diff --git a/bitnami/kubernetes-event-exporter/Chart.lock b/bitnami/kubernetes-event-exporter/Chart.lock index b08a73b41cd4b7..ad32446d7def6d 100644 --- a/bitnami/kubernetes-event-exporter/Chart.lock +++ b/bitnami/kubernetes-event-exporter/Chart.lock @@ -1,6 +1,6 @@ dependencies: - name: common repository: oci://registry-1.docker.io/bitnamicharts - version: 2.19.0 -digest: sha256:ac559eb57710d8904e266424ee364cd686d7e24517871f0c5c67f7c4500c2bcc -generated: "2024-03-11T16:48:25.965251091+01:00" + version: 2.19.1 +digest: sha256:c883732817d9aaa3304f7b3109262aa338959de15b432dc5a2dbde13d2e136a5 +generated: "2024-04-04T17:03:23.224506482Z" diff --git a/bitnami/kubernetes-event-exporter/Chart.yaml b/bitnami/kubernetes-event-exporter/Chart.yaml index 4e32ec5302ae3d..476404b0f940d5 100644 --- a/bitnami/kubernetes-event-exporter/Chart.yaml +++ b/bitnami/kubernetes-event-exporter/Chart.yaml @@ -6,7 +6,7 @@ annotations: licenses: Apache-2.0 images: | - name: kubernetes-event-exporter - image: docker.io/bitnami/kubernetes-event-exporter:1.6.1-debian-12-r16 + image: docker.io/bitnami/kubernetes-event-exporter:1.6.1-debian-12-r18 apiVersion: v2 appVersion: 1.6.1 dependencies: @@ -31,4 +31,4 @@ maintainers: name: kubernetes-event-exporter sources: - https://github.com/bitnami/charts/tree/main/bitnami/kubernetes-event-exporter -version: 3.0.0 +version: 3.0.1 diff --git a/bitnami/kubernetes-event-exporter/README.md b/bitnami/kubernetes-event-exporter/README.md index 3daa6e869da63b..187c74a729be7d 100644 --- a/bitnami/kubernetes-event-exporter/README.md +++ b/bitnami/kubernetes-event-exporter/README.md @@ -91,119 +91,119 @@ As an alternative, use one of the preset configurations for pod affinity, pod an ### Kubernetes Event Exporter parameters -| Name | Description | Value | -| --------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------- | -| `replicaCount` | Desired number of pod replicas | `1` | -| `revisionHistoryLimit` | Desired number of old ReplicaSets to retain | `10` | -| `containerPorts.http` | HTTP container port | `2112` | -| `extraContainerPorts` | Optionally specify extra list of additional port-mappings for the container | `[]` | -| `image.registry` | Container image registry | `REGISTRY_NAME` | -| `image.repository` | Container image name | `REPOSITORY_NAME/kubernetes-event-exporter` | -| `image.digest` | Container image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | -| `image.pullPolicy` | Container image pull policy | `IfNotPresent` | -| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | -| `automountServiceAccountToken` | Mount Service Account token in pod | `true` | -| `hostAliases` | Add deployment host aliases | `[]` | -| `config.logLevel` | Verbosity of the logs (options: `fatal`, `error`, `warn`, `info` or `debug`) | `debug` | -| `config.logFormat` | How the logs are formatted. Allowed values: `pretty` or `json` | `pretty` | -| `config.receivers` | Array containing event receivers | `[]` | -| `config.route.routes` | Array containing event route configuration | `[]` | -| `rbac.create` | Create the RBAC roles for API accessibility | `true` | -| `rbac.rules` | List of rules for the cluster role | `[]` | -| `serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | -| `serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | -| `serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `false` | -| `serviceAccount.annotations` | Annotations for service account. Evaluated as a template. Only used if `create` is `true`. | `{}` | -| `podAnnotations` | Pod annotations | `{}` | -| `podLabels` | Pod labels | `{}` | -| `podSecurityContext.enabled` | Enable security context | `true` | -| `podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | -| `podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | -| `podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | -| `podSecurityContext.fsGroup` | Group ID for the container | `1001` | -| `containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | -| `containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | -| `containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | -| `containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | -| `containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | -| `containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | -| `containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | -| `containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | -| `containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | -| `containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | -| `command` | Override default container command (useful when using custom images) | `[]` | -| `args` | Override default container args (useful when using custom images) | `[]` | -| `lifecycleHooks` | Lifecycle for the container to automate configuration before or after startup | `{}` | -| `resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if resources is set (resources is recommended for