Skip to content

Commit

Permalink
chore: bump the bitnami/kubectl image reference in the node-analyzer ...
Browse files Browse the repository at this point in the history
... chart

Made with ❤️️ by updatecli
  • Loading branch information
updatecli committed Nov 30, 2024
1 parent d82b651 commit bc73ec8
Show file tree
Hide file tree
Showing 2 changed files with 65 additions and 113 deletions.
2 changes: 1 addition & 1 deletion charts/node-analyzer/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ apiVersion: v2
name: node-analyzer
description: Sysdig Node Analyzer
# currently matching Sysdig's appVersion 1.14.34
version: 1.33.2
version: 1.33.3
appVersion: 12.9.2
keywords:
- monitoring
Expand Down
176 changes: 64 additions & 112 deletions charts/node-analyzer/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -36,25 +36,17 @@ global:
# -----END CERTIFICATE-----

# Filename that is used when creating the secret. Required if cert is provided.
keyName:

# Provide the name of an existing Secret that contains the CA required
existingCaSecret:
# Provide the filename that is defined inside the existing Secret. Required if existingCaSecret is set.
existingCaSecretKeyName:

# Provide the name of an existing ConfigMap that contains the CA required
existingCaConfigMap:
# Provide the filename that is defined inside the existing ConfigMap. Required if existingCaConfigMap is set.
existingCaConfigMapKeyName:

keyName: null # Provide the name of an existing Secret that contains the CA required
existingCaSecret: null # Provide the filename that is defined inside the existing Secret. Required if existingCaSecret is set.
existingCaSecretKeyName: null # Provide the name of an existing ConfigMap that contains the CA required
existingCaConfigMap: null # Provide the filename that is defined inside the existing ConfigMap. Required if existingCaConfigMap is set.
existingCaConfigMapKeyName: null
image:
# This is a hack to support RELATED_IMAGE_<identifier> feature in Helm based
# Operators
#
# As long as I don't want to people to use this, I will keep it undocumented
overrideValue:

overrideValue: null
registry: quay.io

gke:
Expand All @@ -74,8 +66,7 @@ daemonset:
# You can also customize maxUnavailable
rollingUpdate:
maxUnavailable: 1
maxSurge:

maxSurge: null
rbac:
# true here enables creation of rbac resources
create: true
Expand Down Expand Up @@ -134,10 +125,9 @@ nodeAnalyzer:
debug: false

# Proxy configuration variables
httpProxy:
httpsProxy:
noProxy:
# NATS max reconnect attempts
httpProxy: null
httpsProxy: null
noProxy: null # NATS max reconnect attempts
natsMaxReconnect: 0
natsMaxReconnectFailures: 60

Expand All @@ -164,12 +154,8 @@ nodeAnalyzer:
createPriorityClass: false

# Set nodeAnalyzer daemonset priorityClassName
priorityClassName:

# Set the value for the Priority Class (if it is to be created)
priorityClassValue:

# Allow the DaemonSet to set labels
priorityClassName: null # Set the value for the Priority Class (if it is to be created)
priorityClassValue: null # Allow the DaemonSet to set labels
labels: {}
# Use this pullSecret to pull images from a private registry
pullSecrets: {}
Expand All @@ -190,28 +176,21 @@ nodeAnalyzer:
image:
repository: sysdig/node-image-analyzer
tag: 0.1.36
digest:
pullPolicy:

# Proxy configuration variables
httpProxy:
httpsProxy:
noProxy:

# The Docker socket path.
# If a custom path is specified, ensure it is correctly mounted from the host inside the container.
# dockerSocketPath: unix:///var/run/docker.sock

# The socket path to a CRI compatible runtime, such as CRI-O.
# If a custom path is specified, ensure it is correctly mounted from the host inside the container.
# criSocketPath: unix:///var/run/crio/crio.sock

# The socket path to a CRI-Containerd daemon.
# If a custom path is specified, ensure it is correctly mounted from the host inside the container.
# containerdSocketPath: unix:///var/run/containerd/containerd.sock

# Allow passing extra volumes to the Node Image Analyzer to mount docker socket, cri-o socket, etc.
# DEPRECATED: use nodeAnalyzer.extraVolumes instead
digest: null
pullPolicy: null # Proxy configuration variables
httpProxy: null
httpsProxy: null
noProxy: null # The Docker socket path.
# If a custom path is specified, ensure it is correctly mounted from the host inside the container.
# dockerSocketPath: unix:///var/run/docker.sock
# The socket path to a CRI compatible runtime, such as CRI-O.
# If a custom path is specified, ensure it is correctly mounted from the host inside the container.
# criSocketPath: unix:///var/run/crio/crio.sock
# The socket path to a CRI-Containerd daemon.
# If a custom path is specified, ensure it is correctly mounted from the host inside the container.
# containerdSocketPath: unix:///var/run/containerd/containerd.sock
# Allow passing extra volumes to the Node Image Analyzer to mount docker socket, cri-o socket, etc.
# DEPRECATED: use nodeAnalyzer.extraVolumes instead
extraVolumes:
volumes: []
mounts: []
Expand Down Expand Up @@ -248,17 +227,13 @@ nodeAnalyzer:
image:
repository: sysdig/host-analyzer
tag: 0.1.23
digest:
pullPolicy:

