Charts CI
``` Updated: argo/argo-cd: - 6.9.1 cockroach-labs/cockroachdb: - 12.0.5 linkerd/linkerd-control-plane: - 2024.5.2 linkerd/linkerd-crds: - 2024.5.2 pixie/pixie-operator-chart: - 0.1.6 stackstate/stackstate-k8s-agent: - 1.0.82 ```pull/1019/head
parent
0332340e0f
commit
1b21568cf7
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
@ -1,7 +1,11 @@
|
|||
annotations:
|
||||
artifacthub.io/changes: |
|
||||
- kind: changed
|
||||
description: Always install applicationset crd
|
||||
- kind: fixed
|
||||
description: Service option externalIPs is available for all service types
|
||||
- kind: fixed
|
||||
description: Service option externalTrafficPolicy is available only for Service types LoadBalancer and NodePort
|
||||
- kind: fixed
|
||||
description: Load balancer options are available only for Service type LoadBalancer
|
||||
artifacthub.io/signKey: |
|
||||
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
|
||||
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
|
||||
|
@ -33,4 +37,4 @@ name: argo-cd
|
|||
sources:
|
||||
- https://github.com/argoproj/argo-helm/tree/main/charts/argo-cd
|
||||
- https://github.com/argoproj/argo-cd
|
||||
version: 6.8.1
|
||||
version: 6.9.1
|
||||
|
|
|
@ -278,6 +278,9 @@ For full list of changes please check ArtifactHub [changelog].
|
|||
|
||||
Highlighted versions provide information about additional steps that should be performed by user when upgrading to newer version.
|
||||
|
||||
### 6.9.0
|
||||
ApplicationSet controller is always created to follow [upstream's manifest](https://github.com/argoproj/argo-cd/blob/v2.11.0/manifests/core-install/kustomization.yaml#L9).
|
||||
|
||||
### 6.4.0
|
||||
|
||||
Added support for application controller dynamic cluster distribution.
|
||||
|
@ -1041,7 +1044,7 @@ NAME: my-release
|
|||
| server.route.termination_type | string | `"passthrough"` | Termination type of Openshift Route |
|
||||
| server.service.annotations | object | `{}` | Server service annotations |
|
||||
| server.service.externalIPs | list | `[]` | Server service external IPs |
|
||||
| server.service.externalTrafficPolicy | string | `""` | Denotes if this Service desires to route external traffic to node-local or cluster-wide endpoints |
|
||||
| server.service.externalTrafficPolicy | string | `"Cluster"` | Denotes if this Service desires to route external traffic to node-local or cluster-wide endpoints |
|
||||
| server.service.labels | object | `{}` | Server service labels |
|
||||
| server.service.loadBalancerIP | string | `""` | LoadBalancer will get created with the IP specified in this field |
|
||||
| server.service.loadBalancerSourceRanges | list | `[]` | Source IP ranges to allow access to service from |
|
||||
|
@ -1050,8 +1053,9 @@ NAME: my-release
|
|||
| server.service.servicePortHttp | int | `80` | Server service http port |
|
||||
| server.service.servicePortHttpName | string | `"http"` | Server service http port name, can be used to route traffic via istio |
|
||||
| server.service.servicePortHttps | int | `443` | Server service https port |
|
||||
| server.service.servicePortHttpsAppProtocol | string | `""` | Server service https port appProtocol |
|
||||
| server.service.servicePortHttpsName | string | `"https"` | Server service https port name, can be used to route traffic via istio |
|
||||
| server.service.sessionAffinity | string | `""` | Used to maintain session affinity. Supports `ClientIP` and `None` |
|
||||
| server.service.sessionAffinity | string | `"None"` | Used to maintain session affinity. Supports `ClientIP` and `None` |
|
||||
| server.service.type | string | `"ClusterIP"` | Server service type |
|
||||
| server.serviceAccount.annotations | object | `{}` | Annotations applied to created service account |
|
||||
| server.serviceAccount.automountServiceAccountToken | bool | `true` | Automount API credentials for the Service Account |
|
||||
|
@ -1341,7 +1345,6 @@ If you want to use an existing Redis (eg. a managed service from a cloud provide
|
|||
| applicationSet.dnsConfig | object | `{}` | [DNS configuration] |
|
||||
| applicationSet.dnsPolicy | string | `"ClusterFirst"` | Alternative DNS policy for ApplicationSet controller pods |
|
||||
| applicationSet.emptyDir.sizeLimit | string | `""` (defaults not set if not specified i.e. no size limit) | EmptyDir size limit for applicationSet controller |
|
||||
| applicationSet.enabled | bool | `true` | Enable ApplicationSet controller |
|
||||
| applicationSet.extraArgs | list | `[]` | ApplicationSet controller command line flags |
|
||||
| applicationSet.extraContainers | list | `[]` | Additional containers to be added to the ApplicationSet controller pod |
|
||||
| applicationSet.extraEnv | list | `[]` | Environment variables to pass to the ApplicationSet controller |
|
||||
|
|
|
@ -196,6 +196,7 @@ NOTE: Configuration keys must be stored as dict because YAML treats dot as separ
|
|||
{{- $_ := set $presets "repo.server" (printf "%s:%s" (include "argo-cd.repoServer.fullname" .) (.Values.repoServer.service.port | toString)) -}}
|
||||
{{- $_ := set $presets "server.repo.server.strict.tls" (.Values.repoServer.certificateSecret.enabled | toString ) -}}
|
||||
{{- $_ := set $presets "redis.server" (include "argo-cd.redis.server" .) -}}
|
||||
{{- $_ := set $presets "applicationsetcontroller.enable.leader.election" (gt ((.Values.applicationSet.replicas | default .Values.applicationSet.replicaCount) | int64) 1) -}}
|
||||
{{- if .Values.dex.enabled -}}
|
||||
{{- $_ := set $presets "server.dex.server" (include "argo-cd.dex.server" .) -}}
|
||||
{{- $_ := set $presets "server.dex.server.strict.tls" .Values.dex.certificateSecret.enabled -}}
|
||||
|
@ -204,9 +205,6 @@ NOTE: Configuration keys must be stored as dict because YAML treats dot as separ
|
|||
{{- $_ := set $presets (printf "%s.log.format" $component) $.Values.global.logging.format -}}
|
||||
{{- $_ := set $presets (printf "%s.log.level" $component) $.Values.global.logging.level -}}
|
||||
{{- end -}}
|
||||
{{- if .Values.applicationSet.enabled -}}
|
||||
{{- $_ := set $presets "applicationsetcontroller.enable.leader.election" (gt ((.Values.applicationSet.replicas | default .Values.applicationSet.replicaCount) | int64) 1) -}}
|
||||
{{- end -}}
|
||||
{{- toYaml $presets }}
|
||||
{{- end -}}
|
||||
|
||||
|
|
|
@ -11,9 +11,7 @@ rules:
|
|||
- argoproj.io
|
||||
resources:
|
||||
- applications
|
||||
{{- if .Values.applicationSet.enabled }}
|
||||
- applicationsets
|
||||
{{- end }}
|
||||
- appprojects
|
||||
verbs:
|
||||
- get
|
||||
|
@ -33,9 +31,7 @@ rules:
|
|||
- argoproj.io
|
||||
resources:
|
||||
- applications
|
||||
{{- if .Values.applicationSet.enabled }}
|
||||
- applicationsets
|
||||
{{- end }}
|
||||
- appprojects
|
||||
verbs:
|
||||
- create
|
||||
|
@ -60,9 +56,7 @@ rules:
|
|||
- argoproj.io
|
||||
resources:
|
||||
- applications
|
||||
{{- if .Values.applicationSet.enabled }}
|
||||
- applicationsets
|
||||
{{- end }}
|
||||
- appprojects
|
||||
verbs:
|
||||
- create
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
{{- if .Values.applicationSet.enabled }}
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
|
@ -332,4 +331,3 @@ spec:
|
|||
{{- toYaml . | nindent 8 }}
|
||||
{{- end }}
|
||||
dnsPolicy: {{ .Values.applicationSet.dnsPolicy }}
|
||||
{{- end }}
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{{- if and .Values.applicationSet.enabled .Values.applicationSet.ingress.enabled -}}
|
||||
{{- if .Values.applicationSet.ingress.enabled -}}
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{{- if and .Values.applicationSet.enabled .Values.applicationSet.metrics.enabled }}
|
||||
{{- if .Values.applicationSet.metrics.enabled }}
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{{- if and .Values.applicationSet.enabled .Values.global.networkPolicy.create (or .Values.applicationSet.metrics.enabled .Values.applicationSet.ingress.enabled) }}
