Regenerate released directory

Merge pull request #1150 from aiyengar2/small_updates_to_monitoring_charts

Small updates for Monitoring
pull/1158/head
actions 2021-04-26 21:09:11 +00:00
parent abb6f9a76d
commit 6992135d80
59 changed files with 759 additions and 6088 deletions

5819
index.yaml Executable file → Normal file

File diff suppressed because it is too large Load Diff

View File

@ -21,6 +21,7 @@ clients:
image:
repository: rancher/windows_exporter-package
tag: v0.0.1
os: "windows"
# Specify the IP addresses of nodes that you want to collect metrics from
endpoints: []

View File

@ -358,11 +358,13 @@ global:
systemDefaultRegistry: ""
## Windows Monitoring
## ref: https://github.com/rancher/charts/tree/dev-v2.5-source/packages/rancher-windows-exporter
## Runs https://github.com/prometheus-community/windows_exporter as a DaemonSet
## Relies on the existence of a wins server of version v0.1.0+ on every Windows host to allow
## windows_exporter to run as a host process that can publish host metrics to a port on the Pod
windows:
enabled: false
##
## Deploys a DaemonSet of Prometheus exporters based on https://github.com/prometheus-community/windows_exporter.
## Every Windows host must have a wins version of 0.1.0+ to use this chart (default as of Rancher 2.5.8).
## To upgrade wins versions on Windows hosts, see https://github.com/rancher/wins/tree/master/charts/rancher-wins-upgrader.
##
# windows:
# enabled: false
kubectl:
repository: rancher/kubectl
tag: v1.20.2
@ -1763,8 +1765,8 @@ prometheusOperator:
enabled: true
# Value must match version names from https://golang.org/pkg/crypto/tls/#pkg-constants
tlsMinVersion: VersionTLS13
# The default webhook port is 10250 in order to work out-of-the-box in GKE private clusters and avoid adding firewall rules.
internalPort: 10250
# Users who are deploying this chart in GKE private clusters will need to add firewall rules to expose this port for admissions webhooks
internalPort: 8443
## Admission webhook support for PrometheusRules resources added in Prometheus Operator 0.30 can be enabled to prevent incorrectly formatted
## rules from making their way into prometheus and potentially preventing the container from starting

View File

@ -21,6 +21,7 @@ clients:
image:
repository: rancher/windows_exporter-package
tag: v0.0.1
os: "windows"
# Specify the IP addresses of nodes that you want to collect metrics from
endpoints: []

View File

@ -1,23 +1,23 @@
# Patterns to ignore when building packages.
# This supports shell glob matching, relative path matching, and
# negation (prefixed with !). Only one pattern per line.
.DS_Store
# Common VCS dirs
.git/
.gitignore
.bzr/
.bzrignore
.hg/
.hgignore
.svn/
# Common backup files
*.swp
*.bak
*.tmp
*.orig
*~
# Various IDEs
.project
.idea/
*.tmproj
.vscode/
# Patterns to ignore when building packages.
# This supports shell glob matching, relative path matching, and
# negation (prefixed with !). Only one pattern per line.
.DS_Store
# Common VCS dirs
.git/
.gitignore
.bzr/
.bzrignore
.hg/
.hgignore
.svn/
# Common backup files
*.swp
*.bak
*.tmp
*.orig
*~
# Various IDEs
.project
.idea/
*.tmproj
.vscode/

View File

@ -1,41 +1,41 @@
# Rancher Wins Upgrader
A Rancher chart that handles keeping the wins server version and config across some (or all) of the Windows nodes on a Kubernetes cluster in sync. It does this by running a simple script to replace the contents of the `\etc\rancher\wins` directory with the newly specified config and wins image via one or more DaemonSets. Once executed, the script will simply sleep forever.
## How does this work?
A DaemonSet of initContainers copies the provided config (stored in a ConfigMap) into `\etc\rancher\wins\config` and runs `wins cli prc run --path {path-to-wins} --args {up}`, where `.\wins up[grade]` is a Go program that runs a simple Powershell script that forces an upgrade of the binary used by the `rancher-wins` service across all of your Windows hosts.
TLDR: we use wins (cli) to pass wins (upgrade) to wins (server) in order to update wins (server) on the host on demand.
## Cluster / Node Requirements
This Helm chart is intended to be used on a Windows cluster that meets the following two requirements:
- A Windows Service called `rancher-wins` is currently running on each Windows host (e.g. `.\wins srv app run --register; Start-Service -Name rancher-wins` or `.\wins up` has been run on the host) that is running a wins server version of v0.1.0+.
- The wins config used by each Windows host's `rancher-wins` Service has `{{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe` within `whiteList.processPath` so that the new wins version can be delivered onto the host
If the cluster you are installing this chart on is a custom cluster that was created via RKE1 with Windows Support enabled, your nodes should already meet the first requirement; this should have been added as part of [the bootstrapping process for adding the Windows node onto your RKE1 cluster](https://github.com/rancher/rancher/blob/master/package/windows/bootstrap.ps1).
However, depending on the bootstrap.ps1 version that was used when you spun up your Windows cluster, it is possible that the second requirement is not met yet.
If the second requirement is not met, there are two options to reconcile:
### Manual Update
This is the recommended approach for updating your Windows hosts, but it requires the user to log onto every Windows host to upgrade the wins config. After logging onto each host, you will need to do manually update the wins config.
By default, the wins config is located in `c:\etc\rancher\wins\config`, but you could use the following powershell command to identify the command line arguments passed into the `rancher-wins` service (`--config` corresponds to the config path on the host):
```powershell
(Get-CimInstance Win32_Service -Filter 'Name = "rancher-wins"').PathName
```
Once complete, restart the service:
```powershell
Restart-Service -Name "rancher-wins" | Stop-Service
```
### Masquerading (Use at your own risk. Here be dragons...)
This option is *only* meant as a hack to allow users who are currently operating on Windows clusters that have not whitelisted `{{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe`. If you plan to use this option, please ensure that you immediately upgrade this chart with `masquerade.enabled=false` and perform another `helm upgrade` to avoid any unintentional consequences (e.g. failure to install the original process that you meant to whitelist on the host).
# Rancher Wins Upgrader
A Rancher chart that handles keeping the wins server version and config across some (or all) of the Windows nodes on a Kubernetes cluster in sync. It does this by running a simple script to replace the contents of the `\etc\rancher\wins` directory with the newly specified config and wins image via one or more DaemonSets. Once executed, the script will simply sleep forever.
## How does this work?
A DaemonSet of initContainers copies the provided config (stored in a ConfigMap) into `\etc\rancher\wins\config` and runs `wins cli prc run --path {path-to-wins} --args {up}`, where `.\wins up[grade]` is a Go program that runs a simple Powershell script that forces an upgrade of the binary used by the `rancher-wins` service across all of your Windows hosts.
TLDR: we use wins (cli) to pass wins (upgrade) to wins (server) in order to update wins (server) on the host on demand.
## Cluster / Node Requirements
This Helm chart is intended to be used on a Windows cluster that meets the following two requirements:
- A Windows Service called `rancher-wins` is currently running on each Windows host (e.g. `.\wins srv app run --register; Start-Service -Name rancher-wins` or `.\wins up` has been run on the host) that is running a wins server version of v0.1.0+.
- The wins config used by each Windows host's `rancher-wins` Service has `{{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe` within `whiteList.processPath` so that the new wins version can be delivered onto the host
If the cluster you are installing this chart on is a custom cluster that was created via RKE1 with Windows Support enabled, your nodes should already meet the first requirement; this should have been added as part of [the bootstrapping process for adding the Windows node onto your RKE1 cluster](https://github.com/rancher/rancher/blob/master/package/windows/bootstrap.ps1).
However, depending on the bootstrap.ps1 version that was used when you spun up your Windows cluster, it is possible that the second requirement is not met yet.
If the second requirement is not met, there are two options to reconcile:
### Manual Update
This is the recommended approach for updating your Windows hosts, but it requires the user to log onto every Windows host to upgrade the wins config. After logging onto each host, you will need to do manually update the wins config.
By default, the wins config is located in `c:\etc\rancher\wins\config`, but you could use the following powershell command to identify the command line arguments passed into the `rancher-wins` service (`--config` corresponds to the config path on the host):
```powershell
(Get-CimInstance Win32_Service -Filter 'Name = "rancher-wins"').PathName
```
Once complete, restart the service:
```powershell
Restart-Service -Name "rancher-wins" | Stop-Service
```
### Masquerading (Use at your own risk. Here be dragons...)
This option is *only* meant as a hack to allow users who are currently operating on Windows clusters that have not whitelisted `{{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe`. If you plan to use this option, please ensure that you immediately upgrade this chart with `masquerade.enabled=false` and perform another `helm upgrade` to avoid any unintentional consequences (e.g. failure to install the original process that you meant to whitelist on the host).
If `masquerade.enabled=True`, this chart will have the wins client execute `wins-upgrade.exe` payload under the `masquerade.as` path provided, effectively tricking the `wins server` into running the binary although it has not been whitelisted. This relies on the fact that the wins server does not / cannot do any verification on the binary passed into wins since it does track a list of valid checksums on the binaries provided to it.

