class NodeTemplate(pb_classes.Message): (source)
Constructor: NodeTemplate(initial_message, metadata, taints, resources, ...)
Undocumented
| Method | __dir__ |
Undocumented |
| Method | __init__ |
Create a wrapper around a protobuf message instance. |
| Method | boot |
Undocumented |
| Method | cloud |
Undocumented |
| Method | filesystems |
Undocumented |
| Method | gpu |
Undocumented |
| Method | gpu |
Undocumented |
| Method | metadata |
Undocumented |
| Method | network |
Undocumented |
| Method | os |
Undocumented |
| Method | preemptible |
Undocumented |
| Method | reservation |
Undocumented |
| Method | resources |
Undocumented |
| Method | service |
Undocumented |
| Method | taints |
Undocumented |
| Constant | __PB2 |
Undocumented |
| Constant | __PY |
Undocumented |
| Class Variable | __mask |
Undocumented |
| Property | boot |
Parameters of a Node Nebius Compute Instance boot disk. |
| Property | cloud |
cloud-init user-data Should contain at least one SSH key. |
| Property | filesystems |
Static attachments of Compute Filesystem. Can be used as a workaround, until CSI for Compute Disk and Filesystem will be available. |
| Property | gpu |
Nebius Compute GPUCluster ID that will be attached to node. |
| Property | gpu |
GPU-related settings. |
| Property | metadata |
Undocumented |
| Property | network |
Undocumented |
| Property | os |
OS version that will be used to create the boot disk of Compute Instances in the NodeGroup. Supported platform / Kubernetes version / OS / driver presets combinations |
| Property | preemptible |
Configures whether the nodes in the group are preemptible. Set to empty value to enable preemptible nodes. |
| Property | reservation |
reservation_policy is an interface of the "capacity block" (or "capacity block group") mechanism of Nebius Compute. |
| Property | resources |
Resources that will have Nebius Compute Instance where Node kubelet will run. |
| Property | service |
the Nebius service account whose credentials will be available on the nodes of the group. With these credentials, it is possible to make nebius CLI or public API requests from the nodes without the need for extra authentication... |
| Property | taints |
Kubernetes Node taints. For now change will not be propagated to existing nodes, so will be applied only to Kubernetes Nodes created after the field change. That behaviour may change later. So, for now you will need to manually set them to existing nodes, if that is needed... |
Inherited from Message:
| Class Method | get |
Return the protobuf descriptor for this message class. |
| Class Method | is |
Return True if the field contains credentials. |
| Class Method | is |
Return True if the field is marked as sensitive. |
| Method | __repr__ |
Return a human-readable representation of the message, sanitizing sensitive fields. |
| Method | check |
Check explicit presence for a field in the protobuf message. |
| Method | get |
Build a reset mask for a full update of this message. |
| Method | get |
Return the tracked reset mask. |
| Method | is |
Return True if a field equals its default value. |
| Method | set |
Replace the tracked reset mask. |
| Method | which |
Return the set field name for a given oneof. |
| Instance Variable | __PB2 |
Protobuf message class associated with this wrapper. |
| Instance Variable | __pb2 |
Underlying protobuf message instance. |
| Method | _clear |
Clear a field and record it in the reset mask. |
| Method | _get |
Return a field value with optional wrapping and presence handling. |
| Method | _set |
Set a field value and update the reset mask. |
| Class Variable | __credentials |
Undocumented |
| Class Variable | __default |
Undocumented |
| Class Variable | __sensitive |
Undocumented |
| Instance Variable | __recorded |
Mask tracking fields cleared or set to default. |
message_1.Message | None = None, *, metadata: NodeMetadataTemplate | node_group_pb2.NodeMetadataTemplate | None | unset.UnsetType = unset.Unset, taints: abc.Iterable[ NodeTaint] | None | unset.UnsetType = unset.Unset, resources: ResourcesSpec | instance_template_pb2.ResourcesSpec | None | unset.UnsetType = unset.Unset, boot_disk: DiskSpec | instance_template_pb2.DiskSpec | None | unset.UnsetType = unset.Unset, gpu_settings: GpuSettings | node_group_pb2.GpuSettings | None | unset.UnsetType = unset.Unset, os: builtins.str | None | unset.UnsetType = unset.Unset, gpu_cluster: GpuClusterSpec | node_group_pb2.GpuClusterSpec | None | unset.UnsetType = unset.Unset, network_interfaces: abc.Iterable[ NetworkInterfaceTemplate] | None | unset.UnsetType = unset.Unset, filesystems: abc.Iterable[ AttachedFilesystemSpec] | None | unset.UnsetType = unset.Unset, cloud_init_user_data: builtins.str | None | unset.UnsetType = unset.Unset, service_account_id: builtins.str | None | unset.UnsetType = unset.Unset, preemptible: PreemptibleSpec | node_group_pb2.PreemptibleSpec | None | unset.UnsetType = unset.Unset, reservation_policy: ReservationPolicy | node_group_pb2.ReservationPolicy | None | unset.UnsetType = unset.Unset):
(source)
¶
Create a wrapper around a protobuf message instance.
