1
0
Fork 0
mirror of https://github.com/kyverno/policy-reporter.git synced 2024-12-14 11:57:32 +00:00

resources config for CronJobs (#374)

Signed-off-by: Frank Jogeleit <frank.jogeleit@web.de>
This commit is contained in:
Frank Jogeleit 2023-11-30 09:55:30 +01:00 committed by GitHub
parent a039531df8
commit a747418c90
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
12 changed files with 24 additions and 11 deletions

View file

@ -1,10 +1,12 @@
# Changelog
# Next
# 2.21.3
* Policy Reporter v2.17.4
* Fix Result Resource mapping
* Policy Reporter v2.17.3
* Fix handling if metric cache fallback
* Helm Chart
* Configure `resources` for email report CronJobs via `emailReports.resources`
# 2.21.2
* Policy Reporter v2.17.2

View file

@ -1,7 +1,7 @@
GO ?= go
BUILD ?= build
REPO ?= ghcr.io/kyverno/policy-reporter
IMAGE_TAG ?= 2.17.2
IMAGE_TAG ?= 2.17.4
LD_FLAGS=-s -w -linkmode external -extldflags "-static"
PLATFORMS ?= linux/arm64,linux/amd64,linux/s390x

View file

@ -5,8 +5,8 @@ description: |
It creates Prometheus Metrics and can send rule validation events to different targets like Loki, Elasticsearch, Slack or Discord
type: application
version: 2.21.2
appVersion: 2.17.2
version: 2.21.3
appVersion: 2.17.4
icon: https://github.com/kyverno/kyverno/raw/main/img/logo.png
home: https://kyverno.github.io/policy-reporter

View file

@ -1,6 +1,6 @@
# Policy Reporter
![Version: v2.21.2](https://img.shields.io/badge/Version-v2.21.2-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: v2.17.2](https://img.shields.io/badge/AppVersion-v2.17.2-informational?style=flat-square)
![Version: v2.21.3](https://img.shields.io/badge/Version-v2.21.3-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: v2.17.4](https://img.shields.io/badge/AppVersion-v2.17.4-informational?style=flat-square)
## Motivation

View file

@ -108,6 +108,8 @@ spec:
key: encryption
optional: true
{{- end }}
resources:
{{- toYaml .Values.emailReports.resources | nindent 16 }}
volumes:
- name: config-file
secret:

View file

@ -108,6 +108,8 @@ spec:
key: encryption
optional: true
{{- end }}
resources:
{{- toYaml .Values.emailReports.resources | nindent 16 }}
volumes:
- name: config-file
secret:

View file

@ -5,7 +5,7 @@ image:
registry: ghcr.io
repository: kyverno/policy-reporter
pullPolicy: IfNotPresent
tag: 2.17.2
tag: 2.17.4
imagePullSecrets: []
@ -283,6 +283,13 @@ emailReports:
# include: ['team-a-*']
# sources:
# include: ['Kyverno']
resources: {}
# limits:
# memory: 100Mi
# cpu: 10m
# requests:
# memory: 75Mi
# cpu: 5m
# Reference a configuration which already exists instead of creating one
existingTargetConfig:

View file

@ -480,7 +480,7 @@ spec:
fsGroup: 1234
containers:
- name: policy-reporter
image: "ghcr.io/kyverno/policy-reporter:2.17.2"
image: "ghcr.io/kyverno/policy-reporter:2.17.4"
imagePullPolicy: IfNotPresent
securityContext:
allowPrivilegeEscalation: false

View file

@ -367,7 +367,7 @@ spec:
fsGroup: 1234
containers:
- name: policy-reporter
image: "ghcr.io/kyverno/policy-reporter:2.17.2"
image: "ghcr.io/kyverno/policy-reporter:2.17.4"
imagePullPolicy: IfNotPresent
securityContext:
allowPrivilegeEscalation: false

View file

@ -223,7 +223,7 @@ spec:
fsGroup: 1234
containers:
- name: policy-reporter
image: "ghcr.io/kyverno/policy-reporter:2.17.2"
image: "ghcr.io/kyverno/policy-reporter:2.17.4"
imagePullPolicy: IfNotPresent
securityContext:
allowPrivilegeEscalation: false

View file

@ -113,7 +113,7 @@ spec:
automountServiceAccountToken: true
containers:
- name: policy-reporter
image: "ghcr.io/kyverno/policy-reporter:2.17.2"
image: "ghcr.io/kyverno/policy-reporter:2.17.4"
imagePullPolicy: IfNotPresent
securityContext:
allowPrivilegeEscalation: false

View file

@ -26,7 +26,7 @@ spec:
restartPolicy: Never
containers:
- name: policy-reporter
image: "ghcr.io/kyverno/policy-reporter:2.17.2"
image: "ghcr.io/kyverno/policy-reporter:2.17.4"
imagePullPolicy: IfNotPresent
securityContext:
allowPrivilegeEscalation: false