@@ -58,7 +58,7 @@ make generate
58
58
Below is a list of command-line flags accepted by Katib controller:
59
59
60
60
| Name | Type | Default | Description |
61
- | --------------------------------- | --------------------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------ |
61
+ | ------------------------------- | ------------------------- | ----------------------------- | ---------------------------------------------------------------------------------------------------------------------- |
62
62
| enable-grpc-probe-in-suggestion | bool | true | Enable grpc probe in suggestions |
63
63
| experiment-suggestion-name | string | "default" | The implementation of suggestion interface in experiment controller |
64
64
| metrics-addr | string | ":8080" | The address that the metrics endpoint binds to |
@@ -74,7 +74,7 @@ Below is a list of command-line flags accepted by Katib controller:
74
74
Below is a list of command-line flags accepted by Katib DB Manager:
75
75
76
76
| Name | Type | Default | Description |
77
- | ----------------- | --------------- | --------- | --------------------------------------------------------- |
77
+ | --------------- | ------------- | ------- | ------------------------------------------------------- |
78
78
| connect-timeout | time.Duration | 60s | Timeout before calling error during database connection |
79
79
80
80
## Workflow design
@@ -113,13 +113,11 @@ to generate certificates for the webhooks.
113
113
114
114
Once Katib is deployed in the Kubernetes cluster, the ` cert-generator ` Job follows these steps:
115
115
116
- - Generate the self-signed CA certificate and private key.
116
+ - Generate the self-signed certificate and private key.
117
117
118
- - Generate public certificate and private key signed with the key generated in the previous step.
119
-
120
- - Create a Kubernetes Secret with the signed certificate. Secret has
121
- the ` katib-webhook-cert ` name and ` cert-generator ` Job's ` ownerReference ` to
122
- clean-up resources once Katib is uninstalled.
118
+ - Create a Kubernetes Secret with the self-signed TLS certificate and private key.
119
+ Secret has the ` katib-webhook-cert ` name and ` cert-generator ` Job's
120
+ ` ownerReference ` to clean-up resources once Katib is uninstalled.
123
121
124
122
Once Secret is created, the Katib controller Deployment spawns the Pod,
125
123
since the controller has the ` katib-webhook-cert ` Secret volume.
0 commit comments