View File

@ -1,19 +1,19 @@
# Rancher Wins Upgrader
A Rancher chart that handles keeping the wins server version and config across some (or all) of the Windows nodes on a Kubernetes cluster in sync. It does this by running a simple script to replace the contents of the `\etc\rancher\wins` directory with the newly specified config and wins image via one or more DaemonSets. Once executed, the script will simply sleep forever.
## How does this work?
A DaemonSet of initContainers copies the provided config (stored in a ConfigMap) into `\etc\rancher\wins\config` and runs `wins cli prc run --path {path-to-wins} --args {up}`, where `.\wins up[grade]` is a Go program that runs a simple Powershell script that forces an upgrade of the binary used by the `rancher-wins` service across all of your Windows hosts.
TLDR: we use wins (cli) to pass wins (upgrade) to wins (server) in order to update wins (server) on the host on demand.
## Cluster / Node Requirements
This Helm chart is intended to be used on a Windows cluster that meets the following two requirements:
- A Windows Service called `rancher-wins` is currently running on each Windows host (e.g. `.\wins srv app run --register; Start-Service -Name rancher-wins` or `.\wins up` has been run on the host) that is running a wins server version of v0.1.0+.
- The wins config used by each Windows host's `rancher-wins` Service has `{{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe` within `whiteList.processPath` so that the new wins version can be delivered onto the host
If the cluster you are installing this chart on is a custom cluster that was created via RKE1 with Windows Support enabled after wins v0.1.0+ was released (i.e. Rancher 2.5.7+), your nodes should already meet the first requirement; this should have been added as part of [the bootstrapping process for adding the Windows node onto your RKE1 cluster](https://github.com/rancher/rancher/blob/master/package/windows/bootstrap.ps1).
# Rancher Wins Upgrader
A Rancher chart that handles keeping the wins server version and config across some (or all) of the Windows nodes on a Kubernetes cluster in sync. It does this by running a simple script to replace the contents of the `\etc\rancher\wins` directory with the newly specified config and wins image via one or more DaemonSets. Once executed, the script will simply sleep forever.
## How does this work?
A DaemonSet of initContainers copies the provided config (stored in a ConfigMap) into `\etc\rancher\wins\config` and runs `wins cli prc run --path {path-to-wins} --args {up}`, where `.\wins up[grade]` is a Go program that runs a simple Powershell script that forces an upgrade of the binary used by the `rancher-wins` service across all of your Windows hosts.
TLDR: we use wins (cli) to pass wins (upgrade) to wins (server) in order to update wins (server) on the host on demand.
## Cluster / Node Requirements
This Helm chart is intended to be used on a Windows cluster that meets the following two requirements:
- A Windows Service called `rancher-wins` is currently running on each Windows host (e.g. `.\wins srv app run --register; Start-Service -Name rancher-wins` or `.\wins up` has been run on the host) that is running a wins server version of v0.1.0+.
- The wins config used by each Windows host's `rancher-wins` Service has `{{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe` within `whiteList.processPath` so that the new wins version can be delivered onto the host
If the cluster you are installing this chart on is a custom cluster that was created via RKE1 with Windows Support enabled after wins v0.1.0+ was released (i.e. Rancher 2.5.7+), your nodes should already meet the first requirement; this should have been added as part of [the bootstrapping process for adding the Windows node onto your RKE1 cluster](https://github.com/rancher/rancher/blob/master/package/windows/bootstrap.ps1).
If not, please see the README.md for more information on how you can use this chart.

View File

@ -1,4 +1,4 @@
$ErrorActionPreference = 'Stop'
# Sleep forever, since a DaemonSet's restartPolicy must be Always
$ErrorActionPreference = 'Stop'
# Sleep forever, since a DaemonSet's restartPolicy must be Always
while(1) { Start-Sleep -s 3600 }

View File

@ -1,67 +1,67 @@
$ErrorActionPreference = 'Stop'
function Create-Directory
{
param (
[parameter(Mandatory = $false, ValueFromPipeline = $true)] [string]$Path
)
if (Test-Path -Path $Path) {
if (-not (Test-Path -Path $Path -PathType Container)) {
# clean the same path file
Remove-Item -Recurse -Force -Path $Path -ErrorAction Ignore | Out-Null
}
return
}
New-Item -Force -ItemType Directory -Path $Path | Out-Null
}
function Transfer-File
{
param (
[parameter(Mandatory = $true)] [string]$Src,
[parameter(Mandatory = $true)] [string]$Dst
)
if (Test-Path -PathType leaf -Path $Dst) {
$dstHasher = Get-FileHash -Path $Dst
$srcHasher = Get-FileHash -Path $Src
if ($dstHasher.Hash -eq $srcHasher.Hash) {
return
}
}
$null = Copy-Item -Force -Path $Src -Destination $Dst
}
if ($env:WINS_UPGRADE_PATH) {
$winsUpgradePath = $env:WINS_UPGRADE_PATH
} else {
$winsUpgradePath = "c:\etc\rancher\wins\wins-upgrade.exe"
}
$winsUpgradeDir = Split-Path -Path $winsUpgradePath
$winsUpgradeFilename = Split-Path -Path $winsUpgradePath -Leaf
Create-Directory -Path $winsUpgradeDir
Transfer-File -Src "c:\Windows\wins.exe" -Dst $winsUpgradePath
Create-Directory -Path "c:\host\etc\rancher\wins"
Transfer-File -Src $winsUpgradePath -Dst "c:\host\etc\rancher\wins\$winsUpgradeFilename"
Transfer-File -Src "c:\scripts\config" -Dst "c:\host\etc\rancher\wins\config"
$winsOut = wins.exe cli prc run --path=$winsUpgradePath --args="up --wins-args=`'--config=$winsUpgradeDir\config`'"
Write-Host $winsOut
if ($winsOut -match ".* rpc error: code = Unavailable desc = transport is closing") {
Write-Host "Successfully upgraded"
exit 0
} elseif ($LastExitCode -ne 0) {
Write-Host "Returned exit $LastExitCode"
exit $LastExitCode
} else {
Write-Host "Returned exit 0, but did not receive expected output from .\wins up"
exit 1
}
$ErrorActionPreference = 'Stop'
function Create-Directory
{
param (
[parameter(Mandatory = $false, ValueFromPipeline = $true)] [string]$Path
)
if (Test-Path -Path $Path) {
if (-not (Test-Path -Path $Path -PathType Container)) {
# clean the same path file
Remove-Item -Recurse -Force -Path $Path -ErrorAction Ignore | Out-Null
}
return
}
New-Item -Force -ItemType Directory -Path $Path | Out-Null
}
function Transfer-File
{
param (
[parameter(Mandatory = $true)] [string]$Src,
[parameter(Mandatory = $true)] [string]$Dst
)
if (Test-Path -PathType leaf -Path $Dst) {
$dstHasher = Get-FileHash -Path $Dst
$srcHasher = Get-FileHash -Path $Src
if ($dstHasher.Hash -eq $srcHasher.Hash) {
return
}
}
$null = Copy-Item -Force -Path $Src -Destination $Dst
}
if ($env:WINS_UPGRADE_PATH) {
$winsUpgradePath = $env:WINS_UPGRADE_PATH
} else {
$winsUpgradePath = "c:\etc\rancher\wins\wins-upgrade.exe"
}
$winsUpgradeDir = Split-Path -Path $winsUpgradePath
$winsUpgradeFilename = Split-Path -Path $winsUpgradePath -Leaf
Create-Directory -Path $winsUpgradeDir
Transfer-File -Src "c:\Windows\wins.exe" -Dst $winsUpgradePath
Create-Directory -Path "c:\host\etc\rancher\wins"
Transfer-File -Src $winsUpgradePath -Dst "c:\host\etc\rancher\wins\$winsUpgradeFilename"
Transfer-File -Src "c:\scripts\config" -Dst "c:\host\etc\rancher\wins\config"
$winsOut = wins.exe cli prc run --path=$winsUpgradePath --args="up --wins-args=`'--config=$winsUpgradeDir\config`'"
Write-Host $winsOut
if ($winsOut -match ".* rpc error: code = Unavailable desc = transport is closing") {
Write-Host "Successfully upgraded"
exit 0
} elseif ($LastExitCode -ne 0) {
Write-Host "Returned exit $LastExitCode"
exit $LastExitCode
} else {
Write-Host "Returned exit 0, but did not receive expected output from .\wins up"
exit 1
}

