[bitnami/jaeger] feat: Add support for PSA restricted policy (#20453)

Signed-off-by: Javier Salmeron Garcia <jsalmeron@vmware.com>
This commit is contained in:
Javier J. Salmerón-García
2023-10-31 14:08:30 +01:00
committed by GitHub
parent 00364f87c2
commit 52b2d9ac6c
8 changed files with 367 additions and 277 deletions

View File

@@ -34,4 +34,4 @@ maintainers:
name: jaeger
sources:
- https://github.com/bitnami/charts/tree/main/bitnami/jaeger
version: 1.3.5
version: 1.4.0

View File

@@ -91,267 +91,290 @@ The command removes all the Kubernetes components associated with the chart and
### Query deployment parameters
| Name | Description | Value |
| --------------------------------------------------- | ----------------------------------------------------------------------------------------- | --------------- |
| `query.command` | Command for running the container (set to default if not set). Use array form | `[]` |
| `query.args` | Args for running the container (set to default if not set). Use array form | `[]` |
| `query.lifecycleHooks` | Override default etcd container hooks | `{}` |
| `query.extraEnvVars` | Extra environment variables to be set on jaeger container | `[]` |
| `query.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars | `""` |
| `query.extraEnvVarsSecret` | Name of existing Secret containing extra env vars | `""` |
| `query.replicaCount` | Number of Jaeger replicas | `1` |
| `query.livenessProbe.enabled` | Enable livenessProbe on Query nodes | `true` |
| `query.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `10` |
| `query.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` |
| `query.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `1` |
| `query.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `3` |
| `query.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` |
| `query.startupProbe.enabled` | Enable startupProbe on Query containers | `false` |
| `query.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `10` |
| `query.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` |
| `query.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` |
| `query.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` |
| `query.startupProbe.successThreshold` | Success threshold for startupProbe | `1` |
| `query.readinessProbe.enabled` | Enable readinessProbe | `false` |
| `query.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `10` |
| `query.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` |
| `query.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `1` |
| `query.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `15` |
| `query.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` |
| `query.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` |
| `query.customStartupProbe` | Override default startup probe | `{}` |
| `query.customReadinessProbe` | Override default readiness probe | `{}` |
| `query.resources.limits` | The resources limits for Jaeger containers | `{}` |
| `query.resources.requests` | The requested resources for Jaeger containers | `{}` |
| `query.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for jaeger container | `[]` |
| `query.containerPorts.api` | Port for API | `16686` |
| `query.containerPorts.admin` | Port for admin | `16687` |
| `query.service.type` | Jaeger service type | `ClusterIP` |
| `query.service.ports.api` | Port for API | `16686` |
| `query.service.ports.admin` | Port for admin | `16687` |
| `query.service.nodePorts.api` | Node port for API | `""` |
| `query.service.nodePorts.admin` | Node port for admin | `""` |
| `query.service.extraPorts` | Extra ports to expose in the service (normally used with the `sidecar` value) | `[]` |
| `query.service.loadBalancerIP` | LoadBalancerIP if service type is `LoadBalancer` | `""` |
| `query.service.loadBalancerSourceRanges` | Service Load Balancer sources | `[]` |
| `query.service.clusterIP` | Service Cluster IP | `""` |
| `query.service.externalTrafficPolicy` | Service external traffic policy | `Cluster` |
| `query.service.annotations` | Provide any additional annotations which may be required. | `{}` |
| `query.service.sessionAffinity` | Session Affinity for Kubernetes service, can be "None" or "ClientIP" | `None` |
| `query.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` |
| `query.service.metrics.annotations` | Annotations for Prometheus metrics | `{}` |
| `query.serviceAccount.create` | Enables ServiceAccount | `true` |
| `query.serviceAccount.name` | ServiceAccount name | `""` |
| `query.serviceAccount.annotations` | Annotations to add to all deployed objects | `{}` |
| `query.serviceAccount.automountServiceAccountToken` | Automount API credentials for a service account. | `true` |
| `query.podSecurityContext.enabled` | Enabled Jaeger pods' Security Context | `true` |
| `query.podSecurityContext.fsGroup` | Set Jaeger pod's Security Context fsGroup | `1001` |
| `query.containerSecurityContext.enabled` | Enabled Jaeger containers' Security Context | `true` |
| `query.containerSecurityContext.runAsUser` | Set Jaeger container's Security Context runAsUser | `1001` |
| `query.containerSecurityContext.runAsNonRoot` | Force the container to be run as non root | `true` |
| `query.podAnnotations` | Additional pod annotations | `{}` |
| `query.podLabels` | Additional pod labels | `{}` |
| `query.podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `query.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
| `query.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `query.nodeAffinityPreset.key` | Node label key to match. Ignored if `affinity` is set | `""` |
| `query.nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set | `[]` |
| `query.priorityClassName` | Server priorityClassName | `""` |
| `query.affinity` | Affinity for pod assignment | `{}` |
| `query.nodeSelector` | Node labels for pod assignment | `{}` |
| `query.tolerations` | Tolerations for pod assignment | `[]` |
| `query.topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` |
| `query.schedulerName` | Alternative scheduler | `""` |
| `query.updateStrategy.type` | Jaeger query deployment strategy type | `RollingUpdate` |
| `query.updateStrategy.rollingUpdate` | Jaeger query deployment rolling update configuration parameters | `{}` |
| `query.extraVolumes` | Optionally specify extra list of additional volumes for jaeger container | `[]` |
| `query.initContainers` | Add additional init containers to the jaeger pods | `[]` |
| `query.sidecars` | Add additional sidecar containers to the jaeger pods | `[]` |
| Name | Description | Value |
| --------------------------------------------------------- | ----------------------------------------------------------------------------------------- | ---------------- |
| `query.command` | Command for running the container (set to default if not set). Use array form | `[]` |
| `query.args` | Args for running the container (set to default if not set). Use array form | `[]` |
| `query.lifecycleHooks` | Override default etcd container hooks | `{}` |
| `query.extraEnvVars` | Extra environment variables to be set on jaeger container | `[]` |
| `query.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars | `""` |
| `query.extraEnvVarsSecret` | Name of existing Secret containing extra env vars | `""` |
| `query.replicaCount` | Number of Jaeger replicas | `1` |
| `query.livenessProbe.enabled` | Enable livenessProbe on Query nodes | `true` |
| `query.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `10` |
| `query.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` |
