Complete reference for the aicr command-line interface.
AICR provides a four-step workflow for optimizing GPU infrastructure:
┌──────────────┐ ┌──────────────┐ ┌──────────────┐ ┌──────────────┐
│ Snapshot │─────▶│ Recipe │─────▶│ Validate │─────▶│ Bundle │
└──────────────┘ └──────────────┘ └──────────────┘ └──────────────┘
Step 1: Capture system configuration Step 2: Generate optimization recipes Step 3: Validate constraints against cluster Step 4: Create deployment bundles
Available for all commands:
| Flag | Short | Type | Default | Description |
|---|---|---|---|---|
--debug |
bool | false | Enable debug logging (text mode with full metadata) | |
--log-json |
bool | false | Enable JSON logging (structured output for machine parsing) | |
--help |
-h |
bool | false | Show help |
--version |
-v |
bool | false | Show version |
AICR supports three logging modes:
-
CLI Mode (default): Minimal user-friendly output
- Just message text without timestamps or metadata
- Error messages display in red (ANSI color)
- Example:
Snapshot captured successfully
-
Text Mode (
--debug): Debug output with full metadata- Key=value format with time, level, source location
- Example:
time=2025-01-06T10:30:00.123Z level=INFO module=aicr version=v1.0.0 msg="snapshot started"
-
JSON Mode (
--log-json): Structured JSON for automation- Machine-readable format for log aggregation
- Example:
{"time":"2025-01-06T10:30:00.123Z","level":"INFO","msg":"snapshot started"}
Examples:
# Default: Clean CLI output
aicr snapshot
# Debug mode: Full metadata
aicr --debug snapshot
# JSON mode: Structured logs
aicr --log-json snapshot
# Combine with other flags
aicr --debug --output system.yaml snapshotCapture comprehensive system configuration including OS, GPU, Kubernetes, and SystemD settings.
Synopsis:
aicr snapshot [flags]Flags:
| Flag | Short | Type | Default | Description |
|---|---|---|---|---|
--output |
-o |
string | stdout | Output destination: file path, ConfigMap URI (cm://namespace/name), or stdout |
--format |
string | yaml | Output format: json, yaml, table | |
--config |
string | Path or HTTP/HTTPS URL to an AICRConfig file (YAML/JSON) that populates spec.snapshot.*. CLI flags below always win over the corresponding config field. |
||
--kubeconfig |
-k |
string | ~/.kube/config | Path to kubeconfig file (overrides KUBECONFIG env) |
--namespace |
-n |
string | default | Kubernetes namespace for agent deployment |
--image |
string | ghcr.io/nvidia/aicr:latest | Container image for agent Job | |
--job-name |
string | aicr | Name for the agent Job | |
--service-account-name |
string | aicr | ServiceAccount name for agent Job | |
--node-selector |
string[] | Node selector for agent scheduling (key=value, repeatable) | ||
--toleration |
string[] | all taints | Tolerations for agent scheduling (key=value:effect, repeatable). Default: all taints tolerated (uses operator: Exists). Only specify to restrict which taints are tolerated. |
|
--timeout |
duration | 5m | Timeout for agent Job completion | |
--no-cleanup |
bool | false | Skip removal of Job and RBAC resources on completion. Warning: leaves a cluster-admin ClusterRoleBinding active. | |
--privileged |
bool | true | Run agent in privileged mode (required for GPU/SystemD collectors). Set to false for PSS-restricted namespaces. | |
--image-pull-secret |
string[] | Image pull secrets for private registries (repeatable) | ||
--require-gpu |
bool | false | Require GPU resources on the agent pod (mutually exclusive with --runtime-class) |
|
--runtime-class |
string | Runtime class for GPU access without consuming a GPU allocation (e.g., nvidia). Mutually exclusive with --require-gpu. |
||
--template |
string | Path to Go template file for custom output formatting (requires YAML format) | ||
--max-nodes-per-entry |
int | 0 | Maximum node names per taint/label entry in topology collection (0 = unlimited) | |
--os |
string | Node OS family (ubuntu, rhel, cos, amazonlinux, talos). Selects the per-OS pod configuration and in-pod service collector backend. talos skips the /run/systemd and /etc/os-release hostPath mounts and uses the Kubernetes-API service backend. Reads AICR_OS env when unset. |
||
--requests |
string | Override agent container resource requests as a comma-separated list of name=quantity pairs (e.g. cpu=500m,memory=1Gi,ephemeral-storage=1Gi). Unspecified resources keep the built-in privileged or restricted defaults. Reads AICR_REQUESTS env when unset. |
||
--limits |
string | Override agent container resource limits as a comma-separated list of name=quantity pairs (e.g. cpu=1,memory=2Gi,ephemeral-storage=2Gi). Unspecified resources keep the built-in defaults. With --require-gpu, the default nvidia.com/gpu=1 is applied only when --limits does not already contain that key — an explicit --limits nvidia.com/gpu=N wins. Reads AICR_LIMITS env when unset. |
Output Destinations:
- stdout: Default when no
-oflag specified - File: Local file path (
/path/to/snapshot.yaml) - ConfigMap: Kubernetes ConfigMap URI (
cm://namespace/configmap-name)
What it captures:
- SystemD Services: containerd, docker, kubelet configurations
- OS Configuration: grub, kmod, sysctl, release info
- Kubernetes: server version, images, ClusterPolicy
- GPU: driver version, CUDA, MIG settings, hardware info
- NodeTopology: node topology (cluster-wide taints and labels across all nodes)
Examples:
# Output to stdout (YAML)
aicr snapshot
# Save to file (JSON)
aicr snapshot --output system.json --format json
# Save to Kubernetes ConfigMap (requires cluster access)
aicr snapshot --output cm://gpu-operator/aicr-snapshot
# Debug mode
aicr --debug snapshot
# Table format (human-readable)
aicr snapshot --format table
# With custom kubeconfig
aicr snapshot --kubeconfig ~/.kube/prod-cluster
# Targeting specific nodes
aicr snapshot \
--namespace gpu-operator \
--node-selector accelerator=nvidia-h100 \
--node-selector zone=us-west1-a
# With tolerations for tainted nodes
# (By default all taints are tolerated - only needed to restrict tolerations)
aicr snapshot \
--toleration nvidia.com/gpu=present:NoSchedule
# Full example with all options
aicr snapshot \
--kubeconfig ~/.kube/config \
--namespace gpu-operator \
--image ghcr.io/nvidia/aicr:v0.8.0 \
--job-name snapshot-gpu-nodes \
--service-account-name aicr \
--node-selector accelerator=nvidia-h100 \
--toleration nvidia.com/gpu:NoSchedule \
--timeout 10m \
--output cm://gpu-operator/aicr-snapshot \
--no-cleanup
# Custom template formatting
aicr snapshot --template examples/templates/snapshot-template.md.tmpl
# Template with file output
aicr snapshot --template examples/templates/snapshot-template.md.tmpl --output report.md
# With custom template
aicr snapshot \
--namespace gpu-operator \
--template examples/templates/snapshot-template.md.tmpl \
--output cluster-report.yamlDrive aicr snapshot from an AICRConfig document so the snapshot inputs version-control alongside the recipe, bundle, and validate steps in an end-to-end workflow.
kind: AICRConfig
apiVersion: aicr.nvidia.com/v1alpha1
metadata:
name: gke-h100-training
spec:
snapshot:
output:
path: snapshot.yaml # written to disk; same shape as -o
format: yaml # yaml | json | table
template: "" # optional Go template path
agent:
namespace: aicr-validation
image: "" # default: ghcr.io/nvidia/aicr:latest
imagePullSecrets: []
jobName: aicr
serviceAccountName: aicr
nodeSelector:
nodeGroup: gpu-worker
tolerations:
- dedicated=gpu-workload:NoSchedule
- nvidia.com/gpu=present:NoSchedule
requireGpu: false
runtimeClassName: "" # mutually exclusive with requireGpu
os: "" # ubuntu | rhel | cos | amazonlinux | talos
requests: "" # "cpu=500m,memory=1Gi"
limits: "" # "cpu=1,memory=2Gi"
execution:
timeout: 5m
noCleanup: false
privileged: true # set false for PSS-restricted namespaces
maxNodesPerEntry: 0 # 0 = unlimited topology entriesPrecedence: a CLI flag always wins over the matching config field. Selectors and tolerations omitted entirely inherit the snapshotter's compiled-in defaults (tolerations defaults to tolerate all taints); an explicit empty list (tolerations: []) clears the tolerate-all default — the same nil-vs-empty semantics used by spec.validate.agent.
# Run snapshot driven entirely by config
aicr snapshot --config aicr-config.yaml
# Reuse the same config but write to a one-off path
aicr snapshot --config aicr-config.yaml -o /tmp/snapshot.yamlThe --template flag enables custom output formatting using Go templates with Sprig functions. Templates receive the full Snapshot struct:
# Available template data structure:
.Kind # Resource kind ("Snapshot")
.APIVersion # API version string
.Metadata # Map of key-value pairs (timestamp, version, source-node)
.Measurements # Array of Measurement objects
.Type # Measurement type (K8s, GPU, OS, SystemD, NodeTopology)
.Subtypes # Array of Subtype objects
.Name # Subtype name (e.g., "server", "smi", "grub")
.Data # Map of readings (key -> Reading with .String method)
# NodeTopology measurement type has subtypes: summary, taint, label
# Taint encoding: effect|value|node1,node2,... (parseable with Sprig splitList "|")
# Label encoding: value|node1,node2,...Example template extracting key cluster info:
cluster:
kubernetes: {{ with index .Measurements 0 }}{{ range .Subtypes }}{{ if eq .Name "server" }}
version: {{ (index .Data "version").String }}{{ end }}{{ end }}{{ end }}
gpu: {{ range .Measurements }}{{ if eq .Type.String "GPU" }}{{ range .Subtypes }}{{ if eq .Name "smi" }}
model: {{ (index .Data "gpu.model").String }}
count: {{ (index .Data "gpu-count").String }}{{ end }}{{ end }}{{ end }}{{ end }}See examples/templates/snapshot-template.md.tmpl for a complete example template that generates a concise cluster report.
When running against a cluster, AICR deploys a Kubernetes Job to capture the snapshot:
- Deploys RBAC: ServiceAccount, Role, RoleBinding, ClusterRole, ClusterRoleBinding
- Creates Job: Runs
aicr snapshotas a container on the target node - Waits for completion: Monitors Job status with configurable timeout
- Retrieves snapshot: Reads snapshot from ConfigMap after Job completes
- Writes output: Saves snapshot to specified output destination
- Cleanup: Deletes Job and RBAC resources (use
--no-cleanupto keep for debugging)
Benefits of agent deployment:
- Capture configuration from actual cluster nodes (not local machine)
- No need to run kubectl manually
- Programmatic deployment for automation/CI/CD
- Reusable RBAC resources across multiple runs
Agent deployment requirements:
- Kubernetes cluster access (via kubeconfig)
- Cluster admin permissions (for RBAC creation)
- GPU nodes with nvidia-smi (for GPU metrics)
When using ConfigMap URIs (cm://namespace/name), the snapshot is stored directly in Kubernetes:
apiVersion: v1
kind: ConfigMap
metadata:
name: aicr-snapshot
namespace: gpu-operator
labels:
app.kubernetes.io/name: aicr
app.kubernetes.io/component: snapshot
app.kubernetes.io/version: <aicr-version>
data:
snapshot.yaml: |
# Full snapshot content
format: yaml
timestamp: "2025-12-31T10:30:00Z"Snapshot Structure:
apiVersion: aicr.nvidia.com/v1alpha1
kind: Snapshot
metadata:
created: "2025-12-31T10:30:00Z"
hostname: gpu-node-1
measurements:
- type: SystemD
subtypes: [...]
- type: OS
subtypes: [...]
- type: K8s
subtypes: [...]
- type: GPU
subtypes: [...]Generate optimized configuration recipes from query parameters or captured snapshots.
Synopsis:
aicr recipe [flags]Modes:
Generate recipes using an AICRConfig document. The same file format also drives the bundle command, so a single file can describe an end-to-end recipe-to-bundle workflow.
Flags:
| Flag | Short | Type | Description |
|---|---|---|---|
--config |
string | Path or HTTP/HTTPS URL to an AICRConfig file (YAML/JSON) | |
--output |
-o |
string | Output file (default: stdout) |
--format |
-f |
string | Format: json, yaml (default: yaml) |
--data |
string | External data directory to overlay on embedded data (see External Data) |
The config file uses a Kubernetes-style envelope:
kind: AICRConfig
apiVersion: aicr.nvidia.com/v1alpha1
metadata:
name: gb200-eks-ubuntu-training
spec:
recipe:
criteria:
service: eks
os: ubuntu
accelerator: gb200
intent: training
nodes: 8
output:
path: recipe.yaml
format: yamlIndividual CLI flags always override config file values. For slice/map flags, presence on the CLI replaces the file's value (no append).
