Charts CI

```
Updated:
  argo/argo-cd:
    - 5.42.0
  asserts/asserts:
    - 1.50.0
  bitnami/cassandra:
    - 10.4.5
  bitnami/postgresql:
    - 12.7.1
  bitnami/redis:
    - 17.14.3
  bitnami/spark:
    - 7.1.2
  bitnami/tomcat:
    - 10.9.6
  bitnami/wordpress:
    - 16.1.34
  bitnami/zookeeper:
    - 11.4.10
  cert-manager/cert-manager:
    - v1.12.3
  datadog/datadog:
    - 3.33.6
  datadog/datadog-operator:
    - 1.0.8
  fairwinds/polaris:
    - 5.11.2
  harbor/harbor:
    - 1.12.3
  jenkins/jenkins:
    - 4.5.0
  jfrog/artifactory-ha:
    - 107.63.8
  jfrog/artifactory-jcr:
    - 107.63.8
  kubecost/cost-analyzer:
    - 1.105.1
  new-relic/nri-bundle:
    - 5.0.24
  openebs/openebs:
    - 3.8.0
  redpanda/redpanda:
    - 5.0.6
  speedscale/speedscale-operator:
    - 1.3.23
  sysdig/sysdig:
    - 1.16.4
  traefik/traefik:
    - 23.2.0
```
pull/845/head
github-actions[bot] 2023-07-31 11:47:01 +00:00
parent fae9f02fa6
commit 79ac1a00e3
218 changed files with 8228 additions and 1137 deletions

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

View File

@ -1,7 +1,7 @@
annotations:
artifacthub.io/changes: |
- kind: changed
description: Update to app version v2.7.9
- kind: added
description: Extra secret labels with .Values.notifications.secret.labels
artifacthub.io/signKey: |
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
@ -33,4 +33,4 @@ name: argo-cd
sources:
- https://github.com/argoproj/argo-helm/tree/main/charts/argo-cd
- https://github.com/argoproj/argo-cd
version: 5.41.2
version: 5.42.0

View File

@ -1195,6 +1195,7 @@ If you want to use an existing Redis (eg. a managed service from a cloud provide
| notifications.secret.annotations | object | `{}` | key:value pairs of annotations to be added to the secret |
| notifications.secret.create | bool | `true` | Whether helm chart creates notifications controller secret |
| notifications.secret.items | object | `{}` | Generic key:value pairs to be inserted into the secret |
| notifications.secret.labels | object | `{}` | key:value pairs of labels to be added to the secret |
| notifications.serviceAccount.annotations | object | `{}` | Annotations applied to created service account |
| notifications.serviceAccount.automountServiceAccountToken | bool | `true` | Automount API credentials for the Service Account |
| notifications.serviceAccount.create | bool | `true` | Create notifications controller service account |

View File

@ -6,6 +6,9 @@ metadata:
namespace: {{ .Release.Namespace | quote }}
labels:
{{- include "argo-cd.labels" (dict "context" . "component" .Values.notifications.name "name" .Values.notifications.name) | nindent 4 }}
{{- with .Values.notifications.secret.labels }}
{{- toYaml . | nindent 4 }}
{{- end }}
{{- with .Values.notifications.secret.annotations }}
annotations:
{{- range $key, $value := . }}

View File

@ -2795,6 +2795,9 @@ notifications:
# -- key:value pairs of annotations to be added to the secret
annotations: {}
# -- key:value pairs of labels to be added to the secret
labels: {}
# -- Generic key:value pairs to be inserted into the secret
## Can be used for templates, notification services etc. Some examples given below.
## For more information: https://argocd-notifications.readthedocs.io/en/stable/services/overview/

View File

@ -58,4 +58,4 @@ maintainers:
url: https://github.com/asserts
name: asserts
type: application
version: 1.47.0
version: 1.50.0

View File

@ -395,7 +395,7 @@ data:
aws_exporter:
tenant_mode: multi-tenant
deployment_mode: multi-tenant-single-instance
enabled: false
enabled: {{ .Values.server.awsExporterEnabled | default "false"}}
hekate:
enable: false

View File

@ -50,6 +50,7 @@ serviceMonitor:
endpoints:
- port: http
path: /api-server/actuator/prometheus
honorLabels: true
relabelings:
- sourceLabels: [job]
regex: "{{.Release.Name}}-server"
@ -154,7 +155,7 @@ server:
repository: asserts/asserts-server
pullPolicy: IfNotPresent
## Overrides the image tag whose default is the chart appVersion.
tag: v0.2.675
tag: v0.2.709
resources:
requests:
@ -251,6 +252,8 @@ server:
## When set, will use the existing PVC for persistence
existingClaim: ""
awsExporterEnabled: false
## Asserts authorization server configuration
##
authorization:
@ -263,7 +266,7 @@ authorization:
repository: asserts/authorization
pullPolicy: IfNotPresent
## Overrides the image tag whose default is the chart appVersion.
tag: v0.2.675
tag: v0.2.709
resources:
requests:
@ -329,7 +332,7 @@ ui:
repository: asserts/asserts-ui
pullPolicy: IfNotPresent
## Overrides the image tag whose default is the chart appVersion.
tag: v0.1.1254
tag: v0.1.1271
imagePullSecrets: []
@ -420,7 +423,7 @@ grafana:
repository: asserts/grafana
pullPolicy: IfNotPresent
## Overrides the image tag whose default is the chart appVersion.
tag: v1.0.230
tag: v1.0.231
resources:
requests:

View File

@ -6,7 +6,7 @@ annotations:
category: Database
licenses: Apache-2.0
apiVersion: v2
appVersion: 4.1.2
appVersion: 4.1.3
dependencies:
- name: common
repository: file://./charts/common
@ -28,4 +28,4 @@ maintainers:
name: cassandra
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/cassandra
version: 10.4.4
version: 10.4.5

View File

@ -78,10 +78,10 @@ The command removes all the Kubernetes components associated with the chart and
### Cassandra parameters
| Name | Description | Value |
| ----------------------------- | ---------------------------------------------------------------------------------------------------------------------- | --------------------- |
| ----------------------------- | ---------------------------------------------------------------------------------------------------------------------- | -------------------- |
| `image.registry` | Cassandra image registry | `docker.io` |
| `image.repository` | Cassandra image repository | `bitnami/cassandra` |
| `image.tag` | Cassandra image tag (immutable tags are recommended) | `4.1.2-debian-11-r15` |
| `image.tag` | Cassandra image tag (immutable tags are recommended) | `4.1.3-debian-11-r0` |
| `image.digest` | Cassandra image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `image.pullPolicy` | image pull policy | `IfNotPresent` |
| `image.pullSecrets` | Cassandra image pull secrets | `[]` |
@ -232,7 +232,7 @@ The command removes all the Kubernetes components associated with the chart and
| `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume | `false` |
| `volumePermissions.image.registry` | Init container volume image registry | `docker.io` |
| `volumePermissions.image.repository` | Init container volume image repository | `bitnami/os-shell` |
| `volumePermissions.image.tag` | Init container volume image tag (immutable tags are recommended) | `11-debian-11-r2` |
| `volumePermissions.image.tag` | Init container volume image tag (immutable tags are recommended) | `11-debian-11-r16` |
| `volumePermissions.image.digest` | Init container volume image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `volumePermissions.image.pullPolicy` | Init container volume pull policy | `IfNotPresent` |
| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
@ -247,7 +247,7 @@ The command removes all the Kubernetes components associated with the chart and
| `metrics.enabled` | Start a side-car prometheus exporter | `false` |
| `metrics.image.registry` | Cassandra exporter image registry | `docker.io` |
| `metrics.image.repository` | Cassandra exporter image name | `bitnami/cassandra-exporter` |
| `metrics.image.tag` | Cassandra exporter image tag | `2.3.8-debian-11-r138` |
| `metrics.image.tag` | Cassandra exporter image tag | `2.3.8-debian-11-r358` |
| `metrics.image.digest` | Cassandra exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `metrics.image.pullPolicy` | image pull policy | `IfNotPresent` |
| `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |

View File

@ -76,7 +76,7 @@ diagnosticMode:
image:
registry: docker.io
repository: bitnami/cassandra
tag: 4.1.2-debian-11-r15
tag: 4.1.3-debian-11-r0
digest: ""
## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
@ -616,7 +616,7 @@ volumePermissions:
image:
registry: docker.io
repository: bitnami/os-shell
tag: 11-debian-11-r2
tag: 11-debian-11-r16
digest: ""
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets.
@ -685,7 +685,7 @@ metrics:
registry: docker.io
pullPolicy: IfNotPresent
repository: bitnami/cassandra-exporter
tag: 2.3.8-debian-11-r138
tag: 2.3.8-debian-11-r358
digest: ""
## Optionally specify an array of imagePullSecrets.
## Secrets must be manually created in the namespace.