| `query.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `1` |
| `query.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `3` |
| `query.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` |
| `query.startupProbe.enabled` | Enable startupProbe on Query containers | `false` |
| `query.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `10` |
| `query.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` |
| `query.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` |
| `query.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` |
| `query.startupProbe.successThreshold` | Success threshold for startupProbe | `1` |
| `query.readinessProbe.enabled` | Enable readinessProbe | `false` |
| `query.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `10` |
| `query.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` |
| `query.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `1` |
| `query.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `15` |
| `query.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` |
| `query.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` |
| `query.customStartupProbe` | Override default startup probe | `{}` |
| `query.customReadinessProbe` | Override default readiness probe | `{}` |
| `query.resources.limits` | The resources limits for Jaeger containers | `{}` |
| `query.resources.requests` | The requested resources for Jaeger containers | `{}` |
| `query.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for jaeger container | `[]` |
| `query.containerPorts.api` | Port for API | `16686` |
| `query.containerPorts.admin` | Port for admin | `16687` |
| `query.service.type` | Jaeger service type | `ClusterIP` |
| `query.service.ports.api` | Port for API | `16686` |
| `query.service.ports.admin` | Port for admin | `16687` |
| `query.service.nodePorts.api` | Node port for API | `""` |
| `query.service.nodePorts.admin` | Node port for admin | `""` |
| `query.service.extraPorts` | Extra ports to expose in the service (normally used with the `sidecar` value) | `[]` |
| `query.service.loadBalancerIP` | LoadBalancerIP if service type is `LoadBalancer` | `""` |
| `query.service.loadBalancerSourceRanges` | Service Load Balancer sources | `[]` |
| `query.service.clusterIP` | Service Cluster IP | `""` |
| `query.service.externalTrafficPolicy` | Service external traffic policy | `Cluster` |
| `query.service.annotations` | Provide any additional annotations which may be required. | `{}` |
| `query.service.sessionAffinity` | Session Affinity for Kubernetes service, can be "None" or "ClientIP" | `None` |
| `query.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` |
| `query.service.metrics.annotations` | Annotations for Prometheus metrics | `{}` |
| `query.serviceAccount.create` | Enables ServiceAccount | `true` |
| `query.serviceAccount.name` | ServiceAccount name | `""` |
| `query.serviceAccount.annotations` | Annotations to add to all deployed objects | `{}` |
| `query.serviceAccount.automountServiceAccountToken` | Automount API credentials for a service account. | `true` |
| `query.podSecurityContext.enabled` | Enabled Jaeger pods' Security Context | `true` |
| `query.podSecurityContext.fsGroup` | Set Jaeger pod's Security Context fsGroup | `1001` |
| `query.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
| `query.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
| `query.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
| `query.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
| `query.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `false` |
| `query.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` |
| `query.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` |
| `query.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` |
| `query.podAnnotations` | Additional pod annotations | `{}` |
| `query.podLabels` | Additional pod labels | `{}` |
| `query.podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `query.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
| `query.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `query.nodeAffinityPreset.key` | Node label key to match. Ignored if `affinity` is set | `""` |
| `query.nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set | `[]` |
| `query.priorityClassName` | Server priorityClassName | `""` |
| `query.affinity` | Affinity for pod assignment | `{}` |
| `query.nodeSelector` | Node labels for pod assignment | `{}` |
| `query.tolerations` | Tolerations for pod assignment | `[]` |
| `query.topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` |
| `query.schedulerName` | Alternative scheduler | `""` |
| `query.updateStrategy.type` | Jaeger query deployment strategy type | `RollingUpdate` |
| `query.updateStrategy.rollingUpdate` | Jaeger query deployment rolling update configuration parameters | `{}` |
| `query.extraVolumes` | Optionally specify extra list of additional volumes for jaeger container | `[]` |
| `query.initContainers` | Add additional init containers to the jaeger pods | `[]` |
| `query.sidecars` | Add additional sidecar containers to the jaeger pods | `[]` |
### Collector deployment parameters
| Name | Description | Value |
| ------------------------------------------------------- | ------------------------------------------------------------------------------------------ | --------------- |
| `collector.command` | Command for running the container (set to default if not set). Use array form | `[]` |
| `collector.args` | Args for running the container (set to default if not set). Use array form | `[]` |
| `collector.lifecycleHooks` | Override default etcd container hooks | `{}` |
| `collector.extraEnvVars` | Extra environment variables to be set on jaeger container | `[]` |
| `collector.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars | `""` |
| `collector.extraEnvVarsSecret` | Name of existing Secret containing extra env vars | `""` |
| `collector.replicaCount` | Number of Jaeger replicas | `1` |
| `collector.livenessProbe.enabled` | Enable livenessProbe on collector nodes | `true` |
| `collector.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `10` |
| `collector.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` |
| `collector.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `1` |
| `collector.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `3` |
| `collector.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` |
| `collector.startupProbe.enabled` | Enable startupProbe on collector containers | `false` |
| `collector.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `10` |
| `collector.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` |
| `collector.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` |
| `collector.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` |
| `collector.startupProbe.successThreshold` | Success threshold for startupProbe | `1` |
| `collector.readinessProbe.enabled` | Enable readinessProbe | `false` |
| `collector.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `10` |
| `collector.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` |
| `collector.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `1` |
| `collector.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `15` |
| `collector.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` |
| `collector.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` |
| `collector.customStartupProbe` | Override default startup probe | `{}` |
| `collector.customReadinessProbe` | Override default readiness probe | `{}` |