# Load criteria from config file
aicr recipe --config config.yaml
# Override service from file
aicr recipe --config config.yaml --service gke
# Save output to file
aicr recipe --config config.yaml -o recipe.yaml
# Load config from a URL (e.g. CI shared template)
aicr recipe --config https://team.example.com/configs/eks-h100-training.yaml--config accepts a local file path or an HTTP/HTTPS URL. ConfigMap (cm://) sources are not supported; export the data with kubectl get cm <name> -o yaml and pass the resulting file.
Generate recipes using direct system parameters:
Flags:
| Flag | Short | Type | Description |
|---|---|---|---|
--service |
string | K8s service: eks, gke, aks, oke, kind, lke | |
--accelerator |
--gpu |
string | Accelerator/GPU type: h100, gb200, b200, a100, l40, rtx-pro-6000 |
--intent |
string | Workload intent: training, inference | |
--os |
string | OS family: ubuntu, rhel, cos, amazonlinux, talos | |
--platform |
string | Platform/framework type: dynamo, kubeflow, nim, runai, slurm | |
--nodes |
int | Number of GPU nodes in the cluster | |
--output |
-o |
string | Output file (default: stdout) |
--format |
-f |
string | Format: json, yaml (default: yaml) |
--data |
string | External data directory to overlay on embedded data (see External Data) | |
--criteria-strict |
bool | Reject criteria values not in the embedded OSS catalog; ignores values registered from --data. Also honored via AICR_CRITERIA_STRICT=1 or spec.recipe.criteriaStrict: true in --config. Intended for OSS CI gates. |
Service / Accelerator / OS / Intent / Platform value listings above are the OSS-embedded set. When
--dataregisters additional values (e.g., undisclosed providers, proprietary platforms), the CLI admits them at runtime through the criteria registry — see Data Extension.--criteria-strictrestores the OSS-only set regardless of what--datacontributes.
Examples:
# Basic recipe for Ubuntu on EKS with H100
aicr recipe --os ubuntu --service eks --accelerator h100
# Training workload with multiple GPU nodes
aicr recipe \
--service eks \
--accelerator gb200 \
--intent training \
--os ubuntu \
--nodes 8 \
--format yaml
# Kubeflow training workload
aicr recipe \
--service eks \
--accelerator h100 \
--intent training \
--os ubuntu \
--platform kubeflow
# Save to file (--gpu is an alias for --accelerator)
aicr recipe --os ubuntu --gpu h100 --output recipe.yamlGenerate recipes from captured snapshots:
Flags:
| Flag | Short | Type | Description |
|---|---|---|---|
--snapshot |
-s |
string | Path/URI to snapshot (file path, URL, or cm://namespace/name) |
--intent |
-i |
string | Workload intent: training, inference |
--output |
-o |
string | Output destination (file, ConfigMap URI, or stdout) |
--format |
string | Format: json, yaml (default: yaml) | |
--kubeconfig |
-k |
string | Path to kubeconfig file (for ConfigMap URIs, overrides KUBECONFIG env) |
Snapshot Sources:
- File: Local file path (
./snapshot.yaml) - URL: HTTP/HTTPS URL (
https://example.com/snapshot.yaml) - ConfigMap: Kubernetes ConfigMap URI (
cm://namespace/configmap-name)
Examples:
# Generate recipe from local snapshot file
aicr recipe --snapshot system.yaml --intent training
# From ConfigMap (requires cluster access)
aicr recipe --snapshot cm://gpu-operator/aicr-snapshot --intent training
# From ConfigMap with custom kubeconfig
aicr recipe \
--snapshot cm://gpu-operator/aicr-snapshot \
--kubeconfig ~/.kube/prod-cluster \
--intent training
# Output to ConfigMap
aicr recipe -s system.yaml -o cm://gpu-operator/aicr-recipe
# Chain snapshot → recipe with ConfigMaps
aicr snapshot -o cm://default/snapshot
aicr recipe -s cm://default/snapshot -o cm://default/recipe
# With custom output
aicr recipe -s system.yaml -i inference -o recipe.yaml --format yamlOutput structure:
apiVersion: aicr.nvidia.com/v1alpha1
kind: Recipe
metadata:
version: v1.0.0
created: "2025-12-31T10:30:00Z"
appliedOverlays:
- base
- eks
- eks-training
- gb200-eks-training
criteria:
service: eks
accelerator: gb200
intent: training
os: any
componentRefs:
- name: gpu-operator
version: v25.3.3
order: 1
repository: https://helm.ngc.nvidia.com/nvidia
constraints:
driver:
version: "580.82.07"
cudaVersion: "13.1"Query a specific value from the fully hydrated recipe configuration. Resolves a recipe
from criteria (same as aicr recipe), merges all base, overlay, and inline value
overrides, then extracts the value at the given dot-path selector.
Synopsis:
aicr query --selector <path> [flags]Flags:
All aicr recipe flags are supported, plus:
| Flag | Type | Description |
|---|---|---|
--selector |
string | Required. Dot-path to the configuration value to extract |
Uses dot-delimited paths consistent with Helm --set and yq:
| Selector | Returns |
|---|---|
components.<name>.values.<path> |
Hydrated Helm value (scalar or subtree) |
components.<name>.chart |
Component metadata field |
components.<name> |
Entire hydrated component block |
criteria.<field> |
Recipe criteria field |
deploymentOrder |
Component deployment order list |
constraints |
Merged constraint list |
. or empty |
Entire hydrated recipe |
Leading dots are optional (yq-style): .components.gpu-operator.chart and
components.gpu-operator.chart are equivalent.
Output:
- Scalar values (string, number, bool) are printed as plain text — no YAML wrapper
- Complex values (maps, lists) are printed as YAML (default) or JSON (
--format json)
Examples:
# Get a specific Helm value
aicr query --service eks --accelerator h100 --intent training \
--selector components.gpu-operator.values.driver.version
# stdout: 570.86.16
# Get a value subtree
aicr query --service eks --accelerator h100 --intent training \
--selector components.gpu-operator.values.driver
# stdout:
# version: "570.86.16"
# repository: nvcr.io/nvidia
# Get the full hydrated component
aicr query --service eks --accelerator h100 --intent training \
--selector components.gpu-operator
# Get deployment order
aicr query --service eks --accelerator h100 --intent training \
--selector deploymentOrder
# Use in shell scripts
VERSION=$(aicr query --service eks --accelerator h100 --intent training \
--selector components.gpu-operator.values.driver.version)
echo "Driver version: $VERSION"
# JSON output for complex values
aicr query --service eks --accelerator h100 --intent training \
--selector components.gpu-operator.values --format json
# Query from snapshot
aicr query --snapshot snapshot.yaml \
--selector components.gpu-operator.values.driver.version
# Full hydrated recipe
aicr query --service eks --accelerator h100 --intent training --selector .Advanced Examples:
# Cross-cloud comparison: how Prometheus storage differs between EKS and GKE
# EKS provisions a 50Gi persistent EBS volume (gp2)
aicr query --service eks --intent training \
--selector components.kube-prometheus-stack.values.prometheus.prometheusSpec.storageSpec
# GKE uses a 10Gi ephemeral emptyDir (GMP handles long-term retention)
aicr query --service gke --intent training \
--selector components.kube-prometheus-stack.values.prometheus.prometheusSpec.storageSpec
# Compare deployment order across clouds
# EKS deploys 12 components (includes aws-ebs-csi-driver, aws-efa, nodewright-customizations)
aicr query --service eks --accelerator h100 --intent training --selector deploymentOrder
# GKE deploys 9 components (storage and networking are platform-managed)
aicr query --service gke --accelerator h100 --intent training --selector deploymentOrder
# Pin the exact driver version into Terraform/Pulumi variables
DRIVER_VERSION=$(aicr query --service eks --accelerator h100 --intent training \
--selector components.gpu-operator.values.driver.version)
echo "gpu_driver_version = \"${DRIVER_VERSION}\""
# Compare nodewright tuning parameters across accelerators
# H100: real tuning packages (kernel setup, nvidia-tuned, full setup)
aicr query --service eks --accelerator h100 --intent training \
--selector components.nodewright-customizations.values
# GB200: same value structure, but manifest renders a no-op (ARM64 packages pending)
aicr query --service eks --accelerator gb200 --intent training \
--selector components.nodewright-customizations.values
# Watch constraints tighten as you add specificity
# Just "EKS" → 1 constraint (K8s >= 1.28)
aicr query --service eks --selector constraints
# Add GPU + intent + OS → 4 constraints (K8s >= 1.32.4, Ubuntu 24.04, kernel >= 6.8)
aicr query --service eks --accelerator h100 --intent training --os ubuntu \
--selector constraintsValidate a system snapshot against the constraints defined in a recipe to verify cluster compatibility. Supports multi-phase validation with different validation stages.
For a task-oriented walkthrough (capture snapshot → generate recipe → run each phase, with worked training and inference examples), see Validation.
Synopsis:
aicr validate [flags]Flags:
| Flag | Short | Type | Default | Description |
|---|---|---|---|---|
--recipe |
-r |
string | (required) | Path/URI to recipe file containing constraints (or via spec.validate.input.recipe in --config) |
--snapshot |
-s |
string | Path/URI to snapshot file containing measurements (omit to capture live) | |
--config |
string | Path or HTTP/HTTPS URL to an AICRConfig file (YAML/JSON). CLI flags override values from this file. See Validate Config File Mode. | ||
--phase |
string[] | all | Validation phase to run: deployment, performance, conformance, all (repeatable) | |
--fail-on-error |
bool | true | Exit with non-zero status if any constraint fails | |
--output |
-o |
string | stdout | Output destination (file or stdout) |
--kubeconfig |
-k |
string | ~/.kube/config | Path to kubeconfig file (for ConfigMap URIs) |
--namespace |
-n |
string | aicr-validation | Kubernetes namespace for validation Job deployment |
--image |
string | ghcr.io/nvidia/aicr:latest | Container image for validation Job | |
--image-pull-secret |
string[] | Image pull secrets for private registries (repeatable) | ||
--job-name |
string | aicr-validate | Name for the validation Job | |
--service-account-name |
string | aicr | ServiceAccount name for validation Job | |
--node-selector |
string[] | Override GPU node selection for validation workloads. Replaces platform-specific selectors (e.g., cloud.google.com/gke-accelerator, node.kubernetes.io/instance-type) on inner workloads like NCCL benchmark pods. Use when GPU nodes have non-standard labels. Does not affect the validator orchestrator Job. (format: key=value, repeatable) |
||
--toleration |
string[] | Override tolerations for validation workloads. Replaces the default tolerate-all policy on inner workloads like NCCL benchmark pods and conformance test pods. Does not affect the validator orchestrator Job. (format: key=value:effect, repeatable) | ||
--timeout |
duration | 5m | Timeout for validation Job completion | |
--no-cleanup |
bool | false | Skip removal of Job and RBAC resources on completion | |
--require-gpu |
bool | false | Require GPU resources on the validation pod | |
--no-cluster |
bool | false | Skip cluster access (test mode): skips RBAC and Job deployment, reports checks as skipped | |
--evidence-dir |
string | Directory to write conformance evidence artifacts | ||
--cncf-submission |
bool | false | Generate CNCF conformance submission artifacts | |
--feature |
-f |
string[] | CNCF evidence-collection feature(s) to scope (repeatable). Valid names: dra-support, gang-scheduling, secure-access, accelerator-metrics, ai-service-metrics, inference-gateway, robust-operator, pod-autoscaling, cluster-autoscaling. Empty selects all features. |
|
--emit-attestation |
string | Directory to write a recipe-evidence v1 attestation bundle (signed when --push is set). See ADR-007. |
||
--bom |
string | Path to a CycloneDX BOM (bom.cdx.json) to embed. Optional with --emit-attestation; when omitted, aicr synthesizes a recipe-bound BOM from the recipe's component refs + validator catalog images. Pass make bom's output for an exhaustive BOM. |
||
--push |
string | OCI registry reference (e.g. ghcr.io/myorg/aicr-evidence) to push the signed summary bundle to. Triggers Sigstore keyless signing via the precedence chain documented under --identity-token. |
||
--plain-http |
bool | false | Use HTTP instead of HTTPS for evidence push (local registry tests). | |
--insecure-tls |
bool | false | Skip TLS verification for evidence push (self-signed registries). | |
--identity-token |
string | Pre-fetched OIDC identity token for --push keyless signing. Skips ambient/browser/device-code flows. Reads COSIGN_IDENTITY_TOKEN from env. Same precedence chain as aicr bundle --attest. |
||
--oidc-device-flow |
bool | false | Use the OAuth 2.0 device authorization grant for --push OIDC instead of opening a browser callback. Reads AICR_OIDC_DEVICE_FLOW. |
|
--data |
string | External data directory to overlay on embedded data |
Input Sources:
- File: Local file path (
./recipe.yaml,./snapshot.yaml) - URL: HTTP/HTTPS URL (
https://example.com/recipe.yaml) - ConfigMap: Kubernetes ConfigMap URI (
cm://namespace/configmap-name)
Validation can be run in different phases to validate different aspects of the deployment:
| Phase | Description | When to Run |
|---|---|---|
deployment |
Validates component deployment completeness plus post-install GPU readiness signals (see below) | After deploying components |
performance |
Validates system performance and network fabric health | After components are running |
conformance |
Validates workload-specific requirements and conformance | Before running production workloads |
all |
Runs all phases sequentially with dependency logic | Complete end-to-end validation |
Note: Readiness constraints (K8s version, OS, kernel) are always evaluated implicitly before any phase runs. If readiness fails, validation stops before deploying any Jobs.