View File

@ -1,50 +1,50 @@
# Rancher
{{- define "system_default_registry" -}}
{{- if .Values.global.cattle.systemDefaultRegistry -}}
{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}}
{{- end -}}
{{- end -}}
# General
{{/*
Create a default fully qualified app name.
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
If release name contains chart name it will be used as a full name.
The components in this chart create additional resources that expand the longest created name strings.
The longest name that gets created adds and extra 37 characters, so truncation should be 63-35=26.
*/}}
{{- define "winsUpgrader.name" -}}
wins-upgrader
{{- end -}}
{{- define "winsUpgrader.namespace" -}}
{{- default .Release.Namespace .Values.namespaceOverride -}}
{{- end -}}
{{- define "winsUpgrader.labels" -}}
k8s-app: {{ template "winsUpgrader.name" . }}
release: {{ .Release.Name }}
provider: kubernetes
{{- end -}}
{{- define "winsUpgrader.winsHostPath" -}}
{{ .Values.prefixPath | replace "\\\\" "/" }}etc/rancher/wins
{{- end -}}
{{- define "winsUpgrader.winsMasqueradeHostPath" -}}
{{ required "Must provide name for .Values.masquerade.as if enabled" .Values.masquerade.as | replace "\\\\" "\\" | replace "\\" "/" | dir }}
{{- end -}}
{{- define "winsUpgrader.nodeSelector" -}}
{{- if semverCompare "<1.14-0" .Capabilities.KubeVersion.GitVersion -}}
beta.kubernetes.io/os: windows
{{- else -}}
kubernetes.io/os: windows
{{- end -}}
{{- end -}}
{{- define "winsUpgrader.tolerations" -}}
- operator: Exists
{{- end -}}
# Rancher
{{- define "system_default_registry" -}}
{{- if .Values.global.cattle.systemDefaultRegistry -}}
{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}}
{{- end -}}
{{- end -}}
# General
{{/*
Create a default fully qualified app name.
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
If release name contains chart name it will be used as a full name.
The components in this chart create additional resources that expand the longest created name strings.
The longest name that gets created adds and extra 37 characters, so truncation should be 63-35=26.
*/}}
{{- define "winsUpgrader.name" -}}
wins-upgrader
{{- end -}}
{{- define "winsUpgrader.namespace" -}}
{{- default .Release.Namespace .Values.namespaceOverride -}}
{{- end -}}
{{- define "winsUpgrader.labels" -}}
k8s-app: {{ template "winsUpgrader.name" . }}
release: {{ .Release.Name }}
provider: kubernetes
{{- end -}}
{{- define "winsUpgrader.winsHostPath" -}}
{{ .Values.prefixPath | replace "\\\\" "/" }}etc/rancher/wins
{{- end -}}
{{- define "winsUpgrader.winsMasqueradeHostPath" -}}
{{ required "Must provide name for .Values.masquerade.as if enabled" .Values.masquerade.as | replace "\\\\" "\\" | replace "\\" "/" | dir }}
{{- end -}}
{{- define "winsUpgrader.nodeSelector" -}}
{{- if semverCompare "<1.14-0" .Capabilities.KubeVersion.GitVersion -}}
beta.kubernetes.io/os: windows
{{- else -}}
kubernetes.io/os: windows
{{- end -}}
{{- end -}}
{{- define "winsUpgrader.tolerations" -}}
- operator: Exists
{{- end -}}

View File

@ -1,16 +1,16 @@
{{- range .Values.winsConfigs }}
apiVersion: v1
kind: ConfigMap
metadata:
name: {{ template "winsUpgrader.name" $ }}-{{ .name }}
namespace: {{ template "winsUpgrader.namespace" $ }}
labels: {{ include "winsUpgrader.labels" $ | nindent 4 }}
data:
config: |-
{{ tpl .config $ | indent 4 }}
upgrade.ps1: |-
{{ $.Files.Get "scripts/upgrade.ps1" | indent 4 }}
noop.ps1: |-
{{ $.Files.Get "scripts/noop.ps1" | indent 4 }}
---
{{- end }}
{{- range .Values.winsConfigs }}
apiVersion: v1
kind: ConfigMap
metadata:
name: {{ template "winsUpgrader.name" $ }}-{{ .name }}
namespace: {{ template "winsUpgrader.namespace" $ }}
labels: {{ include "winsUpgrader.labels" $ | nindent 4 }}
data:
config: |-
{{ tpl .config $ | indent 4 }}
upgrade.ps1: |-
{{ $.Files.Get "scripts/upgrade.ps1" | indent 4 }}
noop.ps1: |-
{{ $.Files.Get "scripts/noop.ps1" | indent 4 }}
---
{{- end }}

View File

@ -1,70 +1,70 @@
{{- range .Values.winsConfigs }}
apiVersion: apps/v1
kind: DaemonSet
metadata:
name: {{ template "winsUpgrader.name" $ }}-{{ required "Must provide name for .Values.winsConfigs[].name" .name }}
namespace: {{ template "winsUpgrader.namespace" $ }}
labels: {{ include "winsUpgrader.labels" $ | nindent 4 }}
spec:
selector:
matchLabels: {{ include "winsUpgrader.labels" $ | nindent 6 }}
template:
metadata:
labels: {{ include "winsUpgrader.labels" $ | nindent 8 }}
spec:
nodeSelector: {{ include "winsUpgrader.nodeSelector" $ | nindent 8 }}
{{- if .nodeSelector }}
{{ toYaml .nodeSelector | indent 8 }}
{{- end }}
{{- if .tolerations }}
tolerations: {{ .tolerations | toYaml | nindent 8 }}
{{- else }}
tolerations: {{ include "winsUpgrader.tolerations" $ | nindent 8 }}
{{- end }}
serviceAccountName: {{ template "winsUpgrader.name" $ }}
containers:
- name: noop
image: {{ template "system_default_registry" $ }}{{ required "Must provide name for .Values.winsConfigs[].image.repository" .image.repository }}:{{ required "Must provide name for .Values.winsConfigs[].tag" .image.tag }}
command: ["pwsh", "-f", "c:/scripts/noop.ps1"]
volumeMounts:
- name: upgrade-scripts
mountPath: c:/scripts/
initContainers:
- name: wins-upgrader
image: {{ template "system_default_registry" $ }}{{ .image.repository }}:{{ .image.tag }}
command: ["pwsh", "-f", "c:/scripts/upgrade.ps1"]
volumeMounts:
- name: wins-pipe
mountPath: \\.\pipe\rancher_wins
- name: wins
mountPath: c:/host/etc/rancher/wins
- name: upgrade-scripts
mountPath: c:/scripts/
env:
- name: HELM_REVISION_NUMBER
value: {{ $.Release.Revision | quote }}
{{- if $.Values.masquerade.enabled }}
- name: WINS_UPGRADE_PATH
value: {{ $.Values.masquerade.as }}
{{- end }}
volumes:
- name: wins-pipe
hostPath:
path: \\.\pipe\rancher_wins
- name: wins
hostPath:
{{- if $.Values.masquerade.enabled }}
path: {{ include "winsUpgrader.winsMasqueradeHostPath" $ }}
type: DirectoryOrCreate
{{- else }}
path: {{ include "winsUpgrader.winsHostPath" $ }}
type: DirectoryOrCreate
{{- end }}
- name: upgrade-scripts
configMap:
name: {{ template "winsUpgrader.name" $ }}-{{ .name }}
---
{{- end }}
{{- if not .Values.winsConfigs }}
{{- fail "Cannot install chart unless at least one config is provided in .Values.winsConfigs" }}
{{- range .Values.winsConfigs }}
apiVersion: apps/v1
kind: DaemonSet
metadata:
name: {{ template "winsUpgrader.name" $ }}-{{ required "Must provide name for .Values.winsConfigs[].name" .name }}
namespace: {{ template "winsUpgrader.namespace" $ }}
labels: {{ include "winsUpgrader.labels" $ | nindent 4 }}
spec:
selector:
matchLabels: {{ include "winsUpgrader.labels" $ | nindent 6 }}
template:
metadata:
labels: {{ include "winsUpgrader.labels" $ | nindent 8 }}
spec:
nodeSelector: {{ include "winsUpgrader.nodeSelector" $ | nindent 8 }}
{{- if .nodeSelector }}
{{ toYaml .nodeSelector | indent 8 }}
{{- end }}
{{- if .tolerations }}
tolerations: {{ .tolerations | toYaml | nindent 8 }}
{{- else }}
tolerations: {{ include "winsUpgrader.tolerations" $ | nindent 8 }}
{{- end }}
serviceAccountName: {{ template "winsUpgrader.name" $ }}
containers:
- name: noop
image: {{ template "system_default_registry" $ }}{{ required "Must provide name for .Values.winsConfigs[].image.repository" .image.repository }}:{{ required "Must provide name for .Values.winsConfigs[].tag" .image.tag }}
command: ["pwsh", "-f", "c:/scripts/noop.ps1"]
volumeMounts:
- name: upgrade-scripts
mountPath: c:/scripts/
initContainers:
- name: wins-upgrader
image: {{ template "system_default_registry" $ }}{{ .image.repository }}:{{ .image.tag }}
command: ["pwsh", "-f", "c:/scripts/upgrade.ps1"]
volumeMounts:
- name: wins-pipe
mountPath: \\.\pipe\rancher_wins
- name: wins
mountPath: c:/host/etc/rancher/wins
- name: upgrade-scripts
mountPath: c:/scripts/
env:
- name: HELM_REVISION_NUMBER
value: {{ $.Release.Revision | quote }}
{{- if $.Values.masquerade.enabled }}
- name: WINS_UPGRADE_PATH
value: {{ $.Values.masquerade.as }}
{{- end }}
volumes:
- name: wins-pipe
hostPath:
path: \\.\pipe\rancher_wins
- name: wins
hostPath:
{{- if $.Values.masquerade.enabled }}
path: {{ include "winsUpgrader.winsMasqueradeHostPath" $ }}
type: DirectoryOrCreate
{{- else }}
path: {{ include "winsUpgrader.winsHostPath" $ }}
type: DirectoryOrCreate
{{- end }}
- name: upgrade-scripts
configMap:
name: {{ template "winsUpgrader.name" $ }}-{{ .name }}
---
{{- end }}
{{- if not .Values.winsConfigs }}
{{- fail "Cannot install chart unless at least one config is provided in .Values.winsConfigs" }}
{{- end }}