| `collector.resources.limits` | The resources limits for Jaeger containers | `{}` |
| `collector.resources.requests` | The requested resources for Jaeger containers | `{}` |
| `collector.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for jaeger container | `[]` |
| `collector.containerPorts.zipkin` | can accept Zipkin spans in Thrift, JSON and Proto (disabled by default) | `9411` |
| `collector.containerPorts.grpc` | used by jaeger-agent to send spans in model.proto format | `14250` |
| `collector.containerPorts.binary` | can accept spans directly from clients in jaeger.thrift format over binary thrift protocol | `14268` |
| `collector.containerPorts.admin` | Admin port: health check at / and metrics at /metrics | `14269` |
| `collector.service.type` | Jaeger service type | `ClusterIP` |
| `collector.service.ports.zipkin` | can accept Zipkin spans in Thrift, JSON and Proto (disabled by default) | `9411` |
| `collector.service.ports.grpc` | used by jaeger-agent to send spans in model.proto format | `14250` |
| `collector.service.ports.binary` | can accept spans directly from clients in jaeger.thrift format over binary thrift protocol | `14268` |
| `collector.service.ports.admin` | Admin port: health check at / and metrics at /metrics | `14269` |
| `collector.service.nodePorts.zipkin` | can accept Zipkin spans in Thrift, JSON and Proto (disabled by default) | `""` |
| `collector.service.nodePorts.grpc` | used by jaeger-agent to send spans in model.proto format | `""` |
| `collector.service.nodePorts.binary` | can accept spans directly from clients in jaeger.thrift format over binary thrift protocol | `""` |
| `collector.service.nodePorts.admin` | Admin port: health check at / and metrics at /metrics | `""` |
| `collector.service.extraPorts` | Extra ports to expose in the service (normally used with the `sidecar` value) | `[]` |
| `collector.service.loadBalancerIP` | LoadBalancerIP if service type is `LoadBalancer` | `""` |
| `collector.service.loadBalancerSourceRanges` | Service Load Balancer sources | `[]` |
| `collector.service.clusterIP` | Service Cluster IP | `""` |
| `collector.service.externalTrafficPolicy` | Service external traffic policy | `Cluster` |
| `collector.service.annotations` | Provide any additional annotations which may be required. | `{}` |
| `collector.service.sessionAffinity` | Session Affinity for Kubernetes service, can be "None" or "ClientIP" | `None` |
| `collector.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` |
| `collector.service.metrics.annotations` | Annotations for Prometheus metrics | `{}` |
| `collector.serviceAccount.create` | Enables ServiceAccount | `true` |
| `collector.serviceAccount.name` | ServiceAccount name | `""` |
| `collector.serviceAccount.annotations` | Annotations to add to all deployed objects | `{}` |
| `collector.serviceAccount.automountServiceAccountToken` | Automount API credentials for a service account. | `true` |
| `collector.podSecurityContext.enabled` | Enabled Jaeger pods' Security Context | `true` |
| `collector.podSecurityContext.fsGroup` | Set Jaeger pod's Security Context fsGroup | `1001` |
| `collector.containerSecurityContext.enabled` | Enabled Jaeger containers' Security Context | `true` |
| `collector.containerSecurityContext.runAsUser` | Set Jaeger container's Security Context runAsUser | `1001` |
| `collector.containerSecurityContext.runAsNonRoot` | Force the container to be run as non root | `true` |
| `collector.podAnnotations` | Additional pod annotations | `{}` |
| `collector.podLabels` | Additional pod labels | `{}` |
| `collector.podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `collector.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
| `collector.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `collector.nodeAffinityPreset.key` | Node label key to match. Ignored if `affinity` is set | `""` |
| `collector.nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set | `[]` |
| `collector.priorityClassName` | Server priorityClassName | `""` |
| `collector.affinity` | Affinity for pod assignment | `{}` |
| `collector.nodeSelector` | Node labels for pod assignment | `{}` |
| `collector.tolerations` | Tolerations for pod assignment | `[]` |
| `collector.topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` |
| `collector.schedulerName` | Alternative scheduler | `""` |
| `collector.updateStrategy.type` | Jaeger collector deployment strategy type | `RollingUpdate` |
| `collector.updateStrategy.rollingUpdate` | Jaeger collector deployment rolling update configuration parameters | `{}` |
| `collector.extraVolumes` | Optionally specify extra list of additional volumes for jaeger container | `[]` |
| `collector.initContainers` | Add additional init containers to the jaeger pods | `[]` |
| `collector.sidecars` | Add additional sidecar containers to the jaeger pods | `[]` |
| Name | Description | Value |
| ------------------------------------------------------------- | ------------------------------------------------------------------------------------------ | ---------------- |
| `collector.command` | Command for running the container (set to default if not set). Use array form | `[]` |
| `collector.args` | Args for running the container (set to default if not set). Use array form | `[]` |
| `collector.lifecycleHooks` | Override default etcd container hooks | `{}` |
| `collector.extraEnvVars` | Extra environment variables to be set on jaeger container | `[]` |
| `collector.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars | `""` |
| `collector.extraEnvVarsSecret` | Name of existing Secret containing extra env vars | `""` |
| `collector.replicaCount` | Number of Jaeger replicas | `1` |
| `collector.livenessProbe.enabled` | Enable livenessProbe on collector nodes | `true` |
| `collector.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `10` |
| `collector.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` |
| `collector.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `1` |
| `collector.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `3` |
| `collector.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` |
| `collector.startupProbe.enabled` | Enable startupProbe on collector containers | `false` |
| `collector.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `10` |
| `collector.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` |
| `collector.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` |
| `collector.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` |
| `collector.startupProbe.successThreshold` | Success threshold for startupProbe | `1` |
| `collector.readinessProbe.enabled` | Enable readinessProbe | `false` |
| `collector.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `10` |
| `collector.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` |
| `collector.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `1` |
| `collector.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `15` |
| `collector.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` |
| `collector.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` |
| `collector.customStartupProbe` | Override default startup probe | `{}` |
| `collector.customReadinessProbe` | Override default readiness probe | `{}` |
| `collector.resources.limits` | The resources limits for Jaeger containers | `{}` |
| `collector.resources.requests` | The requested resources for Jaeger containers | `{}` |
| `collector.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for jaeger container | `[]` |