|
||||
{{- if and .Values.global.networkPolicy.create (or .Values.applicationSet.metrics.enabled .Values.applicationSet.ingress.enabled) }}
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: NetworkPolicy
|
||||
metadata:
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{{- if and .Values.applicationSet.enabled .Values.applicationSet.pdb.enabled }}
|
||||
{{- if .Values.applicationSet.pdb.enabled }}
|
||||
apiVersion: policy/v1
|
||||
kind: PodDisruptionBudget
|
||||
metadata:
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
{{- if .Values.applicationSet.enabled }}
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: Role
|
||||
metadata:
|
||||
|
@ -86,4 +85,3 @@ rules:
|
|||
- patch
|
||||
- update
|
||||
- watch
|
||||
{{- end }}
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
{{- if .Values.applicationSet.enabled }}
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
|
@ -14,4 +13,3 @@ subjects:
|
|||
- kind: ServiceAccount
|
||||
name: {{ include "argo-cd.applicationSet.serviceAccountName" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
{{- end }}
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
{{- if .Values.applicationSet.enabled }}
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
|
@ -23,4 +22,3 @@ spec:
|
|||
targetPort: webhook
|
||||
selector:
|
||||
{{- include "argo-cd.selectorLabels" (dict "context" . "name" .Values.applicationSet.name) | nindent 4 }}
|
||||
{{- end }}
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{{- if and .Values.applicationSet.enabled .Values.applicationSet.serviceAccount.create }}
|
||||
{{- if .Values.applicationSet.serviceAccount.create }}
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
automountServiceAccountToken: {{ .Values.applicationSet.serviceAccount.automountServiceAccountToken }}
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
{{- if .Values.applicationSet.enabled }}
|
||||
{{- if and (.Capabilities.APIVersions.Has "monitoring.coreos.com/v1") .Values.applicationSet.metrics.enabled .Values.applicationSet.metrics.serviceMonitor.enabled }}
|
||||
apiVersion: monitoring.coreos.com/v1
|
||||
kind: ServiceMonitor
|
||||
|
@ -49,4 +48,3 @@ spec:
|
|||
matchLabels:
|
||||
{{- include "argo-cd.selectorLabels" (dict "context" . "component" .Values.applicationSet.name "name" "metrics") | nindent 6 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
|
|
@ -20,11 +20,9 @@ spec:
|
|||
matchLabels:
|
||||
{{- include "argo-cd.selectorLabels" (dict "context" . "name" .Values.notifications.name) | nindent 10 }}
|
||||
{{- end }}
|
||||
{{- if .Values.applicationSet.enabled }}
|
||||
- podSelector:
|
||||
matchLabels:
|
||||
{{- include "argo-cd.selectorLabels" (dict "context" . "name" .Values.applicationSet.name) | nindent 10 }}
|
||||
{{- end }}
|
||||
ports:
|
||||
- port: repo-server
|
||||
protocol: TCP
|
||||
|
|
|
@ -23,9 +23,7 @@ rules:
|
|||
- argoproj.io
|
||||
resources:
|
||||
- applications
|
||||
{{- if .Values.applicationSet.enabled }}
|
||||
- applicationsets
|
||||
{{- end }}
|
||||
- appprojects
|
||||
verbs:
|
||||
- create
|
||||
|
|
|
@ -1,21 +1,37 @@
|
|||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
{{- if .Values.server.service.annotations }}
|
||||
annotations:
|
||||
{{- range $key, $value := .Values.server.service.annotations }}
|
||||
{{ $key }}: {{ $value | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
name: {{ template "argo-cd.server.fullname" . }}
|
||||
namespace: {{ .Release.Namespace | quote }}
|
||||
labels:
|
||||
{{- include "argo-cd.labels" (dict "context" . "component" .Values.server.name "name" .Values.server.name) | nindent 4 }}
|
||||
{{- if .Values.server.service.labels }}
|
||||
{{- toYaml .Values.server.service.labels | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- with .Values.server.service.labels }}
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- with .Values.server.service.annotations }}
|
||||
annotations:
|
||||
{{- range $key, $value := . }}
|
||||
{{ $key }}: {{ $value | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
spec:
|
||||
type: {{ .Values.server.service.type }}
|
||||
{{- with .Values.server.service.externalIPs }}
|
||||
externalIPs: {{ . }}
|
||||
{{- end }}
|
||||
{{- if or (eq .Values.server.service.type "LoadBalancer") (eq .Values.server.service.type "NodePort") }}
|
||||
externalTrafficPolicy: {{ .Values.server.service.externalTrafficPolicy }}
|
||||
{{- end }}
|
||||
{{- if eq .Values.server.service.type "LoadBalancer" }}
|
||||
{{- with .Values.server.service.loadBalancerIP }}
|
||||
loadBalancerIP: {{ . }}
|
||||
{{- end }}
|
||||
{{- with .Values.server.service.loadBalancerSourceRanges }}
|
||||
loadBalancerSourceRanges:
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
sessionAffinity: {{ .Values.server.service.sessionAffinity }}
|
||||
ports:
|
||||
- name: {{ .Values.server.service.servicePortHttpName }}
|
||||
protocol: TCP
|
||||
|
@ -36,21 +52,4 @@ spec:
|
|||
{{- end }}
|
||||
selector:
|
||||
{{- include "argo-cd.selectorLabels" (dict "context" . "name" .Values.server.name) | nindent 4 }}
|
||||
{{- if eq .Values.server.service.type "LoadBalancer" }}
|
||||
{{- if .Values.server.service.loadBalancerIP }}
|
||||
loadBalancerIP: {{ .Values.server.service.loadBalancerIP | quote }}
|
||||
{{- end }}
|
||||
{{- if .Values.server.service.externalIPs }}
|
||||
externalIPs: {{ .Values.server.service.externalIPs }}
|
||||
{{- end }}
|
||||
{{- if .Values.server.service.loadBalancerSourceRanges }}
|
||||
loadBalancerSourceRanges:
|
||||
{{ toYaml .Values.server.service.loadBalancerSourceRanges | indent 4 }}
|
||||
{{- end }}
|
||||
{{- end -}}
|
||||
{{- with .Values.server.service.externalTrafficPolicy }}
|
||||
externalTrafficPolicy: {{ . }}
|
||||
{{- end }}
|
||||
{{- with .Values.server.service.sessionAffinity }}
|
||||
sessionAffinity: {{ . }}
|
||||
{{- end }}
|
||||
|
||||
|
|
|
@ -1972,18 +1972,22 @@ server:
|
|||
servicePortHttpName: http
|
||||
# -- Server service https port name, can be used to route traffic via istio
|
||||
servicePortHttpsName: https
|
||||
# -- Server service https port appProtocol. (should be upper case - i.e. HTTPS)
|
||||
# servicePortHttpsAppProtocol: HTTPS
|
||||
# -- Server service https port appProtocol
|
||||
## Ref: https://kubernetes.io/docs/concepts/services-networking/service/#application-protocol
|
||||
servicePortHttpsAppProtocol: ""
|
||||
# -- LoadBalancer will get created with the IP specified in this field
|
||||
loadBalancerIP: ""
|
||||
# -- Source IP ranges to allow access to service from
|
||||
## Ref: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service
|
||||
loadBalancerSourceRanges: []
|
||||
# -- Server service external IPs
|
||||
externalIPs: []
|
||||
# -- Denotes if this Service desires to route external traffic to node-local or cluster-wide endpoints
|
||||
externalTrafficPolicy: ""
|
||||
## Ref: https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/#preserving-the-client-source-ip
|
||||
externalTrafficPolicy: Cluster
|
||||
# -- Used to maintain session affinity. Supports `ClientIP` and `None`
|
||||
sessionAffinity: ""
|
||||
## Ref: https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxies
|
||||
sessionAffinity: None
|
||||
|
||||
## Server metrics service configuration
|
||||
metrics:
|
||||
|
@ -2638,9 +2642,6 @@ repoServer:
|
|||
|
||||
## ApplicationSet controller
|
||||
applicationSet:
|
||||
# -- Enable ApplicationSet controller
|
||||
enabled: true
|
||||
|
||||
# -- ApplicationSet controller name string
|
||||
name: applicationset-controller
|
||||
|
||||
|
|
|
@ -4,7 +4,7 @@ annotations:
|
|||
catalog.cattle.io/kube-version: '>=1.8-0'
|
||||
catalog.cattle.io/release-name: cockroachdb
|
||||
apiVersion: v1
|
||||
appVersion: 23.2.4
|
||||
appVersion: 23.2.5
|
||||
description: CockroachDB is a scalable, survivable, strongly-consistent SQL database.