View File

@ -1,70 +1,70 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: {{ template "winsUpgrader.name" . }}
namespace: {{ template "winsUpgrader.namespace" . }}
labels: {{ include "winsUpgrader.labels" . | nindent 4 }}
rules:
- apiGroups: ['policy']
resources: ['podsecuritypolicies']
verbs: ['use']
resourceNames: [{{ include "winsUpgrader.name" . | quote }}]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: {{ template "winsUpgrader.name" . }}
namespace: {{ template "winsUpgrader.namespace" . }}
labels: {{ include "winsUpgrader.labels" . | nindent 4 }}
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: {{ template "winsUpgrader.name" . }}
subjects:
- kind: ServiceAccount
name: {{ template "winsUpgrader.name" . }}
namespace: {{ template "winsUpgrader.namespace" $ }}
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: {{ template "winsUpgrader.name" . }}
namespace: {{ template "winsUpgrader.namespace" . }}
labels: {{ include "winsUpgrader.labels" . | nindent 4 }}
---
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
name: {{ template "winsUpgrader.name" . }}
namespace: {{ template "winsUpgrader.namespace" . }}
labels: {{ include "winsUpgrader.labels" . | nindent 4 }}
spec:
privileged: false
hostNetwork: false
hostIPC: false
hostPID: false
runAsUser:
rule: 'RunAsAny'
seLinux:
rule: 'RunAsAny'
supplementalGroups:
rule: 'MustRunAs'
ranges:
- min: 0
max: 65535
fsGroup:
rule: 'MustRunAs'
ranges:
- min: 0
max: 65535
readOnlyRootFilesystem: false
volumes:
- 'secret'
- 'hostPath'
allowedHostPaths:
- pathPrefix: \\.\pipe\rancher_wins
{{- if .Values.masquerade.enabled }}
- pathPrefix: {{ include "winsUpgrader.winsMasqueradeHostPath" . }}
{{- else }}
- pathPrefix: {{ include "winsUpgrader.winsHostPath" . }}
{{- end }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: {{ template "winsUpgrader.name" . }}
namespace: {{ template "winsUpgrader.namespace" . }}
labels: {{ include "winsUpgrader.labels" . | nindent 4 }}
rules:
- apiGroups: ['policy']
resources: ['podsecuritypolicies']
verbs: ['use']
resourceNames: [{{ include "winsUpgrader.name" . | quote }}]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: {{ template "winsUpgrader.name" . }}
namespace: {{ template "winsUpgrader.namespace" . }}
labels: {{ include "winsUpgrader.labels" . | nindent 4 }}
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: {{ template "winsUpgrader.name" . }}
subjects:
- kind: ServiceAccount
name: {{ template "winsUpgrader.name" . }}
namespace: {{ template "winsUpgrader.namespace" $ }}
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: {{ template "winsUpgrader.name" . }}
namespace: {{ template "winsUpgrader.namespace" . }}
labels: {{ include "winsUpgrader.labels" . | nindent 4 }}
---
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
name: {{ template "winsUpgrader.name" . }}
namespace: {{ template "winsUpgrader.namespace" . }}
labels: {{ include "winsUpgrader.labels" . | nindent 4 }}
spec:
privileged: false
hostNetwork: false
hostIPC: false
hostPID: false
runAsUser:
rule: 'RunAsAny'
seLinux:
rule: 'RunAsAny'
supplementalGroups:
rule: 'MustRunAs'
ranges:
- min: 0
max: 65535
fsGroup:
rule: 'MustRunAs'
ranges:
- min: 0
max: 65535
readOnlyRootFilesystem: false
volumes:
- 'secret'
- 'hostPath'
allowedHostPaths:
- pathPrefix: \\.\pipe\rancher_wins
{{- if .Values.masquerade.enabled }}
- pathPrefix: {{ include "winsUpgrader.winsMasqueradeHostPath" . }}
{{- else }}
- pathPrefix: {{ include "winsUpgrader.winsHostPath" . }}
{{- end }}