production). | `nano` | -| `resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | -| `networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | -| `networkPolicy.kubeAPIServerPorts` | List of possible endpoints to kube-apiserver (limit to your cluster settings to increase security) | `[]` | -| `networkPolicy.allowExternal` | Don't require server label for connections | `true` | -| `networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | -| `networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | -| `networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | -| `networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | -| `networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | -| `livenessProbe.enabled` | Enable livenessProbe on Kubernetes event exporter container | `true` | -| `livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `5` | -| `livenessProbe.periodSeconds` | Period seconds for livenessProbe | `5` | -| `livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `2` | -| `livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `5` | -| `livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `readinessProbe.enabled` | Enable readinessProbe on Kubernetes event exporter container | `true` | -| `readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `5` | -| `readinessProbe.periodSeconds` | Period seconds for readinessProbe | `5` | -| `readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `2` | -| `readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `1` | -| `readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `startupProbe.enabled` | Enable startupProbe on Kubernetes event exporter container | `false` | -| `startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `40` | -| `startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | -| `startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `15` | -| `startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | -| `startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `customStartupProbe` | Configure startup probe for Kubernetes event exporter pod | `{}` | -| `customLivenessProbe` | Configure liveness probe for Kubernetes event exporter pod | `{}` | -| `customReadinessProbe` | Configure readiness probe for Kubernetes event exporter pod | `{}` | -| `nodeSelector` | Node labels for pod assignment | `{}` | -| `priorityClassName` | Set Priority Class Name to allow priority control over other pods | `""` | -| `schedulerName` | Name of the k8s scheduler (other than default) | `""` | -| `topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` | -| `tolerations` | Tolerations for pod assignment | `[]` | -| `podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `nodeAffinityPreset.key` | Node label key to match. Ignored if `affinity` is set. | `""` | -| `nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set. | `[]` | -| `affinity` | Affinity for pod assignment | `{}` | -| `updateStrategy.type` | Deployment strategy type. | `RollingUpdate` | -| `extraEnvVars` | Array containing extra env vars to be added to all containers | `[]` | -| `extraEnvVarsCM` | ConfigMap containing extra env vars to be added to all containers | `""` | -| `extraEnvVarsSecret` | Secret containing extra env vars to be added to all containers | `""` | -| `extraVolumeMounts` | Array to add extra mounts (normally used with extraVolumes) | `[]` | -| `extraVolumes` | Array to add extra volumes | `[]` | -| `initContainers` | Attach additional init containers to pods | `[]` | -| `sidecars` | Add additional sidecar containers to pods | `[]` | -| `metrics.enabled` | Enable exposing statistics | `false` | -| `metrics.service.ports.http` | Metrics service HTTP port | `2112` | -| `metrics.service.annotations` | Annotations for enabling prometheus to access the metrics endpoints | `{}` | -| `metrics.serviceMonitor.enabled` | Create ServiceMonitor Resource for scraping metrics using PrometheusOperator | `false` | -| `metrics.serviceMonitor.port` | Metrics service HTTP port | `http` | -| `metrics.serviceMonitor.endpoints` | The endpoint configuration of the ServiceMonitor. Path is mandatory. Interval, timeout and labellings can be overwritten. | `[]` | -| `metrics.serviceMonitor.path` | Metrics service HTTP path. Deprecated: Use @param metrics.serviceMonitor.endpoints instead | `""` | -| `metrics.serviceMonitor.namespace` | Namespace which Prometheus is running in | `""` | -| `metrics.serviceMonitor.interval` | Interval at which metrics should be scraped | `30s` | -| `metrics.serviceMonitor.scrapeTimeout` | Specify the timeout after which the scrape is ended | `""` | -| `metrics.serviceMonitor.labels` | Additional labels that can be used so ServiceMonitor will be discovered by Prometheus | `{}` | -| `metrics.serviceMonitor.selector` | Prometheus instance selector labels | `{}` | -| `metrics.serviceMonitor.relabelings` | RelabelConfigs to apply to samples before scraping | `[]` | -| `metrics.serviceMonitor.metricRelabelings` | MetricRelabelConfigs to apply to samples before ingestion | `[]` | -| `metrics.serviceMonitor.honorLabels` | honorLabels chooses the metric's labels on