View File

@ -31,4 +31,4 @@ maintainers:
name: postgresql
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/postgresql
version: 12.7.0
version: 12.7.1

View File

@ -100,7 +100,7 @@ kubectl delete pvc -l release=my-release
| ---------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------- |
| `image.registry` | PostgreSQL image registry | `docker.io` |
| `image.repository` | PostgreSQL image repository | `bitnami/postgresql` |
| `image.tag` | PostgreSQL image tag (immutable tags are recommended) | `15.3.0-debian-11-r74` |
| `image.tag` | PostgreSQL image tag (immutable tags are recommended) | `15.3.0-debian-11-r75` |
| `image.digest` | PostgreSQL image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `image.pullPolicy` | PostgreSQL image pull policy | `IfNotPresent` |
| `image.pullSecrets` | Specify image pull secrets | `[]` |
@ -387,7 +387,7 @@ kubectl delete pvc -l release=my-release
| `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume | `false` |
| `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` |
| `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` |
| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r16` |
| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r19` |
| `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` |
| `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` |
@ -418,7 +418,7 @@ kubectl delete pvc -l release=my-release
| `metrics.enabled` | Start a prometheus exporter | `false` |
| `metrics.image.registry` | PostgreSQL Prometheus Exporter image registry | `docker.io` |
| `metrics.image.repository` | PostgreSQL Prometheus Exporter image repository | `bitnami/postgres-exporter` |
| `metrics.image.tag` | PostgreSQL Prometheus Exporter image tag (immutable tags are recommended) | `0.13.2-debian-11-r0` |
| `metrics.image.tag` | PostgreSQL Prometheus Exporter image tag (immutable tags are recommended) | `0.13.2-debian-11-r1` |
| `metrics.image.digest` | PostgreSQL image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `metrics.image.pullPolicy` | PostgreSQL Prometheus Exporter image pull policy | `IfNotPresent` |
| `metrics.image.pullSecrets` | Specify image pull secrets | `[]` |

View File

@ -98,7 +98,7 @@ diagnosticMode:
image:
registry: docker.io
repository: bitnami/postgresql
tag: 15.3.0-debian-11-r74
tag: 15.3.0-debian-11-r75
digest: ""
## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
@ -1165,7 +1165,7 @@ volumePermissions:
image:
registry: docker.io
repository: bitnami/os-shell
tag: 11-debian-11-r16
tag: 11-debian-11-r19
digest: ""
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets.
@ -1266,7 +1266,7 @@ metrics:
image:
registry: docker.io
repository: bitnami/postgres-exporter
tag: 0.13.2-debian-11-r0
tag: 0.13.2-debian-11-r1
digest: ""
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets.

View File

@ -28,4 +28,4 @@ maintainers:
name: redis
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/redis
version: 17.14.1
version: 17.14.3

View File

@ -98,10 +98,10 @@ The command removes all the Kubernetes components associated with the chart and
### Redis® Image parameters
| Name | Description | Value |
| ------------------- | ---------------------------------------------------------------------------------------------------------- | --------------------- |
| ------------------- | ---------------------------------------------------------------------------------------------------------- | ---------------------- |
| `image.registry` | Redis® image registry | `docker.io` |
| `image.repository` | Redis® image repository | `bitnami/redis` |
| `image.tag` | Redis® image tag (immutable tags are recommended) | `7.0.12-debian-11-r2` |
| `image.tag` | Redis® image tag (immutable tags are recommended) | `7.0.12-debian-11-r15` |
| `image.digest` | Redis® image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `image.pullPolicy` | Redis® image pull policy | `IfNotPresent` |
| `image.pullSecrets` | Redis® image pull secrets | `[]` |
@ -345,7 +345,7 @@ The command removes all the Kubernetes components associated with the chart and
| `sentinel.enabled` | Use Redis® Sentinel on Redis® pods. | `false` |
| `sentinel.image.registry` | Redis® Sentinel image registry | `docker.io` |
| `sentinel.image.repository` | Redis® Sentinel image repository | `bitnami/redis-sentinel` |
| `sentinel.image.tag` | Redis® Sentinel image tag (immutable tags are recommended) | `7.0.12-debian-11-r1` |
| `sentinel.image.tag` | Redis® Sentinel image tag (immutable tags are recommended) | `7.0.12-debian-11-r13` |
| `sentinel.image.digest` | Redis® Sentinel image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `sentinel.image.pullPolicy` | Redis® Sentinel image pull policy | `IfNotPresent` |
| `sentinel.image.pullSecrets` | Redis® Sentinel image pull secrets | `[]` |
@ -468,7 +468,7 @@ The command removes all the Kubernetes components associated with the chart and
| `metrics.enabled` | Start a sidecar prometheus exporter to expose Redis® metrics | `false` |
| `metrics.image.registry` | Redis® Exporter image registry | `docker.io` |
| `metrics.image.repository` | Redis® Exporter image repository | `bitnami/redis-exporter` |
| `metrics.image.tag` | Redis® Exporter image tag (immutable tags are recommended) | `1.51.0-debian-11-r11` |
| `metrics.image.tag` | Redis® Exporter image tag (immutable tags are recommended) | `1.52.0-debian-11-r0` |
| `metrics.image.digest` | Redis® Exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `metrics.image.pullPolicy` | Redis® Exporter image pull policy | `IfNotPresent` |
| `metrics.image.pullSecrets` | Redis® Exporter image pull secrets | `[]` |
@ -541,7 +541,7 @@ The command removes all the Kubernetes components associated with the chart and
| `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` |
| `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` |
| `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` |
| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r3` |
| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r19` |
| `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` |
| `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` |
@ -551,7 +551,7 @@ The command removes all the Kubernetes components associated with the chart and
| `sysctl.enabled` | Enable init container to modify Kernel settings | `false` |
| `sysctl.image.registry` | OS Shell + Utility image registry | `docker.io` |
| `sysctl.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` |
| `sysctl.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r3` |
| `sysctl.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r19` |
| `sysctl.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `sysctl.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` |
| `sysctl.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` |

View File

@ -91,7 +91,7 @@ diagnosticMode:
image:
registry: docker.io
repository: bitnami/redis
tag: 7.0.12-debian-11-r2
tag: 7.0.12-debian-11-r15
digest: ""
## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
@ -1030,7 +1030,7 @@ sentinel:
image:
registry: docker.io
repository: bitnami/redis-sentinel
tag: 7.0.12-debian-11-r1
tag: 7.0.12-debian-11-r13
digest: ""
## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
@ -1485,7 +1485,7 @@ metrics:
image:
registry: docker.io
repository: bitnami/redis-exporter
tag: 1.51.0-debian-11-r11
tag: 1.52.0-debian-11-r0
digest: ""
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets.
@ -1759,7 +1759,7 @@ volumePermissions:
image:
registry: docker.io
repository: bitnami/os-shell
tag: 11-debian-11-r3
tag: 11-debian-11-r19
digest: ""
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets.
@ -1807,7 +1807,7 @@ sysctl:
image:
registry: docker.io
repository: bitnami/os-shell
tag: 11-debian-11-r3
tag: 11-debian-11-r19
digest: ""
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets.

