Prashant Tiwari
Prashant Tiwari
This worked: It turns out that the secrets need to be base encoded. ``` apiVersion: keda.sh/v1alpha1 kind: TriggerAuthentication metadata: name: trigger-auth-postgres namespace: dev spec: secretTargetRef: - parameter: password name: nebari-conda-store-postgresql...
# Performance imporvements We try and create 5 conda environments the fifth environment we add sciket-learn. ## Current develop branch Time: 5 minutes 11 seconds Number of conda-store workers: 1...
We need a conda-store worker to be alive to start a Jupyter notebook as it depends on NFS-share. As we can not scale conda-store workers to zero. There is little...
> A few specifics: > - We want to add a new node group for most conda store workers. > - We want to keep 1 conda store worker on...
We need to figure out [issuers](https://cert-manager.io/docs/configuration/issuers/) we need to support (other than Let's Encrypt listed as ACEM). Any votes?
The implementation can be broken into several parts, one per Issuer, starting with Let's Encrypt. To resolve this ticket, we should have the following: 1. Figure out list of [issuers](https://cert-manager.io/docs/configuration/issuers/)...
I tried deploying nebari with the following config: ``` ... ... certificate: type: existing # acme_email: [email protected] # acme_server: https://acme-v02.api.letsencrypt.org/directory secret_name: tls-whoami-ingress-http ``` Installed the cert-manager and its CRDs using...
I found this in [traefik docs](https://doc.traefik.io/traefik/providers/kubernetes-ingress/) This explains why I could not convince traefik.IngressRoute to auto create certificate. I will need to create an temprary endpoint using kubernetes Ingress for...
Steps to get the cert-manager working: 1. Start nebari with the following config, note `secret_name: tls-ingress-http`. ```yaml $ tail nebari-config.yaml kubernetes_version: '1.29' region: eu-west-1 certificate: type: existing secret_name: tls-ingress-http dns:...
Certificate configuration in nebari for lets_encrypt. ```yaml certificate: acme_email: [email protected] type: lets-encrypt ``` For self-signed certificates: ```yaml certificate: type: existing secret_name: tls-ingress-http ``` Post upgrade to cert-manager. We have a...