Deployment phase checks:
The deployment phase verifies that the cluster is actually ready for GPU workloads — not just that install commands returned successfully. It covers:
- Enabled component namespaces are
Active. - Declared
expectedResources(Deployments, DaemonSets, etc.) exist and are healthy. - When
nodewright-customizationsis enabled: every Skyhook CR the recipe declares reportsstatus.status == complete. The set of expected CR names is extracted from the recipe's ownComponentRef.ManifestFilesfor this component, so unrelated Skyhook CRs on the cluster (stale from prior deploys, or owned by another tenant) are ignored. If no Skyhook names can be extracted from thoseManifestFiles, deployment validation fails closed as a recipe/configuration error instead of skipping. - When
gpu-operatoris enabled:ClusterPolicyreportsstatus.state == ready. - When
nvidia-dra-driver-gpuis enabled: the kubelet-plugin DaemonSet is ready. Discovery is by the upstream chart's role-suffix convention — the validator finds the single DaemonSet in the component namespace whose name ends in-kubelet-plugin, so customfullnameOverridevalues are handled automatically.
Graceful skip: If a component is declared in the recipe but its CRD is not yet registered on the cluster (e.g., fresh cluster, operator chart not installed), the corresponding readiness check is skipped rather than failing. Once the CRD is present, the check runs and a missing CR is treated as a real failure — for example, if the gpu-operator CRD is registered but no ClusterPolicy CR exists, deployment validation fails with a "CR missing" diagnostic rather than silently passing. Other errors still fail closed: an RBAC denial on skyhooks.skyhook.nvidia.com returns HTTP 403 (not a NoMatch), so the validator surfaces it as a failure instead of silently skipping the Skyhook check.
Day-N re-verification: Because this is a read-only check against live cluster state, re-running aicr validate --phase deployment after scale-up, upgrade, or other runtime changes is safe and answers the same "is this cluster ready for GPU workloads now?" question.
Phase Dependencies:
- Phases run sequentially when using
--phase all - If a phase fails, subsequent phases are skipped
- Use individual phases for targeted validation during specific deployment stages
Constraints use fully qualified measurement paths: {Type}.{Subtype}.{Key}
| Constraint Path | Description |
|---|---|
K8s.server.version |
Kubernetes server version |
OS.release.ID |
Operating system identifier (ubuntu, rhel) |
OS.release.VERSION_ID |
OS version (24.04, 22.04) |
OS.sysctl./proc/sys/kernel/osrelease |
Kernel version |
GPU.info.type |
GPU hardware type |
| Operator | Example | Description |
|---|---|---|
>= |
>= 1.30 |
Greater than or equal (version comparison) |
<= |
<= 1.33 |
Less than or equal (version comparison) |
> |
> 1.30 |
Greater than (version comparison) |
< |
< 2.0 |
Less than (version comparison) |
== |
== ubuntu |
Explicit equality |
!= |
!= rhel |
Not equal |
| (none) | ubuntu |
Exact string match |
Examples:
# Validate snapshot against recipe (readiness constraints run implicitly)
aicr validate --recipe recipe.yaml --snapshot snapshot.yaml
# Validate specific phase
aicr validate \
--recipe recipe.yaml \
--snapshot snapshot.yaml \
--phase deployment
# Run all validation phases
aicr validate \
--recipe recipe.yaml \
--snapshot snapshot.yaml \
--phase all
# Load snapshot from ConfigMap
aicr validate \
--recipe recipe.yaml \
--snapshot cm://gpu-operator/aicr-snapshot
# Save results to file
aicr validate \
--recipe recipe.yaml \
--snapshot cm://gpu-operator/aicr-snapshot \
--output validation-results.json
# Validate deployment phase after components are installed
aicr validate \
--recipe recipe.yaml \
--snapshot snapshot.yaml \
--phase deployment
# Run performance validation
aicr validate \
--recipe recipe.yaml \
--snapshot snapshot.yaml \
--phase performance
# With custom kubeconfig
aicr validate \
--recipe recipe.yaml \
--snapshot cm://gpu-operator/aicr-snapshot \
--kubeconfig ~/.kube/prod-cluster
# Write a recipe-evidence v1 attestation bundle (unsigned, on disk).
# --bom is optional: when omitted, aicr synthesizes a recipe-bound BOM from
# the recipe's component refs and validator catalog images.
aicr validate \
--recipe recipe.yaml --snapshot snapshot.yaml \
--emit-attestation ./out
# Writes ./out/summary-bundle/ and ./out/pointer.yaml.
# Use an exhaustive BOM (e.g., `make bom`-produced) instead of the auto-generated one
aicr validate \
--recipe recipe.yaml --snapshot snapshot.yaml \
--emit-attestation ./out --bom dist/bom/bom.cdx.json
# Sign and push a recipe-evidence bundle to OCI (cosign keyless via Sigstore public-good).
# Token acquisition follows the same precedence chain as `aicr bundle --attest`:
# pre-fetched COSIGN_IDENTITY_TOKEN > ambient GitHub Actions OIDC > --oidc-device-flow > interactive browser.
aicr validate \
--recipe recipe.yaml --snapshot snapshot.yaml \
--emit-attestation ./out \
--push ghcr.io/myorg/aicr-evidence
# After this, copy ./out/pointer.yaml to recipes/evidence/<recipe>.yaml
# Validate on a cluster with custom GPU node labels (non-standard labels that AICR doesn't
# recognize by default, e.g., using a custom node pool label instead of cloud-provider defaults)
aicr validate \
--recipe recipe.yaml \
--node-selector my-org/gpu-pool=true \
--phase performance
# Override both node selector and tolerations for a non-standard taint setup
aicr validate \
--recipe recipe.yaml \
--node-selector gpu-type=h100 \
--toleration gpu-type=h100:NoScheduleaicr validate --config <path> reads inputs from an AICRConfig YAML/JSON file
under spec.validate. CLI flags always override values loaded from --config;
override events are logged at INFO so users can see which input won. The OIDC
identity token used for --push signing stays out of the schema by design
(short-lived tokens must not be committed); the CLI resolves it at sign time
through the precedence chain described on --identity-token.
Supported schema:
kind: AICRConfig
apiVersion: aicr.nvidia.com/v1alpha1
metadata:
name: prod-validate
spec:
validate:
input:
recipe: ./recipe.yaml
snapshot: ./snapshot.yaml # optional; omit to capture live
agent: # only used when input.snapshot is empty
namespace: aicr-validation
image: ghcr.io/nvidia/aicr:v0.1.0
imagePullSecrets: [registry-secret]
jobName: aicr-validate
serviceAccountName: aicr
nodeSelector:
my-org/gpu-pool: "true"
tolerations:
- "gpu-type=h100:NoSchedule"
requireGpu: true
execution:
phases: [deployment, conformance]
failOnError: true # default true; set false to report only
noCluster: false
noCleanup: false
timeout: 10m
evidence:
cncf: # --evidence-dir / --cncf-submission / --feature
dir: ./out/cncf
cncfSubmission: false
features: [] # empty = all features
attestation: # --emit-attestation / --bom / --push / ...
out: ./out/attestation
bom: dist/bom/bom.cdx.json # optional; auto-generated from recipe + validators when absent
push: ghcr.io/myorg/aicr-evidence
plainHTTP: false
insecureTLS: falseExamples:
# Use a config file
aicr validate --config validate.yaml
# Override a single config value from the CLI
aicr validate --config validate.yaml --phase deployment
# Validate the same recipe across two clusters using two different agent
# configs (config-bound) without retyping flags
aicr validate --config validate-cluster-a.yaml
aicr validate --config validate-cluster-b.yamlThe --node-selector and --toleration flags control scheduling for validation
workloads — the inner pods that validators create to test cluster functionality
(e.g., NCCL benchmark workers, conformance test pods). They do not affect the
validator orchestrator Job, which runs lightweight check logic and is placed on
CPU-preferred nodes automatically.
When --node-selector is provided, it replaces the platform-specific selectors
that validators use by default:
| Platform | Default Selector (replaced) | Use Case |
|---|---|---|
| GKE | cloud.google.com/gke-accelerator: nvidia-h100-mega-80gb |
Non-standard GPU node pool labels |
| EKS | node.kubernetes.io/instance-type: <discovered> |
Custom node pool labels |
When --toleration is provided, it replaces the default tolerate-all policy
(operator: Exists) on workloads that need to land on tainted GPU nodes.
Validators that use nodeName pinning (nvidia-smi, DRA isolation test) or
DRA ResourceClaims for placement (gang scheduling) are not affected by these flags.
Output Structure (CTRF JSON):
Results are output in CTRF (Common Test Report Format) — an industry-standard schema for test reporting.
{
"reportFormat": "CTRF",
"specVersion": "0.0.1",
"timestamp": "2026-03-10T20:10:44Z",
"generatedBy": "aicr",
"results": {
"tool": {
"name": "aicr",
"version": "v0.10.3-next"
},
"summary": {
"tests": 16,
"passed": 13,
"failed": 0,
"skipped": 3,
"pending": 0,
"other": 0,
"start": 1773173400872,
"stop": 1773173799002
},
"tests": [
{
"name": "operator-health",
"status": "passed",
"duration": 0,
"suite": ["deployment"],
"stdout": ["Found 1 gpu-operator pod(s)", "Running: 1/1"]
},
{
"name": "expected-resources",
"status": "passed",
"duration": 0,
"suite": ["deployment"],
"stdout": ["All deployment resources and required readiness signals are healthy"]
},
{
"name": "nccl-all-reduce-bw",
"status": "passed",
"duration": 234000,
"suite": ["performance"],
"stdout": ["NCCL All Reduce bandwidth: 488.37 GB/s", "Constraint: >= 100 → true"]
},
{
"name": "inference-perf",
"status": "passed",
"duration": 612000,
"suite": ["performance"],
"stdout": [
"RESULT: Inference throughput: 37961.24 tokens/sec",
"RESULT: Inference TTFT p99: 146.30 ms",
"Throughput constraint: >= 5000 → PASS",
"TTFT p99 constraint: <= 200 → PASS"
]
},
{
"name": "dra-support",
"status": "passed",
"duration": 8000,
"suite": ["conformance"],
"stdout": ["DRA GPU allocation successful"]
},
{
"name": "cluster-autoscaling",
"status": "skipped",
"duration": 0,
"suite": ["conformance"],
"stdout": ["SKIP reason=\"Karpenter not found\""]
}
]
}
}Note: The
testsarray above is truncated for brevity. A full validation run produces one entry per check across all phases. Each entry includesstdoutwith detailed diagnostic output.
Test Statuses:
| Status | Description |
|---|---|
passed |
Check or constraint passed |
failed |
Check or constraint failed |
skipped |
Check could not be evaluated (missing data, no-cluster mode) |
other |
Unexpected outcome (crash, OOM, timeout) |
Exit Codes:
| Code | Description |
|---|---|
0 |
All checks passed |
2 |
Invalid input (bad flags, missing recipe) |
5 |
Timeout (validator section or context deadline exceeded) |
8 |
One or more checks failed (when --fail-on-error is set) |
Compare two snapshots field-by-field to surface configuration drift between cluster states. Reports added, removed, and modified readings across every measurement type (K8s, GPU, OS, SystemD, NodeTopology).
Synopsis:
aicr diff --baseline <path|cm://...> --target <path|cm://...> [flags]Flags:
| Flag | Short | Type | Default | Description |
|---|---|---|---|---|
--baseline |
-b |
string | Baseline snapshot (file path or ConfigMap URI). Required. | |
--target |
string | Target snapshot (file path or ConfigMap URI). Required. | ||
--fail-on-drift |
bool | false | Exit with non-zero status (ErrCodeConflict) if any drift is detected. Useful for CI/CD gating. |
|
--output |
-o |
string | stdout | Output destination: file path, ConfigMap URI (cm://namespace/name, JSON/YAML only), or stdout. Note: ConfigMap destinations are rejected for --format table (a structured format is required for ConfigMap storage). |
--format |
-t |
string | yaml | Output format: json, yaml, or table. |
--kubeconfig |
-k |
string | ~/.kube/config | Path to kubeconfig (used only when --baseline or --target is a ConfigMap URI). |
Inputs:
- File paths (
./baseline.yaml,/tmp/snap.json) - ConfigMap URIs (
cm://gpu-operator/aicr-snapshot) - Both inputs may mix freely; e.g., a local baseline file vs. a live ConfigMap target.