View File

@ -27,4 +27,4 @@ maintainers:
name: spark
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/spark
version: 7.1.1
version: 7.1.2

View File

@ -83,10 +83,10 @@ The command removes all the Kubernetes components associated with the chart and
### Spark parameters
| Name | Description | Value |
| ------------------- | ----------------------------------------------------------------------------------------------------- | -------------------- |
| ------------------- | ----------------------------------------------------------------------------------------------------- | --------------------- |
| `image.registry` | Spark image registry | `docker.io` |
| `image.repository` | Spark image repository | `bitnami/spark` |
| `image.tag` | Spark image tag (immutable tags are recommended) | `3.4.1-debian-11-r6` |
| `image.tag` | Spark image tag (immutable tags are recommended) | `3.4.1-debian-11-r28` |
| `image.digest` | Spark image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `image.pullPolicy` | Spark image pull policy | `IfNotPresent` |
| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |

View File

@ -95,7 +95,7 @@ diagnosticMode:
image:
registry: docker.io
repository: bitnami/spark
tag: 3.4.1-debian-11-r6
tag: 3.4.1-debian-11-r28
digest: ""
## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'

View File

@ -31,4 +31,4 @@ maintainers:
name: tomcat
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/tomcat
version: 10.9.5
version: 10.9.6

View File

@ -78,10 +78,10 @@ The command removes all the Kubernetes components associated with the chart and
### Tomcat parameters
| Name | Description | Value |
| ----------------------------- | ------------------------------------------------------------------------------------------------------ | ---------------------- |
| ----------------------------- | ------------------------------------------------------------------------------------------------------ | ----------------------- |
| `image.registry` | Tomcat image registry | `docker.io` |
| `image.repository` | Tomcat image repository | `bitnami/tomcat` |
| `image.tag` | Tomcat image tag (immutable tags are recommended) | `10.1.11-debian-11-r1` |
| `image.tag` | Tomcat image tag (immutable tags are recommended) | `10.1.11-debian-11-r14` |
| `image.digest` | Tomcat image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `image.pullPolicy` | Tomcat image pull policy | `IfNotPresent` |
| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
@ -203,7 +203,7 @@ The command removes all the Kubernetes components associated with the chart and
| `volumePermissions.enabled` | Enable init container that changes volume permissions in the data directory | `false` |
| `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` |
| `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` |
| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r2` |
| `volumePermissions.image.tag` | Init container volume-permissions image tag | `11-debian-11-r19` |
| `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` |
| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
@ -218,7 +218,7 @@ The command removes all the Kubernetes components associated with the chart and
| `metrics.jmx.catalinaOpts` | custom option used to enabled JMX on tomcat jvm evaluated as template | `-Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.port=5555 -Dcom.sun.management.jmxremote.authenticate=false -Dcom.sun.management.jmxremote.ssl=false -Dcom.sun.management.jmxremote.local.only=true` |
| `metrics.jmx.image.registry` | JMX exporter image registry | `docker.io` |
| `metrics.jmx.image.repository` | JMX exporter image repository | `bitnami/jmx-exporter` |
| `metrics.jmx.image.tag` | JMX exporter image tag (immutable tags are recommended) | `0.19.0-debian-11-r4` |
| `metrics.jmx.image.tag` | JMX exporter image tag (immutable tags are recommended) | `0.19.0-debian-11-r25` |
| `metrics.jmx.image.digest` | JMX exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `metrics.jmx.image.pullPolicy` | JMX exporter image pull policy | `IfNotPresent` |
| `metrics.jmx.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |

View File

@ -61,7 +61,7 @@ extraDeploy: []
image:
registry: docker.io
repository: bitnami/tomcat
tag: 10.1.11-debian-11-r1
tag: 10.1.11-debian-11-r14
digest: ""
## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
@ -585,7 +585,7 @@ volumePermissions:
image:
registry: docker.io
repository: bitnami/os-shell
tag: 11-debian-11-r2
tag: 11-debian-11-r19
digest: ""
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets.
@ -645,7 +645,7 @@ metrics:
image:
registry: docker.io
repository: bitnami/jmx-exporter
tag: 0.19.0-debian-11-r4
tag: 0.19.0-debian-11-r25
digest: ""
## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'

View File

@ -1,12 +1,12 @@
dependencies:
- name: memcached
repository: oci://registry-1.docker.io/bitnamicharts
version: 6.5.5
version: 6.5.6
- name: mariadb
repository: oci://registry-1.docker.io/bitnamicharts
version: 12.2.8
version: 12.2.9
- name: common
repository: oci://registry-1.docker.io/bitnamicharts
version: 2.6.0
digest: sha256:b8bde9825ee3f69bc8d64377b147818af065ca0f24d6229a568ac8813c961b49
generated: "2023-07-19T03:32:43.61154673Z"
digest: sha256:00b9c8659345fc1a9be28d3f337b01c614c4c93fdda2234aa3b6fbc947601879
generated: "2023-07-26T23:52:22.277029253Z"

View File

@ -40,4 +40,4 @@ maintainers:
name: wordpress
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/wordpress
version: 16.1.33
version: 16.1.34

View File

@ -82,7 +82,7 @@ The command removes all the Kubernetes components associated with the chart and
| ------------------- | --------------------------------------------------------------------------------------------------------- | --------------------- |
| `image.registry` | WordPress image registry | `docker.io` |
| `image.repository` | WordPress image repository | `bitnami/wordpress` |
| `image.tag` | WordPress image tag (immutable tags are recommended) | `6.2.2-debian-11-r68` |
| `image.tag` | WordPress image tag (immutable tags are recommended) | `6.2.2-debian-11-r72` |
| `image.digest` | WordPress image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `image.pullPolicy` | WordPress image pull policy | `IfNotPresent` |
| `image.pullSecrets` | WordPress image pull secrets | `[]` |
@ -249,7 +249,7 @@ The command removes all the Kubernetes components associated with the chart and
| `volumePermissions.enabled` | Enable init container that changes the owner/group of the PV mount point to `runAsUser:fsGroup` | `false` |
| `volumePermissions.image.registry` | OS Shell + Utility image registry | `docker.io` |
| `volumePermissions.image.repository` | OS Shell + Utility image repository | `bitnami/os-shell` |
| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r13` |
| `volumePermissions.image.tag` | OS Shell + Utility image tag (immutable tags are recommended) | `11-debian-11-r19` |
| `volumePermissions.image.digest` | OS Shell + Utility image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `volumePermissions.image.pullPolicy` | OS Shell + Utility image pull policy | `IfNotPresent` |
| `volumePermissions.image.pullSecrets` | OS Shell + Utility image pull secrets | `[]` |
@ -281,7 +281,7 @@ The command removes all the Kubernetes components associated with the chart and
| `metrics.enabled` | Start a sidecar prometheus exporter to expose metrics | `false` |
| `metrics.image.registry` | Apache exporter image registry | `docker.io` |
| `metrics.image.repository` | Apache exporter image repository | `bitnami/apache-exporter` |
| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `0.13.4-debian-11-r50` |
| `metrics.image.tag` | Apache exporter image tag (immutable tags are recommended) | `0.13.4-debian-11-r55` |
| `metrics.image.digest` | Apache exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `metrics.image.pullPolicy` | Apache exporter image pull policy | `IfNotPresent` |
| `metrics.image.pullSecrets` | Apache exporter image pull secrets | `[]` |

View File

@ -26,4 +26,4 @@ maintainers:
name: mariadb
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/mariadb
version: 12.2.8
version: 12.2.9

View File

@ -86,7 +86,7 @@ The command removes all the Kubernetes components associated with the chart and
| -------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------- |
| `image.registry` | MariaDB image registry | `docker.io` |
| `image.repository` | MariaDB image repository | `bitnami/mariadb` |
| `image.tag` | MariaDB image tag (immutable tags are recommended) | `10.11.4-debian-11-r12` |
| `image.tag` | MariaDB image tag (immutable tags are recommended) | `10.11.4-debian-11-r46` |
| `image.digest` | MariaDB image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `image.pullPolicy` | MariaDB image pull policy | `IfNotPresent` |
| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
@ -308,7 +308,7 @@ The command removes all the Kubernetes components associated with the chart and
| `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume(s) mountpoint to `runAsUser:fsGroup` | `false` |
| `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` |
| `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` |
| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r2` |
| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r16` |
| `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` |
| `volumePermissions.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
@ -322,7 +322,7 @@ The command removes all the Kubernetes components associated with the chart and
| `metrics.enabled` | Start a side-car prometheus exporter | `false` |
| `metrics.image.registry` | Exporter image registry | `docker.io` |
| `metrics.image.repository` | Exporter image repository | `bitnami/mysqld-exporter` |
| `metrics.image.tag` | Exporter image tag (immutable tags are recommended) | `0.14.0-debian-11-r138` |
| `metrics.image.tag` | Exporter image tag (immutable tags are recommended) | `0.15.0-debian-11-r0` |
| `metrics.image.digest` | Exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `metrics.image.pullPolicy` | Exporter image pull policy | `IfNotPresent` |
| `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |

View File

@ -90,7 +90,7 @@ serviceBindings:
image:
registry: docker.io
repository: bitnami/mariadb
tag: 10.11.4-debian-11-r12
tag: 10.11.4-debian-11-r46
digest: ""
## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
@ -1004,7 +1004,7 @@ volumePermissions:
image:
registry: docker.io
repository: bitnami/os-shell
tag: 11-debian-11-r2
tag: 11-debian-11-r16
digest: ""
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace)
@ -1040,7 +1040,7 @@ metrics:
image:
registry: docker.io
repository: bitnami/mysqld-exporter
tag: 0.14.0-debian-11-r138
tag: 0.15.0-debian-11-r0
digest: ""
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets (secrets must be manually created in the namespace)

View File

@ -23,4 +23,4 @@ maintainers:
name: memcached
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/memcached
version: 6.5.5
version: 6.5.6

View File

@ -77,10 +77,10 @@ The command removes all the Kubernetes components associated with the chart and
### Memcached parameters
| Name | Description | Value |
| ----------------------------- | --------------------------------------------------------------------------------------------------------- | --------------------- |
| ----------------------------- | --------------------------------------------------------------------------------------------------------- | ---------------------- |
| `image.registry` | Memcached image registry | `docker.io` |
| `image.repository` | Memcached image repository | `bitnami/memcached` |
| `image.tag` | Memcached image tag (immutable tags are recommended) | `1.6.21-debian-11-r9` |
| `image.tag` | Memcached image tag (immutable tags are recommended) | `1.6.21-debian-11-r38` |
| `image.digest` | Memcached image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `image.pullPolicy` | Memcached image pull policy | `IfNotPresent` |
| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
@ -207,7 +207,7 @@ The command removes all the Kubernetes components associated with the chart and
| `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume | `false` |
| `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` |
| `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` |
| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r2` |
| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r16` |
| `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` |
| `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` |
@ -217,7 +217,7 @@ The command removes all the Kubernetes components associated with the chart and
| `metrics.enabled` | Start a side-car prometheus exporter | `false` |
| `metrics.image.registry` | Memcached exporter image registry | `docker.io` |
| `metrics.image.repository` | Memcached exporter image repository | `bitnami/memcached-exporter` |
| `metrics.image.tag` | Memcached exporter image tag (immutable tags are recommended) | `0.13.0-debian-11-r13` |
| `metrics.image.tag` | Memcached exporter image tag (immutable tags are recommended) | `0.13.0-debian-11-r51` |
| `metrics.image.digest` | Memcached exporter image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `metrics.image.pullPolicy` | Image pull policy | `IfNotPresent` |
| `metrics.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |

View File

@ -73,7 +73,7 @@ diagnosticMode:
image:
registry: docker.io
repository: bitnami/memcached
tag: 1.6.21-debian-11-r9
tag: 1.6.21-debian-11-r38
digest: ""
## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
@ -515,7 +515,7 @@ volumePermissions:
image:
registry: docker.io
repository: bitnami/os-shell
tag: 11-debian-11-r2
tag: 11-debian-11-r16
digest: ""
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets.
@ -560,7 +560,7 @@ metrics:
image:
registry: docker.io
repository: bitnami/memcached-exporter
tag: 0.13.0-debian-11-r13
tag: 0.13.0-debian-11-r51
digest: ""
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets.

View File

@ -76,7 +76,7 @@ diagnosticMode:
image:
registry: docker.io
repository: bitnami/wordpress
tag: 6.2.2-debian-11-r68
tag: 6.2.2-debian-11-r72
digest: ""
## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
@ -766,7 +766,7 @@ volumePermissions:
image:
registry: docker.io
repository: bitnami/os-shell
tag: 11-debian-11-r13
tag: 11-debian-11-r19
digest: ""
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets.
@ -860,7 +860,7 @@ metrics:
image:
registry: docker.io
repository: bitnami/apache-exporter
tag: 0.13.4-debian-11-r50
tag: 0.13.4-debian-11-r55
digest: ""
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets.

View File

@ -25,4 +25,4 @@ maintainers:
name: zookeeper
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/zookeeper
version: 11.4.9
version: 11.4.10

View File

@ -82,7 +82,7 @@ The command removes all the Kubernetes components associated with the chart and
| ----------------------------- | -------------------------------------------------------------------------------------------------------------------------- | ----------------------- |
| `image.registry` | ZooKeeper image registry | `docker.io` |
| `image.repository` | ZooKeeper image repository | `bitnami/zookeeper` |
| `image.tag` | ZooKeeper image tag (immutable tags are recommended) | `3.8.2-debian-11-r4` |
| `image.tag` | ZooKeeper image tag (immutable tags are recommended) | `3.8.2-debian-11-r7` |
| `image.digest` | ZooKeeper image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `image.pullPolicy` | ZooKeeper image pull policy | `IfNotPresent` |
| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
@ -248,7 +248,7 @@ The command removes all the Kubernetes components associated with the chart and
| `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume | `false` |
| `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` |
| `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/os-shell` |
| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r13` |
| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `11-debian-11-r19` |
| `volumePermissions.image.digest` | Init container volume-permissions image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` |
| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` |
| `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` |

View File

@ -79,7 +79,7 @@ diagnosticMode:
image:
registry: docker.io
repository: bitnami/zookeeper
tag: 3.8.2-debian-11-r4
tag: 3.8.2-debian-11-r7
digest: ""
## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
@ -663,7 +663,7 @@ volumePermissions:
image:
registry: docker.io
repository: bitnami/os-shell
tag: 11-debian-11-r13
tag: 11-debian-11-r19
digest: ""
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets.

View File

@ -9,7 +9,7 @@ annotations:
catalog.cattle.io/namespace: cert-manager
catalog.cattle.io/release-name: cert-manager
apiVersion: v1
appVersion: v1.12.2
appVersion: v1.12.3
description: A Helm chart for cert-manager
home: https://github.com/cert-manager/cert-manager
icon: https://raw.githubusercontent.com/cert-manager/cert-manager/d53c0b9270f8cd90d908460d69502694e1838f5f/logo/logo-small.png
@ -26,4 +26,4 @@ maintainers:
name: cert-manager
sources:
- https://github.com/cert-manager/cert-manager
version: v1.12.2
version: v1.12.3

