8000 Tags · yugabyte/charts · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Tags: yugabyte/charts

Tags

2.27.0.0-b281

Toggle 2.27.0.0-b281's commit message
[PLAT-17919]Don't run the otel_collector as root always

Summary:
This change adds OpenShift compatibility to the Helm chart by conditionally disabling securityContext injection based on a new ocpCompatibility.enabled flag in values.yaml.

There are 3 possible cases for universe deployment
  - Running pods with root access -> otel container also needs root
  - Running pods with non-root user (using podSecurityContext) -> otel container should use the same user/group
  - Running on OCP cluster (No securityContext at all) -> otel container should not have any security context

Updating the image for initContainers with the YBDB image

Test Plan:
Tested the following cases -
  - Create a vanilla k8s universe -> enable audit logs -> otel-container uses root user
  - Create a universe with non-root user -> enable audit logs -> otel-container uses the user for securityContext
  - Create a openshiftUniverse -> (set ocpCompatibility.enabled to true) -> otel-container doesn't specify any securityContext

Reviewers: vkumar, anijhawan, sneelakantan

Reviewed By: vkumar

Subscribers: yugaware

Differential Revision: https://phorge.dev.yugabyte
10000
.com/D44958

2.27.0.0-b280

Toggle 2.27.0.0-b280's commit message
[PLAT-17919]Don't run the otel_collector as root always

Summary:
This change adds OpenShift compatibility to the Helm chart by conditionally disabling securityContext injection based on a new ocpCompatibility.enabled flag in values.yaml.

There are 3 possible cases for universe deployment
  - Running pods with root access -> otel container also needs root
  - Running pods with non-root user (using podSecurityContext) -> otel container should use the same user/group
  - Running on OCP cluster (No securityContext at all) -> otel container should not have any security context

Updating the image for initContainers with the YBDB image

Test Plan:
Tested the following cases -
  - Create a vanilla k8s universe -> enable audit logs -> otel-container uses root user
  - Create a universe with non-root user -> enable audit logs -> otel-container uses the user for securityContext
  - Create a openshiftUniverse -> (set ocpCompatibility.enabled to true) -> otel-container doesn't specify any securityContext

Reviewers: vkumar, anijhawan, sneelakantan

Reviewed By: vkumar

Subscribers: yugaware

Differential Revision: https://phorge.dev.yugabyte.com/D44958

2.27.0.0-b279

Toggle 2.27.0.0-b279's commit message
[PLAT-17919]Don't run the otel_collector as root always

Summary:
This change adds OpenShift compatibility to the Helm chart by conditionally disabling securityContext injection based on a new ocpCompatibility.enabled flag in values.yaml.

There are 3 possible cases for universe deployment
  - Running pods with root access -> otel container also needs root
  - Running pods with non-root user (using podSecurityContext) -> otel container should use the same user/group
  - Running on OCP cluster (No securityContext at all) -> otel container should not have any security context

Updating the image for initContainers with the YBDB image

Test Plan:
Tested the following cases -
  - Create a vanilla k8s universe -> enable audit logs -> otel-container uses root user
  - Create a universe with non-root user -> enable audit logs -> otel-container uses the user for securityContext
  - Create a openshiftUniverse -> (set ocpCompatibility.enabled to true) -> otel-container doesn't specify any securityContext

Reviewers: vkumar, anijhawan, sneelakantan

Reviewed By: vkumar

Subscribers: yugaware

Differential Revision: https://phorge.dev.yugabyte.com/D44958

2.27.0.0-b278

Toggle 2.27.0.0-b278's commit message
[PLAT-17919]Don't run the otel_collector as root always

Summary:
This change adds OpenShift compatibility to the Helm chart by conditionally disabling securityContext injection based on a new ocpCompatibility.enabled flag in values.yaml.

There are 3 possible cases for universe deployment
  - Running pods with root access -> otel container also needs root
  - Running pods with non-root user (using podSecurityContext) -> otel container should use the same user/group
  - Running on OCP cluster (No securityContext at all) -> otel container should not have any security context

Updating the image for initContainers with the YBDB image

Test Plan:
Tested the following cases -
  - Create a vanilla k8s universe -> enable audit logs -> otel-container uses root user
  - Create a universe with non-root user -> enable audit logs -> otel-container uses the user for securityContext
  - Create a openshiftUniverse -> (set ocpCompatibility.enabled to true) -> otel-container doesn't specify any securityContext

Reviewers: vkumar, anijhawan, sneelakantan

Reviewed By: vkumar

Subscribers: yugaware

Differential Revision: https://phorge.dev.yugabyte.com/D44958

2.27.0.0-b277

Toggle 2.27.0.0-b277's commit message
[PLAT-17919]Don't run the otel_collector as root always

Summary:
This change adds OpenShift compatibility to the Helm chart by conditionally disabling securityContext injection based on a new ocpCompatibility.enabled flag in values.yaml.

There are 3 possible cases for universe deployment
  - Running pods with root access -> otel container also needs root
  - Running pods with non-root user (using podSecurityContext) -> otel container should use the same user/group
  - Running on OCP cluster (No securityContext at all) -> otel container should not have any security context

Updating the image for initContainers with the YBDB image

Test Plan:
Tested the following cases -
  - Create a vanilla k8s universe -> enable audit logs -> otel-container uses root user
  - Create a universe with non-root user -> enable audit logs -> otel-container uses the user for securityContext
  - Create a openshiftUniverse -> (set ocpCompatibility.enabled to true) -> otel-container doesn't specify any securityContext

Reviewers: vkumar, anijhawan, sneelakantan

Reviewed By: vkumar

Subscribers: yugaware

Differential Revision: https://phorge.dev.yugabyte.com/D44958

2.27.0.0-b276

Toggle 2.27.0.0-b276's commit message
[PLAT-17919]Don't run the otel_collector as root always

Summary:
This change adds OpenShift compatibility to the Helm chart by conditionally disabling securityContext injection based on a new ocpCompatibility.enabled flag in values.yaml.