| `collector.containerPorts.zipkin` | can accept Zipkin spans in Thrift, JSON and Proto (disabled by default) | `9411` |
| `collector.containerPorts.grpc` | used by jaeger-agent to send spans in model.proto format | `14250` |
| `collector.containerPorts.binary` | can accept spans directly from clients in jaeger.thrift format over binary thrift protocol | `14268` |
| `collector.containerPorts.admin` | Admin port: health check at / and metrics at /metrics | `14269` |
| `collector.service.type` | Jaeger service type | `ClusterIP` |
| `collector.service.ports.zipkin` | can accept Zipkin spans in Thrift, JSON and Proto (disabled by default) | `9411` |
| `collector.service.ports.grpc` | used by jaeger-agent to send spans in model.proto format | `14250` |
| `collector.service.ports.binary` | can accept spans directly from clients in jaeger.thrift format over binary thrift protocol | `14268` |
| `collector.service.ports.admin` | Admin port: health check at / and metrics at /metrics | `14269` |
| `collector.service.nodePorts.zipkin` | can accept Zipkin spans in Thrift, JSON and Proto (disabled by default) | `""` |
| `collector.service.nodePorts.grpc` | used by jaeger-agent to send spans in model.proto format | `""` |
| `collector.service.nodePorts.binary` | can accept spans directly from clients in jaeger.thrift format over binary thrift protocol | `""` |
| `collector.service.nodePorts.admin` | Admin port: health check at / and metrics at /metrics | `""` |
| `collector.service.extraPorts` | Extra ports to expose in the service (normally used with the `sidecar` value) | `[]` |
| `collector.service.loadBalancerIP` | LoadBalancerIP if service type is `LoadBalancer` | `""` |
| `collector.service.loadBalancerSourceRanges` | Service Load Balancer sources | `[]` |
| `collector.service.clusterIP` | Service Cluster IP | `""` |
| `collector.service.externalTrafficPolicy` | Service external traffic policy | `Cluster` |
| `collector.service.annotations` | Provide any additional annotations which may be required. | `{}` |
| `collector.service.sessionAffinity` | Session Affinity for Kubernetes service, can be "None" or "ClientIP" | `None` |
| `collector.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` |
| `collector.service.metrics.annotations` | Annotations for Prometheus metrics | `{}` |
| `collector.serviceAccount.create` | Enables ServiceAccount | `true` |
| `collector.serviceAccount.name` | ServiceAccount name | `""` |
| `collector.serviceAccount.annotations` | Annotations to add to all deployed objects | `{}` |
| `collector.serviceAccount.automountServiceAccountToken` | Automount API credentials for a service account. | `true` |
| `collector.podSecurityContext.enabled` | Enabled Jaeger pods' Security Context | `true` |
| `collector.podSecurityContext.fsGroup` | Set Jaeger pod's Security Context fsGroup | `1001` |
| `collector.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
| `collector.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
| `collector.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
| `collector.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
| `collector.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `false` |
| `collector.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` |
| `collector.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` |
| `collector.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` |
| `collector.podAnnotations` | Additional pod annotations | `{}` |
| `collector.podLabels` | Additional pod labels | `{}` |
| `collector.podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `collector.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
| `collector.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `collector.nodeAffinityPreset.key` | Node label key to match. Ignored if `affinity` is set | `""` |
| `collector.nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set | `[]` |
| `collector.priorityClassName` | Server priorityClassName | `""` |
| `collector.affinity` | Affinity for pod assignment | `{}` |
| `collector.nodeSelector` | Node labels for pod assignment | `{}` |
| `collector.tolerations` | Tolerations for pod assignment | `[]` |
| `collector.topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` |
| `collector.schedulerName` | Alternative scheduler | `""` |
| `collector.updateStrategy.type` | Jaeger collector deployment strategy type | `RollingUpdate` |
| `collector.updateStrategy.rollingUpdate` | Jaeger collector deployment rolling update configuration parameters | `{}` |
| `collector.extraVolumes` | Optionally specify extra list of additional volumes for jaeger container | `[]` |
| `collector.initContainers` | Add additional init containers to the jaeger pods | `[]` |
| `collector.sidecars` | Add additional sidecar containers to the jaeger pods | `[]` |
### agent deployment parameters
| Name | Description | Value |
| --------------------------------------------------- | -------------------------------------------------------------------------------------------------------------- | --------------- |
| `agent.command` | Command for running the container (set to default if not set). Use array form | `[]` |
| `agent.args` | Args for running the container (set to default if not set). Use array form | `[]` |
| `agent.lifecycleHooks` | Override default etcd container hooks | `{}` |
| `agent.extraEnvVars` | Extra environment variables to be set on jaeger container | `[]` |
| `agent.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars | `""` |
| `agent.extraEnvVarsSecret` | Name of existing Secret containing extra env vars | `""` |
| `agent.replicaCount` | Number of Jaeger replicas | `1` |
| `agent.livenessProbe.enabled` | Enable livenessProbe on agent nodes | `true` |
| `agent.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `10` |
| `agent.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` |
| `agent.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `1` |
| `agent.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `3` |
| `agent.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` |
| `agent.startupProbe.enabled` | Enable startupProbe on agent containers | `false` |
| `agent.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `10` |
| `agent.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` |
| `agent.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` |
| `agent.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` |
| `agent.startupProbe.successThreshold` | Success threshold for startupProbe | `1` |
| `agent.readinessProbe.enabled` | Enable readinessProbe | `false` |
| `agent.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `10` |
| `agent.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` |
| `agent.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `1` |
| `agent.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `15` |
| `agent.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` |
| `agent.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` |
| `agent.customStartupProbe` | Override default startup probe | `{}` |
| `agent.customReadinessProbe` | Override default readiness probe | `{}` |
| `agent.resources.limits` | The resources limits for Jaeger containers | `{}` |
| `agent.resources.requests` | The requested resources for Jaeger containers | `{}` |
| `agent.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for jaeger container | `[]` |
| `agent.containerPorts.compact` | accept jaeger.thrift in compact Thrift protocol used by most current Jaeger clients | `6831` |
