@@ -9,7 +9,6 @@ To install anycable-go to your kubernetes cluster simply run:
99``` shell
1010helm repo add anycable https://helm.anycable.io/
1111
12- # With Helm 3
1312helm upgrade -i anycable-go anycable/anycable-go
1413```
1514
@@ -23,14 +22,11 @@ AnyCable uses the same protocol as ActionCable, so you can use its JavaScript cl
2322
2423## Prerequisites
2524
26- * Kubernetes 1.4+ with Beta APIs enabled
27-
2825## Installing chart
2926
3027``` shell
3128helm repo add anycable https://helm.anycable.io/
3229
33- # With Helm 3
3430helm upgrade -i anycable-go anycable/anycable-go
3531```
3632
@@ -53,7 +49,7 @@ Specify each parameter using the `--set key=value[,key=value]` argument to helm
5349``` shell
5450helm upgrade -i anycable-go \
5551 --namespace anycable-go \
56- --set image.tag=1.0.1 \
52+ --set image.tag=1.6.3 \
5753 anycable/anycable-go
5854```
5955
@@ -68,7 +64,7 @@ These are the values used to configure anycable-go itself:
6864| Value| Description| Default|
6965| -----| -----------| -------|
7066| ** image.repository** | Choose between ` anycable/anycable-go ` and ` ghcr.io/anycable/anycable-go-pro ` | ` anycable/anycable-go ` |
71- | ** image.tag** | Version of docker image to use| ` 1.4.7 ` |
67+ | ** image.tag** | Version of docker image to use| ` 1.6.3 ` |
7268| ** image.pullSecrets.enabled** | Enable creating secret for pulling image from AnyCable Pro private registry| ` false ` |
7369| ** image.pullSecrets.registry** | URL of a private registry you want to authorize to| ` ghcr.io ` |
7470| ** image.pullSecrets.username** | Github username| ``|
@@ -162,14 +158,36 @@ These are the values used to configure anycable-go itself:
162158| Value| Description| Default|
163159| -----| -----------| -------|
164160| ** replicas** | Number of replicas for ` anycable-go ` deployment (ignored when HPA is enabled)| ` 1 ` |
161+
162+ | ** containerSecurityContext.enabled** | Enables container's Security Context| ` false ` |
163+ | ** containerSecurityContext.runAsUser** | Sets webhook containers' Security Context runAsUser| ` 1001 ` |
164+ | ** containerSecurityContext.runAsGroup** | Sets webhook containers' Security Context runAsGroup| ` 1001 ` |
165+ | ** containerSecurityContext.runAsNonRoot** | Sets webhook containers' Security Context runAsNonRoot| ` true ` |
166+ | ** containerSecurityContext.privileged** | Sets webhook container's Security Context privileged| ` false ` |
167+ | ** containerSecurityContext.allowPrivilegeEscalation** | Sets webhook container's Security Context allowPrivilegeEscalation| ` false ` |
168+ | ** containerSecurityContext.capabilities.drop** | Sets webhook container's Security Context capabilities.drop| ` ["ALL"] ` |
169+ | ** containerSecurityContext.seccompProfile.type** | Sets webhook container's Security Context seccompProfile.type| ` "RuntimeDefault" ` |
170+ | ** containerSecurityContext.readOnlyRootFilesystem** | Sets webhook container's Security Context readOnlyRootFilesystem| ` true ` |
165171| ** hpa.enabled** | Enable HorizontalPodAutoscaler| ` false ` |
166172| ** hpa.minReplicas** | Minimum replicas for HPA| ` 1 ` |
167173| ** hpa.maxReplicas** | Maximum replicas for HPA| ` 3 ` |
168174| ** hpa.targetCPUUtilizationPercentage** | Target CPU utilization for HPA| ` 50 ` |
169175| ** pod.annotations** | User-specified Pod annotations| ` {} ` |
170176| ** pod.extraLabels** | User-specified Pod Labels| ` {} ` |
177+ | ** pod.priorityClassName** | Controller pod priority class name| ` "" ` |
178+ | ** pod.runtimeClassName** | Name of the runtime class to be used by pod(s)| ` "" ` |
179+ | ** pod.schedulerName** | Name of the k8s scheduler (other than default)| ` "" ` |
180+ | ** pod.securityContext.enabled** | Enables Controller pods' Security Context| ` false ` |
181+ | ** pod.securityContext.fsGroupChangePolicy** | Set filesystem group change policy| ` "Always" ` |
182+ | ** pod.securityContext.sysctls** | Set kernel settings using the sysctl interface| ` [] ` |
183+ | ** pod.securityContext.supplementalGroups** | Set filesystem extra groups| ` [] ` |
184+ | ** pod.securityContext.fsGroup** | Set Controller pod's Security Context fsGroupo| ` 1001 ` |
185+ | ** pod.serviceAccountName** | User-specified ServiceAccount for Pod identity| ` "" ` |
171186| ** pod.tolerations** | User-specified Pod tolerations| ` [] ` |
172- | ** pod.serviceAccountName** | User-specified ServiceAccount for Pod identity||
187+ | ** pod.topologySpreadConstraints** | Topology Spread Constraints for pod assignment| ` [] ` |
188+ | ** pod.disruptionBudget.enabled** | Enables podDisruptionBudget configuration| ` true ` |
189+ | ** pod.disruptionBudget.minUnavailable** | podDisruptionBudget minimum number unavailable pods| ` "50%" ` |
190+ | ** pod.disruptionBudget.maxUnavailable** | podDisruptionBudget maximum number of unavailable pods| ` "" ` |
173191| ** service.annotations** | User-specified Service annotations| ` {} ` |
174192
175193### Monitoring
0 commit comments