|
||||
home: https://www.cockroachlabs.com
|
||||
icon: https://raw.githubusercontent.com/cockroachdb/cockroach/master/docs/media/cockroach_db.png
|
||||
|
@ -14,4 +14,4 @@ maintainers:
|
|||
name: cockroachdb
|
||||
sources:
|
||||
- https://github.com/cockroachdb/cockroach
|
||||
version: 12.0.4
|
||||
version: 12.0.5
|
||||
|
|
|
@ -229,10 +229,10 @@ kubectl get pods \
|
|||
```
|
||||
|
||||
```
|
||||
my-release-cockroachdb-0 cockroachdb/cockroach:v23.2.4
|
||||
my-release-cockroachdb-1 cockroachdb/cockroach:v23.2.4
|
||||
my-release-cockroachdb-2 cockroachdb/cockroach:v23.2.4
|
||||
my-release-cockroachdb-3 cockroachdb/cockroach:v23.2.4
|
||||
my-release-cockroachdb-0 cockroachdb/cockroach:v23.2.5
|
||||
my-release-cockroachdb-1 cockroachdb/cockroach:v23.2.5
|
||||
my-release-cockroachdb-2 cockroachdb/cockroach:v23.2.5
|
||||
my-release-cockroachdb-3 cockroachdb/cockroach:v23.2.5
|
||||
```
|
||||
|
||||
Resume normal operations. Once you are comfortable that the stability and performance of the cluster is what you'd expect post-upgrade, finalize the upgrade:
|
||||
|
@ -316,7 +316,7 @@ For details see the [`values.yaml`](values.yaml) file.
|
|||
| `conf.store.size` | CockroachDB storage size | `""` |
|
||||
| `conf.store.attrs` | CockroachDB storage attributes | `""` |
|
||||
| `image.repository` | Container image name | `cockroachdb/cockroach` |
|
||||
| `image.tag` | Container image tag | `v23.2.4` |
|
||||
| `image.tag` | Container image tag | `v23.2.5` |
|
||||
| `image.pullPolicy` | Container pull policy | `IfNotPresent` |
|
||||
| `image.credentials` | `registry`, `user` and `pass` credentials to pull private image | `{}` |
|
||||
| `statefulset.replicas` | StatefulSet replicas number | `3` |
|
||||
|
|
|
@ -7,7 +7,7 @@ fullnameOverride: ""
|
|||
|
||||
image:
|
||||
repository: cockroachdb/cockroach
|
||||
tag: v23.2.4
|
||||
tag: v23.2.5
|
||||
pullPolicy: IfNotPresent
|
||||
credentials: {}
|
||||
# registry: docker.io
|
||||
|
|
|
@ -6,7 +6,7 @@ annotations:
|
|||
catalog.cattle.io/kube-version: '>=1.22.0-0'
|
||||
catalog.cattle.io/release-name: linkerd-control-plane
|
||||
apiVersion: v2
|
||||
appVersion: edge-24.5.1
|
||||
appVersion: edge-24.5.2
|
||||
dependencies:
|
||||
- name: partials
|
||||
repository: file://./charts/partials
|
||||
|
@ -26,4 +26,4 @@ name: linkerd-control-plane
|
|||
sources:
|
||||
- https://github.com/linkerd/linkerd2/
|
||||
type: application
|
||||
version: 2024.5.1
|
||||
version: 2024.5.2
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
Linkerd gives you observability, reliability, and security
|
||||
for your microservices — with no code change required.
|
||||
|
||||
![Version: 2024.5.1](https://img.shields.io/badge/Version-2024.5.1-informational?style=flat-square)
|
||||
![Version: 2024.5.2](https://img.shields.io/badge/Version-2024.5.2-informational?style=flat-square)
|
||||
![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square)
|
||||
![AppVersion: edge-XX.X.X](https://img.shields.io/badge/AppVersion-edge--XX.X.X-informational?style=flat-square)
|
||||
|
||||
|
@ -162,7 +162,7 @@ Kubernetes: `>=1.22.0-0`
|
|||
| destinationController.meshedHttp2ClientProtobuf.keep_alive.timeout.seconds | int | `3` | |
|
||||
| destinationController.meshedHttp2ClientProtobuf.keep_alive.while_idle | bool | `true` | |
|
||||
| disableHeartBeat | bool | `false` | Set to true to not start the heartbeat cronjob |
|
||||
| disableIPv6 | bool | `false` | disables routing IPv6 traffic in addition to IPv4 traffic through the proxy (IPv6 routing only available as of proxy-init v2.3.0 and linkerd-cni v1.4.0) |
|
||||
| disableIPv6 | bool | `true` | disables routing IPv6 traffic in addition to IPv4 traffic through the proxy (IPv6 routing only available as of proxy-init v2.3.0 and linkerd-cni v1.4.0) |
|
||||
| enableEndpointSlices | bool | `true` | enables the use of EndpointSlice informers for the destination service; enableEndpointSlices should be set to true only if EndpointSlice K8s feature gate is on |
|
||||
| enableH2Upgrade | bool | `true` | Allow proxies to perform transparent HTTP/2 upgrading |
|
||||
| enablePSP | bool | `false` | Add a PSP resource and bind it to the control plane ServiceAccounts. Note PSP has been deprecated since k8s v1.21 |
|
||||
|
|
|
@ -83,7 +83,7 @@ env:
|
|||
- name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR
|
||||
value: "127.0.0.1:{{.Values.proxy.ports.outbound}}"
|
||||
- name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDRS
|
||||
value: "127.0.0.1:{{.Values.proxy.ports.outbound}},[::1]:{{.Values.proxy.ports.outbound}}"
|
||||
value: "127.0.0.1:{{.Values.proxy.ports.outbound}}{{ if not .Values.disableIPv6}},[::1]:{{.Values.proxy.ports.outbound}}{{ end }}"
|
||||
- name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR
|
||||
value: "[::]:{{.Values.proxy.ports.inbound}}"
|
||||
- name: LINKERD2_PROXY_INBOUND_IPS
|
||||
|
|
|
@ -205,6 +205,7 @@ spec:
|
|||
- -cluster-domain={{.Values.clusterDomain}}
|
||||
- -identity-trust-domain={{.Values.identityTrustDomain | default .Values.clusterDomain}}
|
||||
- -default-opaque-ports={{.Values.proxy.opaquePorts}}
|
||||
- -enable-ipv6={{not .Values.disableIPv6}}
|
||||
- -enable-pprof={{.Values.enablePprof | default false}}
|
||||
{{- if (.Values.destinationController).meshedHttp2ClientProtobuf }}
|
||||
- --meshed-http2-client-params={{ toJson .Values.destinationController.meshedHttp2ClientProtobuf }}
|
||||
|
|
|
@ -24,7 +24,7 @@ controlPlaneTracing: false
|
|||
# -- namespace to send control plane traces to
|
||||
controlPlaneTracingNamespace: linkerd-jaeger
|
||||
# -- control plane version. See Proxy section for proxy version
|
||||
linkerdVersion: edge-24.5.1
|
||||
linkerdVersion: edge-24.5.2
|
||||
# -- default kubernetes deployment strategy
|
||||
deploymentStrategy:
|
||||
rollingUpdate:
|
||||
|
@ -44,7 +44,7 @@ enablePodDisruptionBudget: false
|
|||
# -- disables routing IPv6 traffic in addition to IPv4 traffic through the
|
||||
# proxy (IPv6 routing only available as of proxy-init v2.3.0 and linkerd-cni
|
||||
# v1.4.0)
|
||||
disableIPv6: false
|
||||
disableIPv6: true
|
||||
|
||||
controller:
|
||||
# -- sets pod disruption budget parameter for all deployments
|
||||
|
|
|
@ -23,4 +23,4 @@ name: linkerd-crds
|
|||
sources:
|
||||
- https://github.com/linkerd/linkerd2/
|
||||
type: application
|
||||
version: 2024.5.1
|
||||
version: 2024.5.2
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
Linkerd gives you observability, reliability, and security
|
||||
for your microservices — with no code change required.
