Posit Workbench

Version: 0.8.10 AppVersion: 2024.12.0

Official Helm chart for Posit Workbench

Data Scientists use Posit Workbench to analyze data and create data products using R and Python.

For production

To ensure a stable production deployment:

  • “Pin” the version of the Helm chart that you are using. You can do this using the:
    • helm dependency command and the associated “Chart.lock” files or

    • the --version flag.

      Important

      This protects you from breaking changes.

  • Before upgrading check for breaking changes using helm-diff plugin and helm diff upgrade.
  • Read NEWS.md for updates on breaking changes and the documentation below on how to use the chart.

Installing the chart

To install the chart with the release name my-release at version 0.8.10:

helm repo add rstudio https://helm.rstudio.com
helm upgrade --install my-release rstudio/rstudio-workbench --version=0.8.10

To explore other chart versions, look at:

helm search repo rstudio/rstudio-workbench -l

Required configuration

To function, this chart requires the following:

  • A license file. See the Licensing section below for more details.

  • A Kubernetes PersistentVolume that contains the home directory for users.

    • If homeStorage.create is set, it creates a Persistent Volume Claim (PVC) that relies on the default storage class to generate the PersistentVolume. Most Kubernetes environments do not have a default storage class that you can use with ReadWriteMany access mode out-of-the-box. In this case, we recommend that you:
      • Disable homeStorage.create and create your own PersistentVolume and PersistentVolumeClaim, then
      • Mount them into the container by specifying the pod.volumes and pod.volumeMounts parameters, or by specifying your PersistentVolumeClaim using homeStorage.name and homeStorage.mount.
    • If you cannot use a PersistentVolume to properly mount your users’ home directories, mount your data in the container by using a regular Kubernetes Volume, specified in pod.volumes and pod.volumeMounts.
    • If you cannot use a Volume to mount the directories, manually mount them during container startup with a mechanism similar to what is described below for joining to auth domains.
    • If not using homeStorage.create, configure config.serverDcf.launcher-mounts to ensure that the correct mounts are used when users create new sessions.
  • If using load balancing (by setting replicas > 1), you need similar storage defined for sharedStorage to store shared project configuration. However, you can also configure the product to store its shared data underneath /home by setting config.server.rserver\.conf.server-shared-storage-path=/home/some-shared-dir.

  • A method to join the deployed rstudio-workbench container to your auth domain. The default rstudio/rstudio-workbench image has sssd installed and started by default. You can include sssd configuration in config.userProvisioning like so:

    config:
      userProvisioning:
        mysssd.conf:
          sssd:
            config_file_version: 2
            services: nss, pam
            domains: rstudio.com
          domain/rstudio.com:
            id_provider: ldap
            auth_provider: ldap

Licensing

This chart supports activating the product using a license file.

We recommend storing a license file as a Secret and setting the license.file.secret and license.file.secretKey values accordingly.

First, create the secret declaratively with YAML or imperatively using the following command:

kubectl create secret generic rstudio-workbench-license --from-file=licenses/rstudio-workbench.lic

Second, specify the following values:

license:
  file:
    secret: rstudio-workbench-license
    secretKey: rstudio-workbench.lic

Alternatively, license files can be set during helm install with the following argument:

--set-file license.file.contents=licenses/rstudio-workbench.lic

Database

Workbench requires a PostgreSQL database when running in Kubernetes. You must configure a valid connection URI and a password for the product to function correctly. Both the connection URI and password may be specified in the config section of values.yaml. However, we recommend only adding the connection URI and putting the database password in a Kubernetes Secret, which can be automatically set as an environment variable.

Database configuration

Add the following to your values.yaml, replacing the connection-uri with your database details.

config:
  secret:
    database.conf:
      provider: "postgresql"
      connection-uri: "postgres://<USERNAME>@<HOST>:<PORT>/<DATABASE>?sslmode=allow"

Database password

First, create a Secret declaratively with YAML or imperatively using the following command (replacing with your actual password):

kubectl create secret generic rstudio-workbench-database --from-literal=password=YOURPASSWORDHERE

Second, specify the following in your values.yaml:

pod:
  env:
    - name: WORKBENCH_POSTGRES_PASSWORD
      valueFrom:
        secretKeyRef:
          name: rstudio-workbench-database
          key: password

Alternatively, database passwords may be set during helm install with the following argument:

--set config.secret.'database\.conf'.password="<YOUR_PASSWORD_HERE>"

General principles

  • In most places, we opt to pass Helm values directly into ConfigMaps. We automatically translate these into the valid .ini or .dcf file formats required by Workbench.
    • Those configuration files and their mount locations are covered in the Configuration files section below.
  • If you need to modify the jobs launched by Workbench, use job-json-overrides.
  • The prestart scripts for Workbench and Posit Job Launcher are highly customized to get the service account information off of the Workbench pod for use in launching jobs.
  • Workbench does not export prometheus metrics on its own. Instead, we run a sidecar graphite exporter.