View File

@ -19,7 +19,7 @@ Before installing the chart, you must first install the cert-manager CustomResou
This is performed in a separate step to allow you to easily uninstall and reinstall cert-manager without deleting your installed custom resources.
```bash
$ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.12.2/cert-manager.crds.yaml
$ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.12.3/cert-manager.crds.yaml
```
To install the chart with the release name `my-release`:
@ -29,7 +29,7 @@ To install the chart with the release name `my-release`:
$ helm repo add jetstack https://charts.jetstack.io
## Install the cert-manager helm chart
$ helm install my-release --namespace cert-manager --version v1.12.2 jetstack/cert-manager
$ helm install my-release --namespace cert-manager --version v1.12.3 jetstack/cert-manager
```
In order to begin issuing certificates, you will need to set up a ClusterIssuer
@ -65,7 +65,7 @@ If you want to completely uninstall cert-manager from your cluster, you will als
delete the previously installed CustomResourceDefinition resources:
```console
$ kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.12.2/cert-manager.crds.yaml
$ kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.12.3/cert-manager.crds.yaml
```
## Configuration
@ -86,7 +86,7 @@ The following table lists the configurable parameters of the cert-manager chart
| `global.leaderElection.retryPeriod` | The duration the clients should wait between attempting acquisition and renewal of a leadership | |
| `installCRDs` | If true, CRD resources will be installed as part of the Helm chart. If enabled, when uninstalling CRD resources will be deleted causing all installed custom resources to be DELETED | `false` |
| `image.repository` | Image repository | `quay.io/jetstack/cert-manager-controller` |
| `image.tag` | Image tag | `v1.12.2` |
| `image.tag` | Image tag | `v1.12.3` |
| `image.pullPolicy` | Image pull policy | `IfNotPresent` |
| `replicaCount` | Number of cert-manager replicas | `1` |
| `clusterResourceNamespace` | Override the namespace used to store DNS provider credentials etc. for ClusterIssuer resources | Same namespace as cert-manager pod |
@ -169,7 +169,7 @@ The following table lists the configurable parameters of the cert-manager chart
| `webhook.tolerations` | Node tolerations for webhook pod assignment | `[]` |
| `webhook.topologySpreadConstraints` | Topology spread constraints for webhook pod assignment | `[]` |
| `webhook.image.repository` | Webhook image repository | `quay.io/jetstack/cert-manager-webhook` |
| `webhook.image.tag` | Webhook image tag | `v1.12.2` |
| `webhook.image.tag` | Webhook image tag | `v1.12.3` |
| `webhook.image.pullPolicy` | Webhook image pull policy | `IfNotPresent` |
| `webhook.securePort` | The port that the webhook should listen on for requests. | `10250` |
| `webhook.securityContext` | Security context for webhook pod assignment | refer to [Default Security Contexts](#default-security-contexts) |
@ -207,12 +207,12 @@ The following table lists the configurable parameters of the cert-manager chart
| `cainjector.tolerations` | Node tolerations for cainjector pod assignment | `[]` |
| `cainjector.topologySpreadConstraints` | Topology spread constraints for cainjector pod assignment | `[]` |
| `cainjector.image.repository` | cainjector image repository | `quay.io/jetstack/cert-manager-cainjector` |
| `cainjector.image.tag` | cainjector image tag | `v1.12.2` |
| `cainjector.image.tag` | cainjector image tag | `v1.12.3` |
| `cainjector.image.pullPolicy` | cainjector image pull policy | `IfNotPresent` |
| `cainjector.securityContext` | Security context for cainjector pod assignment | refer to [Default Security Contexts](#default-security-contexts) |
| `cainjector.containerSecurityContext` | Security context to be set on cainjector component container | refer to [Default Security Contexts](#default-security-contexts) |
| `acmesolver.image.repository` | acmesolver image repository | `quay.io/jetstack/cert-manager-acmesolver` |
| `acmesolver.image.tag` | acmesolver image tag | `v1.12.2` |
| `acmesolver.image.tag` | acmesolver image tag | `v1.12.3` |
| `acmesolver.image.pullPolicy` | acmesolver image pull policy | `IfNotPresent` |
| `startupapicheck.enabled` | Toggles whether the startupapicheck Job should be installed | `true` |
| `startupapicheck.securityContext` | Security context for startupapicheck pod assignment | refer to [Default Security Contexts](#default-security-contexts) |
@ -228,7 +228,7 @@ The following table lists the configurable parameters of the cert-manager chart
| `startupapicheck.tolerations` | Node tolerations for startupapicheck pod assignment | `[]` |
| `startupapicheck.podLabels` | Optional additional labels to add to the startupapicheck Pods | `{}` |
| `startupapicheck.image.repository` | startupapicheck image repository | `quay.io/jetstack/cert-manager-ctl` |
| `startupapicheck.image.tag` | startupapicheck image tag | `v1.12.2` |
| `startupapicheck.image.tag` | startupapicheck image tag | `v1.12.3` |
| `startupapicheck.image.pullPolicy` | startupapicheck image pull policy | `IfNotPresent` |
| `startupapicheck.serviceAccount.create` | If `true`, create a new service account for the startupapicheck component | `true` |
| `startupapicheck.serviceAccount.name` | Service account for the startupapicheck component to be used. If not set and `startupapicheck.serviceAccount.create` is `true`, a name is generated using the fullname template | |

View File

@ -1,5 +1,9 @@
# Changelog
## 1.0.8
* Minor spelling corrections in the `datadog-operator` chart.
## 1.0.7
* Fix clusterrole to include `extensions` group for `customresourcedefinitions` resource.

View File

@ -26,4 +26,4 @@ name: datadog-operator
sources:
- https://app.datadoghq.com/account/settings#agent/kubernetes
- https://github.com/DataDog/datadog-agent
version: 1.0.7
version: 1.0.8

View File

@ -1,6 +1,6 @@
# Datadog Operator
![Version: 1.0.7](https://img.shields.io/badge/Version-1.0.7-informational?style=flat-square) ![AppVersion: 1.0.3](https://img.shields.io/badge/AppVersion-1.0.3-informational?style=flat-square)
![Version: 1.0.8](https://img.shields.io/badge/Version-1.0.8-informational?style=flat-square) ![AppVersion: 1.0.3](https://img.shields.io/badge/AppVersion-1.0.3-informational?style=flat-square)
## Values
@ -13,7 +13,7 @@
| appKeyExistingSecret | string | `nil` | Use existing Secret which stores APP key instead of creating a new one |
| collectOperatorMetrics | bool | `true` | Configures an openmetrics check to collect operator metrics |
| containerSecurityContext | object | `{}` | A security context defines privileges and access control settings for a container. |
| datadogAgent.enabled | bool | `true` | Enables Datadog Agetn controller |
| datadogAgent.enabled | bool | `true` | Enables Datadog Agent controller |
| datadogCRDs.crds.datadogAgents | bool | `true` | |
| datadogCRDs.crds.datadogMetrics | bool | `true` | |
| datadogCRDs.crds.datadogMonitors | bool | `true` | |

View File

@ -66,7 +66,7 @@ secretBackend:
# secretBackend.arguments -- Specifies the space-separated arguments passed to the command that implements the secret backend api
arguments: ""
datadogAgent:
# datadogAgent.enabled -- Enables Datadog Agetn controller
# datadogAgent.enabled -- Enables Datadog Agent controller
enabled: true
datadogMonitor:
# datadogMonitor.enabled -- Enables the Datadog Monitor controller

View File

@ -1,5 +1,17 @@
# Datadog changelog
## 3.33.6
* Ensure the core agent is aware that CSPM is enabled (for inventories purposes).
## 3.33.5
* Daemonset includes `logdatadog` volume when rendered for `targetSystem: "windows"`
## 3.33.4
* Update `fips.image.tag` to `0.5.4` increasing the health checks interval from 2 to 10 seconds in the FIPS compliant side car container
## 3.33.3
* Remove `datadog.dataStreamsMonitoring.enabled` parameter.

View File

@ -19,4 +19,4 @@ name: datadog
sources:
- https://app.datadoghq.com/account/settings#agent/kubernetes