|
||||
|
||||
![Version: 2024.5.1](https://img.shields.io/badge/Version-2024.5.1-informational?style=flat-square)
|
||||
![Version: 2024.5.2](https://img.shields.io/badge/Version-2024.5.2-informational?style=flat-square)
|
||||
![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square)
|
||||
|
||||
**Homepage:** <https://linkerd.io>
|
||||
|
|
|
@ -83,7 +83,7 @@ env:
|
|||
- name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDR
|
||||
value: "127.0.0.1:{{.Values.proxy.ports.outbound}}"
|
||||
- name: LINKERD2_PROXY_OUTBOUND_LISTEN_ADDRS
|
||||
value: "127.0.0.1:{{.Values.proxy.ports.outbound}},[::1]:{{.Values.proxy.ports.outbound}}"
|
||||
value: "127.0.0.1:{{.Values.proxy.ports.outbound}}{{ if not .Values.disableIPv6}},[::1]:{{.Values.proxy.ports.outbound}}{{ end }}"
|
||||
- name: LINKERD2_PROXY_INBOUND_LISTEN_ADDR
|
||||
value: "[::]:{{.Values.proxy.ports.inbound}}"
|
||||
- name: LINKERD2_PROXY_INBOUND_IPS
|
||||
|
|
File diff suppressed because it is too large
Load Diff
|
@ -5,7 +5,7 @@ kind: CustomResourceDefinition
|
|||
metadata:
|
||||
annotations:
|
||||
api-approved.kubernetes.io: https://github.com/kubernetes-sigs/gateway-api/pull/1923
|
||||
gateway.networking.k8s.io/bundle-version: v0.7.1-dev
|
||||
gateway.networking.k8s.io/bundle-version: v0.7.1
|
||||
gateway.networking.k8s.io/channel: experimental
|
||||
{{ include "partials.annotations.created-by" . }}
|
||||
labels:
|
||||
|
@ -61,14 +61,12 @@ spec:
|
|||
description: "Hostnames defines a set of hostname that should match
|
||||
against the HTTP Host header to select a HTTPRoute used to process
|
||||
the request. Implementations MUST ignore any port value specified
|
||||
in the HTTP Host header while performing a match and (absent of
|
||||
any applicable header modification configuration) MUST forward this
|
||||
header unmodified to the backend. \n Valid values for Hostnames
|
||||
are determined by RFC 1123 definition of a hostname with 2 notable
|
||||
exceptions: \n 1. IPs are not allowed. 2. A hostname may be prefixed
|
||||
with a wildcard label (`*.`). The wildcard label must appear by
|
||||
itself as the first label. \n If a hostname is specified by both
|
||||
the Listener and HTTPRoute, there must be at least one intersecting
|
||||
in the HTTP Host header while performing a match. \n Valid values
|
||||
for Hostnames are determined by RFC 1123 definition of a hostname
|
||||
with 2 notable exceptions: \n 1. IPs are not allowed. 2. A hostname
|
||||
may be prefixed with a wildcard label (`*.`). The wildcard label
|
||||
must appear by itself as the first label. \n If a hostname is specified
|
||||
by both the Listener and HTTPRoute, there must be at least one intersecting
|
||||
hostname for the HTTPRoute to be attached to the Listener. For example:
|
||||
\n * A Listener with `test.example.com` as the hostname matches
|
||||
HTTPRoutes that have either not specified any hostnames, or have
|
||||
|
@ -558,9 +556,8 @@ spec:
|
|||
the value with which to replace the prefix
|
||||
match of a request during a rewrite or
|
||||
redirect. For example, a request to \"/foo/bar\"
|
||||
with a prefix match of \"/foo\" and a
|
||||
ReplacePrefixMatch of \"/xyz\" would be
|
||||
modified to \"/xyz/bar\". \n Note that
|
||||
with a prefix match of \"/foo\" would
|
||||
be modified to \"/bar\". \n Note that
|
||||
this matches the behavior of the PathPrefix
|
||||
match type. This matches full path elements.
|
||||
A path element refers to the list of labels
|
||||
|
@ -568,23 +565,7 @@ spec:
|
|||
When specified, a trailing `/` is ignored.
|
||||
For example, the paths `/abc`, `/abc/`,
|
||||
and `/abc/def` would all match the prefix
|
||||
`/abc`, but the path `/abcd` would not.
|
||||
\n Request Path | Prefix Match | Replace
|
||||
Prefix | Modified Path -------------|--------------|----------------|----------
|
||||
/foo/bar | /foo | /xyz |
|
||||
/xyz/bar /foo/bar | /foo |
|
||||
/xyz/ | /xyz/bar /foo/bar |
|
||||
/foo/ | /xyz | /xyz/bar
|
||||
/foo/bar | /foo/ | /xyz/ |
|
||||
/xyz/bar /foo | /foo |
|
||||
/xyz | /xyz /foo/ | /foo
|
||||
\ | /xyz | /xyz/ /foo/bar
|
||||
\ | /foo | <empty string> |
|
||||
/bar /foo/ | /foo | <empty
|
||||
string> | / /foo | /foo |
|
||||
<empty string> | / /foo/ | /foo
|
||||
\ | / | / /foo |
|
||||
/foo | / | /"
|
||||
`/abc`, but the path `/abcd` would not."
|
||||
maxLength: 1024
|
||||
type: string
|
||||
type:
|
||||
|
@ -840,9 +821,8 @@ spec:
|
|||
the value with which to replace the prefix
|
||||
match of a request during a rewrite or
|
||||
redirect. For example, a request to \"/foo/bar\"
|
||||
with a prefix match of \"/foo\" and a
|
||||
ReplacePrefixMatch of \"/xyz\" would be
|
||||
modified to \"/xyz/bar\". \n Note that
|
||||
with a prefix match of \"/foo\" would
|
||||
be modified to \"/bar\". \n Note that
|
||||
this matches the behavior of the PathPrefix
|
||||
match type. This matches full path elements.
|
||||
A path element refers to the list of labels
|
||||
|
@ -850,23 +830,7 @@ spec:
|
|||
When specified, a trailing `/` is ignored.
|
||||
For example, the paths `/abc`, `/abc/`,
|
||||
and `/abc/def` would all match the prefix
|
||||
`/abc`, but the path `/abcd` would not.