Configuration files

These configuration values all take the form of usual Helm values so you can set the database password with something like:

... --set config.secret.database\.conf.password=mypassword ...

The files are converted into configuration files in the necessary format via go-templating. If you want to “in-line” a config file or mount it verbatim, you can use a pattern like:

config:
  server:
    rserver.conf: |
      verbatim-file=format

The names of files are dynamically used, so you can add new files as needed. Beware that some files have default values, so moving them can have adverse effects. Also, if you use a different mounting paradigm, you need to change the XDG_CONFIG_DIRS environment variable.

  • Session Configuration
    • These configuration files are mounted into the server and are mounted into the session pods.
    • repos.conf, rsession.conf, notifications.conf
    • Located in:
      config.session.<< name of file >> Helm values
    • Mounted at:
      /mnt/session-configmap/rstudio/
  • Session Secret Configuration:
    • These configuration files are mounted into the server and session pods.
    • odbc.ini and other similar shared secrets.
    • Located in:
      config.sessionSecret.<< name of file>> Helm values
    • Mounted at:
      /mnt/session-secret/
  • Secret Configuration:
    • These configuration files are mounted into the server with more restrictive permissions (0600).
    • database.conf, openid-client-secret, databricks.conf
    • Located in:
      config.secret.<< name of file >> Helm values
    • Mounted at:
      /mnt/secret-configmap/rstudio/
  • Server Configuration:
    • These configuration files are mounted into the server (.ini file format).
    • rserver.conf, launcher.conf, jupyter.conf, logging.conf
    • Located at:
      config.server.<< name of file >> Helm values
    • Mounted at:
      /mnt/configmap/rstudio/
  • Server DCF Configuration:
    • These configuration files are mounted into the server (.dcf file format).
    • launcher-mounts, launcher-env
    • Located at:
      config.serverDcf.<< name of file >> Helm values
    • Included at:
      /mnt/configmap/rstudio/
  • Profiles Configuration:
    • These configuration files are mounted into the server (.ini file format).
    • launcher.kubernetes.profiles.conf
    • They are located at config.profiles.<< name of file >> Helm values
    • Included at:
      /mnt/configmap/rstudio/
    • See the Profiles section below for more information.
  • Prestart:
    • This is provided by the Helm chart in a configmap.
    • It is mounted into the pod at /scripts/.
    • prestart-workbench.bash is used to start workbench.
    • prestart-launcher.bash is used to start launcher.
  • User Provisioning Configuration:
    • These configuration files are used for configuring user provisioning (i.e., sssd).
    • Located at:
      config.userProvisioning.<< name of file >> Helm values
    • Mounted onto:
      /etc/sssd/conf.d/ with 0600 permissions by default.
  • Custom Startup Configuration:
    • supervisord service / unit definition .conf files.

    • Use the .ini file format by default.

    • Mounted at:
      /startup/custom

    • As with all configuration files above, you can override with a verbatim string if desired:

    • Located at:
      config.startupCustom.<< name of file >> Helm values:

      config:
        startupCustom:
          myfile.conf: |
            file-used-verbatim
  • PAM configuration:
    • pam configuration files.
    • Located at:
      config.pam.<< name of file >> Helm values
    • Mounted verbatim as individual files (using subPath mounts) at:
      /etc/pam.d/<< name of file >>

Python repositories

pip can be configured with config.session.pip.conf. To ensure pip.conf is mounted into the session pods, it is important that:

  • launcher.useTemplates: true is set

  • pip.conf settings are listed under config.session as shown in the following example for adding Posit Public Package Manager’s PyPI:

    launcher:
      useTemplates: true
    
    config:
      session:
        pip.conf:
          "global":
            index-url: https://packagemanager.posit.co/pypi/latest/simple
            trusted-host: packagemanager.posit.co

R repositories

R package repositories can be configured with config.session.repos.conf:

config:
  session:
    repos.conf:
      CRAN: https://packagemanager.posit.co/cran/__linux__/jammy/latest

For more information about configuring CRAN repositories in Workbench, see the Posit Workbench Administrator Guide’s - Package Installation > CRAN repositories section.