View File

@ -1,62 +1,62 @@
# Default values for rancher-windows-exporter.
# This is a YAML-formatted file.
# Declare variables to be passed into your templates.
# Configuration
global:
cattle:
systemDefaultRegistry: ""
## The path that prefixes all of your wins processPaths, used in the template for each config
##
prefixPath: c:\\
## One or more configurations for the wins server to be applied across all of the nodes based on the nodeSelector and tolerations provided
##
winsConfigs:
- name: default
image:
# TODO(aiyengar2): replace with an image that just contains wins
repository: rancher/wins
tag: v0.1.0
config: |
debug: false
listen: rancher_wins
proxy: rancher_wins_proxy
whiteList:
processPaths:
- {{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe
- {{ .Values.prefixPath }}etc\windows-exporter\windows-exporter.exe
- {{ .Values.prefixPath }}etc\wmi-exporter\wmi-exporter.exe
- {{ .Values.prefixPath }}etc\kubernetes\bin\kube-proxy.exe
- {{ .Values.prefixPath }}etc\kubernetes\bin\kubelet.exe
- {{ .Values.prefixPath }}etc\nginx\nginx.exe
- {{ .Values.prefixPath }}opt\bin\flanneld.exe
proxyPorts:
- 9796
upgrade:
mode: watching
watchingPath: {{ .Values.prefixPath }}etc\rancher\wins\wins.exe
# By default, `kubernetes.io/os: windows` or `beta.kubernetes.io/os: windows` will be included
nodeSelector: {}
# If provided, these tolerations will be used. Otherwise, it defaults to `[ {operator: Exists} ]`
tolerations: []
## Masquerade is *only* meant as a hack to allow users who are currently operating on Windows clusters that do
## not support wins upgrades (e.g. those which have not whitelisted {{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe)
## to be able to masquerade the payload for this installer under another whitelisted process's name.
##
## Please read the README.md before trying to enable this option and, if applied, ensure that you immediately upgrade
## this chart with masquerade.enabled=false to avoid any unintentional consequences (e.g. failure to install the original
## process that you meant to whitelist on the host)
##
## TLDR: Use at your own risk. Here be dragons...
##
masquerade:
enabled: false
# Why wmi_exporter?
# wmi_exporter is the only default whitelisted process that may or may not be run on the host, since
# it is only ever deployed if the Windows cluster is also using Prometheus-based Windows monitoring (e.g. Rancher Monitoring V1)
# All of the other default whitelisted processes are required for the Kubernetes cluster to operate
# Default values for rancher-windows-exporter.
# This is a YAML-formatted file.
# Declare variables to be passed into your templates.
# Configuration
global:
cattle:
systemDefaultRegistry: ""
## The path that prefixes all of your wins processPaths, used in the template for each config
##
prefixPath: c:\\
## One or more configurations for the wins server to be applied across all of the nodes based on the nodeSelector and tolerations provided
##
winsConfigs:
- name: default
image:
repository: rancher/wins
tag: v0.1.0
os: windows
config: |
debug: false
listen: rancher_wins
proxy: rancher_wins_proxy
whiteList:
processPaths:
- {{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe
- {{ .Values.prefixPath }}etc\windows-exporter\windows-exporter.exe
- {{ .Values.prefixPath }}etc\wmi-exporter\wmi-exporter.exe
- {{ .Values.prefixPath }}etc\kubernetes\bin\kube-proxy.exe
- {{ .Values.prefixPath }}etc\kubernetes\bin\kubelet.exe
- {{ .Values.prefixPath }}etc\nginx\nginx.exe
- {{ .Values.prefixPath }}opt\bin\flanneld.exe
proxyPorts:
- 9796
upgrade:
mode: watching
watchingPath: {{ .Values.prefixPath }}etc\rancher\wins\wins.exe
# By default, `kubernetes.io/os: windows` or `beta.kubernetes.io/os: windows` will be included
nodeSelector: {}
# If provided, these tolerations will be used. Otherwise, it defaults to `[ {operator: Exists} ]`
tolerations: []
## Masquerade is *only* meant as a hack to allow users who are currently operating on Windows clusters that do
## not support wins upgrades (e.g. those which have not whitelisted {{ .Values.prefixPath }}etc\rancher\wins\wins-upgrade.exe)
## to be able to masquerade the payload for this installer under another whitelisted process's name.
##
## Please read the README.md before trying to enable this option and, if applied, ensure that you immediately upgrade
## this chart with masquerade.enabled=false to avoid any unintentional consequences (e.g. failure to install the original
## process that you meant to whitelist on the host)
##
## TLDR: Use at your own risk. Here be dragons...
##
masquerade:
enabled: false
# Why wmi_exporter?
# wmi_exporter is the only default whitelisted process that may or may not be run on the host, since
# it is only ever deployed if the Windows cluster is also using Prometheus-based Windows monitoring (e.g. Rancher Monitoring V1)
# All of the other default whitelisted processes are required for the Kubernetes cluster to operate
as: c:\\etc\wmi-exporter\wmi-exporter.exe