|
||||
\n Request Path | Prefix Match | Replace
|
||||
Prefix | Modified Path -------------|--------------|----------------|----------
|
||||
/foo/bar | /foo | /xyz |
|
||||
/xyz/bar /foo/bar | /foo |
|
||||
/xyz/ | /xyz/bar /foo/bar |
|
||||
/foo/ | /xyz | /xyz/bar
|
||||
/foo/bar | /foo/ | /xyz/ |
|
||||
/xyz/bar /foo | /foo |
|
||||
/xyz | /xyz /foo/ | /foo
|
||||
\ | /xyz | /xyz/ /foo/bar
|
||||
\ | /foo | <empty string> |
|
||||
/bar /foo/ | /foo | <empty
|
||||
string> | / /foo | /foo |
|
||||
<empty string> | / /foo/ | /foo
|
||||
\ | / | / /foo |
|
||||
/foo | / | /"
|
||||
`/abc`, but the path `/abcd` would not."
|
||||
maxLength: 1024
|
||||
type: string
|
||||
type:
|
||||
|
@ -1250,8 +1214,7 @@ spec:
|
|||
value with which to replace the prefix match
|
||||
of a request during a rewrite or redirect. For
|
||||
example, a request to \"/foo/bar\" with a prefix
|
||||
match of \"/foo\" and a ReplacePrefixMatch of
|
||||
\"/xyz\" would be modified to \"/xyz/bar\".
|
||||
match of \"/foo\" would be modified to \"/bar\".
|
||||
\n Note that this matches the behavior of the
|
||||
PathPrefix match type. This matches full path
|
||||
elements. A path element refers to the list
|
||||
|
@ -1259,21 +1222,7 @@ spec:
|
|||
When specified, a trailing `/` is ignored. For
|
||||
example, the paths `/abc`, `/abc/`, and `/abc/def`
|
||||
would all match the prefix `/abc`, but the path
|
||||
`/abcd` would not. \n Request Path | Prefix
|
||||
Match | Replace Prefix | Modified Path -------------|--------------|----------------|----------
|
||||
/foo/bar | /foo | /xyz |
|
||||
/xyz/bar /foo/bar | /foo | /xyz/
|
||||
\ | /xyz/bar /foo/bar | /foo/ |
|
||||
/xyz | /xyz/bar /foo/bar | /foo/
|
||||
\ | /xyz/ | /xyz/bar /foo |
|
||||
/foo | /xyz | /xyz /foo/ |
|
||||
/foo | /xyz | /xyz/ /foo/bar
|
||||
\ | /foo | <empty string> | /bar
|
||||
/foo/ | /foo | <empty string>
|
||||
| / /foo | /foo | <empty string>
|
||||
| / /foo/ | /foo | / |
|
||||
/ /foo | /foo | / |
|
||||
/"
|
||||
`/abcd` would not."
|
||||
maxLength: 1024
|
||||
type: string
|
||||
type:
|
||||
|
@ -1512,8 +1461,7 @@ spec:
|
|||
value with which to replace the prefix match
|
||||
of a request during a rewrite or redirect. For
|
||||
example, a request to \"/foo/bar\" with a prefix
|
||||
match of \"/foo\" and a ReplacePrefixMatch of
|
||||
\"/xyz\" would be modified to \"/xyz/bar\".
|
||||
match of \"/foo\" would be modified to \"/bar\".
|
||||
\n Note that this matches the behavior of the
|
||||
PathPrefix match type. This matches full path
|
||||
elements. A path element refers to the list
|
||||
|
@ -1521,21 +1469,7 @@ spec:
|
|||
When specified, a trailing `/` is ignored. For
|
||||
example, the paths `/abc`, `/abc/`, and `/abc/def`
|
||||
would all match the prefix `/abc`, but the path
|
||||
`/abcd` would not. \n Request Path | Prefix
|
||||
Match | Replace Prefix | Modified Path -------------|--------------|----------------|----------
|
||||
/foo/bar | /foo | /xyz |
|
||||
/xyz/bar /foo/bar | /foo | /xyz/
|
||||
\ | /xyz/bar /foo/bar | /foo/ |
|
||||
/xyz | /xyz/bar /foo/bar | /foo/
|
||||
\ | /xyz/ | /xyz/bar /foo |
|
||||
/foo | /xyz | /xyz /foo/ |
|
||||
/foo | /xyz | /xyz/ /foo/bar
|
||||
\ | /foo | <empty string> | /bar
|
||||
/foo/ | /foo | <empty string>
|
||||
| / /foo | /foo | <empty string>
|
||||
| / /foo/ | /foo | / |
|
||||
/ /foo | /foo | / |
|
||||
/"
|
||||
`/abcd` would not."
|
||||
maxLength: 1024
|
||||
type: string
|
||||
type:
|
||||
|
@ -2011,7 +1945,7 @@ spec:
|
|||
required:
|
||||
- spec
|
||||
type: object
|
||||
served: false
|
||||
served: true
|
||||
storage: false
|
||||
subresources:
|
||||
status: {}
|
||||
|
@ -2049,14 +1983,12 @@ spec:
|
|||
description: "Hostnames defines a set of hostname that should match
|
||||
against the HTTP Host header to select a HTTPRoute used to process
|
||||
the request. Implementations MUST ignore any port value specified
|
||||
in the HTTP Host header while performing a match and (absent of
|
||||
any applicable header modification configuration) MUST forward this
|
||||
header unmodified to the backend. \n Valid values for Hostnames
|
||||
are determined by RFC 1123 definition of a hostname with 2 notable
|
||||
exceptions: \n 1. IPs are not allowed. 2. A hostname may be prefixed
|
||||
with a wildcard label (`*.`). The wildcard label must appear by
|
||||
itself as the first label. \n If a hostname is specified by both
|
||||
the Listener and HTTPRoute, there must be at least one intersecting
|
||||
in the HTTP Host header while performing a match. \n Valid values
|
||||
for Hostnames are determined by RFC 1123 definition of a hostname
|
||||
with 2 notable exceptions: \n 1. IPs are not allowed. 2. A hostname
|
||||
may be prefixed with a wildcard label (`*.`). The wildcard label
|
||||
must appear by itself as the first label. \n If a hostname is specified
|
||||
by both the Listener and HTTPRoute, there must be at least one intersecting
|
||||
hostname for the HTTPRoute to be attached to the Listener. For example:
|
||||
\n * A Listener with `test.example.com` as the hostname matches
|
||||
HTTPRoutes that have either not specified any hostnames, or have
|
||||
|
@ -2546,9 +2478,8 @@ spec:
|
|||
the value with which to replace the prefix
|
||||
match of a request during a rewrite or
|
||||
redirect. For example, a request to \"/foo/bar\"
|
||||
with a prefix match of \"/foo\" and a
|
||||
ReplacePrefixMatch of \"/xyz\" would be
|
||||
modified to \"/xyz/bar\". \n Note that
|
||||
with a prefix match of \"/foo\" would
|
||||
be modified to \"/bar\". \n Note that
|
||||
this matches the behavior of the PathPrefix
|
||||
match type. This matches full path elements.
|
||||
A path element refers to the list of labels
|
||||
|
@ -2556,23 +2487,7 @@ spec:
|
|||
When specified, a trailing `/` is ignored.
|
||||
For example, the paths `/abc`, `/abc/`,
|
||||
and `/abc/def` would all match the prefix
|
||||
`/abc`, but the path `/abcd` would not.
|
||||
\n Request Path | Prefix Match | Replace
|
||||
Prefix | Modified Path -------------|--------------|----------------|----------
|
||||
/foo/bar | /foo | /xyz |
|
||||
/xyz/bar /foo/bar | /foo |
|
||||
/xyz/ | /xyz/bar /foo/bar |
|
||||
/foo/ | /xyz | /xyz/bar
|
||||
/foo/bar | /foo/ | /xyz/ |
|
||||
/xyz/bar /foo | /foo |
|
||||
/xyz | /xyz /foo/ | /foo
|
||||
\ | /xyz | /xyz/ /foo/bar
|
||||
\ | /foo | <empty string> |
|
||||
/bar /foo/ | /foo | <empty
|
||||
string> | / /foo | /foo |
|
||||
<empty string> | / /foo/ | /foo
|
||||
\ | / | / /foo |
|
||||
/foo | / | /"
|
||||
`/abc`, but the path `/abcd` would not."
