You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: charts/deepgram-self-hosted/README.md
+54Lines changed: 54 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -92,6 +92,60 @@ To configure a specific storage option, see the `engine.modelManager.volumes` [c
92
92
93
93
For detailed instructions on setting up and configuring each storage option, refer to the [Deepgram self-hosted guides](https://developers.deepgram.com/docs/kubernetes) and the respective cloud provider's documentation.
94
94
95
+
### Service Configuration
96
+
97
+
The Deepgram Helm chart provides flexible service configuration options for exposing the API, Engine, and License Proxy services. By default, all services use `ClusterIP` type, which provides internal cluster access only.
98
+
99
+
#### Service Types
100
+
101
+
- **ClusterIP** (default): Exposes the service on a cluster-internal IP. This is the default and recommended option for most deployments.
102
+
- **NodePort**: Exposes the service on each Node's IP at a static port. Useful for development or when you need direct node access.
103
+
- **LoadBalancer**: Exposes the service externally using a cloud provider's load balancer. Recommended for production deployments requiring external access.
104
+
105
+
#### Configuration Examples
106
+
107
+
**API Service with LoadBalancer (with security restrictions):**
- "10.0.0.0/8" # Only allow internal network access
137
+
externalTrafficPolicy: "Cluster" # Allow traffic from any node
138
+
```
139
+
140
+
#### LoadBalancer Security Options
141
+
142
+
When using `LoadBalancer` service type, you can configure additional security and performance options:
143
+
144
+
- **`loadBalancerSourceRanges`**: Restrict access to specific IP CIDR ranges. This provides network-level security by only allowing traffic from specified IP ranges.
145
+
- **`externalTrafficPolicy`**: Controls how external traffic is routed:
146
+
- `Cluster` (default): Traffic can be routed to any node in the cluster, then forwarded to the target pod
147
+
- `Local`: Traffic is only routed to nodes that have the target pod running, preserving source IP addresses
148
+
95
149
### Autoscaling
96
150
97
151
Autoscaling your cluster's capacity to meet incoming traffic demands involves both node autoscaling and pod autoscaling. Node autoscaling forsupported cloud providers is setup by default when using this Helm chart and creating your cluster with the [Deepgram self-hosted guides](https://developers.deepgram.com/docs/kubernetes). Pod autoscaling can be enabled via the `scaling.auto.enabled` configuration optionin this chart.
0 commit comments