View File

@ -12,9 +12,9 @@ entries:
catalog.cattle.io/release-name: fleet
apiVersion: v2
appVersion: 0.3.5
created: "2021-04-23T22:29:53.065772106Z"
created: "2021-04-26T21:09:08.807447037Z"
description: Fleet Manager - GitOps at Scale
digest: 0901c4030d501fc936da001fa83e6f445513003e73080f27258614f816cdc5ca
digest: 032377b1e3eb5db269be4159e69dcd0adeaec4ab33b3a6989c2be3f5adce080a
icon: https://charts.rancher.io/assets/logos/fleet.svg
name: fleet
urls:
@ -124,9 +124,9 @@ entries:
catalog.cattle.io/release-name: fleet-agent
apiVersion: v2
appVersion: 0.3.5
created: "2021-04-23T22:29:53.068234134Z"
created: "2021-04-26T21:09:08.810954774Z"
description: Fleet Manager Agent - GitOps at Scale
digest: ae734792241f7968adecbd68832e5ad6c294a2c51ea2361fb536b828bdbec26f
digest: 6af228ccc1139666883d8499331fc7a015ef2758ab08815fd8919afec82ff120
icon: https://charts.rancher.io/assets/logos/fleet.svg
name: fleet-agent
urls:
@ -221,9 +221,9 @@ entries:
catalog.cattle.io/release-name: fleet-crd
apiVersion: v2
appVersion: 0.3.5
created: "2021-04-23T22:29:53.072748469Z"
created: "2021-04-26T21:09:08.816614732Z"
description: Fleet Manager CustomResourceDefinitions
digest: 39cf036aa7eb60ff8e96c0876c3d0f1a5bae91a0884c2d4c1527a14af844a1d2
digest: 8047046f3b428914c526ffdcbf311d0d6f84382a640460005d88bd7f0c7e01c4
icon: https://charts.rancher.io/assets/logos/fleet.svg
name: fleet-crd
urls:
@ -534,7 +534,7 @@ entries:
catalog.cattle.io/release-name: rancher-alerting-drivers
apiVersion: v2
appVersion: 1.16.0
created: "2021-04-23T22:29:53.079628826Z"
created: "2021-04-26T21:09:08.824955119Z"
dependencies:
- condition: prom2teams.enabled
name: prom2teams
@ -544,7 +544,7 @@ entries:
repository: file://./charts/sachet
description: The manager for third-party webhook receivers used in Prometheus
Alertmanager
digest: d1ba607cb58c3c78323288e7b54a4b7ff3d11275e70ddb728304eb2be29f22c4
digest: 31d71db813b01272013780dfbb71e82ea8135edcf4ef62a7e10bd68fd3f27e9e
keywords:
- monitoring
- alertmanger
@ -566,10 +566,10 @@ entries:
catalog.cattle.io/ui-component: rancher-backup
apiVersion: v2
appVersion: 1.0.4
created: "2021-04-23T22:29:53.082070853Z"
created: "2021-04-26T21:09:08.827803748Z"
description: Provides ability to back up and restore the Rancher application running
on any Kubernetes cluster
digest: 86182359f261d6da5d3a6cab06113a8f57ef6ea6e2645abc950c3975a1f2c77f
digest: 2008163de468553bc31973d96f6184f9a2373e5c3b1bda67a02867a6709e6e45
icon: https://charts.rancher.io/assets/logos/backup-restore.svg
keywords:
- applications
@ -681,9 +681,9 @@ entries:
catalog.cattle.io/release-name: rancher-backup-crd
apiVersion: v2
appVersion: 1.0.4
created: "2021-04-23T22:29:53.083586432Z"
created: "2021-04-26T21:09:08.828804758Z"
description: Installs the CRDs for rancher-backup.
digest: c7e2b2c2846fda431f4bccb49983ca198b017a33c6654d94052935f2017e46d9
digest: e86d39e1f4d347aa2ce136cbd3a57b17c378c1bce176f5acf9e96c6b6572704b
name: rancher-backup-crd
type: application
urls:
@ -757,10 +757,10 @@ entries:
catalog.cattle.io/ui-component: rancher-cis-benchmark
apiVersion: v1
appVersion: v1.0.4
created: "2021-04-23T22:29:53.08796876Z"
created: "2021-04-26T21:09:08.833066303Z"
description: The cis-operator enables running CIS benchmark security scans on
a kubernetes cluster
digest: 33c252f7c74cfb789b2bc0f1ae0458a935358f4a05a5878a650343c5a58e3dbb
digest: 85057d67e0ea90581674768f45cfd3198b9a64a971b6bc2a5d8f3cbd4a02578e
icon: https://charts.rancher.io/assets/logos/cis-kube-bench.svg
keywords:
- security
@ -779,10 +779,10 @@ entries:
catalog.cattle.io/ui-component: rancher-cis-benchmark
apiVersion: v1
appVersion: v1.0.4
created: "2021-04-23T22:29:53.087271824Z"
created: "2021-04-26T21:09:08.831972591Z"
description: The cis-operator enables running CIS benchmark security scans on
a kubernetes cluster
digest: cca9af836b2c8194b4f702dd6d453699efee5072abc03fda0400128e32fc1c4a
digest: bbfe36e02650c172bce5877240fac9b88a53c3802353fbed7a38b9449e0b492f
icon: https://charts.rancher.io/assets/logos/cis-kube-bench.svg
keywords:
- security
@ -884,9 +884,9 @@ entries:
catalog.cattle.io/namespace: cis-operator-system
catalog.cattle.io/release-name: rancher-cis-benchmark-crd
apiVersion: v1
created: "2021-04-23T22:29:53.089196824Z"
created: "2021-04-26T21:09:08.835109224Z"
description: Installs the CRDs for rancher-cis-benchmark.
digest: 9d5aa6021aa70c51b3959fb6ecc246576b8edb4c6b711b834e6bd58b4d3b4d48
digest: d356ce0d0ecd94960db87ef4f8ddf0b5bd187f2b3d4e768eb798c66088249631
name: rancher-cis-benchmark-crd
type: application
urls:
@ -898,9 +898,9 @@ entries:
catalog.cattle.io/namespace: cis-operator-system
catalog.cattle.io/release-name: rancher-cis-benchmark-crd
apiVersion: v1
created: "2021-04-23T22:29:53.088982413Z"
created: "2021-04-26T21:09:08.834351116Z"
description: Installs the CRDs for rancher-cis-benchmark.
digest: f3963b8ed438a93c69fc15a7bbddbbe6118424462848d5a2b1bf3aa0f2e02173
digest: 173464a203a988984c4bdb83f3301267ed6640a872972ef6e6507980c2a105c7
name: rancher-cis-benchmark-crd
type: application
urls:
@ -1059,10 +1059,10 @@ entries:
catalog.cattle.io/ui-component: gatekeeper
apiVersion: v1
appVersion: v3.3.0
created: "2021-04-23T22:29:53.095128532Z"
created: "2021-04-26T21:09:08.841617391Z"
description: Modifies Open Policy Agent's upstream gatekeeper chart that provides
policy-based control for cloud native environments
digest: 8dfa9a4cf69981095487027ce4ce96cab989bdb5aab1a65f66d36e4814a0ee6e
digest: 3fa906b9e53b1813a33125a1e9886edca374d843e156bcc54843bd10a91f971c
home: https://github.com/open-policy-agent/gatekeeper
icon: https://charts.rancher.io/assets/logos/gatekeeper.svg
keywords:
@ -1185,9 +1185,9 @@ entries:
catalog.cattle.io/namespace: cattle-gatekeeper-system
catalog.cattle.io/release-name: rancher-gatekeeper-crd
apiVersion: v1
created: "2021-04-23T22:29:53.098151789Z"
created: "2021-04-26T21:09:08.843039106Z"
description: Installs the CRDs for rancher-gatekeeper.
digest: 26b354c0f0c3f305fcc55c4acdcb0f7277750c23e2b4f97a795f0b217b867eed
digest: af2c9d417e05803e14d83b54f681bd8daa27882637a8f119651492d8e7a0c2f0
name: rancher-gatekeeper-crd
type: application
urls:
@ -1261,9 +1261,9 @@ entries:
catalog.rancher.io/release-name: rancher-grafana
apiVersion: v2
appVersion: 7.4.5
created: "2021-04-23T22:29:53.101641171Z"
created: "2021-04-26T21:09:08.845116827Z"
description: The leading tool for querying and visualizing time series and metrics.
digest: 06f1b778b04d1c4e1296a8ba59c9cd70b90ec38d1da46e01d9300f0dc95030cf
digest: 426227064a81cd67f14b5721d6ddb10368893292301a010858ecdde83f14b1ca
home: https://grafana.net
icon: https://raw.githubusercontent.com/grafana/grafana/master/public/img/logo_transparent_400x.png
kubeVersion: ^1.8.0-0
@ -1299,7 +1299,7 @@ entries:
catalog.cattle.io/ui-component: istio
apiVersion: v1
appVersion: 1.9.3
created: "2021-04-23T22:29:53.120774965Z"
created: "2021-04-26T21:09:08.866105045Z"
dependencies:
- condition: kiali.enabled
name: kiali
@ -1309,7 +1309,7 @@ entries:
repository: file://./charts/tracing
description: A basic Istio setup that installs with the istioctl. Refer to https://istio.io/latest/
for details.
digest: 6b4c63474cdc4a42c2258e2b47f4b7caeb25583adb69f40ae26ae75c5bcd9d7e
digest: 2e39d7cb14812695b03ce1940672ebe4866f1e1ba53c6b2a00d13ac686323de9
icon: https://charts.rancher.io/assets/logos/istio.svg
keywords:
- networking
@ -1331,7 +1331,7 @@ entries:
catalog.cattle.io/ui-component: istio
apiVersion: v1
appVersion: 1.9.2
created: "2021-04-23T22:29:53.118678156Z"
created: "2021-04-26T21:09:08.862429107Z"
dependencies:
- condition: kiali.enabled
name: kiali
@ -1341,7 +1341,7 @@ entries:
repository: file://./charts/tracing
description: A basic Istio setup that installs with the istioctl. Refer to https://istio.io/latest/
for details.
digest: 9e28d6789ce413af9890062952857bdc7070249eefef622c55221ec952cc505b
digest: 92ff097bf8bfef928ae44317bbd7be7c917ccd04cbd8713d6ca33be73140055f
icon: https://charts.rancher.io/assets/logos/istio.svg
keywords:
- networking