User provisioning

Provisioning users in Workbench containers is challenging. Session images create users automatically (with consistent UIDs / GIDs). However, creating users in the Workbench containers is a responsibility that falls to the administrator.

The most common way to provision users is via sssd. The latest Workbench container has sssd included and running by default (see userProvisioning configuration files above).

The other way that this can be managed is via a lightweight startup service (runs once at startup and then sleeps forever) or a polling service (checks at regular intervals). Either can be written easily in bash or another programming language.

However, it is important to use caution for the following:

  • UID / GID consistency:
    • Linux usernames and their matching to UID/GID must be consistent across all nodes and across time.
    • Failing can cause security issues and access by some users to access view they should not be allowed to see.
  • Usernames cannot have @.
    • The @ sign (often used in emails with SSO) is a problem for Workbench because some operating systems disallow @ signs in linux usernames.
  • supervisord is configured by default to exit if any of its child processes exit.
    • If you use config.startupCustom to configure a user management service, be careful that it does not exit unnecessarily.

We do not provide such a service out-of-the box because we intend for Workbench to solve this problem in a future release. Please contact your account representative if you have feedback or questions about this workflow.

PAM

When starting sessions on Workbench, PAM configuration is often very important, even if PAM is not being used as an authentication mechanism. The Workbench Helm chart allows creating custom PAM files via the config.pam values section.

Each key under config.pam becomes a PAM configuration file, and is mounted into /etc/pam.d/ in the container. For example:

config:
  pam:
    rstudio: |
      # the rstudio PAM config file
      # will be used verbatim
    rstudio-session: |
      # the rstudio-session PAM config file
      # will be used verbatim

RStudio profiles

Profiles are used to define product behavior (in .ini file format) based on user and group membership.

Sections define whether a set of configurations is applied to a user’s jobs based on the following criteria:

  • If section header is [*], it applies to all users.
  • If a user’s username is myusername, the section [myusername] applies to them.
  • If a user is in the allusers group, then the section [@allusers] applies to them

The product reads configuration from top to bottom and “last-in-wins” for a given configuration value.

/etc/rstudio/profiles

The /etc/rstudio/profiles file enables you to tailor the behavior of sessions on a per-user or per-group basis. See the Posit Workbench Administrator Guide - User and Group Profiles page for more information.

In the values.yaml, define the content of /etc/rstudio/profiles in config.server.profiles. For example:

config:
  server:
    profiles:
      "*":
        session-limit: 5
        session-timeout-minutes: 60

Becomes:

/etc/rstudio/profiles

[*]
session-limit=5
session-timeout-minutes=60

/etc/rstudio/launcher.kubernetes.profiles.conf

The /etc/rstudio/launcher.kubernetes.profiles.conf contains the configuration of resource limits by user and group when using the Kubernetes Launcher Plugin. In the values.yaml, define the content of /etc/rstudio/launcher.kubernetes.profiles.conf in the config.profiles.launcher.kubernetes.profiles.conf file. The config.profiles section has a couple of niceties that are added in by default.

  • YAML arrays like the following becomes “comma-joined.” For instance, the following becomes: some-key=value1,value2

    some-key:
      - value1
      - value2
  • The [*] section has arrays “appended” to user and group sections, along with “defaults” defined by the chart.

For example:

config:
  profiles:
    launcher.kubernetes.profiles.conf:
      "*":
        some-key:
          - value1
          - value2
      myuser:
        some-key:
          - value4
          - value5

Becomes:

/etc/rstudio/launcher.kubernetes.profiles.conf

[*]
some-key: value1,value2
[myuser]
some-key: value1,value2,value3,value4
Note

This appending/concatenation/array translation behavior only works with the helm chart.

Job Json overrides

If you want to customize the job launch process (i.e., how sessions are defined), edit the following configuration:

  • Modify:

    config.profiles.launcher\.kubernetes\.profiles\.conf.<< some selector >>.job-json-overrides`
  • Create an array of maps with the following keys:

    • target: The “target” part of the job spec to replace.
    • name: A unique identifier (ideally with no spaces) becomes a configuration filename on disk.
    • json: A YAML value that is translated directly to JSON and injected into the job spec at target.