Output Semantics:
- A nil reading is rendered as the literal
<nil>so it cannot be confused with an empty-string value (""). Both forms surface as drift when one side is nil and the other is a concrete value. - Changes are emitted in deterministic order (sorted by
Path) so the diff is reproducible across runs and machines. - The
Resultenvelope includesbaselineSourceandtargetSource(the supplied paths), achangesarray, and asummarywithadded,removed,modified, andtotalcounts.
Examples:
# Local-file diff in default YAML
aicr diff --baseline before.yaml --target after.yaml
# Human-readable table to stdout
aicr diff -b before.yaml --target after.yaml --format table
# CI/CD gate: non-zero exit on drift, JSON to a file
aicr diff -b before.yaml --target after.yaml \
--format json --output drift.json --fail-on-drift
# Compare two ConfigMaps in the cluster
aicr diff \
--baseline cm://gpu-operator/aicr-snapshot-baseline \
--target cm://gpu-operator/aicr-snapshot
# Mix file + ConfigMap (golden baseline vs live cluster)
aicr diff --baseline ./golden.yaml --target cm://default/aicr-snapshotExit Codes:
| Code | Description |
|---|---|
0 |
Diff completed; no drift, or --fail-on-drift not set |
2 |
Invalid input (missing flags, bad format, ConfigMap output for --format table) or drift detected with --fail-on-drift (mapped from ErrCodeConflict) |
Note on CI gating: A non-zero exit identifies that drift was detected, but doesn't by itself distinguish drift from malformed input — both map to exit
2. To differentiate without relying on stderr format (text by default; JSON only with--log-json), inspect the diff payload directly: write the result with--output drift.json --format jsonand branch on the presence of the file plus itssummary.totalfield. That signal is format-stable regardless of logging mode.
Generate deployment-ready bundles from recipes containing Helm values, manifests, scripts, and documentation.
Synopsis:
aicr bundle [flags]Flags:
| Flag | Short | Type | Description |
|---|---|---|---|
--recipe |
-r |
string | Path to recipe file (required, or via spec.bundle.input.recipe in --config) |
--config |
string | Path or HTTP/HTTPS URL to an AICRConfig file (YAML/JSON). CLI flags override values from this file. See Bundle Config File Mode. | |
--output |
-o |
string | Output directory (default: current dir) |
--deployer |
-d |
string | Deployment method: helm (default), argocd, argocd-helm, flux, or helmfile |
--repo |
string | Git/OCI repository URL baked into Argo CD Application sources. Used with --deployer argocd. Ignored with --deployer argocd-helm (that bundle is URL-portable — the URL is supplied at helm install time via --set repoURL=...); a warning is logged if passed. |
|
--set |
string[] | Override values in bundle files (repeatable). Use enabled key to include/exclude components (e.g., --set awsebscsidriver:enabled=false) |
|
--dynamic |
string[] | Declare value paths as install-time parameters (repeatable, format: component:path). Supported with helm, argocd-helm, flux, and helmfile deployers. See Dynamic Install-Time Values. |
|
--data |
string | External data directory to overlay on embedded data (see External Data) | |
--system-node-selector |
string[] | Node selector for system components (format: key=value, repeatable) | |
--system-node-toleration |
string[] | Toleration for system components (format: key=value:effect, repeatable) | |
--accelerated-node-selector |
string[] | Node selector for accelerated/GPU nodes (format: key=value, repeatable) | |
--accelerated-node-toleration |
string[] | Toleration for accelerated/GPU nodes (format: key=value:effect, repeatable) | |
--workload-gate |
string | Taint for nodewright-operator runtime required (format: key=value:effect or key:effect). This is a day 2 option for cluster scaling operations. | |
--workload-selector |
string[] | Label selector for nodewright-customizations to prevent eviction of running training jobs (format: key=value, repeatable). Required when nodewright-customizations is enabled with training intent. | |
--nodes |
int | Estimated number of GPU nodes (default: 0 = unset). At bundle time, written to Helm value paths declared in the registry under nodeScheduling.nodeCountPaths. |
|
--storage-class |
string | Kubernetes StorageClass name to inject at bundle time. Written to registry-declared storageClassPaths for each component. Overrides any storageClassName set in recipe overlays. |
|
--vendor-charts |
bool | Pull upstream Helm chart bytes into the bundle at bundle time so the artifact is fully self-contained and air-gap deployable. Requires helm on $PATH. See Vendoring Charts for Air-Gap. |
|
--kubeconfig |
-k |
string | Path to kubeconfig file |
--insecure-tls |
bool | Skip TLS verification for OCI registry connections | |
--plain-http |
bool | Use plain HTTP for OCI registry connections | |
--image-refs |
string | Path to image references file for OCI registry | |
--attest |
bool | Enable bundle attestation and binary provenance verification. Requires OIDC authentication. See Bundle Attestation. | |
--certificate-identity-regexp |
string | Override the certificate identity pattern for binary attestation verification. Must contain "NVIDIA/aicr". For testing only. |
|
--identity-token |
string | Pre-fetched OIDC identity token for --attest keyless signing. Skips ambient/browser/device-code flows. Prefer COSIGN_IDENTITY_TOKEN on shared hosts — flag values are visible in ps and /proc/<pid>/cmdline. |
|
--oidc-device-flow |
bool | Use the OAuth 2.0 device authorization grant for --attest instead of opening a browser callback. Useful on headless hosts that can still reach Sigstore (--identity-token and CI ambient OIDC are alternatives). Also reads AICR_OIDC_DEVICE_FLOW. |
The bundle command accepts the same AICRConfig format used by aicr recipe. A single file can populate both spec.recipe and spec.bundle, capturing an end-to-end workflow that can be committed to git, fetched from CI, or shared across environments.
When both spec.recipe.output.path and spec.bundle.input.recipe are set, they must reference the same path; otherwise loading fails fast.
kind: AICRConfig
apiVersion: aicr.nvidia.com/v1alpha1
spec:
bundle:
input:
recipe: ./recipe.yaml
output:
target: oci://ghcr.io/example/bundle:v1.0.0
deployment:
deployer: argocd
repo: https://example.git/charts
set:
- gpuoperator:driver.version=570.86.16
scheduling:
systemNodeSelector:
role: system
acceleratedNodeTolerations:
- "nvidia.com/gpu=present:NoSchedule"
nodes: 8
storageClass: gp3
attestation:
enabled: false
registry:
insecureTLS: false
plainHTTP: false# Drive the bundle entirely from a config file
aicr bundle --config bundle.yaml
# Override the deployer for a one-off run
aicr bundle --config bundle.yaml --deployer helmCLI flags always override values loaded from --config. For slice/map flags (--set, --dynamic, --system-node-selector, etc.), CLI presence replaces the config's value rather than appending. Override events are logged at INFO so users can see which input won.
Secrets: the cosign identity token is never read from a config file; supply it via --identity-token or COSIGN_IDENTITY_TOKEN.
The --accelerated-node-selector and --accelerated-node-toleration flags control scheduling for GPU-specific components:
| Flag | GPU Daemonsets | NFD Workers |
|---|---|---|
--accelerated-node-selector |
Applied (restricts to GPU nodes) | Not applied (NFD runs on all nodes) |
--accelerated-node-toleration |
Applied | Applied |
--system-node-selector |
Not applied | Not applied |
--system-node-toleration |
Not applied | Not applied |
NFD (Node Feature Discovery) workers must run on all nodes (GPU, CPU, and system) to detect hardware features. This matches the gpu-operator default behavior where NFD workers also run on control-plane nodes. The --accelerated-node-selector is intentionally not applied to NFD workers so they are not restricted to GPU nodes.
Note: When no
--accelerated-node-tolerationis specified, a default toleration (operator: Exists) is applied to both GPU daemonsets and NFD workers, allowing them to run on nodes with any taint.
Example:
aicr bundle --recipe recipe.yaml \
--accelerated-node-selector nodeGroup=gpu-worker \
--accelerated-node-toleration dedicated=worker-workload:NoSchedule \
--accelerated-node-toleration dedicated=worker-workload:NoExecute \
--system-node-selector nodeGroup=system-worker \
--system-node-toleration dedicated=system-workload:NoSchedule \
--system-node-toleration dedicated=system-workload:NoExecute \
--output bundleCluster node requirements: This example assumes the cluster has nodes labeled
nodeGroup=system-workerwith taintsdedicated=system-workload:NoSchedule,NoExecutefor system infrastructure, and GPU nodes labelednodeGroup=gpu-workerwith taintsdedicated=worker-workload:NoSchedule,NoExecute.
This results in:
- GPU daemonsets (driver, device-plugin, toolkit, dcgm):
nodeSelector=nodeGroup=gpu-worker+ tolerations fordedicated=worker-workloadwith bothNoScheduleandNoExecute - NFD workers: no nodeSelector (runs on all nodes) + tolerations for
dedicated=worker-workloadwith bothNoScheduleandNoExecute - System components (gpu-operator controller, NFD gc/master, dynamo grove, agentgateway proxy):
nodeSelector=nodeGroup=system-worker+ tolerations fordedicated=system-workloadwith bothNoScheduleandNoExecute
Behavior:
- All components from the recipe are bundled automatically
- Each component creates a subdirectory in the output directory
- Components are deployed in the order specified by
deploymentOrderin the recipe
The --storage-class flag injects a Kubernetes StorageClass name into components at bundle time. StorageClass is a cluster infrastructure detail — the right value depends on what the target cluster has provisioned, not on the recipe.
When provided, the value is written to all Helm value paths declared in the component registry under storageClassPaths, overriding any storageClassName set in recipe overlays. If a per-component --set <component>:<path>=<value> explicitly targets the same path, that value takes precedence over --storage-class.
Example:
# Use EBS gp3 instead of the overlay default gp2 on EKS
aicr bundle --recipe recipe.yaml \
--storage-class gp3 \
--output bundle
# Use a custom storage class on an on-prem cluster
aicr bundle --recipe recipe.yaml \
--storage-class local-path \
--output bundleWhen --storage-class is not set, any storageClassName values already defined in the recipe overlays are preserved as defaults. When it is set, --set <component>:<path>=<value> on the same path still wins — --storage-class only fills in paths that were not explicitly overridden.
If a rendered component creates a PVC at a registry-declared storageClassPaths entry and no usable storageClassName is set after overlay, --storage-class, and --set precedence is resolved, aicr bundle emits a non-blocking warning. The bundle still relies on the target cluster's default StorageClass in that case.
The --deployer flag controls how deployment artifacts are generated:
| Method | Description |
|---|---|
helm |
(Default) Generates Helm charts with values for deployment. Supports --dynamic. |
argocd |
Generates Argo CD Application manifests for GitOps deployment. Does not support --dynamic. |
argocd-helm |
Generates a Helm chart app-of-apps for Argo CD. All values overridable at install time via helm --set. Use --dynamic to pre-populate specific paths. |
flux |
Generates Flux HelmRelease manifests for GitOps deployment. Supports --dynamic via ConfigMap valuesFrom. |
helmfile |
Generates a helmfile.yaml release graph driven by the upstream helmfile CLI (helmfile apply / diff / destroy). Supports --dynamic via per-release cluster-values.yaml. Requires the helmfile binary at deploy time. |
Note:
--dynamicis not supported with--deployer argocd. Use--deployer argocd-helminstead, which produces a Helm chart where all values are overridable at install time.
Deployment Order:
All deployers respect the deploymentOrder field from the recipe, ensuring components are installed in the correct sequence:
- Helm: Components listed in README in deployment order
- Argo CD: Uses
argocd.argoproj.io/sync-waveannotation (0 = first, 1 = second, etc.) - Flux: Uses
dependsOnreferences in HelmRelease CRs (each component depends on the previous component's terminal release — its<prev>-postrelease when post-manifests are present, otherwise<prev>). Components with pre-manifests insert a<name>-prerelease that the primary HelmRelease depends on, so the chain becomesprevious → <name>-pre → <name> → <name>-post → next. The bundle's rootkustomization.yamlis a plain Kustomize file (not a Flux Kustomization CR). - Helmfile: Uses
needs:references in each release (each component depends on its predecessor)
Override any value in the generated bundle files using dot notation:
--set bundler:path.to.field=valueFormat: bundler:path=value where:
bundler- Bundler name (e.g.,gpuoperator,networkoperator,certmanager,nodewright-operator,nvsentinel)path- Dot-separated path to the fieldvalue- New value to set
Behavior:
- Duplicate keys: When the same
bundler:pathis specified multiple times, the last value wins - Array values: Individual array elements cannot be overridden (no
[0]index syntax). Arrays can only be replaced entirely via recipe overrides, not via--setflags. Use recipe-level overrides incomponentRefs[].overridesif you need to replace an entire array. - Type conversion: String values are automatically converted to appropriate types (
true/false→ bool, numeric strings → numbers) - Component enable/disable: The special
enabledkey controls whether a component is included in the bundle.--set <component>:enabled=falseexcludes the component;--set <component>:enabled=truere-enables a recipe-disabled component. Theenabledkey is consumed by the bundler and not passed to Helm chart values.