@ -1363,7 +1363,7 @@ entries:
catalog.cattle.io/ui-component: istio
apiVersion: v1
appVersion: 1.8.5
created: "2021-04-23T22:29:53.116185227Z"
created: "2021-04-26T21:09:08.860318385Z"
dependencies:
- condition: kiali.enabled
name: kiali
@ -1373,7 +1373,7 @@ entries:
repository: file://./charts/tracing
description: A basic Istio setup that installs with the istioctl. Refer to https://istio.io/latest/
for details.
digest: 3a79bded2fbd0fc107006d06a6fba4e067c9e8b1d079a45ca7e35b0d3d065dee
digest: 8f7b73095bee971444b2a3fba4556658cbc69a88f09dd14ae611c0a187ab230f
icon: https://charts.rancher.io/assets/logos/istio.svg
keywords:
- networking
@ -1395,7 +1395,7 @@ entries:
catalog.cattle.io/ui-component: istio
apiVersion: v1
appVersion: 1.8.4
created: "2021-04-23T22:29:53.113783302Z"
created: "2021-04-26T21:09:08.858047461Z"
dependencies:
- condition: kiali.enabled
name: kiali
@ -1405,7 +1405,7 @@ entries:
repository: file://./charts/tracing
description: A basic Istio setup that installs with the istioctl. Refer to https://istio.io/latest/
for details.
digest: 740ffdb2e317e8943febaecfc92e4088aa6903abbffd02da86760342404cc164
digest: 7f3cd5cab0e07507ffaefd91c3ddfefc13a2e2674eb9b49b76057b54168b1797
icon: https://charts.rancher.io/assets/logos/istio.svg
keywords:
- networking
@ -1427,7 +1427,7 @@ entries:
catalog.cattle.io/ui-component: istio
apiVersion: v1
appVersion: 1.8.3
created: "2021-04-23T22:29:53.111085262Z"
created: "2021-04-26T21:09:08.855930039Z"
dependencies:
- condition: kiali.enabled
name: kiali
@ -1437,7 +1437,7 @@ entries:
repository: file://./charts/tracing
description: A basic Istio setup that installs with the istioctl. Refer to https://istio.io/latest/
for details.
digest: b854ecd7610f74792ec844ac86c8c76f79b8145dcbba359a4224aed82f1409ed
digest: b0c74a7283dbff6f4a2c4dc475b953e26fa65697087c12466dc488e9c30d731a
icon: https://charts.rancher.io/assets/logos/istio.svg
keywords:
- networking
@ -1581,11 +1581,11 @@ entries:
catalog.rancher.io/release-name: rancher-kiali-server
apiVersion: v2
appVersion: v1.32.0
created: "2021-04-23T22:29:53.12625105Z"
created: "2021-04-26T21:09:08.871644202Z"
description: Kiali is an open source project for service mesh observability, refer
to https://www.kiali.io for details. This is installed as sub-chart with customized
values in Rancher's Istio.
digest: 647b0013646599c90f1283f092ad9103441aea3dd4146b03c952ec329f84fa14
digest: 61a2b9ab2de7620b0caee47ee86181180ed6f5e26f90477913eaa76318ce8cc7
home: https://github.com/kiali/kiali
icon: https://raw.githubusercontent.com/kiali/kiali.io/master/themes/kiali/static/img/kiali_logo_masthead.png
keywords:
@ -1616,11 +1616,11 @@ entries:
catalog.rancher.io/release-name: rancher-kiali-server
apiVersion: v2
appVersion: v1.29.0
created: "2021-04-23T22:29:53.125269499Z"
created: "2021-04-26T21:09:08.870693292Z"
description: Kiali is an open source project for service mesh observability, refer
to https://www.kiali.io for details. This is installed as sub-chart with customized
values in Rancher's Istio.
digest: b2b4393b39a5a57b1201c83f7d3f6a736e654f839a85e494ff90fcbc741f0c19
digest: 5e17227b58d3c63adeb44e37ab674c4e98e3940ded80cdc2f4851fb49d252311
home: https://github.com/kiali/kiali
icon: https://raw.githubusercontent.com/kiali/kiali.io/master/themes/kiali/static/img/kiali_logo_masthead.png
keywords:
@ -1785,9 +1785,9 @@ entries:
- annotations:
catalog.cattle.io/hidden: "true"
apiVersion: v2
created: "2021-04-23T22:29:53.127527616Z"
created: "2021-04-26T21:09:08.87239861Z"
description: Installs the CRDs for rancher-kiali-server.
digest: cc3ebffbe46f961e561aaeb66697a8d1ff80a1915f2027592666e1282904fc44
digest: ebe42b28026ba8656ccbbeb9cc16093d7f8d8ac0cfe8d4d754fe5616269b33da
name: rancher-kiali-server-crd
type: application
urls:
@ -1796,9 +1796,9 @@ entries:
- annotations:
catalog.cattle.io/hidden: "true"
apiVersion: v2
created: "2021-04-23T22:29:53.127237601Z"
created: "2021-04-26T21:09:08.872282809Z"
description: Installs the CRDs for rancher-kiali-server.
digest: 0859eb062b26a52debb0380ebf3f9583b422313e80ec9ed10eaedb6e63ff43d5
digest: 56668663db5b384916204897a02862bc1287e80ecf5a08343bf0a1b202427720
name: rancher-kiali-server-crd
type: application
urls:
@ -1857,9 +1857,9 @@ entries:
catalog.rancher.io/release-name: rancher-kube-state-metrics
apiVersion: v1
appVersion: 1.9.8
created: "2021-04-23T22:29:53.129008493Z"
created: "2021-04-26T21:09:08.87333832Z"
description: Install kube-state-metrics to generate and expose cluster-level metrics
digest: a21588f3f38199b24460c74c6c5b4348e47e1c3e58c6e6dacb22fce3932ae0cb
digest: fc0ffec21630dda60fbce68c618cd2a6fa1ac7fd751e5b446330e74a1b59beeb
home: https://github.com/kubernetes/kube-state-metrics/
keywords:
- metric
@ -1888,10 +1888,10 @@ entries:
catalog.cattle.io/ui-component: logging
apiVersion: v1
appVersion: 3.9.4
created: "2021-04-23T22:29:53.135382025Z"
created: "2021-04-26T21:09:08.881356703Z"
description: Collects and filter logs using highly configurable CRDs. Powered
by Banzai Cloud Logging Operator.
digest: 2b18db3a548ad8609b1c24b34268311428b92ae5d8af5bbb1071ac976926b80e
digest: e0b45df1760f114d3450f76ed23ea41c9ad73aa12df212a538bdfb0e26559283
icon: https://charts.rancher.io/assets/logos/logging.svg
keywords:
- logging
@ -1912,10 +1912,10 @@ entries:
catalog.cattle.io/ui-component: logging
apiVersion: v1
appVersion: 3.9.0
created: "2021-04-23T22:29:53.134367172Z"
created: "2021-04-26T21:09:08.880291892Z"
description: Collects and filter logs using highly configurable CRDs. Powered
by Banzai Cloud Logging Operator.
digest: b8e55207ee02929435690cf3ca947d268c1f3d22b494549e12acec244cc620b4
digest: e8df39243078513b13820974bf65449a77200f70e6b7c0a717fd420170dc0949
icon: https://charts.rancher.io/assets/logos/logging.svg
keywords:
- logging
@ -1936,10 +1936,10 @@ entries:
catalog.cattle.io/ui-component: logging
apiVersion: v1
appVersion: 3.9.0
created: "2021-04-23T22:29:53.133502427Z"
created: "2021-04-26T21:09:08.878757076Z"
description: Collects and filter logs using highly configurable CRDs. Powered
by Banzai Cloud Logging Operator.
digest: 5e2fa52f5220e99d5370dfc9b91ad026661a4601c4b615b2e2f5d1f2d90f90a6
digest: 6958738a77314c9cfa1315bed8a214a6ad09e7255a978e06824b46755725348c
icon: https://charts.rancher.io/assets/logos/logging.svg
keywords:
- logging
@ -2051,9 +2051,9 @@ entries:
catalog.cattle.io/namespace: cattle-logging-system
catalog.cattle.io/release-name: rancher-logging-crd
apiVersion: v1
created: "2021-04-23T22:29:53.146496703Z"
created: "2021-04-26T21:09:08.891214605Z"
description: Installs the CRDs for rancher-logging.
digest: e77e429b9b1e195faa51e6eaff68143711338b2cfdd43f2e833b061456edf368
digest: 612916bf1ed503fb3a737a1e60307c6875a7595b6cee41b00ba390a49e5e30ba
name: rancher-logging-crd
type: application
urls:
@ -2065,9 +2065,9 @@ entries:
catalog.cattle.io/namespace: cattle-logging-system
catalog.cattle.io/release-name: rancher-logging-crd
apiVersion: v1
created: "2021-04-23T22:29:53.14489992Z"
created: "2021-04-26T21:09:08.889264885Z"
description: Installs the CRDs for rancher-logging.
digest: fec51fb34426c9bf5d17bc93c1bfcaa193eec57697f1219a20f4710cf6e47774
digest: acbafc3d11f54902dace3f4596af31742cca89e4536d649ec499f00f433d6881
name: rancher-logging-crd
type: application
urls:
@ -2079,9 +2079,9 @@ entries:
catalog.cattle.io/namespace: cattle-logging-system
catalog.cattle.io/release-name: rancher-logging-crd
apiVersion: v1
created: "2021-04-23T22:29:53.143631454Z"
created: "2021-04-26T21:09:08.888069572Z"
description: Installs the CRDs for rancher-logging.
digest: dc126123aae1a927000b186c8f4debafc256a14300ea167888664b6fdbfa7e67
digest: c21a63b7a7ad86362d07835a4f1db934a725ceae42928bb81de4398e420e7474
name: rancher-logging-crd
type: application
urls:
@ -2162,7 +2162,7 @@ entries:
catalog.cattle.io/ui-component: monitoring
apiVersion: v2
appVersion: 0.46.0
created: "2021-04-23T22:29:53.170460548Z"
created: "2021-04-26T21:09:08.91679077Z"
dependencies:
- condition: grafana.enabled
name: grafana