- https://github.com/DataDog/datadog-agent
version: 3.33.3
version: 3.33.6

View File

@ -1,6 +1,6 @@
# Datadog
![Version: 3.33.3](https://img.shields.io/badge/Version-3.33.3-informational?style=flat-square) ![AppVersion: 7](https://img.shields.io/badge/AppVersion-7-informational?style=flat-square)
![Version: 3.33.6](https://img.shields.io/badge/Version-3.33.6-informational?style=flat-square) ![AppVersion: 7](https://img.shields.io/badge/AppVersion-7-informational?style=flat-square)
[Datadog](https://www.datadoghq.com/) is a hosted infrastructure monitoring platform. This chart adds the Datadog Agent to all nodes in your cluster via a DaemonSet. It also optionally depends on the [kube-state-metrics chart](https://github.com/prometheus-community/helm-charts/tree/main/charts/kube-state-metrics). For more information about monitoring Kubernetes with Datadog, please refer to the [Datadog documentation website](https://docs.datadoghq.com/agent/basic_agent_usage/kubernetes/).
@ -738,7 +738,7 @@ helm install <RELEASE_NAME> \
| fips.image.name | string | `"fips-proxy"` | |
| fips.image.pullPolicy | string | `"IfNotPresent"` | Datadog the FIPS sidecar image pull policy |
| fips.image.repository | string | `nil` | |
| fips.image.tag | string | `"0.5.3"` | Define the FIPS sidecar container version to use. |
| fips.image.tag | string | `"0.5.4"` | Define the FIPS sidecar container version to use. |
| fips.local_address | string | `"127.0.0.1"` | |
| fips.port | int | `9803` | |
| fips.portRange | int | `15` | |

View File

@ -150,6 +150,8 @@
{{- end }}
- name: DD_EXPVAR_PORT
value: {{ .Values.datadog.expvarPort | quote }}
- name: DD_COMPLIANCE_CONFIG_ENABLED
value: {{ .Values.datadog.securityAgent.compliance.enabled | quote }}
{{- include "additional-env-entries" .Values.agents.containers.agent.env | indent 4 }}
{{- include "additional-env-dict-entries" .Values.agents.containers.agent.envDict | indent 4 }}
volumeMounts:

View File

@ -34,6 +34,6 @@
name: containerdsocket
{{- end }}
{{- end }}
{{- end -}}
- name: logdatadog
emptyDir: {}
{{- end -}}

View File

@ -1171,7 +1171,7 @@ fips:
name: fips-proxy
# fips.image.tag -- Define the FIPS sidecar container version to use.
tag: 0.5.3
tag: 0.5.4
# fips.image.pullPolicy -- Datadog the FIPS sidecar image pull policy
pullPolicy: IfNotPresent

View File

@ -12,4 +12,4 @@ maintainers:
- email: robertb@fairwinds.com
name: rbren
name: polaris
version: 5.11.1
version: 5.11.2

View File

@ -4,7 +4,7 @@ annotations:
catalog.cattle.io/kube-version: '>=1.20-0'
catalog.cattle.io/release-name: harbor
apiVersion: v1
appVersion: 2.8.2
appVersion: 2.8.3
description: An open source trusted cloud native registry that stores, signs, and
scans content
home: https://goharbor.io
@ -24,4 +24,4 @@ name: harbor
sources:
- https://github.com/goharbor/harbor
- https://github.com/goharbor/harbor-helm
version: 1.12.2
version: 1.12.3

View File

@ -400,7 +400,7 @@ enableMigrateHelmHook: false
nginx:
image:
repository: goharbor/nginx-photon
tag: v2.8.2
tag: v2.8.3
# set the service account to be used, default if left empty
serviceAccountName: ""
# mount the service account token
@ -422,7 +422,7 @@ nginx:
portal:
image:
repository: goharbor/harbor-portal
tag: v2.8.2
tag: v2.8.3
# set the service account to be used, default if left empty
serviceAccountName: ""
# mount the service account token
@ -444,7 +444,7 @@ portal:
core:
image:
repository: goharbor/harbor-core
tag: v2.8.2
tag: v2.8.3
# set the service account to be used, default if left empty
serviceAccountName: ""
# mount the service account token
@ -497,7 +497,7 @@ core:
jobservice:
image:
repository: goharbor/harbor-jobservice
tag: v2.8.2
tag: v2.8.3
replicas: 1
revisionHistoryLimit: 10
# set the service account to be used, default if left empty
@ -545,7 +545,7 @@ registry:
registry:
image:
repository: goharbor/registry-photon
tag: v2.8.2
tag: v2.8.3
# resources:
# requests:
# memory: 256Mi
@ -553,7 +553,7 @@ registry:
controller:
image:
repository: goharbor/harbor-registryctl
tag: v2.8.2
tag: v2.8.3
# resources:
# requests:
@ -610,7 +610,7 @@ trivy:
# repository the repository for Trivy adapter image
repository: goharbor/trivy-adapter-photon
# tag the tag for Trivy adapter image
tag: v2.8.2
tag: v2.8.3
# set the service account to be used, default if left empty
serviceAccountName: ""
# mount the service account token
@ -685,7 +685,7 @@ notary:
automountServiceAccountToken: false
image:
repository: goharbor/notary-server-photon
tag: v2.8.2
tag: v2.8.3
replicas: 1
# resources:
# requests:
@ -707,7 +707,7 @@ notary:
automountServiceAccountToken: false
image:
repository: goharbor/notary-signer-photon
tag: v2.8.2
tag: v2.8.3
replicas: 1
# resources:
# requests:
@ -739,7 +739,7 @@ database:
automountServiceAccountToken: false
image:
repository: goharbor/harbor-db
tag: v2.8.2
tag: v2.8.3
# The initial superuser password for internal database
password: "changeit"
# The size limit for Shared memory, pgSQL use it for shared_buffer
@ -811,7 +811,7 @@ redis:
automountServiceAccountToken: false
image:
repository: goharbor/redis-photon
tag: v2.8.2
tag: v2.8.3
# resources:
# requests:
# memory: 256Mi
@ -855,7 +855,7 @@ exporter:
automountServiceAccountToken: false
image:
repository: goharbor/harbor-exporter
tag: v2.8.2
tag: v2.8.3
nodeSelector: {}
tolerations: []
affinity: {}

View File

@ -12,6 +12,15 @@ Use the following links to reference issues, PRs, and commits prior to v2.6.0.
The changelog until v1.5.7 was auto-generated based on git commits.
Those entries include a reference to the git commit to be able to get more details.
## 4.5.0
Added `.Values.persistence.dataSource` to allow cloning home PVC from existing dataSource.
## 4.4.2
Update Jenkins image and appVersion to jenkins lts release version 2.401.3
## 4.4.1
Added `.Values.agent.jnlpregistry` to allow agents to be configured with private registry.

View File

@ -2,7 +2,7 @@ annotations:
artifacthub.io/category: integration-delivery
artifacthub.io/images: |
- name: jenkins
image: jenkins/jenkins:2.401.2-jdk11
image: jenkins/jenkins:2.401.3-jdk11
- name: k8s-sidecar
image: kiwigrid/k8s-sidecar:1.24.4
- name: inbound-agent
@ -22,7 +22,7 @@ annotations:
catalog.cattle.io/kube-version: '>=1.14-0'
catalog.cattle.io/release-name: jenkins
apiVersion: v2
appVersion: 2.401.2
appVersion: 2.401.3
description: Jenkins - Build great things at any scale! The leading open source automation
server, Jenkins provides hundreds of plugins to support building, deploying and
automating any project.
@ -49,4 +49,4 @@ sources:
- https://github.com/jenkinsci/docker-inbound-agent
- https://github.com/maorfr/kube-tasks
- https://github.com/jenkinsci/configuration-as-code-plugin
version: 4.4.1
version: 4.5.0

View File

@ -359,7 +359,7 @@ The following tables list the configurable parameters of the Jenkins chart and t
### Persistence
| Parameter | Description | Default |
| --------------------------- | ------------------------------- | --------------- |
| --------------------------- | -------------------------------------- | --------------- |
| `persistence.enabled` | Enable the use of a Jenkins PVC | `true` |
| `persistence.existingClaim` | Provide the name of a PVC | `nil` |
| `persistence.storageClass` | Storage class for the PVC | `nil` |
@ -367,6 +367,7 @@ The following tables list the configurable parameters of the Jenkins chart and t
| `persistence.labels` | Labels for the PVC | `{}` |
| `persistence.accessMode` | The PVC access mode | `ReadWriteOnce` |
| `persistence.size` | The size of the PVC | `8Gi` |
| `persistence.dataSource` | Existing data source to clone PVC from | `nil` |
| `persistence.subPath` | SubPath for jenkins-home mount | `nil` |
| `persistence.volumes` | Additional volumes | `nil` |
| `persistence.mounts` | Additional mounts | `nil` |

View File

@ -21,6 +21,10 @@ metadata:
{{ toYaml .Values.persistence.labels | indent 4 }}
{{- end }}
spec:
{{- if .Values.persistence.dataSource }}
dataSource:
