Skip to content

Releases: weaviate/weaviate-helm

v13.3.0 - Added support for img2vec-neural module

14 Jun 20:18
2f9333e
Compare
Choose a tag to compare

Added support for img2vec-neural module

v13.2.1 - Added ability to define custom pvc for Weaviate

24 May 11:43
717cb40
Compare
Choose a tag to compare

Added ability to define custom pvc for Weaviate

v13.2.0 - Support for Weaviate v1.4.0, support for image module

13 May 08:26
da6c005
Compare
Choose a tag to compare

v13.1.0 - Support For Weaviate v1.3.0, support QnA module

23 Apr 09:42
4389265
Compare
Choose a tag to compare
Merge pull request #40 from semi-technologies/prepare-release-13.1

prepare release 13.1.0

v13.0.0 - Full module support

19 Mar 10:16
2e8e449
Compare
Choose a tag to compare

Supports Weaviate's module strategy. Breaking changes because contextionary was moved to modules.text2vec-contextionary, other than that it is backward-compatible.

Still defaults to deploying with the contextionary.

v12.1.0 - Support for usage collector origin variable

16 Mar 13:27
e7db4de
Compare
Choose a tag to compare

Support for usage collector origin variable

v12.0.0 - Support Weaviate v1.0.0

12 Jan 17:14
6c92bcd
Compare
Choose a tag to compare

Supports Weaviate v1.0.0. A clean install is recommended.

v11.0.0 - Weaviate Standalone

18 Dec 14:45
c042b3f
Compare
Choose a tag to compare

Supports Weaviate 0.23.0, i.e. the standalone version which no longer depends on Elasticsearch or etcd.

Since Weaviate 0.22.x to Weaviate 0.23.0 is not upgradeable, neither is this helm chart. Requires a new setup and reimport of all data.

v10.3.1 - Liveness and readyness probes in collector proxy

07 Oct 09:16
a1719eb
Compare
Choose a tag to compare

Adds liveness and readyness probes for the collector proxy.

Fixes unhealthy state when deploying with a gke ingress.

v10.3.0 - Optional collector proxy

02 Oct 07:41
c171e57
Compare
Choose a tag to compare

Values contains the option to configure a meta data collector proxy in front of the normal weaviate service.

Such a proxy may be used to optimize the deployment or detect malicious attacks.