diff --git a/bitnami/kubernetes-event-exporter/Chart.yaml b/bitnami/kubernetes-event-exporter/Chart.yaml index 2660b93eef..2720f03e40 100644 --- a/bitnami/kubernetes-event-exporter/Chart.yaml +++ b/bitnami/kubernetes-event-exporter/Chart.yaml @@ -31,4 +31,4 @@ maintainers: name: kubernetes-event-exporter sources: - https://github.com/bitnami/charts/tree/main/bitnami/kubernetes-event-exporter -version: 2.15.2 +version: 2.16.0 diff --git a/bitnami/kubernetes-event-exporter/README.md b/bitnami/kubernetes-event-exporter/README.md index 022bb0d65a..8832b29f4d 100644 --- a/bitnami/kubernetes-event-exporter/README.md +++ b/bitnami/kubernetes-event-exporter/README.md @@ -109,6 +109,7 @@ The command removes all the Kubernetes components associated with the chart and | `containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | | `containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `nil` | | `containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | | `containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | | `containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | | `containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | diff --git a/bitnami/kubernetes-event-exporter/values.yaml b/bitnami/kubernetes-event-exporter/values.yaml index 810cff449a..78e24af921 100644 --- a/bitnami/kubernetes-event-exporter/values.yaml +++ b/bitnami/kubernetes-event-exporter/values.yaml @@ -175,6 +175,7 @@ podSecurityContext: ## @param containerSecurityContext.enabled Enabled containers' Security Context ## @param containerSecurityContext.seLinuxOptions [object,nullable] Set SELinux options in container ## @param containerSecurityContext.runAsUser Set containers' Security Context runAsUser +## @param containerSecurityContext.runAsGroup Set containers' Security Context runAsGroup ## @param containerSecurityContext.runAsNonRoot Set container's Security Context runAsNonRoot ## @param containerSecurityContext.privileged Set container's Security Context privileged ## @param containerSecurityContext.readOnlyRootFilesystem Set container's Security Context readOnlyRootFilesystem @@ -186,6 +187,7 @@ containerSecurityContext: enabled: true seLinuxOptions: null runAsUser: 1001 + runAsGroup: 1001 runAsNonRoot: true privileged: false readOnlyRootFilesystem: true