{{ toYaml .Values.persistence.dataSource | indent 4 }}
{{- end }}
accessModes:
- {{ .Values.persistence.accessMode | quote }}
resources:

View File

@ -22,7 +22,7 @@ controller:
# Used for label app.kubernetes.io/component
componentName: "jenkins-controller"
image: "jenkins/jenkins"
# tag: "2.401.2-jdk11"
# tag: "2.401.3-jdk11"
tagLabel: jdk11
imagePullPolicy: "Always"
imagePullSecretName:
@ -850,6 +850,11 @@ persistence:
labels: {}
accessMode: "ReadWriteOnce"
size: "8Gi"
# Existing data source to clone PVC from
# ref: https://kubernetes.io/docs/concepts/storage/volume-pvc-datasource/
dataSource:
# name: PVC-NAME
# kind: PersistentVolumeClaim
volumes:
# - name: nothing
# emptyDir: {}

View File

@ -1,7 +1,7 @@
# JFrog Artifactory-ha Chart Changelog
All changes to this chart will be documented in this file
## [107.63.7] - Jul 20, 2023
## [107.63.8] - Jul 20, 2023
* Added support for Openshift by adding the securityContext in container level.
* **IMPORTANT**
* Nginx deployment is disabled on openshift.

View File

@ -4,7 +4,7 @@ annotations:
catalog.cattle.io/kube-version: '>= 1.14.0-0'
catalog.cattle.io/release-name: artifactory-ha
apiVersion: v2
appVersion: 7.63.7
appVersion: 7.63.8
dependencies:
- condition: postgresql.enabled
name: postgresql
@ -26,4 +26,4 @@ name: artifactory-ha
sources:
- https://github.com/jfrog/charts
type: application
version: 107.63.7
version: 107.63.8

View File

@ -1,7 +1,7 @@
# JFrog Container Registry Chart Changelog
All changes to this chart will be documented in this file.
## [107.63.7] - Aug 25, 2022
## [107.63.8] - Aug 25, 2022
* Included event service as mandatory and remove the flag from values.yaml
## [107.41.0] - Jul 22, 2022

View File

@ -4,11 +4,11 @@ annotations:
catalog.cattle.io/kube-version: '>= 1.14.0-0'
catalog.cattle.io/release-name: artifactory-jcr
apiVersion: v2
appVersion: 7.63.7
appVersion: 7.63.8
dependencies:
- name: artifactory
repository: file://./charts/artifactory
version: 107.63.7
version: 107.63.8
description: JFrog Container Registry
home: https://jfrog.com/container-registry/
icon: https://raw.githubusercontent.com/jfrog/charts/ea5c3112c24a973f64f3ccd99747323db292a369/stable/artifactory-jcr/logo/jcr-logo.png
@ -27,4 +27,4 @@ name: artifactory-jcr
sources:
- https://github.com/jfrog/charts
type: application
version: 107.63.7
version: 107.63.8

View File

@ -1,7 +1,7 @@
# JFrog Artifactory Chart Changelog
All changes to this chart will be documented in this file.
## [107.63.7] - Jul 20, 2023
## [107.63.8] - Jul 20, 2023
* Added support for Openshift by adding the securityContext in container level.
* **IMPORTANT**
* Nginx deployment is disabled on openshift.

View File

@ -1,5 +1,5 @@
apiVersion: v2
appVersion: 7.63.7
appVersion: 7.63.8
dependencies:
- condition: postgresql.enabled
name: postgresql
@ -21,4 +21,4 @@ name: artifactory
sources:
- https://github.com/jfrog/charts
type: application
version: 107.63.7
version: 107.63.8

View File

@ -7,7 +7,7 @@ annotations:
catalog.cattle.io/featured: "1"
catalog.cattle.io/release-name: cost-analyzer
apiVersion: v2
appVersion: 1.105.0
appVersion: 1.105.1
dependencies:
- condition: global.grafana.enabled
name: grafana
@ -25,4 +25,4 @@ description: A Helm chart that sets up Kubecost, Prometheus, and Grafana to moni
cloud costs.
icon: https://partner-charts.rancher.io/assets/logos/kubecost.png
name: cost-analyzer
version: 1.105.0
version: 1.105.1

View File

@ -1,7 +1,7 @@
dependencies:
- name: newrelic-infrastructure
repository: https://newrelic.github.io/nri-kubernetes
version: 3.20.1
version: 3.20.2
- name: nri-prometheus
repository: https://newrelic.github.io/nri-prometheus
version: 2.1.17
@ -22,7 +22,7 @@ dependencies:
version: 3.1.2
- name: newrelic-logging
repository: https://newrelic.github.io/helm-charts
version: 1.14.2
version: 1.16.1
- name: newrelic-pixie
repository: https://newrelic.github.io/helm-charts
version: 2.1.2
@ -32,5 +32,5 @@ dependencies:
- name: newrelic-infra-operator
repository: https://newrelic.github.io/newrelic-infra-operator
version: 2.2.2
digest: sha256:b8faa679e0468c47730eed1d5a819add368db64a71da298cd8960d981ee16f9f
generated: "2023-06-23T21:08:01.803816734Z"
digest: sha256:5fb36da47b85fc7492388df2d97c69e6adc0563ab62e025942323083858d6eed
generated: "2023-07-27T19:24:50.33978983Z"

View File

@ -7,7 +7,7 @@ dependencies:
- condition: infrastructure.enabled,newrelic-infrastructure.enabled
name: newrelic-infrastructure
repository: file://./charts/newrelic-infrastructure
version: 3.20.1
version: 3.20.2
- condition: prometheus.enabled,nri-prometheus.enabled
name: nri-prometheus
repository: file://./charts/nri-prometheus
@ -35,7 +35,7 @@ dependencies:
- condition: logging.enabled,newrelic-logging.enabled
name: newrelic-logging
repository: file://./charts/newrelic-logging
version: 1.14.2
version: 1.16.1
- condition: newrelic-pixie.enabled
name: newrelic-pixie
repository: file://./charts/newrelic-pixie
@ -89,4 +89,4 @@ sources:
- https://github.com/newrelic/helm-charts/tree/master/charts/newrelic-logging
- https://github.com/newrelic/helm-charts/tree/master/charts/newrelic-pixie
- https://github.com/newrelic/newrelic-infra-operator/tree/master/charts/newrelic-infra-operator
version: 5.0.22
version: 5.0.24

View File

@ -1,5 +1,5 @@
apiVersion: v2
appVersion: 3.15.1
appVersion: 3.15.2
dependencies:
- name: common-library
repository: https://helm-charts.newrelic.com
@ -35,4 +35,4 @@ sources:
- https://github.com/newrelic/nri-kubernetes/
- https://github.com/newrelic/nri-kubernetes/tree/main/charts/newrelic-infrastructure
- https://github.com/newrelic/infrastructure-agent/
version: 3.20.1
version: 3.20.2

View File

@ -23,14 +23,14 @@ images:
forwarder:
registry: ""
repository: newrelic/k8s-events-forwarder
tag: 1.43.1
tag: 1.45.0
pullPolicy: IfNotPresent
# -- Image for the New Relic Infrastructure Agent plus integrations.
# @default -- See `values.yaml`
agent:
registry: ""
repository: newrelic/infrastructure-bundle
tag: 3.2.9
tag: 3.2.12
pullPolicy: IfNotPresent
# -- Image for the New Relic Kubernetes integration.
# @default -- See `values.yaml`

View File

@ -1,5 +1,5 @@
apiVersion: v2
appVersion: 1.16.0
appVersion: 1.17.3
dependencies:
- name: common-library
repository: https://helm-charts.newrelic.com
@ -17,4 +17,4 @@ maintainers:
- name: danybmx
- name: sdaubin
name: newrelic-logging
version: 1.14.2
version: 1.16.1

View File

@ -4,7 +4,7 @@
## Chart Details
New Relic offers a [Fluent Bit](https://fluentbit.io/) output [plugin](https://github.com/newrelic/newrelic-fluent-bit-output) to easily forward your logs to [New Relic Logs](https://docs.newrelic.com/docs/logs/new-relic-logs/get-started/introduction-new-relic-logs). This plugin is also provided in a standalone Docker image that can be installed in a [Kubernetes](https://kubernetes.io/) cluster in the form of a [DaemonSet](https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/), which we refer as the Kubernetes plugin.
This document explains how to install it in your cluster, either using a [Helm](https://helm.sh/) chart (recommended), or manually by applying Kubernetes manifests.
This document explains how to install it in your cluster using our [Helm](https://helm.sh/) chart.
## Install / Uninstall instructions
@ -155,6 +155,7 @@ See [values.yaml](values.yaml) for the default values
| `fluentBit.config.extraOutputs` | Contains extra fluent-bit.conf Outputs config | |
| `fluentBit.config.parsers` | Contains parsers.conf Parsers config | |
| `fluentBit.retryLimit` | Amount of times to retry sending a given batch of logs to New Relic. This prevents data loss if there is a temporary network disruption, if a request to the Logs API is lost or when receiving a recoverable HTTP response. Set it to "False" for unlimited retries. | 5 |
| `dnsConfig` | [DNS configuration](https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-dns-config) that will be added to the pods. Can be configured also with `global.dnsConfig`. | `{}` |
### Proxy support

View File

@ -1,66 +0,0 @@