Examples:
# Generate all bundles
aicr bundle --recipe recipe.yaml --output ./bundles
# Override values in GPU Operator bundle
aicr bundle -r recipe.yaml \
--set gpuoperator:gds.enabled=true \
--set gpuoperator:driver.version=570.86.16 \
-o ./bundles
# Override multiple components
aicr bundle -r recipe.yaml \
--set gpuoperator:mig.strategy=mixed \
--set networkoperator:rdma.enabled=true \
--set networkoperator:sriov.enabled=true \
-o ./bundles
# Override cert-manager resources
aicr bundle -r recipe.yaml \
--set certmanager:controller.resources.memory.limit=512Mi \
--set certmanager:webhook.resources.cpu.limit=200m \
-o ./bundles
# Override Nodewright manager resources
aicr bundle -r recipe.yaml \
--set nodewright-operator:manager.resources.cpu.limit=500m \
--set nodewright-operator:manager.resources.memory.limit=256Mi \
-o ./bundles
# Disable a component at bundle time (e.g., EBS CSI already installed as EKS addon)
aicr bundle -r recipe.yaml \
--set awsebscsidriver:enabled=false \
-o ./bundles
# Schedule system components on specific node pool
aicr bundle -r recipe.yaml \
--system-node-selector nodeGroup=system-pool \
--system-node-toleration dedicated=system:NoSchedule \
-o ./bundles
# Schedule GPU workloads on labeled GPU nodes
aicr bundle -r recipe.yaml \
--accelerated-node-selector nvidia.com/gpu.present=true \
--accelerated-node-toleration nvidia.com/gpu=present:NoSchedule \
-o ./bundles
# Combined: separate system and GPU scheduling
aicr bundle -r recipe.yaml \
--system-node-selector nodeGroup=system-pool \
--system-node-toleration dedicated=system:NoSchedule \
--accelerated-node-selector accelerator=nvidia-h100 \
--accelerated-node-toleration nvidia.com/gpu=present:NoSchedule \
-o ./bundles
# Set estimated GPU node count (writes to nodeCountPaths in registry)
aicr bundle -r recipe.yaml --nodes 8 -o ./bundles
# Day 2 options: workload-gate and workload-selector for nodewright
aicr bundle -r recipe.yaml \
--workload-gate skyhook.nvidia.com/runtime-required=true:NoSchedule \
--workload-selector workload-type=training \
-o ./bundles
# Generate an attested bundle (opens browser for OIDC auth)
aicr bundle -r recipe.yaml --attest -o ./bundles
# In GitHub Actions (OIDC token detected automatically)
aicr bundle -r recipe.yaml --attest -o ./bundles
# Generate Argo CD Application manifests for GitOps
aicr bundle -r recipe.yaml --deployer argocd -o ./bundles
# Argo CD with Git repository URL (avoids placeholder in app-of-apps.yaml)
aicr bundle -r recipe.yaml --deployer argocd \
--repo https://github.com/my-org/my-gitops-repo.git \
-o ./bundles
# Combine deployer with value overrides
aicr bundle -r recipe.yaml \
--deployer argocd \
-o ./bundlesThe --vendor-charts flag pulls upstream Helm chart bytes into the bundle at bundle time. With the flag set, every Helm-typed component becomes a local chart inside the generated bundle and the resulting artifact deploys end-to-end with zero registry egress. Without the flag, deploy-time helm upgrade --install calls fetch from the upstream repository — which works for connected clusters but breaks in air-gapped environments.
Bundle-time requirement: the helm binary must be on $PATH when aicr bundle --vendor-charts runs. Authentication for private chart registries flows through Helm's own conventions:
- HTTP(S) repositories —
HELM_REPOSITORY_USERNAME/HELM_REPOSITORY_PASSWORDenvironment variables. - OCI registries — standard docker config (
~/.docker/config.jsonor$DOCKER_CONFIG); rundocker login <registry>ahead of time.
Tradeoff: CVE-yank fail-loud signal is lost. Non-vendored bundles fail loudly when an upstream chart version is yanked at registry time, which prompts a rebundle with a fixed recipe. Vendored bundles freeze the chart bytes at bundle creation and silently install the frozen version even after upstream yank. Treat provenance.yaml (below) as the audit surface for cross-referencing yank lists.
Bundle-time costs. Vendoring adds bundle-time network egress (the chart pull), bundle-time auth surface (private registries need credentials at the bundle host), and bundle size (typically 0.5–5 MB unpacked per chart). Users who don't need air-gap shouldn't set --vendor-charts and shouldn't pay these costs.
Bundle layout with --vendor-charts — every Helm component emits a single wrapper folder (mixed components no longer split into a primary + -post pair):
my-bundle/
001-gpu-operator/
Chart.yaml # wrapper, declares the vendored subchart
charts/gpu-operator-v25.3.0.tgz # vendored upstream tarball
values.yaml # values nested under the subchart name
cluster-values.yaml # dynamic values, also nested
install.sh # helm upgrade --install <name> ./<dir> ...
002-alloy/
Chart.yaml
charts/alloy-1.2.3.tgz
templates/ # for mixed components: raw manifests
clusterrole.yaml # with helm.sh/hook: post-install
values.yaml
cluster-values.yaml
install.sh
provenance.yaml # bundle-time audit log
...
provenance.yaml sits at the bundle root and lists one entry per vendored chart, using the same K8s-style apiVersion/kind shape as the rest of AICR's persisted formats:
apiVersion: aicr.nvidia.com/v1alpha1
kind: BundleProvenance
vendoredCharts:
- name: gpu-operator
chart: gpu-operator
version: v25.3.0
repository: https://helm.ngc.nvidia.com/nvidia
sha256: abc123...
tarballName: gpu-operator-v25.3.0.tgz
pullerVersion: helm-cli v3.20.2The sha256 field is the digest of the bytes copied into charts/, suitable for yank-list lookups and cross-bundle drift comparisons. Pipe through yq -o=json provenance.yaml if your scanner expects JSON.
Examples:
# Vendor everything for an air-gap deployment
aicr bundle --recipe recipe.yaml --vendor-charts -o ./bundle
# Vendor with private OCI registry credentials
docker login nvcr.io
aicr bundle --recipe recipe.yaml --vendor-charts -o ./bundle
# Vendor with private HTTP(S) chart repo credentials
HELM_REPOSITORY_USERNAME=robot \
HELM_REPOSITORY_PASSWORD=secret \
aicr bundle --recipe recipe.yaml --vendor-charts -o ./bundleThe --dynamic flag declares value paths that are cluster-specific and should be provided at install time rather than baked into the bundle at build time. This enables building a single bundle that can be deployed to multiple clusters with different configurations.
Use --dynamic for values that genuinely vary per cluster — cluster names, subnet IDs, endpoint URLs, region-specific settings. For values that are static per bundle but differ from the recipe default (e.g., a specific driver version), use --set instead.
| Use case | Flag | Example |
|---|---|---|
| Cluster-specific value (varies per deployment) | --dynamic |
--dynamic alloy:clusterName |
| Static override (same for all deployments of this bundle) | --set |
--set gpuoperator:driver.version=580.105.08 |
Attestation scope: Dynamic values are supplied at install time and are not covered by
--attest. Attestation binds the shipped bundle (defaults and stubs), not operator-provided overrides. If you need to constrain dynamic values at deploy time, use admission control or Argo sync hooks — see Attestation Scope.
--dynamic component:path.to.fieldFormat: component:path where:
component- Component name or override key (same keys as--set, e.g.,gpuoperator,alloy)path- Dot-separated path to the value that varies per cluster
Helm deployer behavior:
Dynamic paths are removed from values.yaml and written to a separate cluster-values.yaml per component. The generated deploy.sh passes both files to Helm:
helm upgrade --install gpu-operator ... \
-f values.yaml \
-f cluster-values.yamlBefore deploying, fill in cluster-values.yaml with cluster-specific values.
Argo CD deployer behavior:
The --deployer argocd-helm generates a Helm chart app-of-apps where all values are overridable at install time. Static values are baked into the chart as files; dynamic overrides are merged on top at render time. Use --dynamic to pre-populate specific paths in the root values.yaml:
helm install aicr-bundle ./bundle \
--set alloy.clusterName=prod-east \
--set alloy.subnetName=subnet-abc123Examples:
# Helm: declare cluster name as install-time parameter
aicr bundle -r recipe.yaml \
--dynamic alloy:clusterName \
-o ./bundles
# Helm: multiple dynamic paths across components
aicr bundle -r recipe.yaml \
--dynamic alloy:clusterName \
--dynamic alloy:subnetName \
-o ./bundles
# Helm: combine with --set (static overrides + dynamic cluster-specific values)
aicr bundle -r recipe.yaml \
--set gpuoperator:driver.version=580.105.08 \
--dynamic alloy:clusterName \
-o ./bundles
# Argo CD Helm chart: all values overridable, --dynamic pre-populates specific paths
aicr bundle -r recipe.yaml \
--deployer argocd-helm \
--dynamic alloy:clusterName \
-o ./bundles
# Argo CD Helm chart: without --dynamic, still fully overridable via helm --set
aicr bundle -r recipe.yaml \
--deployer argocd-helm \
-o ./bundlesBundle structure with --dynamic (Helm deployer):
bundles/
├── alloy/
│ ├── values.yaml # Static values (clusterName removed)
│ └── cluster-values.yaml # Dynamic values (override before deploying)
├── gpu-operator/
│ └── values.yaml # No dynamic values, no cluster-values.yaml
├── deploy.sh # Passes -f cluster-values.yaml when present
└── ...
Bundle structure with --dynamic (Flux deployer):
The --deployer flux bundle uses Flux's native spec.valuesFrom to reference ConfigMaps containing dynamic values. Dynamic paths are removed from the inline spec.values and placed into a ConfigMap per component. Flux merges valuesFrom first, then inline values on top — since dynamic paths are stripped from inline values, the ConfigMap values take effect without conflicts.
bundles/
├── gpu-operator/
│ ├── helmrelease.yaml # HelmRelease with valuesFrom + inline values
│ └── configmap-values.yaml # Dynamic values ConfigMap (edit before applying)
├── cert-manager/
│ └── helmrelease.yaml # No dynamic values, no ConfigMap
├── sources/
│ └── ...
├── kustomization.yaml
└── README.md
Before applying the bundle to your cluster, edit each configmap-values.yaml with the correct per-cluster values:
# 1. Generate the bundle
aicr bundle -r recipe.yaml --deployer flux \
--dynamic gpuoperator:driver.version \
--repo https://github.com/my-org/gitops.git \
-o ./bundles
# 2. Edit dynamic ConfigMaps
vim bundles/gpu-operator/configmap-values.yaml
# 3. Push to your Git repository and let Flux reconcile
git add bundles/ && git commit -m "Add AICR bundle" && git pushBundle structure with --dynamic (Helmfile deployer):
The --deployer helmfile bundle references both values.yaml (static) and cluster-values.yaml (dynamic stubs) per release. helmfile merges value files in declaration order, so cluster-values.yaml overrides on top of the generated values.yaml. Edit cluster-values.yaml per component before helmfile apply:
bundles/
├── helmfile.yaml # Release graph; per-release values: [./NNN-<component>/values.yaml, ./NNN-<component>/cluster-values.yaml]
├── 001-cert-manager/
│ ├── values.yaml # Generated static values
│ └── cluster-values.yaml # Dynamic stubs (edit before apply)
├── 002-gpu-operator/
│ ├── values.yaml
│ └── cluster-values.yaml
└── README.md
# 1. Generate the bundle
aicr bundle -r recipe.yaml --deployer helmfile \
--dynamic gpuoperator:driver.version \
-o ./bundles
# 2. Edit per-cluster overrides
vim bundles/002-gpu-operator/cluster-values.yaml
# 3. Preview and apply
cd ./bundles && helmfile diff && helmfile applyArgo CD Helm chart structure with --dynamic:
The --deployer argocd-helm bundle is itself a Helm chart whose templates/ create per-component Argo Applications. Each application's helm.values block merges static values (loaded via .Files.Get for upstream-helm components, or read from the wrapped chart's own values.yaml for local-chart components) with dynamic overrides from the parent chart's .Values.
The same uniform NNN-<component>/ folder layout used by --deployer argocd is included at the bundle root so that path-based Argo Applications (manifest-only, kustomize-wrapped, mixed -post) can resolve their path: references against the OCI-published bundle.
bundles/
├── Chart.yaml # Parent chart metadata
├── values.yaml # Dynamic stubs only (per-cluster surface)
├── templates/
│ ├── aicr-stack.yaml # Parent Argo Application (renders all children)
│ ├── cert-manager.yaml # Argo App, multi-source (upstream-helm)
│ ├── gpu-operator.yaml # Argo App, multi-source
│ ├── gpu-operator-post.yaml # Argo App, path-based (mixed -post)
│ └── nodewright-customizations.yaml # Argo App, path-based (manifest-only)
├── static/
│ ├── cert-manager.yaml # Static values for upstream-helm Applications
│ └── gpu-operator.yaml
├── 001-cert-manager/ # NNN-folder content (KindUpstreamHelm)
│ └── values.yaml
├── 002-gpu-operator/ # KindUpstreamHelm (mixed primary)
│ └── values.yaml
├── 003-gpu-operator-post/ # KindLocalHelm (mixed -post)
│ ├── Chart.yaml
│ ├── templates/
│ └── values.yaml
├── 004-nodewright-customizations/ # KindLocalHelm (manifest-only)
│ ├── Chart.yaml
│ ├── templates/
│ └── values.yaml
└── README.md
Manifest-only components and mixed-component raw manifests are supported by --deployer argocd-helm via the path-based Application shape.