Explore the docs in the Helm repository for additional information.

config:
  profiles:
    launcher.kubernetes.profiles.conf:
      "*":
        job-json-overrides:
          - target: "/spec/template/spec/containers/0/imagePullPolicy"
            json: "Always"
            name: imagePullPolicy
          - target: "/spec/template/spec/imagePullSecrets"
            json:
              - name: my-pull-secret
            name: imagePullSecrets
        container-images:
          - "one-image:tag"
          - "two-image:tag

Sealed secrets

This chart supports the use of Sealed Secrets to allow for storing secrets in SCM and to ensure secrets are never leaked via Helm. The target cluster must include a SealedSecret controller as the controller is responsible for converting a SealedSecret to a Secret.

To activate the use of SealedSecret templates instead of Secret templates in the chart, set sealedSecret.enabled=true and ensure the following values are all encrypted (the chart does not support mixing encrypted values with unencrypted values):

  • config.secret
  • config.sessionSecret
  • config.userProvisioning
  • launcherPem
  • secureCookieKey (or global.secureCookieKey)

Use of Sealed secrets disables the chart’s auto-generation and reuse capabilities for launcherPem and secureCookieKey. launcherPem is an RSA private key, which can be generated via an RSA tool such as Helm’s genPrivateKey function. secureCookieKey is typically a UUID, which can be generated via a UUID generator such as Helm’s uuidv4 function.