# :warning: :warning: DEPRECATION NOTE :warning: :warning:
**The Kubernetes manifests inside this folder are deprecated and will be removed from this repository on June 30th 2023. To install the New Relic Kubernetes plugin for Logging without using Helm, please refer to this [documentation page](https://docs.newrelic.com/docs/kubernetes-pixie/kubernetes-integration/installation/kubernetes-integration-install-configure/).**
# New Relic Logs: Kubernetes manifests
This directory provides plain Kubernetes manifests that can be applied to your cluster to install the Kubernetes Logging plugin. It is provided as an alternative for those users who prefer not using Helm.
## Installation instructions
* Create a `newrelic` namespace. Run `kubectl create namespace newrelic`.
* Copy all the manifest files in this folder (*.yml files) in your local working directory.
* Configure the plugin. In new-relic-fluent-plugin.yml:
* Specify your New Relic license key in the value for LICENSE_KEY
* Specify your Kubernetes cluster name in the value for CLUSTER_NAME
* If you are in the EU:
* Override the ENDPOINT environment variable to https://log-api.eu.newrelic.com/log/v1
* Make sure that the license key you are using is an EU key
* From your working directory, run `kubectl apply -f .` on your cluster
* Check [New Relic for your logs](https://docs.newrelic.com/docs/logs/new-relic-logs/get-started/introduction-new-relic-logs#find-data)
## Find and use your data
For how to find and query your data in New Relic, see [Find log data](https://docs.newrelic.com/docs/logs/new-relic-logs/get-started/introduction-new-relic-logs#find-data).
For general querying information, see:
- [Query New Relic data](https://docs.newrelic.com/docs/using-new-relic/data/understand-data/query-new-relic-data)
- [Intro to NRQL](https://docs.newrelic.com/docs/query-data/nrql-new-relic-query-language/getting-started/introduction-nrql)
## Configuration notes
We default to tailing `/var/log/containers/*.log`. If you want to change what's tailed, just update the `PATH`
value in `new-relic-fluent-plugin.yml`.
By default, and to ensure backwards compatibility, we assume that `kubelet` communicates with the `Docker` container engine. With the introduction of the [CRI](https://kubernetes.io/blog/2016/12/container-runtime-interface-cri-in-kubernetes/), logs placed under `/var/log/containers/*.log` follow a different format, even if they are originally produced in JSON format by the container. If you are using CRI, to be able to parse these logs correctly, you must set `LOG_PARSER` to `"cri"` in `new-relic-fluent-plugin.yml`.
## Parsing
We currently support parsing Docker (JSON) and [CRI](https://kubernetes.io/blog/2016/12/container-runtime-interface-cri-in-kubernetes/) logs. If you want more parsing, feel free to add more parsers in `fluent-conf.yml`.
Here are some parsers for your parsing pleasure.
```
[PARSER]
Name apache
Format regex
Regex ^(?<host>[^ ]*) [^ ]* (?<user>[^ ]*) \[(?<time>[^\]]*)\] "(?<method>\S+)(?: +(?<path>[^\"]*?)(?: +\S*)?)?" (?<code>[^ ]*) (?<size>[^ ]*)(?: "(?<referer>[^\"]*)" "(?<agent>[^\"]*)")?$
Time_Key time
Time_Format %d/%b/%Y:%H:%M:%S %z
[PARSER]
Name apache2
Format regex
Regex ^(?<host>[^ ]*) [^ ]* (?<user>[^ ]*) \[(?<time>[^\]]*)\] "(?<method>\S+)(?: +(?<path>[^ ]*) +\S*)?" (?<code>[^ ]*) (?<size>[^ ]*)(?: "(?<referer>[^\"]*)" "(?<agent>[^\"]*)")?$
Time_Key time
Time_Format %d/%b/%Y:%H:%M:%S %z
[PARSER]
Name apache_error
Format regex
Regex ^\[[^ ]* (?<time>[^\]]*)\] \[(?<level>[^\]]*)\](?: \[pid (?<pid>[^\]]*)\])?( \[client (?<client>[^\]]*)\])? (?<message>.*)$
[PARSER]
Name nginx
Format regex
Regex ^(?<remote>[^ ]*) (?<host>[^ ]*) (?<user>[^ ]*) \[(?<time>[^\]]*)\] "(?<method>\S+)(?: +(?<path>[^\"]*?)(?: +\S*)?)?" (?<code>[^ ]*) (?<size>[^ ]*)(?: "(?<referer>[^\"]*)" "(?<agent>[^\"]*)")?$
Time_Key time
Time_Format %d/%b/%Y:%H:%M:%S %z
```

View File

@ -1,69 +0,0 @@
apiVersion: v1
kind: ConfigMap
metadata:
name: fluent-bit-config
namespace: newrelic
labels:
k8s-app: newrelic-logging
data:
# Configuration files: server, input, filters and output
# ======================================================
fluent-bit.conf: |
[SERVICE]
Flush 1
Log_Level ${LOG_LEVEL}
Daemon off
Parsers_File parsers.conf
HTTP_Server On
HTTP_Listen 0.0.0.0
HTTP_Port 2020
@INCLUDE input-kubernetes.conf
@INCLUDE output-newrelic.conf
@INCLUDE filter-kubernetes.conf
input-kubernetes.conf: |
[INPUT]
Name tail
Tag kube.*
Path ${PATH}
Parser ${LOG_PARSER}
DB /var/log/flb_kube.db
Mem_Buf_Limit 7MB
Skip_Long_Lines On
Refresh_Interval 10
filter-kubernetes.conf: |
[FILTER]
Name record_modifier
Match *
Record cluster_name ${CLUSTER_NAME}
[FILTER]
Name kubernetes
Match kube.*
Kube_URL https://kubernetes.default.svc.cluster.local:443
Merge_Log Off
output-newrelic.conf: |
[OUTPUT]
Name newrelic
Match *
licenseKey ${LICENSE_KEY}
endpoint ${ENDPOINT}
parsers.conf: |
# Relevant parsers retrieved from: https://github.com/fluent/fluent-bit/blob/master/conf/parsers.conf
[PARSER]
Name docker
Format json
Time_Key time
Time_Format %Y-%m-%dT%H:%M:%S.%L
Time_Keep On
[PARSER]
Name cri
Format regex
Regex ^(?<time>[^ ]+) (?<stream>stdout|stderr) (?<logtag>[^ ]*) (?<message>.*)$
Time_Key time
Time_Format %Y-%m-%dT%H:%M:%S.%L%z

View File

@ -1,70 +0,0 @@
apiVersion: apps/v1
kind: DaemonSet
metadata:
name: newrelic-logging
namespace: newrelic
labels:
k8s-app: newrelic-logging
version: v1
kubernetes.io/cluster-service: "true"
name: newrelic-logging
app.kubernetes.io/name: newrelic-logging
spec:
selector:
matchLabels:
name: newrelic-logging
template:
metadata:
labels:
k8s-app: newrelic-logging
version: v1
kubernetes.io/cluster-service: "true"
name: newrelic-logging
app.kubernetes.io/name: newrelic-logging
spec:
serviceAccountName: newrelic-logging
containers:
- name: newrelic-logging
env:
- name: ENDPOINT
value : "https://log-api.newrelic.com/log/v1"
- name: SOURCE
value: "kubernetes"
- name: LICENSE_KEY
value: <YOUR_LICENSE_KEY>
- name: CLUSTER_NAME
value: <YOUR CLUSTER NAME>
- name: LOG_LEVEL
value: "info"
# Allowed values: "docker", "cri"
- name: LOG_PARSER
value: "docker"
- name: PATH
value: "/var/log/containers/*.log"
image: newrelic/newrelic-fluentbit-output:1.16.0
command:
- /fluent-bit/bin/fluent-bit
- -c
- /fluent-bit/etc/fluent-bit.conf
- -e
- /fluent-bit/bin/out_newrelic.so
resources:
limits:
cpu: 500m
memory: 128Mi
requests:
cpu: 250m
memory: 64Mi
volumeMounts:
- name: config
mountPath: /fluent-bit/etc
- name: varlog
mountPath: /var
terminationGracePeriodSeconds: 10
volumes:
- name: config
configMap:
name: fluent-bit-config
- name: varlog
hostPath:
path: /var

View File

@ -1,31 +0,0 @@
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: fluent-bit-read
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: fluent-bit-read
subjects:
- kind: ServiceAccount
name: newrelic-logging
namespace: newrelic
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: fluent-bit-read
rules:
- apiGroups: [""]
resources:
- namespaces
- pods
verbs: ["get", "list", "watch"]
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: newrelic-logging
namespace: newrelic
automountServiceAccountToken: true

View File

@ -38,6 +38,10 @@ spec:
spec:
serviceAccountName: {{ include "newrelic.common.serviceAccount.name" $ }}
hostNetwork: false
{{- with include "newrelic.common.dnsConfig" $ }}
dnsConfig:
{{- . | nindent 8 }}
{{- end }}
dnsPolicy: ClusterFirst
terminationGracePeriodSeconds: 10
{{- if $.Values.image.pullSecrets }}

View File

@ -34,6 +34,10 @@ spec:
spec:
serviceAccountName: {{ include "newrelic.common.serviceAccount.name" . }}
hostNetwork: true # This option is a requirement for the Infrastructure Agent to report the proper hostname in New Relic.
{{- with include "newrelic.common.dnsConfig" . }}
dnsConfig:
{{- . | nindent 8 }}
{{- end }}
dnsPolicy: ClusterFirstWithHostNet
terminationGracePeriodSeconds: 10
{{- if .Values.image.pullSecrets }}

Some files were not shown because too many files have changed in this diff Show More