The bundle is URL-portable. No --repo flag is needed (and is ignored if passed with --deployer argocd-helm). The same generated bundle bytes can be pushed to any chart-source backend the user chooses — Argo CD pulls from whichever URL the user supplies at install time via helm install --set repoURL=.... The publish location is not baked into the bundle artifact.
Recommended deploy flow:
# 1. Generate the bundle (URL-agnostic)
aicr bundle -r recipe.yaml --deployer argocd-helm --dynamic gpuoperator:driver.version -o ./bundle
# 2. Publish to your chart registry (any HTTPS-capable OCI / Helm chart repo)
helm package ./bundle -d /tmp/
helm push /tmp/aicr-bundle-*.tgz oci://<your-registry>/<path>
# 3. Install — the URL is supplied here, not at bundle time
helm install aicr-bundle oci://<your-registry>/<path>/aicr-bundle --version <chart-version> \
-n argocd \
--set repoURL=oci://<your-registry>/<path>/aicr-bundle \
--set targetRevision=<chart-version>The chart's templates/aicr-stack.yaml renders the parent Argo Application with .Values.repoURL and .Values.targetRevision substituted in. The parent Application then triggers Argo to render the chart again from the OCI source, creating the per-component child Applications with sync-wave ordering preserved. Child Applications whose source is path-based (manifest-only and mixed-component -post folders) inherit .Values.repoURL so they too pull from the same published location.
helm install ./bundle from a local directory also works, but with a caveat: child Applications whose source is path-based require Argo's repo-server to fetch the bundle from a remote (git or OCI) — there is no local-filesystem source type for an Argo Application. Local helm install is therefore end-to-end only when the recipe contains pure-Helm components. For everything else, publish first.
Bundle structure (with default Helm deployer):
bundles/
├── README.md # Deployment guide with ordered steps
├── deploy.sh # Generic install loop + name-matched blocks
├── undeploy.sh # Generic reverse loop
├── recipe.yaml # Recipe used to generate bundle
├── checksums.txt # SHA256 checksums
├── attestation/ # Present when --attest is used
│ ├── bundle-attestation.sigstore.json # SLSA Build Provenance v1
│ └── aicr-attestation.sigstore.json # Binary SLSA provenance chain
├── 001-cert-manager/ # Upstream-helm folder: no Chart.yaml
│ ├── install.sh # Rendered: helm upgrade --install ... --repo ${REPO}
│ ├── values.yaml
│ ├── cluster-values.yaml # Dynamic-path overrides (operator-edited)
│ └── upstream.env # CHART, REPO, VERSION (sourced by install.sh)
├── 002-network-operator/ # Mixed component primary (upstream-helm)
│ ├── install.sh
│ ├── values.yaml
│ ├── cluster-values.yaml
│ └── upstream.env
└── 003-network-operator-post/ # Injected -post wrapped chart (mixed component's raw manifests)
├── Chart.yaml # Local-helm folder: Chart.yaml + templates/ present
├── install.sh # Rendered: helm upgrade --install ... ./
├── values.yaml
├── cluster-values.yaml
└── templates/
└── nfd-network-rule.yaml
Folder layout rules:
- Folders are numbered
NNN-<component>/(1-based, zero-padded). Numbering is regenerated on every bundle. - Each folder is one of two kinds, distinguished by the presence of
Chart.yaml:- upstream-helm — no
Chart.yaml;upstream.envcarriesCHART/REPO/VERSION;install.shinstalls the upstream chart. - local-helm —
Chart.yaml+templates/;install.shinstalls the local chart (helm upgrade --install <name> ./).
- upstream-helm — no
- Mixed components (Helm chart + raw manifests) emit two adjacent folders: a primary upstream-helm
NNN-<name>/and an injected(NNN+1)-<name>-post/local-helm wrapper carrying the raw manifests. Subsequent components shift by one. - Manifest-only components (no upstream Helm chart, just raw manifests) become a single local-helm wrapped chart.
- Kustomize-typed components run
kustomize buildat bundle time; the output becomes a singletemplates/manifest.yamlinside a local-helm folder.
Breaking change vs. earlier releases:
Previous releases used a flat <component>/ layout with manifests/ siblings and a --deployer helm script that branched on component kind. The new format is uniform:
- All folders carry a rendered
install.sh. The top-leveldeploy.shis a generic loop with no per-component branching — name-matched special-case blocks (nodewright-operator taint cleanup, kai-scheduler async timeout, orphan-CRD scan, DRA kubelet-plugin restart) live around the loop, not inside it. - Raw manifests for mixed components now apply post-install only, via the injected
-postwrapped chart. The earlier pre-apply mechanism with a CRD-race retry wrapper is gone — Helm now owns CRD ordering for mixed components natively. - Tooling that parsed bundle paths by bare component name must account for the
NNN-prefix.
Argo CD bundle structure (with --deployer argocd):
The argocd deployer uses the same uniform NNN-<component>/ folder layout as --deployer helm. Each folder carries an application.yaml whose Application shape is decided by the folder kind:
Chart.yamlabsent (KindUpstreamHelm — pure Helm components): today's multi-source Application pointing at the upstream Helm repository plus a values $ref to the user's git repo. Unchanged for current users.Chart.yamlpresent (KindLocalHelm — manifest-only, kustomize-wrapped, mixed-post): single-source path-based Application withsource.path: NNN-<name>against the user's repo.
The argocd deployer emits only what Argo CD's repo-server consumes: application.yaml, values.yaml (multi-source helm.valueFiles for upstream-helm, or local-chart Helm rendering for KindLocalHelm), and Chart.yaml/templates/ for KindLocalHelm. The helm-deployer orchestration files (install.sh, upstream.env, cluster-values.yaml) are stripped — Argo doesn't run shell scripts or source shell env, and --dynamic is rejected with --deployer argocd (use --deployer argocd-helm for install-time values).
bundles/
├── app-of-apps.yaml # Parent Application (recurses *.application.yaml)
├── 001-cert-manager/ # KindUpstreamHelm — no Chart.yaml
│ ├── values.yaml # Static Helm values (consumed via multi-source)
│ └── application.yaml # Multi-source Application (sync-wave 0)
├── 002-gpu-operator/ # KindUpstreamHelm — primary of mixed
│ ├── values.yaml
│ └── application.yaml
├── 003-gpu-operator-post/ # KindLocalHelm — injected mixed -post
│ ├── Chart.yaml # Synthesized wrapper for raw manifests
│ ├── templates/ # Rendered manifests
│ ├── values.yaml
│ └── application.yaml # Path-based Application (sync-wave 2)
├── 004-nodewright-customizations/ # KindLocalHelm — manifest-only
│ ├── Chart.yaml
│ ├── templates/
│ ├── values.yaml
│ └── application.yaml
└── README.md
Manifest-only components (e.g., nodewright-customizations) and mixed-component raw manifests (the -post injection) are now deployed by --deployer argocd. Previously they were silently dropped. Set --repo <user-git-or-oci> to populate the repoURL on path-based Applications so Argo can resolve them.
Day 2 Options:
The --workload-gate and --workload-selector flags are day 2 operational options for cluster scaling operations:
-
--workload-gate: Specifies a taint for nodewright-operator's runtime required feature. This ensures nodes are properly configured before workloads can schedule on them during cluster scaling. The taint is configured in the nodewright-operator Helm values file atcontrollerManager.manager.env.runtimeRequiredTaint. For more information about runtime required, see the Nodewright documentation. -
--workload-selector: Specifies a label selector for nodewright-customizations to prevent nodewright from evicting running training jobs. This is critical for training workloads where job eviction would cause significant disruption. The selector is set in the Skyhook CR manifest (tuning.yaml) in thespec.workloadSelector.matchLabelsfield.
Estimated node count (--nodes):
The --nodes flag is a bundle-time option: it is applied when you run aicr bundle, not when you run aicr recipe. The value is written to each component's Helm values at the paths declared in the registry under nodeScheduling.nodeCountPaths.
- When to use: Pass the expected or typical number of GPU nodes (e.g. size of your node pool). Use
0(default) to leave the value unset. - Where it goes: Components that define
nodeCountPathsin the registry receive the value at those paths in their generatedvalues.yaml. - Example:
aicr bundle -r recipe.yaml --nodes 8 -o ./bundleswrites8to every path listed in each component'snodeScheduling.nodeCountPaths.
Component Validation System:
AICR includes a component-driven validation system that automatically checks bundle configuration and displays warnings or errors during bundle generation. Validations are defined in the component registry and run automatically when components are included in a recipe.
How Validations Work:
- Automatic Execution: When generating a bundle, validations are automatically executed for each component in the recipe
- Condition-Based: Validations can be configured to run only when specific conditions are met (e.g., intent, service, accelerator)
- Severity Levels: Each validation can be configured as a "warning" (non-blocking) or "error" (blocking)
- Custom Messages: Each validation can include an optional detail message that provides actionable guidance
Validation Warnings:
When generating bundles with nodewright-customizations enabled, validation warnings are displayed for missing configuration:
- Workload Selector Warning: When nodewright-customizations is enabled with training intent, if
--workload-selectoris not set, a warning will be displayed:
Warning: nodewright-customizations is enabled but --workload-selector is not set.
This may cause nodewright to evict running training jobs. Consider setting --workload-selector to prevent eviction.
- Accelerated Selector Warning: When nodewright-customizations is enabled with training or inference intent, if
--accelerated-node-selectoris not set, a warning will be displayed:
Warning: nodewright-customizations is enabled but --accelerated-node-selector is not set.
Without this selector, the customization will run on all nodes. Consider setting --accelerated-node-selector to target specific nodes.
Viewing Validation Warnings:
Validation warnings are displayed in the bundle output after successful generation:
Note:
⚠ Warning: nodewright-customizations is enabled but --workload-selector is not set. This may cause nodewright to evict running training jobs. Consider setting --workload-selector to prevent eviction.
⚠ Warning: nodewright-customizations is enabled but --accelerated-node-selector is not set. Without this selector, the customization will run on all nodes. Consider setting --accelerated-node-selector to target specific nodes.Resolving Validation Warnings:
To resolve the warnings, include the appropriate flags when generating the bundle:
# Resolve workload selector warning
aicr bundle -r recipe.yaml \
--workload-selector workload-type=training \
-o ./bundle
# Resolve accelerated selector warning
aicr bundle -r recipe.yaml \
--accelerated-node-selector nodeGroup=gpu-worker \
-o ./bundle
# Resolve both warnings
aicr bundle -r recipe.yaml \
--workload-selector workload-type=training \
--accelerated-node-selector nodeGroup=gpu-worker \
-o ./bundleExamples:
# Generate bundle with day 2 options for training workloads
aicr bundle -r recipe.yaml \
--workload-gate skyhook.nvidia.com/runtime-required=true:NoSchedule \
--workload-selector workload-type=training \
--workload-selector intent=training \
--accelerated-node-selector accelerator=nvidia-h100 \
-o ./bundles
# Generate bundle for inference workloads with accelerated selector
aicr bundle -r recipe.yaml \
--accelerated-node-selector accelerator=nvidia-h100 \
-o ./bundlesArgo CD Applications use multi-source to:
- Pull Helm charts from upstream repositories
- Apply values.yaml from your GitOps repository
- Deploy additional manifests from component's manifests/ directory (if present)
Prerequisite: The
--attestflag requires a binary installed using the install script, which includes a cryptographic attestation from NVIDIA. Binaries installed viago installor manual download do not include this file and cannot use--attest.
When --attest is passed, the bundle command performs five steps:
- Verifies the binary attestation file exists — The running
aicrbinary must have a valid SLSA provenance file (aicr-attestation.sigstore.json) alongside it, included by the install script from a release archive. If missing, the command fails immediately with guidance on how to install correctly. - Acquires an OIDC token — see OIDC Token Sources below.
- Verifies the binary's own attestation — Cryptographically verifies the SLSA provenance binds to the running binary and was signed by NVIDIA CI. This ensures only NVIDIA-built binaries can produce attested bundles.
- Signs the bundle — Creates a SLSA Build Provenance v1 in-toto statement binding the creator's identity to the bundle content (via
checksums.txtdigest) and the binary that produced it. - Writes attestation files —
attestation/bundle-attestation.sigstore.jsonandattestation/aicr-attestation.sigstore.jsonare added to the bundle output.