|
||||
maxLength: 1024
|
||||
type: string
|
||||
type:
|
||||
|
@ -2828,9 +2743,8 @@ spec:
|
|||
the value with which to replace the prefix
|
||||
match of a request during a rewrite or
|
||||
redirect. For example, a request to \"/foo/bar\"
|
||||
with a prefix match of \"/foo\" and a
|
||||
ReplacePrefixMatch of \"/xyz\" would be
|
||||
modified to \"/xyz/bar\". \n Note that
|
||||
with a prefix match of \"/foo\" would
|
||||
be modified to \"/bar\". \n Note that
|
||||
this matches the behavior of the PathPrefix
|
||||
match type. This matches full path elements.
|
||||
A path element refers to the list of labels
|
||||
|
@ -2838,23 +2752,7 @@ spec:
|
|||
When specified, a trailing `/` is ignored.
|
||||
For example, the paths `/abc`, `/abc/`,
|
||||
and `/abc/def` would all match the prefix
|
||||
`/abc`, but the path `/abcd` would not.
|
||||
\n Request Path | Prefix Match | Replace
|
||||
Prefix | Modified Path -------------|--------------|----------------|----------
|
||||
/foo/bar | /foo | /xyz |
|
||||
/xyz/bar /foo/bar | /foo |
|
||||
/xyz/ | /xyz/bar /foo/bar |
|
||||
/foo/ | /xyz | /xyz/bar
|
||||
/foo/bar | /foo/ | /xyz/ |
|
||||
/xyz/bar /foo | /foo |
|
||||
/xyz | /xyz /foo/ | /foo
|
||||
\ | /xyz | /xyz/ /foo/bar
|
||||
\ | /foo | <empty string> |
|
||||
/bar /foo/ | /foo | <empty
|
||||
string> | / /foo | /foo |
|
||||
<empty string> | / /foo/ | /foo
|
||||
\ | / | / /foo |
|
||||
/foo | / | /"
|
||||
`/abc`, but the path `/abcd` would not."
|
||||
maxLength: 1024
|
||||
type: string
|
||||
type:
|
||||
|
@ -3238,8 +3136,7 @@ spec:
|
|||
value with which to replace the prefix match
|
||||
of a request during a rewrite or redirect. For
|
||||
example, a request to \"/foo/bar\" with a prefix
|
||||
match of \"/foo\" and a ReplacePrefixMatch of
|
||||
\"/xyz\" would be modified to \"/xyz/bar\".
|
||||
match of \"/foo\" would be modified to \"/bar\".
|
||||
\n Note that this matches the behavior of the
|
||||
PathPrefix match type. This matches full path
|
||||
elements. A path element refers to the list
|
||||
|
@ -3247,21 +3144,7 @@ spec:
|
|||
When specified, a trailing `/` is ignored. For
|
||||
example, the paths `/abc`, `/abc/`, and `/abc/def`
|
||||
would all match the prefix `/abc`, but the path
|
||||
`/abcd` would not. \n Request Path | Prefix
|
||||
Match | Replace Prefix | Modified Path -------------|--------------|----------------|----------
|
||||
/foo/bar | /foo | /xyz |
|
||||
/xyz/bar /foo/bar | /foo | /xyz/
|
||||
\ | /xyz/bar /foo/bar | /foo/ |
|
||||
/xyz | /xyz/bar /foo/bar | /foo/
|
||||
\ | /xyz/ | /xyz/bar /foo |
|
||||
/foo | /xyz | /xyz /foo/ |
|
||||
/foo | /xyz | /xyz/ /foo/bar
|
||||
\ | /foo | <empty string> | /bar
|
||||
/foo/ | /foo | <empty string>
|
||||
| / /foo | /foo | <empty string>
|
||||
| / /foo/ | /foo | / |
|
||||
/ /foo | /foo | / |
|
||||
/"
|
||||
`/abcd` would not."
|
||||
maxLength: 1024
|
||||
type: string
|
||||
type:
|
||||
|
@ -3500,8 +3383,7 @@ spec:
|
|||
value with which to replace the prefix match
|
||||
of a request during a rewrite or redirect. For
|
||||
example, a request to \"/foo/bar\" with a prefix
|
||||
match of \"/foo\" and a ReplacePrefixMatch of
|
||||
\"/xyz\" would be modified to \"/xyz/bar\".
|
||||
match of \"/foo\" would be modified to \"/bar\".
|
||||
\n Note that this matches the behavior of the
|
||||
PathPrefix match type. This matches full path
|
||||
elements. A path element refers to the list
|
||||
|
@ -3509,21 +3391,7 @@ spec:
|
|||
When specified, a trailing `/` is ignored. For
|
||||
example, the paths `/abc`, `/abc/`, and `/abc/def`
|
||||
would all match the prefix `/abc`, but the path
|
||||
`/abcd` would not. \n Request Path | Prefix
|
||||
Match | Replace Prefix | Modified Path -------------|--------------|----------------|----------
|
||||
/foo/bar | /foo | /xyz |
|
||||
/xyz/bar /foo/bar | /foo | /xyz/
|
||||
\ | /xyz/bar /foo/bar | /foo/ |
|
||||
/xyz | /xyz/bar /foo/bar | /foo/
|
||||
\ | /xyz/ | /xyz/bar /foo |
|
||||
/foo | /xyz | /xyz /foo/ |
|
||||
/foo | /xyz | /xyz/ /foo/bar
|
||||
\ | /foo | <empty string> | /bar
|
||||
/foo/ | /foo | <empty string>
|
||||
| / /foo | /foo | <empty string>
|
||||
| / /foo/ | /foo | / |
|
||||
/ /foo | /foo | / |
|
||||
/"
|
||||
`/abcd` would not."
|
||||
maxLength: 1024
|
||||
type: string
|
||||
type:
|
||||
|
@ -4010,3 +3878,4 @@ status:
|
|||
conditions: null
|
||||
storedVersions: null
|
||||
{{- end }}
|
||||
|
||||
|
|
|
@ -6,4 +6,4 @@ apiVersion: v2
|
|||
icon: https://raw.githubusercontent.com/cncf/artwork/master/projects/pixie/icon/color/pixie-icon-color.svg
|
||||
name: pixie-operator-chart
|
||||
type: application
|
||||
version: 0.1.501
|
||||
version: 0.1.601
|
||||
|
|
|
@ -19,7 +19,7 @@ spec:
|
|||
fieldPath: metadata.namespace
|
||||
- name: PL_VIZIER_NAME
|
||||
value: '{{ .Values.name }}'
|
||||
image: gcr.io/pixie-oss/pixie-prod/operator-vizier_deleter:0.1.5
|
||||
image: gcr.io/pixie-oss/pixie-prod/operator-vizier_deleter:0.1.6
|
||||
name: delete-job
|
||||
restartPolicy: Never
|
||||
serviceAccountName: pl-deleter-service-account
|
||||
|
|
|
@ -21,4 +21,4 @@ maintainers:
|
|||
- email: ops@stackstate.com
|
||||
name: Stackstate
|
||||
name: stackstate-k8s-agent
|
||||
version: 1.0.81
|
||||
version: 1.0.82
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
|
||||
Helm chart for the StackState Agent.
