610
611
611
-
In order to enable secure in the node registration to make sure that the node is one you control and not a rouge node, you can enable and provide a registration secret string to Distributor, Router and
612
+
To enable secure in the node registration to make sure that the node is one you control and not a rouge node, you can enable and provide a registration secret string to Distributor, Router and
612
613
Node servers in config `tls.registrationSecret`. For example:
0 commit comments