collisions with target labels | `false` | -| `metrics.serviceMonitor.jobLabel` | The name of the label on the target service to use as the job name in prometheus. | `""` | -| `metrics.prometheusRule.enabled` | Create PrometheusRule Resource for scraping metrics using PrometheusOperator | `false` | -| `metrics.prometheusRule.namespace` | Namespace which Prometheus is running in | `""` | -| `metrics.prometheusRule.labels` | Additional labels that can be used so PrometheusRule will be discovered by Prometheus | `{}` | -| `metrics.prometheusRule.groups` | Groups, containing the alert rules. | `[]` | +| Name | Description | Value | +| --------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------- | +| `replicaCount` | Desired number of pod replicas | `1` | +| `revisionHistoryLimit` | Desired number of old ReplicaSets to retain | `10` | +| `containerPorts.http` | HTTP container port | `2112` | +| `extraContainerPorts` | Optionally specify extra list of additional port-mappings for the container | `[]` | +| `image.registry` | Container image registry | `REGISTRY_NAME` | +| `image.repository` | Container image name | `REPOSITORY_NAME/kubernetes-event-exporter` | +| `image.digest` | Container image digest in the way sha256:aa.... Please note this parameter, if set, will override the tag | `""` | +| `image.pullPolicy` | Container image pull policy | `IfNotPresent` | +| `image.pullSecrets` | Specify docker-registry secret names as an array | `[]` | +| `automountServiceAccountToken` | Mount Service Account token in pod | `true` | +| `hostAliases` | Add deployment host aliases | `[]` | +| `config.logLevel` | Verbosity of the logs (options: `fatal`, `error`, `warn`, `info` or `debug`) | `debug` | +| `config.logFormat` | How the logs are formatted. Allowed values: `pretty` or `json` | `pretty` | +| `config.receivers` | Array containing event receivers | `[]` | +| `config.route.routes` | Array containing event route configuration | `[]` | +| `rbac.create` | Create the RBAC roles for API accessibility | `true` | +| `rbac.rules` | List of rules for the cluster role | `[]` | +| `serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | +| `serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | +| `serviceAccount.automountServiceAccountToken` | Automount service account token for the server service account | `false` | +| `serviceAccount.annotations` | Annotations for service account. Evaluated as a template. Only used if `create` is `true`. | `{}` | +| `podAnnotations` | Pod annotations | `{}` | +| `podLabels` | Pod labels | `{}` | +| `podSecurityContext.enabled` | Enable security context | `true` | +| `podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | +| `podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | +| `podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | +| `podSecurityContext.fsGroup` | Group ID for the container | `1001` | +| `containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | +| `containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | +| `containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | +| `containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | +| `containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | +| `containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | +| `containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | +| `containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | +| `containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | +| `command` | Override default container command (useful when using custom images) | `[]` | +| `args` | Override default container args (useful when using custom images) | `[]` | +| `lifecycleHooks` | Lifecycle for the container to automate configuration before or after startup | `{}` | +| `resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if resources is set (resources is recommended for production). | `nano` | +| `resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | +| `networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | +| `networkPolicy.kubeAPIServerPorts` | List of possible endpoints to kube-apiserver (limit to your cluster settings to increase security) | `[]` | +| `networkPolicy.allowExternal` | Don't require server label for connections | `true` | +| `networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | +| `networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | +| `networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | +| `networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | +| `networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | +| `livenessProbe.enabled` | Enable livenessProbe on Kubernetes event exporter container | `true` | +| `livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `5` | +| `livenessProbe.periodSeconds` | Period seconds for livenessProbe | `5` | +| `livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `2` | +| `livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `5` | +| `livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `readinessProbe.enabled` | Enable