Values

Key Type Default Description
affinity object {} A map used verbatim as the pod’s “affinity” definition
args list [] args is the pod container’s run arguments.
command list [] command is the pod container’s run command. By default, it uses the container’s default. However, the chart expects a container using supervisord for startup
config.defaultMode.jobJsonOverrides int 0644 default mode for jobJsonOverrides config
config.defaultMode.pam int 0644 default mode for pam scripts
config.defaultMode.prestart int 0755 default mode for prestart config
config.defaultMode.secret int 0600 default mode for secrets
config.defaultMode.server int 0644 default mode for server config
config.defaultMode.session int 0644 default mode for session files
config.defaultMode.sessionSecret int 0420 default mode for session secrets
config.defaultMode.startup int 0755 default mode for startup config
config.defaultMode.userProvisioning int 0600 default mode for userProvisioning config
config.pam object {} a map of pam config files. Will be mounted into the container directly / per file, in order to avoid overwriting system pam files
config.profiles object {} a map of server-scoped config files (akin to config.server), but with specific behavior that supports profiles. See README for more information.
config.secret string nil a map of secret, server-scoped config files (database.conf, databricks.conf, openid-client-secret). Mounted to /mnt/secret-configmap/rstudio/ with 0600 permissions
config.server object RStudio Workbench Configuration Reference. See defaults with helm show values a map of server config files. Mounted to /mnt/configmap/rstudio/
config.serverDcf object {"launcher-mounts":[]} a map of server-scoped config files (akin to config.server), but with .dcf file formatting (i.e. launcher-mounts, launcher-env, etc.)
config.session object {"notifications.conf":{},"repos.conf":{"CRAN":"https://packagemanager.posit.co/cran/__linux__/jammy/latest"},"rsession.conf":{},"rstudio-prefs.json":"{}\n"} a map of session-scoped config files. Mounted to /mnt/session-configmap/rstudio/ on both server and session, by default.
config.sessionSecret object {} a map of secret, session-scoped config files (odbc.ini, etc.). Mounted to /mnt/session-secret/ on both server and session, by default
config.startupCustom object {} a map of supervisord .conf files to define custom services. Mounted into the container at /startup/custom/
config.startupUserProvisioning object {"sssd.conf":"[program:sssd]\ncommand=/usr/sbin/sssd -i -c /etc/sssd/sssd.conf --logger=stderr\nautorestart=false\nnumprocs=1\nstdout_logfile=/dev/stdout\nstdout_logfile_maxbytes=0\nstdout_logfile_backups=0\nstderr_logfile=/dev/stderr\nstderr_logfile_maxbytes=0\nstderr_logfile_backups=0\n"} a map of supervisord .conf files to define user provisioning services. Mounted into the container at /startup/user-provisioning/
config.userProvisioning object {} a map of sssd config files, used for user provisioning. Mounted to /etc/sssd/conf.d/ with 0600 permissions
dangerRegenerateAutomatedValues bool false
diagnostics object {"directory":"/var/log/rstudio","enabled":false} Settings for enabling server diagnostics
extraObjects list [] Extra objects to deploy (value evaluated as a template)
fullnameOverride string "" the full name of the release (can be overridden)
global.secureCookieKey string ""
homeStorage.accessModes list ["ReadWriteMany"] accessModes defined for the storage PVC (represented as YAML)
homeStorage.create bool false whether to create the persistentVolumeClaim for homeStorage
homeStorage.mount bool false Whether the persistentVolumeClaim should be mounted (even if not created)
homeStorage.name string "" The name of the pvc. By default, computes a value from the release name
homeStorage.path string "/home" the path to mount the homeStorage claim within the pod
homeStorage.requests.storage string "10Gi" the volume of storage to request for this persistent volume claim
homeStorage.selector object {} selector for PVC definition
homeStorage.storageClassName bool false storageClassName - the type of storage to use. Must allow ReadWriteMany
homeStorage.subPath string "" an optional subPath for the volume mount
homeStorage.volumeName string "" the volumeName passed along to the persistentVolumeClaim. Optional
image.imagePullPolicy string "IfNotPresent" the imagePullPolicy for the main pod image
image.imagePullSecrets list [] an array of kubernetes secrets for pulling the main pod image from private registries
image.repository string "rstudio/rstudio-workbench" the repository to use for the main pod image
image.tag string "" Overrides the image tag whose default is the chart appVersion.
image.tagPrefix string "ubuntu2204-" A tag prefix for the server image (common selection: ubuntu2204-). Only used if tag is not defined
ingress.annotations object {}
ingress.enabled bool false
ingress.hosts string nil
ingress.ingressClassName string "" The ingressClassName for the ingress resource. Only used for clusters that support networking.k8s.io/v1 Ingress resources
ingress.tls list []
initContainers bool false the initContainer spec that will be used verbatim
jobJsonOverridesFiles object {} jobJsonOverridesFiles is a map of maps. Each item in the map will become a file (named by the key), and the underlying object will be converted to JSON as the file’s contents
launcher.enabled bool true determines whether the launcher should be started in the container
launcher.extraTemplates object {} extra templates to render in the template directory.
launcher.includeDefaultTemplates bool true whether to include the default job.tpl and service.tpl files included with the chart
launcher.includeTemplateValues bool true whether to include the templateValues rendering process