| `agent.containerPorts.binary` | accept jaeger.thrift in binary Thrift protocol used by Node.js Jaeger client | `6832` |
| `agent.containerPorts.config` | Serve configs, sampling strategies | `5778` |
| `agent.containerPorts.zipkin` | Accept zipkin.thrift in compact Thrift protocol (deprecated; only used by very old Jaeger clients, circa 2016) | `5775` |
| `agent.containerPorts.admin` | Admin port: health check at / and metrics at /metrics | `14271` |
| `agent.service.type` | Jaeger service type | `ClusterIP` |
| `agent.service.ports.compact` | accept jaeger.thrift in compact Thrift protocol used by most current Jaeger clients | `6831` |
| `agent.service.ports.binary` | accept jaeger.thrift in binary Thrift protocol used by Node.js Jaeger client | `6832` |
| `agent.service.ports.config` | Serve configs, sampling strategies | `5778` |
| `agent.service.ports.zipkin` | Accept zipkin.thrift in compact Thrift protocol (deprecated; only used by very old Jaeger clients, circa 2016) | `5775` |
| `agent.service.ports.admin` | Admin port: health check at / and metrics at /metrics | `14271` |
| `agent.service.nodePorts.compact` | accept jaeger.thrift in compact Thrift protocol used by most current Jaeger clients | `""` |
| `agent.service.nodePorts.binary` | accept jaeger.thrift in binary Thrift protocol used by Node.js Jaeger client | `""` |
| `agent.service.nodePorts.config` | Serve configs, sampling strategies | `""` |
| `agent.service.nodePorts.zipkin` | Accept zipkin.thrift in compact Thrift protocol (deprecated; only used by very old Jaeger clients, circa 2016) | `""` |
| `agent.service.nodePorts.admin` | Admin port: health check at / and metrics at /metrics | `""` |
| `agent.service.extraPorts` | Extra ports to expose in the service (normally used with the `sidecar` value) | `[]` |
| `agent.service.loadBalancerIP` | LoadBalancerIP if service type is `LoadBalancer` | `""` |
| `agent.service.loadBalancerSourceRanges` | Service Load Balancer sources | `[]` |
| `agent.service.clusterIP` | Service Cluster IP | `""` |
| `agent.service.externalTrafficPolicy` | Service external traffic policy | `Cluster` |
| `agent.service.annotations` | Provide any additional annotations which may be required. | `{}` |
| `agent.service.sessionAffinity` | Session Affinity for Kubernetes service, can be "None" or "ClientIP" | `None` |
| `agent.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` |
| `agent.service.metrics.annotations` | Annotations for Prometheus metrics | `{}` |
| `agent.serviceAccount.create` | Enables ServiceAccount | `true` |
| `agent.serviceAccount.name` | ServiceAccount name | `""` |
| `agent.serviceAccount.annotations` | Annotations to add to all deployed objects | `{}` |
| `agent.serviceAccount.automountServiceAccountToken` | Automount API credentials for a service account. | `true` |
| `agent.podSecurityContext.enabled` | Enabled Jaeger pods' Security Context | `true` |
| `agent.podSecurityContext.fsGroup` | Set Jaeger pod's Security Context fsGroup | `1001` |
| `agent.containerSecurityContext.enabled` | Enabled Jaeger containers' Security Context | `true` |
| `agent.containerSecurityContext.runAsUser` | Set Jaeger container's Security Context runAsUser | `1001` |
| `agent.containerSecurityContext.runAsNonRoot` | Force the container to be run as non root | `true` |
| `agent.podAnnotations` | Additional pod annotations | `{}` |
| `agent.podLabels` | Additional pod labels | `{}` |
| `agent.podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `agent.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
| `agent.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `agent.nodeAffinityPreset.key` | Node label key to match. Ignored if `affinity` is set | `""` |
| `agent.nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set | `[]` |
| `agent.priorityClassName` | Server priorityClassName | `""` |
| `agent.affinity` | Affinity for pod assignment | `{}` |
| `agent.nodeSelector` | Node labels for pod assignment | `{}` |
| `agent.tolerations` | Tolerations for pod assignment | `[]` |
| `agent.topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` |
| `agent.schedulerName` | Alternative scheduler | `""` |
| `agent.updateStrategy.type` | Jaeger agent deployment strategy type | `RollingUpdate` |
| `agent.updateStrategy.rollingUpdate` | Jaeger agent deployment rolling update configuration parameters | `{}` |
| `agent.extraVolumes` | Optionally specify extra list of additional volumes for jaeger container | `[]` |
| `agent.initContainers` | Add additional init containers to the jaeger pods | `[]` |
| `agent.sidecars` | Add additional sidecar containers to the jaeger pods | `[]` |
| `migration.podLabels` | Additional pod labels | `{}` |
| `migration.podAnnotations` | Additional pod annotations | `{}` |
| `migration.annotations` | Provide any additional annotations which may be required. | `{}` |
| `migration.podSecurityContext.enabled` | Enabled Jaeger pods' Security Context | `true` |
| `migration.podSecurityContext.fsGroup` | Set Jaeger pod's Security Context fsGroup | `1001` |
| `migration.extraEnvVars` | Extra environment variables to be set on jaeger migration container | `[]` |
| `migration.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars | `""` |
| `migration.extraEnvVarsSecret` | Name of existing Secret containing extra env vars | `""` |
| `migration.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for jaeger container | `[]` |
| `migration.resources.limits` | The resources limits for Jaeger containers | `{}` |
| `migration.resources.requests` | The requested resources for Jaeger containers | `{}` |
| `migration.extraVolumes` | Optionally specify extra list of additional volumes for jaeger container | `[]` |
| Name | Description | Value |
| ------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------- | ---------------- |
| `agent.command` | Command for running the container (set to default if not set). Use array form | `[]` |
| `agent.args` | Args for running the container (set to default if not set). Use array form | `[]` |
| `agent.lifecycleHooks` | Override default etcd container hooks | `{}` |
| `agent.extraEnvVars` | Extra environment variables to be set on jaeger container | `[]` |
| `agent.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars | `""` |
| `agent.extraEnvVarsSecret` | Name of existing Secret containing extra env vars | `""` |
| `agent.replicaCount` | Number of Jaeger replicas | `1` |
| `agent.livenessProbe.enabled` | Enable livenessProbe on agent nodes | `true` |
| `agent.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `10` |
| `agent.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` |
| `agent.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `1` |
| `agent.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `3` |
| `agent.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` |
| `agent.startupProbe.enabled` | Enable startupProbe on agent containers | `false` |
| `agent.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `10` |
| `agent.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` |
| `agent.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` |
| `agent.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` |
| `agent.startupProbe.successThreshold` | Success threshold for startupProbe | `1` |
| `agent.readinessProbe.enabled` | Enable readinessProbe | `false` |
| `agent.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `10` |
| `agent.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` |