There are 3 possible cases for universe deployment
  - Running pods with root access -> otel container also needs root
  - Running pods with non-root user (using podSecurityContext) -> otel container should use the same user/group
  - Running on OCP cluster (No securityContext at all) -> otel container should not have any security context

Updating the image for initContainers with the YBDB image

Test Plan:
Tested the following cases -
  - Create a vanilla k8s universe -> enable audit logs -> otel-container uses root user
  - Create a universe with non-root user -> enable audit logs -> otel-container uses the user for securityContext
  - Create a openshiftUniverse -> (set ocpCompatibility.enabled to true) -> otel-container doesn't specify any securityContext

Reviewers: vkumar, anijhawan, sneelakantan

Reviewed By: vkumar

Subscribers: yugaware

Differential Revision: https://phorge.dev.yugabyte.com/D44958

2.27.0.0-b275

Toggle 2.27.0.0-b275's commit message
[PLAT-17919]Don't run the otel_collector as root always

Summary:
This change adds OpenShift compatibility to the Helm chart by conditionally disabling securityContext injection based on a new ocpCompatibility.enabled flag in values.yaml.

There are 3 possible cases for universe deployment
  - Running pods with root access -> otel container also needs root
  - Running pods with non-root user (using podSecurityContext) -> otel container should use the same user/group
  - Running on OCP cluster (No securityContext at all) -> otel container should not have any security context

Updating the image for initContainers with the YBDB image

Test Plan:
Tested the following cases -
  - Create a vanilla k8s universe -> enable audit logs -> otel-container uses root user
  - Create a universe with non-root user -> enable audit logs -> otel-container uses the user for securityContext
  - Create a openshiftUniverse -> (set ocpCompatibility.enabled to true) -> otel-container doesn't specify any securityContext

Reviewers: vkumar, anijhawan, sneelakantan

Reviewed By: vkumar

Subscribers: yugaware

Differential Revision: https://phorge.dev.yugabyte.com/D44958

2.27.0.0-b274

Toggle 2.27.0.0-b274's commit message
[PLAT-17919]Don't run the otel_collector as root always

Summary:
This change adds OpenShift compatibility to the Helm chart by conditionally disabling securityContext injection based on a new ocpCompatibility.enabled flag in values.yaml.

There are 3 possible cases for universe deployment
  - Running pods with root access -> otel container also needs root
  - Running pods with non-root user (using podSecurityContext) -> otel container should use the same user/group
  - Running on OCP cluster (No securityContext at all) -> otel container should not have any security context

Updating the image for initContainers with the YBDB image

Test Plan:
Tested the following cases -
  - Create a vanilla k8s universe -> enable audit logs -> otel-container uses root user
  - Create a universe with non-root user -> enable audit logs -> otel-container uses the user for securityContext
  - Create a openshiftUniverse -> (set ocpCompatibility.enabled to true) -> otel-container doesn't specify any securityContext

Reviewers: vkumar, anijhawan, sneelakantan

Reviewed By: vkumar

Subscribers: yugaware

Differential Revision: https://phorge.dev.yugabyte.com/D44958

2.27.0.0-b273

Toggle 2.27.0.0-b273's commit message
[PLAT-17919]Don't run the otel_collector as root always

Summary:
This change adds OpenShift compatibility to the Helm chart by conditionally disabling securityContext injection based on a new ocpCompatibility.enabled flag in values.yaml.

There are 3 possible cases for universe deployment
  - Running pods with root access -> otel container also needs root
  - Running pods with non-root user (using podSecurityContext) -> otel container should use the same user/group
  - Running on OCP cluster (No securityContext at all) -> otel container should not have any security context

Updating the image for initContainers with the YBDB image

Test Plan:
Tested the following cases -
  - Create a vanilla k8s universe -> enable audit logs -> otel-container uses root user
  - Create a universe with non-root user -> enable audit logs -> otel-container uses the user for securityContext
  - Create a openshiftUniverse -> (set ocpCompatibility.enabled to true) -> otel-container doesn't specify any securityContext

Reviewers: vkumar, anijhawan, sneelakantan

Reviewed By: vkumar

Subscribers: yugaware

Differential Revision: https://phorge.dev.yugabyte.com/D44958

2.27.0.0-b272

Toggle 2.27.0.0-b272's commit message
[PLAT-17919]Don't run the otel_collector as root always

Summary:
This change adds OpenShift compatibility to the Helm chart by conditionally disabling securityContext injection based on a new ocpCompatibility.enabled flag in values.yaml.

There are 3 possible cases for universe deployment
  - Running pods with root access -> otel container also needs root
  - Running pods with non-root user (using podSecurityContext) -> otel container should use the same user/group
  - Running on OCP cluster (No securityContext at all) -> otel container should not have any security context

Updating the image for initContainers with the YBDB image

Test Plan:
Tested the following cases -
  - Create a vanilla k8s universe -> enable audit logs -> otel-container uses root user
  - Create a universe with non-root user -> enable audit logs -> otel-container uses the user for securityContext
  - Create a openshiftUniverse -> (set ocpCompatibility.enabled to true) -> otel-container doesn't specify any securityContext

Reviewers: vkumar, anijhawan, sneelakantan

Reviewed By: vkumar

Subscribers: yugaware

Differential Revision: https://phorge.dev.yugabyte.com/D44958
0