|
||||
|
||||
Current chart version is `1.0.81`
|
||||
Current chart version is `1.0.82`
|
||||
|
||||
**Homepage:** <https://github.com/StackVista/stackstate-agent>
|
||||
|
||||
|
@ -61,7 +61,7 @@ stackstate/stackstate-k8s-agent
|
|||
| checksAgent.enabled | bool | `true` | Enable / disable runnning cluster checks in a separately deployed pod |
|
||||
| checksAgent.image.pullPolicy | string | `"IfNotPresent"` | Default container image pull policy. |
|
||||
| checksAgent.image.repository | string | `"stackstate/stackstate-k8s-agent"` | Base container image repository. |
|
||||
| checksAgent.image.tag | string | `"7983b3be"` | Default container image tag. |
|
||||
| checksAgent.image.tag | string | `"44638ef5"` | Default container image tag. |
|
||||
| checksAgent.livenessProbe.enabled | bool | `true` | Enable use of livenessProbe check. |
|
||||
| checksAgent.livenessProbe.failureThreshold | int | `3` | `failureThreshold` for the liveness probe. |
|
||||
| checksAgent.livenessProbe.initialDelaySeconds | int | `15` | `initialDelaySeconds` for the liveness probe. |
|
||||
|
@ -126,7 +126,7 @@ stackstate/stackstate-k8s-agent
|
|||
| clusterAgent.enabled | bool | `true` | Enable / disable the cluster agent. |
|
||||
| clusterAgent.image.pullPolicy | string | `"IfNotPresent"` | Default container image pull policy. |
|
||||
| clusterAgent.image.repository | string | `"stackstate/stackstate-k8s-cluster-agent"` | Base container image repository. |
|
||||
| clusterAgent.image.tag | string | `"7983b3be"` | Default container image tag. |
|
||||
| clusterAgent.image.tag | string | `"44638ef5"` | Default container image tag. |
|
||||
| clusterAgent.livenessProbe.enabled | bool | `true` | Enable use of livenessProbe check. |
|
||||
| clusterAgent.livenessProbe.failureThreshold | int | `3` | `failureThreshold` for the liveness probe. |
|
||||
| clusterAgent.livenessProbe.initialDelaySeconds | int | `15` | `initialDelaySeconds` for the liveness probe. |
|
||||
|
@ -190,7 +190,7 @@ stackstate/stackstate-k8s-agent
|
|||
| nodeAgent.containers.agent.env | object | `{}` | Additional environment variables for the agent container |
|
||||
| nodeAgent.containers.agent.image.pullPolicy | string | `"IfNotPresent"` | Default container image pull policy. |
|
||||
| nodeAgent.containers.agent.image.repository | string | `"stackstate/stackstate-k8s-agent"` | Base container image repository. |
|
||||
| nodeAgent.containers.agent.image.tag | string | `"7983b3be"` | Default container image tag. |
|
||||
| nodeAgent.containers.agent.image.tag | string | `"44638ef5"` | Default container image tag. |
|
||||
| nodeAgent.containers.agent.livenessProbe.enabled | bool | `true` | Enable use of livenessProbe check. |
|
||||
| nodeAgent.containers.agent.livenessProbe.failureThreshold | int | `3` | `failureThreshold` for the liveness probe. |
|
||||
| nodeAgent.containers.agent.livenessProbe.initialDelaySeconds | int | `15` | `initialDelaySeconds` for the liveness probe. |
|
||||
|
|
|
@ -109,7 +109,7 @@ nodeAgent:
|
|||
# nodeAgent.containers.agent.image.repository -- Base container image repository.
|
||||
repository: stackstate/stackstate-k8s-agent
|
||||
# nodeAgent.containers.agent.image.tag -- Default container image tag.
|
||||
tag: "7983b3be"
|
||||
tag: "44638ef5"
|
||||
# nodeAgent.containers.agent.image.pullPolicy -- Default container image pull policy.
|
||||
pullPolicy: IfNotPresent
|
||||
processAgent:
|
||||
|
@ -357,7 +357,7 @@ clusterAgent:
|
|||
# clusterAgent.image.repository -- Base container image repository.
|
||||
repository: stackstate/stackstate-k8s-cluster-agent
|
||||
# clusterAgent.image.tag -- Default container image tag.
|
||||
tag: "7983b3be"
|
||||
tag: "44638ef5"
|
||||
# clusterAgent.image.pullPolicy -- Default container image pull policy.
|
||||
pullPolicy: IfNotPresent
|
||||
|
||||
|
@ -512,7 +512,7 @@ checksAgent:
|
|||
# checksAgent.image.repository -- Base container image repository.
|
||||
repository: stackstate/stackstate-k8s-agent
|
||||
# checksAgent.image.tag -- Default container image tag.
|
||||
tag: "7983b3be"
|
||||
tag: "44638ef5"
|
||||
# checksAgent.image.pullPolicy -- Default container image pull policy.
|
||||
pullPolicy: IfNotPresent
|
||||
|
||||
|
|
181
index.yaml
181
index.yaml
|
@ -243,8 +243,12 @@ entries:
|
|||
argo-cd:
|
||||
- annotations:
|
||||
artifacthub.io/changes: |
|
||||
- kind: changed
|
||||
description: Always install applicationset crd
|
||||
- kind: fixed
|
||||
description: Service option externalIPs is available for all service types
|
||||
- kind: fixed
|
||||
description: Service option externalTrafficPolicy is available only for Service types LoadBalancer and NodePort
|
||||
- kind: fixed
|
||||
description: Load balancer options are available only for Service type LoadBalancer
|
||||
artifacthub.io/signKey: |
|
||||
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
|
||||
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
|
||||
|
@ -255,7 +259,7 @@ entries:
|
|||
catalog.cattle.io/release-name: argo-cd
|
||||
apiVersion: v2
|
||||
appVersion: v2.11.0
|
||||
created: "2024-05-11T00:52:51.48360261Z"
|
||||
created: "2024-05-14T00:54:35.105340647Z"
|
||||
dependencies:
|
||||
- condition: redis-ha.enabled
|
||||
name: redis-ha
|
||||
|
@ -263,7 +267,46 @@ entries:
|
|||
version: 4.26.1
|
||||
description: A Helm chart for Argo CD, a declarative, GitOps continuous delivery
|
||||
tool for Kubernetes.
|
||||
digest: 545323d0230fd5371a63cbe0643a2aebd2913f881afb682e74205c7798a7cacc
|
||||
digest: 4cceb1f0a4496d370adca0bcee500825eb913f9aa500540f7f30d202a99b00de
|
||||
home: https://github.com/argoproj/argo-helm
|
||||
icon: https://argo-cd.readthedocs.io/en/stable/assets/logo.png
|
||||
keywords:
|
||||
- argoproj
|
||||
- argocd
|
||||
- gitops
|
||||
kubeVersion: '>=1.23.0-0'
|
||||
maintainers:
|
||||
- name: argoproj
|
||||
url: https://argoproj.github.io/
|
||||
name: argo-cd
|
||||
sources:
|
||||
- https://github.com/argoproj/argo-helm/tree/main/charts/argo-cd
|
||||
- https://github.com/argoproj/argo-cd
|
||||
urls:
|
||||
- assets/argo/argo-cd-6.9.1.tgz
|
||||
version: 6.9.1
|
||||
- annotations:
|
||||
artifacthub.io/changes: |
|
||||
- kind: changed
|
||||
description: Always install applicationset crd
|
||||
artifacthub.io/signKey: |
|
||||
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
|
||||
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Argo CD
|
||||
catalog.cattle.io/kube-version: '>=1.23.0-0'
|
||||
catalog.cattle.io/release-name: argo-cd
|
||||
apiVersion: v2
|
||||
appVersion: v2.11.0
|
||||
created: "2024-05-14T00:54:25.992246022Z"
|
||||
dependencies:
|
||||
- condition: redis-ha.enabled
|
||||
name: redis-ha
|
||||
repository: file://./charts/redis-ha
|
||||
version: 4.26.1
|
||||
description: A Helm chart for Argo CD, a declarative, GitOps continuous delivery
|
||||
tool for Kubernetes.
|
||||
digest: 995475b7ae6e5167e46fe2e59ed8e4558be1fae9ad12c8d53557bdbaae12dd80
|
||||
home: https://github.com/argoproj/argo-helm
|
||||
icon: https://argo-cd.readthedocs.io/en/stable/assets/logo.png
|
||||
keywords:
|
||||
|
@ -12241,6 +12284,27 @@ entries:
|
|||
- assets/cloudcasa/cloudcasa-0.1.000.tgz
|
||||
version: 0.1.000
|
||||
cockroachdb:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: CockroachDB
|
||||
catalog.cattle.io/kube-version: '>=1.8-0'
|
||||
catalog.cattle.io/release-name: cockroachdb
|
||||
apiVersion: v1
|
||||
appVersion: 23.2.5
|
||||
created: "2024-05-14T00:54:35.885665014Z"
|
||||
description: CockroachDB is a scalable, survivable, strongly-consistent SQL database.