Attestation is opt-in; bundles are unsigned by default. Signing uses Sigstore keyless signing (Fulcio CA + Rekor transparency log). For verification, see aicr verify.
--attest resolves an OIDC identity token from the first matching source, in
order:
--identity-tokenflag (orCOSIGN_IDENTITY_TOKENenv) — a pre-fetched token. Use this when a token is obtained out of band (e.g., from a cloud workload-identity exchange or anothercosigninvocation). On shared hosts prefer the env var: a flag value is visible inpsand/proc/<pid>/cmdlineto any user on the same machine.ACTIONS_ID_TOKEN_REQUEST_URL+ACTIONS_ID_TOKEN_REQUEST_TOKEN— the ambient GitHub Actions OIDC credential. Used automatically in CI.--oidc-device-flowflag (orAICR_OIDC_DEVICE_FLOWenv) — OAuth 2.0 Device Authorization Grant (RFC 8628). The CLI prints a verification URL and short code; the user enters the code in a browser on a separate device. Use on headless hosts (bastions, remote build boxes) where the default browser callback cannot reach the machine runningaicr. The host still needs outbound network access to Sigstore's OIDC and signing endpoints.- Interactive browser flow — opens the default browser and listens on a
random
localhostport for the redirect. Default on workstations.
Both interactive flows time out after 5 minutes.
Attestation works with all deployers (helm, argocd, argocd-helm, flux). External --data files are included in checksums.txt and listed as resolved dependencies in the attestation.
Attestation binds the shipped bundle — defaults, dynamic-value stubs, and any external --data files copied into the bundle. It does not bind install-time values supplied via helm --set, a user-provided -f extra.yaml, or Argo Application.spec.source.helm.parameters. That boundary is intentional: dynamic values are the operator's domain by design.
If you need to enforce specific install-time values (e.g., pinning driver.version), that is a policy concern, not an attestation one. Use admission control (Kyverno, Gatekeeper) or Argo sync hooks to reject deployments that violate the policy. aicr verify checks bundle integrity and provenance; it does not evaluate install-time value constraints.
# Navigate to bundle
cd bundles
# Review root README and a component's values
cat README.md
cat 001-gpu-operator/values.yaml
# Verify integrity
sha256sum -c checksums.txt
# Deploy to cluster
chmod +x deploy.sh && ./deploy.shNote:
deploy.shandundeploy.share convenience scripts — not the only deployment path. EachNNN-<component>/folder contains a renderedinstall.shthat runs the exacthelm upgrade --installcommand for manual or pipeline-driven deployment.
The deploy script installs components in the order specified by deploymentOrder in the recipe.
Flags:
| Flag | Description |
|---|---|
--no-wait |
Skip Helm chart-level wait (helm --wait) where AICR uses it. Keeps --timeout for hooks. |
--best-effort |
Continue past individual component failures instead of exiting |
--retries N |
Retry failed helm/kubectl operations N times with exponential backoff (default: 5) |
Unknown flags are rejected with an error to catch typos (e.g., --bes-effort or --retires N).
Note on install completion vs. workload readiness. By default,
deploy.shwaits on Helm chart readiness where AICR useshelm --wait. Some components are intentionally installed without Helm chart-level waiting, and the script does not wait for bundle-level workload readiness such as Nodewright node tuning, GPU operator operand rollout (driver, toolkit, device-plugin DaemonSets), or NVIDIA DRA kubelet plugin registration. Those continue asynchronously after the script exits. When--best-effortis used, the script may also finish with non-fatal component failures; check warning lines and logs before treating the install/apply pass as fully successful.--no-waitonly skips the Helm chart-level wait where AICR uses it; it does not affect bundle-level convergence.
Retry behavior:
The deploy script retries failed helm upgrade --install and kubectl apply operations with exponential backoff. By default, each operation is retried up to 5 times (6 total attempts). The backoff delay increases quadratically: 5s, 20s, 45s, 80s, 120s (capped) between retries.
Use --retries 0 to disable retries (fail-fast behavior). When --best-effort is also set, retries are exhausted first before falling through to best-effort handling.
Pre-install manifests and CRD ordering:
Some components have pre-install manifests (CRDs, namespaces, ConfigMaps) that must exist before helm install. The script applies these with kubectl apply before the Helm install. On first deploy, CRD-dependent resources may produce no matches for kind warnings because the CRD hasn't been registered yet — these warnings are suppressed. All other kubectl apply errors (auth failures, webhook denials, bad manifests) fail the script immediately.
After helm install, the same manifests are re-applied as post-install to ensure CRD-dependent resources are created.
Async components:
Components that use operator patterns with custom resources that reconcile asynchronously (e.g., kai-scheduler) are installed without --wait to avoid Helm timing out on CR readiness.
After installing nvidia-dra-driver-gpu, the script automatically restarts the DRA kubelet plugin daemonset. This is a best-effort mitigation for a known issue: after uninstall/reinstall, the kubelet's plugin watcher (fsnotify) may not detect new registration sockets, causing DRA driver gpu.nvidia.com is not registered errors.
If DRA pods fail with this error after redeployment, the daemonset restart alone may not be sufficient — a node reboot is required to reset the kubelet's plugin registration state. To reboot GPU nodes:
# Cordon, drain, and reboot the affected node
kubectl cordon <node-name>
kubectl drain <node-name> --ignore-daemonsets --delete-emptydir-data
# Reboot via cloud provider (e.g., AWS EC2 console or CLI)
aws ec2 reboot-instances --instance-ids <instance-id>
# Uncordon after node returns
kubectl uncordon <node-name>The undeploy script removes components in reverse deployment order.
Flags:
| Flag | Description |
|---|---|
--keep-namespaces |
Skip namespace deletion after component removal |
--delete-pvcs |
Delete all PVCs in component namespaces (default: off) |
--skip-preflight |
Skip pre-flight CRD/finalizer checks (use with caution) |
--timeout SECONDS |
Helm uninstall timeout per component (default: 120) |
PVC preservation (default):
PVCs are not deleted by default. This preserves historical data (Prometheus metrics, Alertmanager state, etcd data) across redeploys. If an EBS-backed PV has an AZ mismatch after redeployment, the PVC will stay Pending with a clear error — the operator can then decide to delete it manually.
Pass --delete-pvcs to delete all PVCs. Protected namespaces (kube-system, kube-public, kube-node-lease, default) are always excluded from PVC deletion to prevent accidental removal of non-bundle PVCs.
Shared namespace ordering:
When multiple components share a namespace (e.g., monitoring contains kube-prometheus-stack, prometheus-adapter, and k8s-ephemeral-storage-metrics), all components are uninstalled first, then PVC and namespace cleanup runs once. This prevents hangs caused by kubernetes.io/pvc-protection finalizers — if a StatefulSet owner is still running when PVC deletion is attempted, the delete blocks indefinitely.
Stuck release handling:
If a Helm release is in a pending-install or pending-upgrade state (from an interrupted deploy), the script retries with --no-hooks to force removal.
Orphaned webhook cleanup:
After uninstalling each component, the script checks for orphaned validating/mutating webhooks whose backing service no longer exists. Fail-closed webhooks with missing services block all pod creation, so these are deleted proactively.
Discover container images and Helm charts referenced by a recipe for air-gapped mirroring. Renders each component's Helm chart with recipe-resolved values and scans embedded manifests to produce a deduplicated image and chart list.
For an end-to-end walkthrough covering Hauler and Zarf workflows, see Air-Gapped Mirroring.
Synopsis:
aicr mirror list [flags]Flags:
| Flag | Short | Type | Default | Description |
|---|---|---|---|---|
--recipe |
-r |
string | Path/URI to a previously generated recipe. Supports: file paths, HTTP/HTTPS URLs, or ConfigMap URIs (cm://namespace/name). |
|
--service |
string | Cloud service (e.g., eks, gke, aks). Alternative to --recipe. |
||
--accelerator |
string | GPU accelerator (e.g., h100, gb200). Alternative to --recipe. |
||
--intent |
string | Workload intent (training or inference). Alternative to --recipe. |
||
--os |
string | Operating system (e.g., ubuntu). Alternative to --recipe. |
||
--platform |
string | Optional platform specialization (e.g., kubeflow). |
||
--set |
string[] | Override values that affect image discovery (format: component:path.to.field=value). Repeatable. |
||
--format |
-f |
string | yaml |
Output format: yaml, json, hauler, zarf |
--output |
-o |
string | stdout | Output file path |
Examples:
# List images from a recipe file (YAML to stdout)
aicr mirror list --recipe recipe.yaml
# Resolve recipe from query parameters
aicr mirror list --service eks --accelerator h100 --intent training --os ubuntu
# Generate Hauler manifest
aicr mirror list --recipe recipe.yaml --format hauler --output hauler-manifest.yaml
# Generate Zarf package config
aicr mirror list --recipe recipe.yaml --format zarf --output zarf.yaml
# Override a value that affects image discovery
aicr mirror list --recipe recipe.yaml --set gpuoperator:driver.enabled=falseVerify the integrity and attestation chain of a bundle. Verification is fully offline — no network calls are made.
Synopsis:
aicr verify <bundle-dir> [flags]Flags:
| Flag | Type | Default | Description |
|---|---|---|---|
--min-trust-level |
string | max |
Minimum required trust level. max auto-detects the highest achievable level and verifies against it. Explicit levels: verified, attested, unverified, unknown. |
--require-creator |
string | Require a specific creator identity, matched against the bundle attestation signing certificate. | |
--cli-version-constraint |
string | Version constraint for the aicr CLI version in the attestation predicate. Supports >=, >, <=, <, ==, !=. A bare version (e.g. "0.8.0") defaults to >=. |
|
--certificate-identity-regexp |
string | Override the certificate identity pattern for binary attestation verification. Must contain "NVIDIA/aicr". For testing only. |
|
--format |
string | text |
Output format: text or json. |
| Level | Name | Criteria |
|---|---|---|
| 4 | verified |
Full chain: checksums + bundle attestation + binary attestation pinned to NVIDIA CI |
| 3 | attested |
Chain verified but binary attestation missing or external data (--data) was used |
| 2 | unverified |
Checksums valid, --attest was not used when creating the bundle |
| 1 | unknown |
Missing or invalid checksums |
- Checksums — verifies all content files match
checksums.txt - Bundle attestation — cryptographic signature verified against Sigstore trusted root
- Binary attestation — provenance chain verified with identity pinned to NVIDIA CI (
on-tag.yamlworkflow)
Examples:
# Auto-detect maximum trust level
aicr verify ./my-bundle
# Enforce a minimum trust level
aicr verify ./my-bundle --min-trust-level verified
# Require a specific bundle creator
aicr verify ./my-bundle --require-creator jdoe@company.com
# Require minimum CLI version used to create the bundle
aicr verify ./my-bundle --cli-version-constraint ">= 0.8.0"
# JSON output for CI pipelines
aicr verify ./my-bundle --format jsonStale root: If verification fails with certificate chain errors, run
aicr trust updateto refresh the Sigstore trusted root.
Verify a recipe-evidence v1 bundle produced by aicr validate --emit-attestation. When the bundle carries a signature, verifies it against the Sigstore trusted root and extracts the cryptographically anchored predicate. Recomputes every file's sha256 against manifest.json (which the predicate's manifest.digest field anchors), and surfaces the predicate's fingerprint, phase counts, and BOM info.
Inline constraint replay is reserved for a follow-up PR.
Synopsis:
aicr evidence verify <input> [flags]The positional argument is auto-detected as one of:
recipes/evidence/<recipe>.yaml— pointer file (verifier fetches the OCI artifact named inside).ghcr.io/<owner>/aicr-evidence@sha256:...oroci://...— OCI reference../out/summary-bundle/(or a parent containing it) — unpacked directory.
Flags:
| Flag | Alias | Type | Default | Description |
|---|---|---|---|---|
--output |
-o |
string | Write output to this file. When empty, output goes to stdout. | |
--format |
-t |
string | text |
Output format: text (Markdown) or json. Applies regardless of destination. |
--expected-issuer |
string | Pin the OIDC issuer URL on the signing certificate. Empty allows any issuer. | ||
--expected-identity-regexp |
string | Pin the signer's SubjectAlternativeName via regex. Empty allows any identity. |
||
--bundle |
string | OCI reference override when the pointer carries no bundle.oci. |
||
--registry-plain-http |
bool | false |
Use HTTP for registry traffic (local-registry tests only). | |
--registry-insecure-tls |
bool | false |
Skip TLS verification for the registry (self-signed certificates). | |
--allow-unpinned-tag |
bool | false |
Accept tag-only OCI references. By default the verifier refuses unpinned refs because tags are registry-rewritable; opt in only for one-off debugging. Pointer-driven flows ignore this flag when the pointer carries a sha256: digest. |
Exit codes:
| Code | Meaning |
|---|---|
| 0 | Bundle valid; every check passed. |
| 2 | Bundle invalid (signature, integrity, or predicate failure), OR recorded validator results show failures. |
The JSON/Markdown output's exit field (and VerifyResult.Exit from the library API) still distinguishes the two non-zero cases as 1 (recorded phase failures) vs 2 (bundle invalid). Shell consumers can branch via jq '.exit' on --format json output.