| Raises | |
AttributeError | If the wrapper is missing required class metadata. |
def boot_disk(self, value:
DiskSpec | instance_template_pb2.DiskSpec | None):
(source)
¶
Undocumented
def filesystems(self, value:
abc.Iterable[ AttachedFilesystemSpec] | None):
(source)
¶
Undocumented
def gpu_cluster(self, value:
GpuClusterSpec | node_group_pb2.GpuClusterSpec | None):
(source)
¶
Undocumented
def gpu_settings(self, value:
GpuSettings | node_group_pb2.GpuSettings | None):
(source)
¶
Undocumented
def metadata(self, value:
NodeMetadataTemplate | node_group_pb2.NodeMetadataTemplate | None):
(source)
¶
Undocumented
def network_interfaces(self, value:
abc.Iterable[ NetworkInterfaceTemplate] | None):
(source)
¶
Undocumented
def preemptible(self, value:
PreemptibleSpec | node_group_pb2.PreemptibleSpec | None):
(source)
¶
Undocumented
def reservation_policy(self, value:
ReservationPolicy | node_group_pb2.ReservationPolicy | None):
(source)
¶
Undocumented
def resources(self, value:
ResourcesSpec | instance_template_pb2.ResourcesSpec | None):
(source)
¶
Undocumented
Undocumented
| Value |
|
Undocumented
| Value |
|
Static attachments of Compute Filesystem. Can be used as a workaround, until CSI for Compute Disk and Filesystem will be available.
OS version that will be used to create the boot disk of Compute Instances in the NodeGroup. Supported platform / Kubernetes version / OS / driver presets combinations
- gpu-l40s-a, gpu-l40s-d, gpu-h100-sxm, gpu-h200-sxm, cpu-e1, cpu-e2, cpu-d3:
- drivers_preset: ""
- version: 1.30 → "ubuntu22.04"
- version: 1.31 → "ubuntu22.04" (default), "ubuntu24.04"
- drivers_preset: ""
- gpu-l40s-a, gpu-l40s-d, gpu-h100-sxm, gpu-h200-sxm:
- drivers_preset: "cuda12" (CUDA 12.4)
- version: 1.30, 1.31 → "ubuntu22.04"
- drivers_preset: "cuda12.4"
- version: 1.31 → "ubuntu22.04"
- drivers_preset: "cuda12.8"
- version: 1.31 → "ubuntu24.04"
- drivers_preset: "cuda12" (CUDA 12.4)
- gpu-b200-sxm:
- drivers_preset: ""
- version: 1.30, 1.31 → "ubuntu24.04"
- drivers_preset: "cuda12" (CUDA 12.8)
- version: 1.30, 1.31 → "ubuntu24.04"
- drivers_preset: "cuda12.8"
- version: 1.31 → "ubuntu24.04"
- drivers_preset: ""
- gpu-b200-sxm-a:
- drivers_preset: ""
- version: 1.31 → "ubuntu24.04"
- drivers_preset: "cuda12.8"
- version: 1.31 → "ubuntu24.04"
- drivers_preset: ""
Configures whether the nodes in the group are preemptible. Set to empty value to enable preemptible nodes.
reservation_policy is an interface of the "capacity block" (or "capacity block group") mechanism of Nebius Compute.
the Nebius service account whose credentials will be available on the nodes of the group. With these credentials, it is possible to make nebius CLI or public API requests from the nodes without the need for extra authentication. This service account is also used to make requests to container registry.
resource.serviceaccount.issueAccessToken permission is required to use this field.
Kubernetes Node taints. For now change will not be propagated to existing nodes, so will be applied only to Kubernetes Nodes created after the field change. That behaviour may change later. So, for now you will need to manually set them to existing nodes, if that is needed. Field change will NOT trigger NodeGroup roll out.