[bitnami/airflow] Move venv to emptydir volume (#34560)

* [bitnami/airflow] Move venv to emptydir volume

Signed-off-by: Jota Martos <jota.martos@broadcom.com>

* Update CHANGELOG.md

Signed-off-by: Bitnami Bot <bitnami.bot@broadcom.com>

* Update README.md with readme-generator-for-helm

Signed-off-by: Bitnami Bot <bitnami.bot@broadcom.com>

* [bitnami/airflow] Mount entire venv folder and remove the tmp volume

Signed-off-by: Jota Martos <jota.martos@broadcom.com>

* Update CHANGELOG.md

Signed-off-by: Bitnami Bot <bitnami.bot@broadcom.com>

---------

Signed-off-by: Jota Martos <jota.martos@broadcom.com>
Signed-off-by: Bitnami Bot <bitnami.bot@broadcom.com>
Signed-off-by: Juan José Martos <jota.martos@broadcom.com>
Co-authored-by: Bitnami Bot <bitnami.bot@broadcom.com>
This commit is contained in:
Juan José Martos
2025-06-25 08:40:10 +02:00
committed by GitHub
parent b1d5705872
commit d2e3dc579c
12 changed files with 124 additions and 28 deletions

View File

@@ -459,6 +459,19 @@ The Bitnami Airflow chart relies on the PostgreSQL chart persistence. This means
| `defaultInitContainers.waitForDBMigrations.containerSecurityContext.seccompProfile.type` | Set seccomp profile in "wait-for-db-migrations" init-containers | `RuntimeDefault` |
| `defaultInitContainers.waitForDBMigrations.resourcesPreset` | Set Airflow "wait-for-db-migrations" init container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if defaultInitContainers.waitForDBMigrations.resources is set (defaultInitContainers.waitForDBMigrations.resources is recommended for production). | `micro` |
| `defaultInitContainers.waitForDBMigrations.resources` | Set Airflow "wait-for-db-migrations" init container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
| `defaultInitContainers.prepareVenv.containerSecurityContext.enabled` | Enabled "prepare-venv" init-containers' Security Context | `true` |
| `defaultInitContainers.prepareVenv.containerSecurityContext.seLinuxOptions` | Set SELinux options in "prepare-venv" init-containers | `{}` |
| `defaultInitContainers.prepareVenv.containerSecurityContext.runAsUser` | Set runAsUser in "prepare-venv" init-containers' Security Context | `1001` |
| `defaultInitContainers.prepareVenv.containerSecurityContext.runAsGroup` | Set runAsUser in "prepare-venv" init-containers' Security Context | `1001` |
| `defaultInitContainers.prepareVenv.containerSecurityContext.runAsNonRoot` | Set runAsNonRoot in "prepare-venv" init-containers' Security Context | `true` |
| `defaultInitContainers.prepareVenv.containerSecurityContext.readOnlyRootFilesystem` | Set readOnlyRootFilesystem in "prepare-venv" init-containers' Security Context | `true` |
| `defaultInitContainers.prepareVenv.containerSecurityContext.privileged` | Set privileged in "prepare-venv" init-containers' Security Context | `false` |
| `defaultInitContainers.prepareVenv.containerSecurityContext.allowPrivilegeEscalation` | Set allowPrivilegeEscalation in "prepare-venv" init-containers' Security Context | `false` |
| `defaultInitContainers.prepareVenv.containerSecurityContext.capabilities.add` | List of capabilities to be added in "prepare-venv" init-containers | `[]` |
| `defaultInitContainers.prepareVenv.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped in "prepare-venv" init-containers | `["ALL"]` |
| `defaultInitContainers.prepareVenv.containerSecurityContext.seccompProfile.type` | Set seccomp profile in "prepare-venv" init-containers | `RuntimeDefault` |
| `defaultInitContainers.prepareVenv.resourcesPreset` | Set Airflow "prepare-venv" init container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if defaultInitContainers.prepareVenv.resources is set (defaultInitContainers.prepareVenv.resources is recommended for production). | `nano` |
| `defaultInitContainers.prepareVenv.resources` | Set Airflow "prepare-venv" init container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` |
| `defaultInitContainers.loadDAGsPlugins.command` | Override cmd | `[]` |
| `defaultInitContainers.loadDAGsPlugins.args` | Override args | `[]` |
| `defaultInitContainers.loadDAGsPlugins.extraVolumeMounts` | Add extra volume mounts | `[]` |