| `agent.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `1` |
| `agent.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `15` |
| `agent.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` |
| `agent.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` |
| `agent.customStartupProbe` | Override default startup probe | `{}` |
| `agent.customReadinessProbe` | Override default readiness probe | `{}` |
| `agent.resources.limits` | The resources limits for Jaeger containers | `{}` |
| `agent.resources.requests` | The requested resources for Jaeger containers | `{}` |
| `agent.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for jaeger container | `[]` |
| `agent.containerPorts.compact` | accept jaeger.thrift in compact Thrift protocol used by most current Jaeger clients | `6831` |
| `agent.containerPorts.binary` | accept jaeger.thrift in binary Thrift protocol used by Node.js Jaeger client | `6832` |
| `agent.containerPorts.config` | Serve configs, sampling strategies | `5778` |
| `agent.containerPorts.zipkin` | Accept zipkin.thrift in compact Thrift protocol (deprecated; only used by very old Jaeger clients, circa 2016) | `5775` |
| `agent.containerPorts.admin` | Admin port: health check at / and metrics at /metrics | `14271` |
| `agent.service.type` | Jaeger service type | `ClusterIP` |
| `agent.service.ports.compact` | accept jaeger.thrift in compact Thrift protocol used by most current Jaeger clients | `6831` |
| `agent.service.ports.binary` | accept jaeger.thrift in binary Thrift protocol used by Node.js Jaeger client | `6832` |
| `agent.service.ports.config` | Serve configs, sampling strategies | `5778` |
| `agent.service.ports.zipkin` | Accept zipkin.thrift in compact Thrift protocol (deprecated; only used by very old Jaeger clients, circa 2016) | `5775` |
| `agent.service.ports.admin` | Admin port: health check at / and metrics at /metrics | `14271` |
| `agent.service.nodePorts.compact` | accept jaeger.thrift in compact Thrift protocol used by most current Jaeger clients | `""` |
| `agent.service.nodePorts.binary` | accept jaeger.thrift in binary Thrift protocol used by Node.js Jaeger client | `""` |
| `agent.service.nodePorts.config` | Serve configs, sampling strategies | `""` |
| `agent.service.nodePorts.zipkin` | Accept zipkin.thrift in compact Thrift protocol (deprecated; only used by very old Jaeger clients, circa 2016) | `""` |
| `agent.service.nodePorts.admin` | Admin port: health check at / and metrics at /metrics | `""` |
| `agent.service.extraPorts` | Extra ports to expose in the service (normally used with the `sidecar` value) | `[]` |
| `agent.service.loadBalancerIP` | LoadBalancerIP if service type is `LoadBalancer` | `""` |
| `agent.service.loadBalancerSourceRanges` | Service Load Balancer sources | `[]` |
| `agent.service.clusterIP` | Service Cluster IP | `""` |
| `agent.service.externalTrafficPolicy` | Service external traffic policy | `Cluster` |
| `agent.service.annotations` | Provide any additional annotations which may be required. | `{}` |
| `agent.service.sessionAffinity` | Session Affinity for Kubernetes service, can be "None" or "ClientIP" | `None` |
| `agent.service.sessionAffinityConfig` | Additional settings for the sessionAffinity | `{}` |
| `agent.service.metrics.annotations` | Annotations for Prometheus metrics | `{}` |
| `agent.serviceAccount.create` | Enables ServiceAccount | `true` |
| `agent.serviceAccount.name` | ServiceAccount name | `""` |
| `agent.serviceAccount.annotations` | Annotations to add to all deployed objects | `{}` |
| `agent.serviceAccount.automountServiceAccountToken` | Automount API credentials for a service account. | `true` |
| `agent.podSecurityContext.enabled` | Enabled Jaeger pods' Security Context | `true` |
| `agent.podSecurityContext.fsGroup` | Set Jaeger pod's Security Context fsGroup | `1001` |
| `agent.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
| `agent.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
| `agent.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
| `agent.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
| `agent.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `false` |
| `agent.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` |
| `agent.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` |
| `agent.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` |
| `agent.podAnnotations` | Additional pod annotations | `{}` |
| `agent.podLabels` | Additional pod labels | `{}` |
| `agent.podAffinityPreset` | Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `agent.podAntiAffinityPreset` | Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
| `agent.nodeAffinityPreset.type` | Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
| `agent.nodeAffinityPreset.key` | Node label key to match. Ignored if `affinity` is set | `""` |
| `agent.nodeAffinityPreset.values` | Node label values to match. Ignored if `affinity` is set | `[]` |
| `agent.priorityClassName` | Server priorityClassName | `""` |
| `agent.affinity` | Affinity for pod assignment | `{}` |
| `agent.nodeSelector` | Node labels for pod assignment | `{}` |
| `agent.tolerations` | Tolerations for pod assignment | `[]` |
| `agent.topologySpreadConstraints` | Topology Spread Constraints for pod assignment | `[]` |
| `agent.schedulerName` | Alternative scheduler | `""` |
| `agent.updateStrategy.type` | Jaeger agent deployment strategy type | `RollingUpdate` |
| `agent.updateStrategy.rollingUpdate` | Jaeger agent deployment rolling update configuration parameters | `{}` |
| `agent.extraVolumes` | Optionally specify extra list of additional volumes for jaeger container | `[]` |
| `agent.initContainers` | Add additional init containers to the jaeger pods | `[]` |
| `agent.sidecars` | Add additional sidecar containers to the jaeger pods | `[]` |
| `migration.podLabels` | Additional pod labels | `{}` |
| `migration.podAnnotations` | Additional pod annotations | `{}` |
| `migration.annotations` | Provide any additional annotations which may be required. | `{}` |
| `migration.podSecurityContext.enabled` | Enabled Jaeger pods' Security Context | `true` |
| `migration.podSecurityContext.fsGroup` | Set Jaeger pod's Security Context fsGroup | `1001` |
| `migration.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` |
| `migration.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` |
| `migration.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` |
| `migration.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` |
| `migration.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `false` |
| `migration.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` |
| `migration.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` |
| `migration.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` |
| `migration.extraEnvVars` | Extra environment variables to be set on jaeger migration container | `[]` |
| `migration.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars | `""` |
| `migration.extraEnvVarsSecret` | Name of existing Secret containing extra env vars | `""` |
| `migration.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for jaeger container | `[]` |
| `migration.resources.limits` | The resources limits for Jaeger containers | `{}` |
| `migration.resources.requests` | The requested resources for Jaeger containers | `{}` |
| `migration.extraVolumes` | Optionally specify extra list of additional volumes for jaeger container | `[]` |
### Set the image to use for the migration job