Examples:
# Verify the pointer that a contributor committed alongside their recipe change.
aicr evidence verify recipes/evidence/h100-eks-ubuntu-training.yaml
# Verify a pushed OCI bundle directly (no repo checkout required).
aicr evidence verify ghcr.io/myorg/aicr-evidence@sha256:abc...
# Verify a local bundle directory (contributor self-debug before push).
aicr evidence verify ./out/summary-bundle
# Pin the expected OIDC signer.
aicr evidence verify recipes/evidence/<recipe>.yaml \
--expected-issuer https://token.actions.githubusercontent.com \
--expected-identity-regexp '^https://github\.com/myorg/.*$'
# CI pipelines: JSON output.
aicr evidence verify recipes/evidence/<recipe>.yaml -o result.json -t jsonSee demos/evidence.md for a full producer-and-consumer walkthrough.
Stale root: If verification fails with certificate chain errors, run
aicr trust updateto refresh the Sigstore trusted root.
Fetch the latest Sigstore trusted root from the TUF CDN and update the local cache at ~/.sigstore/root/. This is needed when Sigstore rotates signing keys (a few times per year).
Synopsis:
aicr trust updateNo flags. This command contacts tuf-repo-cdn.sigstore.dev, verifies the update chain against the embedded TUF root, and writes the result to ~/.sigstore/root/.
When to run:
- After initial installation (the install script runs this automatically)
- When
aicr verifyreports a stale or expired trusted root - When Sigstore announces key rotation
Example:
aicr trust updateGenerate an AI agent skill file that teaches a coding agent how to use the AICR CLI. The generated file is written to the agent's standard configuration directory.
Synopsis:
aicr skill --agent <agent> [flags]Flags:
| Flag | Type | Default | Description |
|---|---|---|---|
--agent |
string | (required) | Target coding agent: claude-code, codex |
--stdout |
bool | false | Print to stdout instead of writing to disk |
--force |
bool | false | Overwrite an existing skill file without prompting |
Install Locations:
| Agent | Path |
|---|---|
claude-code |
~/.claude/skills/aicr/SKILL.md |
codex |
~/.codex/skills/aicr/SKILL.md |
Behavior:
- Without
--stdout: writes the file to disk and prints the path - With
--stdout: prints the generated content to stdout - If the target file already exists: prompts
overwrite? [y/N]when stdin is a terminal; aborts on non-interactive stdin unless--forceis set - Creates parent directories as needed
Examples:
# Install Claude Code skill file
aicr skill --agent claude-code
# Install Codex skill file
aicr skill --agent codex
# Overwrite an existing skill file without prompting (e.g., in CI)
aicr skill --agent claude-code --force
# Print to stdout (e.g., for review before installing)
aicr skill --agent claude-code --stdout# Step 1: Capture system configuration
aicr snapshot --output snapshot.yaml
# Step 2: Generate optimized recipe for training workloads
aicr recipe \
--snapshot snapshot.yaml \
--intent training \
--output recipe.yaml
# Step 3: Validate recipe constraints against snapshot
aicr validate \
--recipe recipe.yaml \
--snapshot snapshot.yaml
# Step 4: Create deployment bundle
aicr bundle \
--recipe recipe.yaml \
--output ./deployment
# Step 5: Deploy to cluster
cd deployment && chmod +x deploy.sh && ./deploy.sh
# Step 6: Verify deployment
kubectl get pods -n gpu-operator
kubectl logs -n gpu-operator -l app=nvidia-operator-validator# Step 1: Agent captures snapshot to ConfigMap (using CLI deployment)
aicr snapshot --output cm://gpu-operator/aicr-snapshot
# The CLI handles agent deployment automatically
# No manual kubectl steps needed
# Step 2: Generate recipe from ConfigMap
aicr recipe \
--snapshot cm://gpu-operator/aicr-snapshot \
--intent training \
--output recipe.yaml
# Alternative: Write recipe to ConfigMap as well
aicr recipe \
--snapshot cm://gpu-operator/aicr-snapshot \
--intent training \
--output cm://gpu-operator/aicr-recipe
# With custom kubeconfig (if not using default)
aicr recipe \
--snapshot cm://gpu-operator/aicr-snapshot \
--kubeconfig ~/.kube/prod-cluster \
--intent training \
--output recipe.yaml
# Step 3: Validate recipe constraints against cluster snapshot
aicr validate \
--recipe recipe.yaml \
--snapshot cm://gpu-operator/aicr-snapshot
# For CI/CD pipelines: exit non-zero on validation failure
aicr validate \
--recipe recipe.yaml \
--snapshot cm://gpu-operator/aicr-snapshot \
--fail-on-error
# Step 4: Create bundle from recipe
aicr bundle \
--recipe recipe.yaml \
--output ./deployment
# Step 5: Deploy to cluster
cd deployment && chmod +x deploy.sh && ./deploy.sh
# Step 6: Verify deployment
kubectl get pods -n gpu-operator
kubectl logs -n gpu-operator -l app=nvidia-operator-validatorValidate the complete workflow:
# Run all CLI integration tests (no cluster needed)
make e2e
# Run a single chainsaw test
AICR_BIN=$(find dist -maxdepth 2 -type f -name aicr | head -n 1)
chainsaw test --no-cluster --test-dir tests/chainsaw/cli/recipe-generationGenerate shell completion scripts:
# Bash
aicr completion bash
# Zsh
aicr completion zsh
# Fish
aicr completion fish
# PowerShell
aicr completion pwshInstallation:
Bash:
source <(aicr completion bash)
# Or add to ~/.bashrc for persistence
echo 'source <(aicr completion bash)' >> ~/.bashrcZsh:
source <(aicr completion zsh)
# Or add to ~/.zshrc
echo 'source <(aicr completion zsh)' >> ~/.zshrcAICR respects standard environment variables:
| Variable | Description | Default |
|---|---|---|
KUBECONFIG |
Path to Kubernetes config file | ~/.kube/config |
AICR_LOG_LEVEL |
Logging level: debug, info, warn, error | info |
AICR_LOG_PREFIX |
Override the CLI logger prefix | cli |
AICR_REQUESTS |
Default for aicr snapshot --requests. Comma-separated name=quantity pairs (e.g. cpu=500m,memory=1Gi,ephemeral-storage=1Gi). Unspecified resources keep the built-in privileged or restricted defaults. |
unset |
AICR_LIMITS |
Default for aicr snapshot --limits. Comma-separated name=quantity pairs (e.g. cpu=1,memory=2Gi,ephemeral-storage=2Gi). Unspecified resources keep the built-in defaults. With --require-gpu, the default nvidia.com/gpu=1 is applied only when this list does not already contain that key — explicit nvidia.com/gpu=N wins. |
unset |
AICR_CRITERIA_STRICT |
When set to 1 / true / yes / on, equivalent to --criteria-strict on every aicr recipe invocation: rejects criteria values not in the embedded OSS catalog regardless of --data contributions. Intended for OSS CI gates; make qualify exports it automatically for the unit-test step. |
unset |
NO_COLOR |
Suppress ANSI color codes in CLI logger output (de-facto standard, see no-color.org) | unset |
| Code | Meaning |
|---|---|
| 0 | Success |
| 1 | General error (unclassified) |
| 2 | Invalid input (bad arguments, validation failure) |
| 3 | Not found (requested resource does not exist) |
| 4 | Unauthorized (authentication or authorization failure) |
| 5 | Timeout (operation exceeded time limit) |
| 6 | Unavailable (service temporarily unavailable) |
| 7 | Rate limited (client exceeded rate limit) |
| 8 | Internal error (unexpected failure) |
aicr recipe --os ubuntu --accelerator h100 | jq '.componentRefs[]'aicr snapshot -o snapshot.yaml
aicr recipe -s snapshot.yaml --intent training -o recipe.yaml
aicr bundle -r recipe.yaml -o ./bundles# Extract GPU Operator version from recipe
aicr recipe --os ubuntu --accelerator h100 --format json | \
jq -r '.componentRefs[] | select(.name=="gpu-operator") | .version'
# Get all component versions
aicr recipe --os ubuntu --accelerator h100 --format json | \
jq -r '.componentRefs[] | "\(.name): \(.version)"'# Generate recipes for different cloud providers
for service in eks gke aks; do
aicr recipe --os ubuntu --service $service --gpu h100 \
--output recipe-${service}.yaml
done# Check GPU drivers
nvidia-smi
# Check Kubernetes access
kubectl cluster-info
# Run with debug
aicr --debug snapshot# Query parameters may not match any overlay
# Try broader query:
aicr recipe --os ubuntu --gpu h100# Verify recipe file
cat recipe.yaml
# List available flags
aicr bundle --help
# Run with debug
aicr --debug bundle -r recipe.yaml"helm CLI not found on PATH" with --vendor-charts — the bundle-time vendoring path shells out to helm pull. Install Helm v3 or later (brew install helm / package manager) and re-run, or drop --vendor-charts for a registry-referencing bundle. See Vendoring Charts for Air-Gap.
"failed to load manifest <path> for component <name>" — the recipe references a manifest path that does not exist in the current AICR binary's embedded data. This usually means the recipe was generated by an older binary and a referenced manifest has since been removed or relocated. Regenerate the recipe with the current binary (aicr recipe ...) and re-bundle. AICR recipes are a point-in-time artifact of the binary that produced them; bundling a stale recipe against a newer binary is not supported.
The --data flag enables extending or overriding the embedded recipe data with external files. This allows customization without rebuilding the CLI.
AICR embeds recipe data (overlays, component values, registry) at compile time. The --data flag layers an external directory on top, enabling:
- Custom components: Add new components to the registry
- Override values: Replace default component values files
- Custom overlays: Add new recipe overlays for specific environments
- Registry extensions: Add custom components while preserving embedded ones
The external directory must mirror the embedded data structure:
my-data/
├── registry.yaml # REQUIRED - merged with embedded registry
├── overlays/
│ └── base.yaml # Optional - replaces embedded base.yaml
│ └── custom-overlay.yaml # Optional - adds new overlay
└── components/
└── gpu-operator/
└── values.yaml # Optional - replaces embedded values
- registry.yaml is required: The external directory must contain a
registry.yamlfile - Security validations: Symlinks are rejected, file size is limited (10MB default)
- No path traversal: Paths containing
..are rejected
| File Type | Behavior |
|---|---|
registry.yaml |
Merged - External components are added to embedded; same-named components are replaced |
| All other files | Replaced - External file completely replaces embedded if path matches |
# Use external data directory for recipe generation
aicr recipe --service eks --accelerator h100 --data ./my-data
# Use external data directory for bundle generation
aicr bundle --recipe recipe.yaml --data ./my-data --output ./bundles
# Combine with other flags
aicr recipe --service eks --gpu gb200 --intent training \
--data ./custom-recipes \
--output recipe.yaml- Create external data directory:
mkdir -p my-data/components/my-operator- Create registry.yaml with custom component:
# my-data/registry.yaml
apiVersion: aicr.nvidia.com/v1alpha1
kind: ComponentRegistry
components:
- name: my-operator
displayName: My Custom Operator
helm:
defaultRepository: https://my-charts.example.com
defaultChart: my-operator
defaultVersion: v1.0.0- Create values file for the component:
# my-data/components/my-operator/values.yaml
replicaCount: 1
image:
repository: my-registry/my-operator
tag: v1.0.0- Create overlay that includes the component:
# my-data/overlays/my-custom-overlay.yaml
kind: RecipeMetadata
apiVersion: aicr.nvidia.com/v1alpha1
metadata:
name: my-custom-overlay
spec:
criteria:
service: eks
intent: training
componentRefs:
- name: my-operator
type: Helm
valuesFile: components/my-operator/values.yaml- Generate recipe with external data:
aicr recipe --service eks --intent training --data ./my-dataUse --debug flag to see detailed logging about external data loading:
aicr --debug recipe --service eks --data ./my-dataDebug logs include:
- External files discovered and registered
- File source resolution (embedded vs external)
- Registry merge details (components added/overridden)
The examples/ directory contains reference files for testing and learning:
| File | Description |
|---|---|
kind.yaml |
Recipe for local Kind cluster with fake GPU |
eks-training.yaml |
EKS recipe optimized for training workloads |
eks-gb200-ubuntu-training-with-validation.yaml |
GB200 on EKS with Ubuntu and multi-phase validation |
Usage:
# Generate bundle from example recipe
aicr bundle --recipe examples/recipes/eks-training.yaml --output ./bundles| File | Description |
|---|---|
snapshot-template.md.tmpl |
Go template for custom snapshot report formatting |
Usage:
# Generate custom cluster report
aicr snapshot --template examples/templates/snapshot-template.md.tmpl --output report.md- Installation Guide - Install aicr
- Agent Deployment - Kubernetes agent setup
- API Reference - Programmatic access
- Architecture Docs - Internal architecture
- Data Architecture - Recipe data system details