readinessProbe on Kubernetes event exporter container | `true` | +| `readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `5` | +| `readinessProbe.periodSeconds` | Period seconds for readinessProbe | `5` | +| `readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `2` | +| `readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `1` | +| `readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `startupProbe.enabled` | Enable startupProbe on Kubernetes event exporter container | `false` | +| `startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `40` | +| `startupProbe.periodSeconds` | Period seconds for startupProbe | `10` | +| `startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `15` | +| `startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | +| `startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `customStartupProbe` | Configure startup probe for Kubernetes event exporter pod | `{}` | +| `customLivenessProbe` | Configure liveness probe for Kubernetes event exporter pod | `{}` | +| `customReadinessProbe` | Configure readiness probe for Kubernetes event exporter pod | `{}` | +| `nodeSelector` | Node labels for pod assignment | `{}` | +| `priorityClassName` | Set Priority Class Name to allow priority control over other pods | `""` | +| `schedulerName` | Name of the k8s scheduler (other than default) | `""` | +| `topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` | +| `tolerations` | Tolerations for pod assignment | `[]` | +| `podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `nodeAffinityPreset.key` | Node label key to match. Ignored if `affinity` is set. | `""` | +| `nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set. | `[]` | +| `affinity` | Affinity for pod assignment | `{}` | +| `updateStrategy.type` | Deployment strategy type. | `RollingUpdate` | +| `extraEnvVars` | Array containing extra env vars to be added to all containers | `[]` | +| `extraEnvVarsCM` | ConfigMap containing extra env vars to be added to all containers | `""` | +| `extraEnvVarsSecret` | Secret containing extra env vars to be added to all containers | `""` | +| `extraVolumeMounts` | Array to add extra mounts (normally used with extraVolumes) | `[]` | +| `extraVolumes` | Array to add extra volumes | `[]` | +| `initContainers` | Attach additional init containers to pods | `[]` | +| `sidecars` | Add additional sidecar containers to pods | `[]` | +| `metrics.enabled` | Enable exposing statistics | `false` | +| `metrics.service.ports.http` | Metrics service HTTP port | `2112` | +| `metrics.service.annotations` | Annotations for enabling prometheus to access the metrics endpoints | `{}` | +| `metrics.serviceMonitor.enabled` | Create ServiceMonitor Resource for scraping metrics using PrometheusOperator | `false` | +| `metrics.serviceMonitor.port` | Metrics service HTTP port | `http` | +| `metrics.serviceMonitor.endpoints` | The endpoint configuration of the ServiceMonitor. Path is mandatory. Interval, timeout and labellings can be overwritten. | `[]` | +| `metrics.serviceMonitor.path` | Metrics service HTTP path. Deprecated: Use @param metrics.serviceMonitor.endpoints instead | `""` | +| `metrics.serviceMonitor.namespace` | Namespace which Prometheus is running in | `""` | +| `metrics.serviceMonitor.interval` | Interval at which metrics should be scraped | `30s` | +| `metrics.serviceMonitor.scrapeTimeout` | Specify the timeout after which the scrape is ended | `""` | +| `metrics.serviceMonitor.labels` | Additional labels that can be used so ServiceMonitor will be discovered by Prometheus | `{}` | +| `metrics.serviceMonitor.selector` | Prometheus instance selector labels | `{}` | +| `metrics.serviceMonitor.relabelings` | RelabelConfigs to apply to samples before scraping | `[]` | +| `metrics.serviceMonitor.metricRelabelings` | MetricRelabelConfigs to apply to samples before ingestion | `[]` | +| `metrics.serviceMonitor.honorLabels` | honorLabels chooses the metric's labels on collisions with target labels | `false` | +| `metrics.serviceMonitor.jobLabel` | The name of the label on the target service to use as the job name in prometheus. | `""` | +| `metrics.prometheusRule.enabled` | Create PrometheusRule Resource for scraping metrics using PrometheusOperator | `false` | +| `metrics.prometheusRule.namespace` | Namespace which Prometheus is running in | `""` | +| `metrics.prometheusRule.labels` | Additional labels that can be used so PrometheusRule will be discovered by Prometheus | `{}` | +| `metrics.prometheusRule.groups` | Groups, containing the alert rules. | `[]` | ### Autoscaling diff --git a/bitnami/kubernetes-event-exporter/values.yaml b/bitnami/kubernetes-event-exporter/values.yaml index 46c1b9216d7efe..3b710f72db791e 100644 --- a/bitnami/kubernetes-event-exporter/values.yaml +++ b/bitnami/kubernetes-event-exporter/values.yaml @@ -85,7 +85,7 @@ image: ## registry: docker.io repository: bitnami/kubernetes-event-exporter - tag: 1.6.1-debian-12-r16 + tag: 1.6.1-debian-12-r18 digest: "" ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'