launcher.kubernetesHealthCheck object {"enabled":true,"extraCurlArgs":["-fsSL"]} configuration for the “Kubernetes Health Check” that the launcher entrypoint runs at startup
launcher.namespace string "" allow customizing the namespace that sessions are launched into. Note RBAC and some config issues today
launcher.templateValues object {"job":{"annotations":{},"labels":{},"ttlSecondsAfterFinished":null},"pod":{"affinity":{},"annotations":{},"command":[],"containerSecurityContext":{},"defaultSecurityContext":{},"env":[],"extraContainers":[],"imagePullPolicy":"","imagePullSecrets":[],"initContainers":[],"labels":{},"nodeSelector":{},"securityContext":{},"serviceAccountName":"","tolerations":[],"volumeMounts":[],"volumes":[]},"service":{"annotations":{},"labels":{},"type":"ClusterIP"}} values that are passed along to the launcher job rendering process as a data object (in JSON). These values are then used within session templates.
launcher.templateValues.pod.command list [] command for all pods. This is really not something we should expose and will be removed once we have a better option
launcher.useTemplates bool false whether to render and use templates in the job launching process
launcherPem string "" An inline launcher.pem key. If not provided, one will be auto-generated. See README for more details.
launcherPub bool false An inline launcher.pub key to pair with launcher.pem. If false (the default), we will try to generate a launcher.pub from the provided launcher.pem
license.file object {"contents":false,"mountPath":"/etc/rstudio-licensing","mountSubPath":false,"secret":false,"secretKey":"license.lic"} the file section is used for licensing with a license file
license.file.contents bool false contents is an in-line license file
license.file.mountPath string "/etc/rstudio-licensing" mountPath is the place the license file will be mounted into the container
license.file.mountSubPath bool false It can be preferable not to enable this, because then updates propagate automatically
license.file.secret bool false secret is an existing secret with a license file in it
license.file.secretKey string "license.lic" secretKey is the key for the secret to use for the license file
license.key string nil key is the license to use
license.server bool false server is the : for a license server
livenessProbe object {"enabled":false,"failureThreshold":10,"httpGet":{"path":"/health-check","port":8787},"initialDelaySeconds":10,"periodSeconds":5,"timeoutSeconds":2} livenessProbe is used to configure the container’s livenessProbe
loadBalancer.forceEnabled bool false whether to force the loadBalancer to be enabled. Otherwise requires replicas > 1. Worth setting if you are HA but may only have one node
nameOverride string "" the name of the chart deployment (can be overridden)
nodeSelector object {} A map used verbatim as the pod’s “nodeSelector” definition
pod.annotations object {} Additional annotations to add to the rstudio-workbench pods
pod.env list [] env is an array of maps that is injected as-is into the “env:” component of the pod.container spec
pod.labels object {} Additional labels to add to the rstudio-workbench pods
pod.lifecycle object {} container lifecycle hooks
pod.port int 8787 The containerPort used by the main pod container
pod.securityContext object {} Values to set the securityContext for the service pod
pod.sidecar list [] sidecar is an array of containers that will be run alongside the main container
pod.terminationGracePeriodSeconds int 120 The termination grace period seconds allowed for the pod before shutdown
pod.volumeMounts list [] volumeMounts is injected as-is into the “volumeMounts:” component of the pod.container spec
pod.volumes list [] volumes is injected as-is into the “volumes:” component of the pod.container spec
podDisruptionBudget object {} Pod disruption budget
priorityClassName string "" The pod’s priorityClassName
prometheus.enabled bool true The parent setting for whether to enable prometheus metrics. Default is to use the built-in product exporter
prometheus.legacy bool false Whether to enable the legacy prometheusExporter INSTEAD OF the built-in product exporter. If you change this to true, please let us know why! Requires prometheusExporter.enabled=true too
prometheus.port int 8989 The port that prometheus will listen on. If legacy=true, then this will be hard-coded to 9108
prometheusExporter.enabled bool true DEPRECATED. Whether the prometheus exporter sidecar should be enabled. See prometheus.enabled instead.
prometheusExporter.image.imagePullPolicy string "IfNotPresent"
prometheusExporter.image.repository string "prom/graphite-exporter"
prometheusExporter.image.tag string "v0.9.0"
prometheusExporter.mappingYaml string nil Yaml that defines the graphite exporter mapping. null by default, which uses the embedded / default mapping yaml file
prometheusExporter.resources object {} resource specification for the prometheus exporter sidecar
prometheusExporter.securityContext object {} securityContext for the prometheus exporter sidecar
rbac.clusterRoleCreate bool false Whether to create the ClusterRole that grants access to the Kubernetes nodes API. This is used by the Launcher to get all of the IP addresses associated with the node that is running a particular job. In most cases, this can be disabled as the node’s internal address is sufficient to allow proper functionality.
rbac.create bool true Whether to create rbac. (also depends on launcher.enabled = true)
rbac.serviceAccount object {"annotations":{},"create":true,"labels":{},"name":""} The serviceAccount to be associated with rbac (also depends on launcher.enabled = true)