View File

@@ -32,9 +32,11 @@ Create the name of the query deployment
Create a container for checking cassandra availability
*/}}
{{- define "jaeger.waitForDBInitContainer" -}}
{{- $context := .context }}
{{- $block := index .context.Values .component }}
- name: jaeger-cassandra-ready-check
image: {{ include "jaeger.cqlshImage" . }}
imagePullPolicy: {{ .Values.image.pullPolicy | quote }}
image: {{ include "jaeger.cqlshImage" .context }}
imagePullPolicy: {{ .context.Values.image.pullPolicy | quote }}
command:
- /bin/bash
args:
@@ -61,20 +63,23 @@ Create a container for checking cassandra availability
fi
env:
- name: CQLSH_HOST
value: {{ include "jaeger.cassandra.host" . }}
value: {{ include "jaeger.cassandra.host" .context }}
- name: BITNAMI_DEBUG
value: {{ ternary "true" "false" .Values.cqlshImage.debug | quote }}
value: {{ ternary "true" "false" .context.Values.cqlshImage.debug | quote }}
- name: CQLSH_PORT
value: {{ include "jaeger.cassandra.port" . }}
value: {{ include "jaeger.cassandra.port" .context }}
- name: CASSANDRA_USERNAME
value: {{ include "jaeger.cassandra.user" . }}
value: {{ include "jaeger.cassandra.user" .context }}
- name: CASSANDRA_PASSWORD
valueFrom:
secretKeyRef:
name: {{ include "jaeger.cassandra.secretName" . }}
key: {{ include "jaeger.cassandra.secretKey" . }}
name: {{ include "jaeger.cassandra.secretName" .context }}
key: {{ include "jaeger.cassandra.secretKey" .context }}
- name: CASSANDRA_KEYSPACE
value: {{ .Values.cassandra.keyspace }}
value: {{ .context.Values.cassandra.keyspace }}
{{- if $block.containerSecurityContext.enabled }}
securityContext: {{- omit $block.containerSecurityContext "enabled" | toYaml | nindent 4 }}
{{- end }}
{{- end -}}
{{/*

View File

@@ -56,7 +56,7 @@ spec:
topologySpreadConstraints: {{- include "common.tplvalues.render" (dict "value" .Values.agent.topologySpreadConstraints "context" $) | nindent 8 }}
{{- end }}
initContainers:
{{- include "jaeger.waitForDBInitContainer" . | nindent 8 }}
{{- include "jaeger.waitForDBInitContainer" (dict "component" "agent" "context" $) | nindent 8 }}
{{- if .Values.agent.initContainers }}
{{- include "common.tplvalues.render" (dict "value" .Values.agent.initContainers "context" $) | nindent 8 }}
{{- end }}

View File

@@ -56,7 +56,7 @@ spec:
topologySpreadConstraints: {{- include "common.tplvalues.render" (dict "value" .Values.collector.topologySpreadConstraints "context" $) | nindent 8 }}
{{- end }}
initContainers:
{{- include "jaeger.waitForDBInitContainer" . | nindent 8 }}
{{- include "jaeger.waitForDBInitContainer" (dict "component" "collector" "context" $) | nindent 8 }}
{{- if .Values.collector.initContainers }}
{{- include "common.tplvalues.render" (dict "value" .Values.collector.initContainers "context" $) | nindent 8 }}
{{- end }}