|
||||
digest: c582f106f97bf3b0f5e792fdecbf3680e41e6c84091ce4cb0d91d717244f54b2
|
||||
home: https://www.cockroachlabs.com
|
||||
icon: https://raw.githubusercontent.com/cockroachdb/cockroach/master/docs/media/cockroach_db.png
|
||||
maintainers:
|
||||
- email: helm-charts@cockroachlabs.com
|
||||
name: cockroachlabs
|
||||
name: cockroachdb
|
||||
sources:
|
||||
- https://github.com/cockroachdb/cockroach
|
||||
urls:
|
||||
- assets/cockroach-labs/cockroachdb-12.0.5.tgz
|
||||
version: 12.0.5
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: CockroachDB
|
||||
|
@ -34924,15 +34988,47 @@ entries:
|
|||
catalog.cattle.io/kube-version: '>=1.22.0-0'
|
||||
catalog.cattle.io/release-name: linkerd-control-plane
|
||||
apiVersion: v2
|
||||
appVersion: edge-24.5.1
|
||||
created: "2024-05-03T00:55:52.028185824Z"
|
||||
appVersion: edge-24.5.2
|
||||
created: "2024-05-14T00:54:48.384169031Z"
|
||||
dependencies:
|
||||
- name: partials
|
||||
repository: file://./charts/partials
|
||||
version: 0.1.0
|
||||
description: 'Linkerd gives you observability, reliability, and security for your
|
||||
microservices — with no code change required. '
|
||||
digest: f797d70a336344e7e12f7d41e7e4f1df00191e9af8583c17b677f767e24df68e
|
||||
digest: a5bb520f5ca8ab817ff434fcd8a196a4630d67662f2fa02df993eacbb293ac8b
|
||||
home: https://linkerd.io
|
||||
icon: https://linkerd.io/images/logo-only-200h.png
|
||||
keywords:
|
||||
- service-mesh
|
||||
kubeVersion: '>=1.22.0-0'
|
||||
maintainers:
|
||||
- email: cncf-linkerd-dev@lists.cncf.io
|
||||
name: Linkerd authors
|
||||
url: https://linkerd.io/
|
||||
name: linkerd-control-plane
|
||||
sources:
|
||||
- https://github.com/linkerd/linkerd2/
|
||||
type: application
|
||||
urls:
|
||||
- assets/linkerd/linkerd-control-plane-2024.5.2.tgz
|
||||
version: 2024.5.2
|
||||
- annotations:
|
||||
catalog.cattle.io/auto-install: linkerd-crds
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Linkerd Control Plane
|
||||
catalog.cattle.io/kube-version: '>=1.22.0-0'
|
||||
catalog.cattle.io/release-name: linkerd-control-plane
|
||||
apiVersion: v2
|
||||
appVersion: edge-24.5.1
|
||||
created: "2024-05-14T00:54:39.12820235Z"
|
||||
dependencies:
|
||||
- name: partials
|
||||
repository: file://./charts/partials
|
||||
version: 0.1.0
|
||||
description: 'Linkerd gives you observability, reliability, and security for your
|
||||
microservices — with no code change required. '
|
||||
digest: 20bbe1d852cc1605a6d46c550289c03bd0023ce77a926cf6c787d77d6e989a0a
|
||||
home: https://linkerd.io
|
||||
icon: https://linkerd.io/images/logo-only-200h.png
|
||||
keywords:
|
||||
|
@ -35547,6 +35643,36 @@ entries:
|
|||
- assets/linkerd/linkerd-control-plane-1.12.5.tgz
|
||||
version: 1.12.5
|
||||
linkerd-crds:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Linkerd CRDs
|
||||
catalog.cattle.io/kube-version: '>=1.22.0-0'
|
||||
catalog.cattle.io/release-name: linkerd-crds
|
||||
apiVersion: v2
|
||||
created: "2024-05-14T00:54:48.417942357Z"
|
||||
dependencies:
|
||||
- name: partials
|
||||
repository: file://./charts/partials
|
||||
version: 0.1.0
|
||||
description: 'Linkerd gives you observability, reliability, and security for your
|
||||
microservices — with no code change required. '
|
||||
digest: 3b994e57d4afe1dc729d4bef1c9bebc98d52ea655b63414e983c108124ccb429
|
||||
home: https://linkerd.io
|
||||
icon: https://linkerd.io/images/logo-only-200h.png
|
||||
keywords:
|
||||
- service-mesh
|
||||
kubeVersion: '>=1.22.0-0'
|
||||
maintainers:
|
||||
- email: cncf-linkerd-dev@lists.cncf.io
|
||||
name: Linkerd authors
|
||||
url: https://linkerd.io/
|
||||
name: linkerd-crds
|
||||
sources:
|
||||
- https://github.com/linkerd/linkerd2/
|
||||
type: application
|
||||
urls:
|
||||
- assets/linkerd/linkerd-crds-2024.5.2.tgz
|
||||
version: 2024.5.2
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Linkerd CRDs
|
||||
|
@ -43605,6 +43731,19 @@ entries:
|
|||
- assets/openebs/openebs-1.12.300.tgz
|
||||
version: 1.12.300
|
||||
pixie-operator-chart:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Pixie
|
||||
catalog.cattle.io/release-name: pixie
|
||||
apiVersion: v2
|
||||
created: "2024-05-14T00:54:49.564282292Z"
|
||||
digest: 29442580b08bee08504b9bc26bbf415540162900fcb33fdb8c26e51fd2c60728
|
||||
icon: https://raw.githubusercontent.com/cncf/artwork/master/projects/pixie/icon/color/pixie-icon-color.svg
|
||||
name: pixie-operator-chart
|
||||
type: application
|
||||
urls:
|
||||
- assets/pixie/pixie-operator-chart-0.1.601.tgz
|
||||
version: 0.1.601
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: Pixie
|
||||
|
@ -52839,6 +52978,34 @@ entries:
|
|||
- assets/speedscale/speedscale-operator-0.9.12600.tgz
|
||||
version: 0.9.12600
|
||||
stackstate-k8s-agent:
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: StackState Agent
|
||||
catalog.cattle.io/kube-version: '>=1.19.0-0'
|
||||
catalog.cattle.io/release-name: stackstate-k8s-agent
|
||||
apiVersion: v2
|
||||
appVersion: 3.0.0
|
||||
created: "2024-05-14T00:54:50.112324678Z"
|
||||
dependencies:
|
||||
- alias: httpHeaderInjectorWebhook
|
||||
name: http-header-injector
|
||||
repository: file://./charts/http-header-injector
|
||||
version: 0.0.9
|
||||
description: Helm chart for the StackState Agent.
|
||||
digest: 7349edab39b23472bdb5263ecef8db4497b326f5186e529bd7e18ce5e4612d84
|
||||
home: https://github.com/StackVista/stackstate-agent
|
||||
icon: https://raw.githubusercontent.com/StackVista/helm-charts/master/stable/stackstate-k8s-agent/logo.svg
|
||||
keywords:
|
||||
- monitoring
|
||||
- observability
|
||||
- stackstate
|
||||
maintainers:
|
||||
- email: ops@stackstate.com
|
||||
name: Stackstate
|
||||
name: stackstate-k8s-agent
|
||||
urls:
|
||||
- assets/stackstate/stackstate-k8s-agent-1.0.82.tgz
|
||||
version: 1.0.82
|
||||
- annotations:
|
||||
catalog.cattle.io/certified: partner
|
||||
catalog.cattle.io/display-name: StackState Agent
|
||||
|
|
Loading…
Reference in New Issue