readinessProbe object {"enabled":true,"failureThreshold":3,"httpGet":{"path":"/health-check","port":8787},"initialDelaySeconds":10,"periodSeconds":3,"successThreshold":1,"timeoutSeconds":1} readinessProbe is used to configure the container’s readinessProbe
replicas int 1 replicas is the number of replica pods to maintain for this service. Use 2 or more to enable HA
resources object {"limits":{"cpu":"2000m","enabled":false,"ephemeralStorage":"200Mi","memory":"4Gi"},"requests":{"cpu":"100m","enabled":false,"ephemeralStorage":"100Mi","memory":"2Gi"}} resources define requests and limits for the rstudio-server pod
revisionHistoryLimit int 10 The revisionHistoryLimit to use for the pod deployment. Do not set to 0
sealedSecret.annotations object {} annotations for SealedSecret resources
sealedSecret.enabled bool false use SealedSecret instead of Secret to deploy secrets
secureCookieKey string ""
securityContext object {}
service.annotations object {} Annotations for the service, for example to specify an internal load balancer
service.clusterIP string "" The cluster-internal IP to use with service.type ClusterIP
service.loadBalancerIP string "" The external IP to use with service.type LoadBalancer, when supported by the cloud provider
service.nodePort bool false The explicit nodePort to use for service.type NodePort. If not provided, Kubernetes will choose one automatically
service.port int 80 The Service port. This is the port your service will run under.
service.type string "ClusterIP" The service type, usually ClusterIP (in-cluster only) or LoadBalancer (to expose the service using your cloud provider’s load balancer)
serviceMonitor.additionalLabels object {} additionalLabels normally includes the release name of the Prometheus Operator
serviceMonitor.enabled bool false Whether to create a ServiceMonitor CRD for use with a Prometheus Operator
serviceMonitor.namespace string "" Namespace to create the ServiceMonitor in (usually the same as the one in which the Prometheus Operator is running). Defaults to the release namespace
session.defaultConfigMount bool true Whether to automatically mount the config.session configuration into session pods. If launcher.namespace is different from Release Namespace, then the chart will duplicate the session configmap in both namespaces to facilitate this
session.defaultHomeMount bool true Whether to automatically add the homeStorage PVC to the session (i.e. via the launcher-mounts file)
session.defaultSecretMountPath string "/mnt/session-secret/" The path to mount the sessionSecret (from config.sessionSecret) onto the server and session pods
session.image.repository string "rstudio/r-session-complete" The repository to use for the session image
session.image.tag string "" A tag override for the session image. Overrides the “tagPrefix” above, if set. Default tag is { tagPrefix }{{ version }}
session.image.tagPrefix string "ubuntu2204-" A tag prefix for session images (common selections: ubuntu2204-, centos7-). Only used if tag is not defined
shareProcessNamespace bool false whether to provide shareProcessNamespace to the pod.
sharedStorage.accessModes list ["ReadWriteMany"] accessModes defined for the storage PVC (represented as YAML)
sharedStorage.annotations object {"helm.sh/resource-policy":"keep"} Define the annotations for the Persistent Volume Claim resource
sharedStorage.create bool false whether to create the persistentVolumeClaim for shared storage
sharedStorage.mount bool false Whether the persistentVolumeClaim should be mounted (even if not created)
sharedStorage.name string "" The name of the pvc. By default, computes a value from the release name
sharedStorage.path string "/var/lib/rstudio-server" the path to mount the sharedStorage claim within the pod
sharedStorage.requests.storage string "10Gi" the volume of storage to request for this persistent volume claim
sharedStorage.selector object {} selector for PVC definition
sharedStorage.storageClassName bool false storageClassName - the type of storage to use. Must allow ReadWriteMany
sharedStorage.volumeName string "" the volumeName passed along to the persistentVolumeClaim. Optional
startupProbe object {"enabled":false,"failureThreshold":30,"httpGet":{"path":"/health-check","port":8787},"initialDelaySeconds":10,"periodSeconds":10,"timeoutSeconds":1} startupProbe is used to configure the container’s startupProbe
startupProbe.failureThreshold int 30 failureThreshold * periodSeconds should be strictly > worst case startup time
strategy object {"rollingUpdate":{"maxSurge":"100%","maxUnavailable":0},"type":"RollingUpdate"} How to handle updates to the service. RollingUpdate (the default) minimizes downtime, but will not work well if your license only allows a single activation.
tolerations list [] An array used verbatim as the pod’s “tolerations” definition
topologySpreadConstraints list [] An array used verbatim as the pod’s “topologySpreadConstraints” definition
userCreate bool false userCreate determines whether a user should be created at startup (if true)
userName string "rstudio" userName determines the username of the created user
userPassword string "rstudio" userPassword determines the password of the created user
userUid string "10000" userUid determines the UID of the created user
versionOverride string "" A Workbench version to override the “tag” for the RStudio Workbench image and the session images. Necessary until https://github.com/helm/helm/issues/8194
xdgConfigDirs string "/mnt/dynamic:/mnt/session-configmap:/mnt/secret-configmap:/mnt/configmap:/mnt/load-balancer/" The XDG config dirs (directories where configuration will be read from). Do not change without good reason.
xdgConfigDirsExtra list [] A list of additional XDG config dir paths

Autogenerated from chart metadata using helm-docs v1.13.1