# Proxy configuration variables
httpProxy:
httpsProxy:
noProxy:

# The scanning schedule specification for the host analyzer expressed as a crontab string such as “5 4 * * *”.
# The default value of @dailydefault instructs the analyzer to automatically pick a schedule that will start
# shortly after it is deployed and will perform a scan every 24 hours.
digest: null
pullPolicy: null # Proxy configuration variables
httpProxy: null
httpsProxy: null
noProxy: null # The scanning schedule specification for the host analyzer expressed as a crontab string such as “5 4 * * *”.
# The default value of @dailydefault instructs the analyzer to automatically pick a schedule that will start
# shortly after it is deployed and will perform a scan every 24 hours.
schedule: "@dailydefault"

# The list of directories to inspect during the scan, expressed as a comma separated list.
Expand All @@ -284,14 +259,11 @@ nodeAnalyzer:
image:
repository: sysdig/compliance-benchmark-runner
tag: 1.1.1.4
digest:
pullPolicy:

# Proxy configuration variables
httpProxy:
httpsProxy:
noProxy:

digest: null
pullPolicy: null # Proxy configuration variables
httpProxy: null
httpsProxy: null
noProxy: null
resources:
requests:
cpu: 150m
Expand All @@ -314,15 +286,12 @@ nodeAnalyzer:
image:
repository: sysdig/vuln-runtime-scanner
tag: "1.8.1"
digest:
pullPolicy:

# Proxy configuration variables
httpProxy:
httpsProxy:
noProxy:

storageClassName:
digest: null
pullPolicy: null # Proxy configuration variables
httpProxy: null
httpsProxy: null
noProxy: null
storageClassName: null
extraMounts: []
# example for bottlerocket
# extraMounts:
Expand Down Expand Up @@ -366,11 +335,9 @@ nodeAnalyzer:
image:
repository: sysdig/eveclient-api
tag: 1.1.4
digest:
pullPolicy:

priorityClassName:

digest: null
pullPolicy: null
priorityClassName: null
resources:
requests:
cpu: 100m
Expand Down Expand Up @@ -407,15 +374,11 @@ nodeAnalyzer:
image:
repository: sysdig/vuln-host-scanner
tag: "0.12.3"
digest:
pullPolicy:

# Proxy configuration variables
httpProxy:
httpsProxy:
noProxy:

# Prometheus configuration
digest: null
pullPolicy: null # Proxy configuration variables
httpProxy: null
httpsProxy: null
noProxy: null # Prometheus configuration
prometheus:
enabled: false
# endpoint: "/metrics"
Expand Down Expand Up @@ -455,14 +418,11 @@ nodeAnalyzer:
image:
repository: sysdig/kspm-analyzer
tag: 1.44.17
digest:
pullPolicy:

# Proxy configuration variables
httpProxy:
httpsProxy:
noProxy:

digest: null
pullPolicy: null # Proxy configuration variables
httpProxy: null
httpsProxy: null
noProxy: null
resources:
requests:
cpu: 150m
Expand Down Expand Up @@ -508,19 +468,11 @@ nodeAnalyzer:
# -----END CERTIFICATE-----

# Filename that is used when creating the secret. Required if cert is provided.
keyName:

# Provide the name of an existing Secret that contains the CA required
existingCaSecret:
# Provide the filename that is defined inside the existing Secret. Required if existingCaSecret is set.
existingCaSecretKeyName:

# Provide the name of an existing ConfigMap that contains the CA required
existingCaConfigMap:
# Provide the filename that is defined inside the existing ConfigMap. Required if existingCaConfigMap is set.
existingCaConfigMapKeyName:

# If Bottlerocket is enabled then the apiclient and api socket will be mounted
keyName: null # Provide the name of an existing Secret that contains the CA required
existingCaSecret: null # Provide the filename that is defined inside the existing Secret. Required if existingCaSecret is set.
existingCaSecretKeyName: null # Provide the name of an existing ConfigMap that contains the CA required
existingCaConfigMap: null # Provide the filename that is defined inside the existing ConfigMap. Required if existingCaConfigMap is set.
existingCaConfigMapKeyName: null # If Bottlerocket is enabled then the apiclient and api socket will be mounted
bottlerocket:
enabled: false
# Path to host apiclient binary
Expand All @@ -533,7 +485,7 @@ tests:
timeout: 300s
image:
repo: bitnami/kubectl
tag: 1.31.2
tag: 1.31.3

# Allow to modify DNS policy
dnsPolicy: null
Expand Down

0 comments on commit bc73ec8

Please sign in to comment.