@ -2221,7 +2221,7 @@ entries:
description: Collects several related Helm charts, Grafana dashboards, and Prometheus
rules combined with documentation and scripts to provide easy to operate end-to-end
Kubernetes cluster monitoring with Prometheus using the Prometheus Operator.
digest: 98d099e8773ee312bc5e645db08a2b846c0d6a164335f6a28875cea6bedc0371
digest: fbcf79db1332920f09034f2a8dac5d4f9317f4e70fc137ad29bcee3a40e0520b
home: https://github.com/prometheus-operator/kube-prometheus
icon: https://raw.githubusercontent.com/prometheus/prometheus.github.io/master/assets/prometheus_logo-cb55bb5c346.png
keywords:
@ -2269,7 +2269,7 @@ entries:
catalog.cattle.io/ui-component: monitoring
apiVersion: v1
appVersion: 0.38.1
created: "2021-04-23T22:29:53.264899058Z"
created: "2021-04-26T21:09:09.014966886Z"
dependencies:
- condition: grafana.enabled
name: grafana
@ -2328,7 +2328,7 @@ entries:
description: Collects several related Helm charts, Grafana dashboards, and Prometheus
rules combined with documentation and scripts to provide easy to operate end-to-end
Kubernetes cluster monitoring with Prometheus using the Prometheus Operator.
digest: 0ca3cfc978539f83aa36dd2cbc4c2bec95e956c0795f46b07ea405cf61866d2f
digest: 8eaa786ec3d1243f1ab3b35904a0a5595babf1ab36299cfb3ec5f1619be1856b
home: https://github.com/prometheus-operator/kube-prometheus
icon: https://raw.githubusercontent.com/prometheus/prometheus.github.io/master/assets/prometheus_logo-cb55bb5c346.png
keywords:
@ -2862,9 +2862,9 @@ entries:
catalog.cattle.io/namespace: cattle-monitoring-system
catalog.cattle.io/release-name: rancher-monitoring-crd
apiVersion: v1
created: "2021-04-23T22:29:53.268940268Z"
created: "2021-04-26T21:09:09.019726636Z"
description: Installs the CRDs for rancher-monitoring.
digest: 190246be621f9df5fe71db60ea87867014b54f342f60e3fe1d72e9c560f494a6
digest: 68fba729b2d8066a761eaec0bc2db04ea3dbd3dc8ede9859804385b1faa0bfcd
name: rancher-monitoring-crd
type: application
urls:
@ -2876,9 +2876,9 @@ entries:
catalog.cattle.io/namespace: cattle-monitoring-system
catalog.cattle.io/release-name: rancher-monitoring-crd
apiVersion: v1
created: "2021-04-23T22:29:53.291493541Z"
created: "2021-04-26T21:09:09.041747364Z"
description: Installs the CRDs for rancher-monitoring.
digest: 8936b06a5cdbbc0a69961611602189d2756159bea1437014253472b4c8007378
digest: df05c941a342ce1424c45f5b965989307cf5c3ea361a9a57b578eecf42e975b7
name: rancher-monitoring-crd
type: application
urls:
@ -2949,9 +2949,9 @@ entries:
catalog.rancher.io/release-name: rancher-node-exporter
apiVersion: v1
appVersion: 1.1.2
created: "2021-04-23T22:29:53.292230379Z"
created: "2021-04-26T21:09:09.042507272Z"
description: A Helm chart for prometheus node-exporter
digest: f1c61d0e3c486ca5fe487e89360ac21cb57c707d026175bf459c439315a3e89c
digest: 83e6effdd107b4c9cf5b1434d7e30a80c83f1a45b6b7a84729119ffde777b941
home: https://github.com/prometheus/node_exporter/
keywords:
- node-exporter
@ -2980,9 +2980,9 @@ entries:
catalog.cattle.io/release-name: rancher-operator
apiVersion: v2
appVersion: 0.1.4
created: "2021-04-23T22:29:53.293349737Z"
created: "2021-04-26T21:09:09.043721984Z"
description: Control Rancher using GitOps
digest: 4bce3fd45f9409834b2aab09d03636682d934461e02f3326629a74c93d2d0477
digest: 93109a8e18809b5889261e5590977b8aaae5e066a6c85002dd95225341bce871
name: rancher-operator
urls:
- assets/rancher-operator/rancher-operator-0.1.400.tgz
@ -3068,9 +3068,9 @@ entries:
catalog.cattle.io/release-name: rancher-operator-crd
apiVersion: v2
appVersion: 0.1.4
created: "2021-04-23T22:29:53.29589907Z"
created: "2021-04-26T21:09:09.045733205Z"
description: Rancher Operator CustomResourceDefinitions
digest: 78bc6f31b6a154ad71f0cd9d643431237d6dc96cad3db78863f3a61d1eb48865
digest: 35dda4b2b06a63ff88bbc79eeac007c6dfb6b4bac69ba280ff87584df589ab15
name: rancher-operator-crd
urls:
- assets/rancher-operator-crd/rancher-operator-crd-0.1.400.tgz
@ -3141,9 +3141,9 @@ entries:
catalog.cattle.io/release-name: rancher-prom2teams
apiVersion: v1
appVersion: 3.2.1
created: "2021-04-23T22:29:53.296760315Z"
created: "2021-04-26T21:09:09.04616931Z"
description: A Helm chart for Prom2Teams based on the upstream https://github.com/idealista/prom2teams
digest: 13fc293f16596c12726d8da19cad9d1e347a2342001e9d0543c3a92c9acc0295
digest: d076efa3e5d6fb2bc88d935265ff22b565f10c233d7767f5225038dbbfdf0235
name: rancher-prom2teams
urls:
- assets/rancher-prom2teams/rancher-prom2teams-0.2.000.tgz
@ -3157,9 +3157,9 @@ entries:
catalog.rancher.io/release-name: rancher-prometheus-adapter
apiVersion: v1
appVersion: v0.8.3
created: "2021-04-23T22:29:53.297647761Z"
created: "2021-04-26T21:09:09.046959818Z"
description: A Helm chart for k8s prometheus adapter
digest: 0d2b67953e02149217390040cf62010d39ce9569232a318564f68374c108cf62
digest: 543ab69f8d58de6c3625db835ff21f0d24d35919b08cba9de7f817b3a530b6af
home: https://github.com/DirectXMan12/k8s-prometheus-adapter
keywords:
- hpa
@ -3188,10 +3188,10 @@ entries:
catalog.rancher.io/release-name: rancher-pushprox
apiVersion: v1
appVersion: 0.1.0
created: "2021-04-23T22:29:53.300963133Z"
created: "2021-04-26T21:09:09.050012449Z"
description: Sets up a deployment of the PushProx proxy and a DaemonSet of PushProx
clients.
digest: 9e988fdb7244447762a9a89881b72359ab3c31383d46c26323634e6d966b1f48
digest: 3e42eb412c83b3822c3f0c52e68d65a5fe82d61279902231a8f9ade9c8e5d6be
name: rancher-pushprox
type: application
urls:
@ -3271,9 +3271,9 @@ entries:
catalog.cattle.io/release-name: rancher-sachet
apiVersion: v2
appVersion: 0.2.3
created: "2021-04-23T22:29:53.301457059Z"
created: "2021-04-26T21:09:09.050416054Z"
description: A Helm chart for Sachet based on the upstream https://github.com/messagebird/sachet
digest: 367523674af71285bc29aa32fa0218a48ffdb0ca54ead1aae2497b38536a5bb1
digest: 3b26cbf371989b052fbc85c30ad1ce049b53fcc134859329311385ded308f592
name: rancher-sachet
type: application
urls:
@ -3288,11 +3288,11 @@ entries:
catalog.rancher.io/release-name: rancher-tracing
apiVersion: v1
appVersion: 1.20.0
created: "2021-04-23T22:29:53.302692923Z"
created: "2021-04-26T21:09:09.052119571Z"
description: A quick start Jaeger Tracing installation using the all-in-one demo.
This is not production qualified. Refer to https://www.jaegertracing.io/ for
details.
digest: 95c78776b1bd279af3754d292e275db8c549acc03f99b3020b79893271e36bc4
digest: fe3fcda4c85d8a2f8e833a7c6c1b8617639b5c45720baf643ecf146c46ee7de5
name: rancher-tracing
urls:
- assets/rancher-tracing/rancher-tracing-1.20.100.tgz
@ -3388,9 +3388,9 @@ entries:
catalog.cattle.io/release-name: rancher-webhook
apiVersion: v2
appVersion: 0.1.0
created: "2021-04-23T22:29:53.304975542Z"
created: "2021-04-26T21:09:09.055460106Z"
description: ValidatingAdmissionWebhook for Rancher types
digest: a59f0cc0490380469d39272a8ac5451e814d009013227659124c4daa977ecefc
digest: 5d3591cc3a6921b7b4f31dfbc7beaac8e2e871f67698e0e8556a3fe0a9b0f9a5
name: rancher-webhook
urls:
- assets/rancher-webhook/rancher-webhook-0.1.000.tgz
@ -3464,9 +3464,9 @@ entries:
catalog.rancher.io/release-name: rancher-windows-exporter
apiVersion: v1
appVersion: 0.0.4
created: "2021-04-23T22:29:53.305415965Z"
created: "2021-04-26T21:09:09.055991811Z"
description: Sets up monitoring metrics from Windows nodes via Prometheus windows-exporter
digest: 442f58b81bcd9bb384fd9e33722dd42cafe0973eb6d3655dd0634ee6fb469b84
digest: b0bcbb1c7a7b09f275b8c54ece4325d999a84476a8cc7d46d285fad9f0a65b75
maintainers:
- email: arvind.iyengar@rancher.com
name: aiyengar2
@ -3483,10 +3483,10 @@ entries:
catalog.cattle.io/release-name: rancher-wins-upgrader
apiVersion: v2
appVersion: 0.1.0
created: "2021-04-23T22:29:53.305886089Z"
created: "2021-04-26T21:09:09.056472016Z"
description: Manages upgrading the wins server version and configuration across
all of your Windows nodes
digest: feb7e51297cfd2928b3ef49c2627c4896ff46405911d98eab7c1fef027890891
digest: 829216aac0ef63383feda7cd964bb3d5abfbd57898bed54cacbbe787b493fbed
maintainers:
- email: arvind.iyengar@suse.com
name: aiyengar2