View File

@@ -36,6 +36,9 @@ spec:
volumeMounts:
- name: cassandra-schema
mountPath: "/cassandra-schema"
{{- if .Values.migration.containerSecurityContext.enabled }}
securityContext: {{- omit .Values.migration.containerSecurityContext "enabled" | toYaml | nindent 12 }}
{{- end }}
containers:
- name: jaeger-cassandra-migrator
image: {{ include "jaeger.cqlshImage" . }}
@@ -66,6 +69,9 @@ spec:
sed -i 's/cqlsh -e "show version"/cqlsh -e "show version" -u $CASSANDRA_USERNAME -p $CASSANDRA_PASSWORD /' /cassandra-schema/create.sh
/cassandra-schema/docker.sh
fi
{{- if .Values.migration.containerSecurityContext.enabled }}
securityContext: {{- omit .Values.migration.containerSecurityContext "enabled" | toYaml | nindent 12 }}
{{- end }}
env:
- name: CQLSH
value: /opt/bitnami/cassandra/bin/cqlsh

View File

@@ -56,7 +56,7 @@ spec:
topologySpreadConstraints: {{- include "common.tplvalues.render" (dict "value" .Values.query.topologySpreadConstraints "context" $) | nindent 8 }}
{{- end }}
initContainers:
{{- include "jaeger.waitForDBInitContainer" . | nindent 8 }}
{{- include "jaeger.waitForDBInitContainer" (dict "component" "query" "context" $) | nindent 8 }}
{{- if .Values.query.initContainers }}
{{- include "common.tplvalues.render" (dict "value" .Values.query.initContainers "context" $) | nindent 8 }}
{{- end }}

View File

@@ -301,14 +301,26 @@ query:
fsGroup: 1001
## Configure Container Security Context (only main container)
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
## @param query.containerSecurityContext.enabled Enabled Jaeger containers' Security Context
## @param query.containerSecurityContext.runAsUser Set Jaeger container's Security Context runAsUser
## @param query.containerSecurityContext.runAsNonRoot Force the container to be run as non root
## @param query.containerSecurityContext.enabled Enabled containers' Security Context
## @param query.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
## @param query.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
## @param query.containerSecurityContext.privileged Set container's Security Context privileged
## @param query.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
## @param query.containerSecurityContext.allowPrivilegeEscalation Set container's Security Context allowPrivilegeEscalation
## @param query.containerSecurityContext.capabilities.drop List of capabilities to be dropped
## @param query.containerSecurityContext.seccompProfile.type Set container's Security Context seccomp profile
##
containerSecurityContext:
enabled: true
runAsUser: 1001
runAsNonRoot: true
privileged: false
readOnlyRootFilesystem: false
allowPrivilegeEscalation: false
capabilities:
drop: ["ALL"]
seccompProfile:
type: "RuntimeDefault"
## @param query.podAnnotations Additional pod annotations
## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
##
@@ -616,14 +628,26 @@ collector:
fsGroup: 1001
## Configure Container Security Context (only main container)
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
## @param collector.containerSecurityContext.enabled Enabled Jaeger containers' Security Context
## @param collector.containerSecurityContext.runAsUser Set Jaeger container's Security Context runAsUser
## @param collector.containerSecurityContext.runAsNonRoot Force the container to be run as non root
## @param collector.containerSecurityContext.enabled Enabled containers' Security Context
## @param collector.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
## @param collector.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
## @param collector.containerSecurityContext.privileged Set container's Security Context privileged
## @param collector.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
## @param collector.containerSecurityContext.allowPrivilegeEscalation Set container's Security Context allowPrivilegeEscalation
## @param collector.containerSecurityContext.capabilities.drop List of capabilities to be dropped
## @param collector.containerSecurityContext.seccompProfile.type Set container's Security Context seccomp profile
##
containerSecurityContext:
enabled: true
runAsUser: 1001
runAsNonRoot: true
privileged: false
readOnlyRootFilesystem: false
allowPrivilegeEscalation: false
capabilities:
drop: ["ALL"]
seccompProfile:
type: "RuntimeDefault"
## @param collector.podAnnotations Additional pod annotations
## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
##
@@ -940,14 +964,26 @@ agent:
fsGroup: 1001
## Configure Container Security Context (only main container)
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
## @param agent.containerSecurityContext.enabled Enabled Jaeger containers' Security Context
## @param agent.containerSecurityContext.runAsUser Set Jaeger container's Security Context runAsUser
## @param agent.containerSecurityContext.runAsNonRoot Force the container to be run as non root
## @param agent.containerSecurityContext.enabled Enabled containers' Security Context
## @param agent.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
## @param agent.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
## @param agent.containerSecurityContext.privileged Set container's Security Context privileged
## @param agent.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
## @param agent.containerSecurityContext.allowPrivilegeEscalation Set container's Security Context allowPrivilegeEscalation
## @param agent.containerSecurityContext.capabilities.drop List of capabilities to be dropped
## @param agent.containerSecurityContext.seccompProfile.type Set container's Security Context seccomp profile
##
containerSecurityContext:
enabled: true
runAsUser: 1001
runAsNonRoot: true
privileged: false
readOnlyRootFilesystem: false
allowPrivilegeEscalation: false
capabilities:
drop: ["ALL"]
seccompProfile:
type: "RuntimeDefault"
## @param agent.podAnnotations Additional pod annotations
## ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
##
@@ -1047,6 +1083,26 @@ migration:
podSecurityContext:
enabled: true
fsGroup: 1001
## @param migration.containerSecurityContext.enabled Enabled containers' Security Context
## @param migration.containerSecurityContext.runAsUser Set containers' Security Context runAsUser
## @param migration.containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot
## @param migration.containerSecurityContext.privileged Set container's Security Context privileged
## @param migration.containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem
## @param migration.containerSecurityContext.allowPrivilegeEscalation Set container's Security Context allowPrivilegeEscalation
## @param migration.containerSecurityContext.capabilities.drop List of capabilities to be dropped
## @param migration.containerSecurityContext.seccompProfile.type Set container's Security Context seccomp profile
containerSecurityContext:
enabled: true
runAsUser: 1001
runAsNonRoot: true
privileged: false
readOnlyRootFilesystem: false
allowPrivilegeEscalation: false
capabilities:
drop: ["ALL"]
seccompProfile:
type: "RuntimeDefault"
## @param migration.extraEnvVars Extra environment variables to be set on jaeger migration container
## For example:
## - name: FOO