From 89e5af2f74691da26fef74b98bb9283989db8501 Mon Sep 17 00:00:00 2001 From: Dan Pock Date: Wed, 22 Jan 2025 14:08:10 -0500 Subject: [PATCH 1/5] bump alerting-drivers to 106.0.0 --- packages/rancher-alerting/rancher-alerting-drivers/package.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/packages/rancher-alerting/rancher-alerting-drivers/package.yaml b/packages/rancher-alerting/rancher-alerting-drivers/package.yaml index 1147e84a33..6b76f01735 100644 --- a/packages/rancher-alerting/rancher-alerting-drivers/package.yaml +++ b/packages/rancher-alerting/rancher-alerting-drivers/package.yaml @@ -1,2 +1,2 @@ url: local -version: 105.0.0 +version: 106.0.0 From 433bcd2467d639896b546d9be91b272329343105 Mon Sep 17 00:00:00 2001 From: Dan Pock Date: Wed, 22 Jan 2025 14:08:48 -0500 Subject: [PATCH 2/5] PACKAGE=rancher-alerting make charts --- .../rancher-alerting-drivers-106.0.0.tgz | Bin 0 -> 8835 bytes .../106.0.0/Chart.yaml | 29 ++++ .../106.0.0/README.md | 11 ++ .../106.0.0/app-readme.md | 29 ++++ .../106.0.0/charts/prom2teams/.helmignore | 22 +++ .../106.0.0/charts/prom2teams/Chart.yaml | 10 ++ .../106.0.0/charts/prom2teams/files/teams.j2 | 44 ++++++ .../charts/prom2teams/templates/NOTES.txt | 2 + .../charts/prom2teams/templates/_helpers.tpl | 73 ++++++++++ .../prom2teams/templates/configmap.yaml | 39 ++++++ .../prom2teams/templates/deployment.yaml | 83 ++++++++++++ .../charts/prom2teams/templates/psp.yaml | 61 +++++++++ .../prom2teams/templates/service-account.yaml | 6 + .../charts/prom2teams/templates/service.yaml | 17 +++ .../106.0.0/charts/prom2teams/values.yaml | 69 ++++++++++ .../106.0.0/charts/sachet/.helmignore | 23 ++++ .../106.0.0/charts/sachet/Chart.yaml | 11 ++ .../106.0.0/charts/sachet/files/template.tmpl | 1 + .../106.0.0/charts/sachet/templates/NOTES.txt | 3 + .../charts/sachet/templates/_helpers.tpl | 79 +++++++++++ .../templates/configmap-pre-install.yaml | 34 +++++ .../charts/sachet/templates/deployment.yaml | 75 +++++++++++ .../106.0.0/charts/sachet/templates/psp.yaml | 61 +++++++++ .../sachet/templates/service-account.yaml | 6 + .../charts/sachet/templates/service.yaml | 17 +++ .../106.0.0/charts/sachet/values.yaml | 69 ++++++++++ .../106.0.0/questions.yml | 17 +++ .../106.0.0/templates/NOTES.txt | 2 + .../106.0.0/templates/_helpers.tpl | 117 ++++++++++++++++ .../106.0.0/templates/cluster-role.yaml | 50 +++++++ .../106.0.0/templates/hardened.yaml | 126 ++++++++++++++++++ .../templates/validate-psp-install.yaml | 7 + .../106.0.0/values.yaml | 29 ++++ index.yaml | 34 +++++ 34 files changed, 1256 insertions(+) create mode 100644 assets/rancher-alerting-drivers/rancher-alerting-drivers-106.0.0.tgz create mode 100644 charts/rancher-alerting-drivers/106.0.0/Chart.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/README.md create mode 100644 charts/rancher-alerting-drivers/106.0.0/app-readme.md create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/.helmignore create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/Chart.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/files/teams.j2 create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/NOTES.txt create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/_helpers.tpl create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/configmap.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/deployment.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/psp.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/service-account.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/service.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/values.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/sachet/.helmignore create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/sachet/Chart.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/sachet/files/template.tmpl create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/NOTES.txt create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/_helpers.tpl create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/configmap-pre-install.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/deployment.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/psp.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/service-account.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/service.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/charts/sachet/values.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/questions.yml create mode 100644 charts/rancher-alerting-drivers/106.0.0/templates/NOTES.txt create mode 100644 charts/rancher-alerting-drivers/106.0.0/templates/_helpers.tpl create mode 100644 charts/rancher-alerting-drivers/106.0.0/templates/cluster-role.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/templates/hardened.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/templates/validate-psp-install.yaml create mode 100644 charts/rancher-alerting-drivers/106.0.0/values.yaml diff --git a/assets/rancher-alerting-drivers/rancher-alerting-drivers-106.0.0.tgz b/assets/rancher-alerting-drivers/rancher-alerting-drivers-106.0.0.tgz new file mode 100644 index 0000000000000000000000000000000000000000..c91d8173615ce6def91baf0ce55c5afa4480ea44 GIT binary patch literal 8835 zcmV-}B7EH+iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKBvbKJJFZ~o?|=u2IfBwvxUX!Du6KJ^q?arBNYt0X0iz$|<@+SJuy7r6Hp!A550a9H#MW54(P%V&WGM1Rm^moGOps{k z_>7D(Dg49pqpH}zzs98jX9>vr0PlCIn7G*iNGfDy;0-A&w7n^jC= z+ygI2xWLR2lm-@x$*(CHQD$=j# zRFWkc=Z$N-9m~huV&uYq9?tNw+AV;@Ka z=ZuC}jBvvB95f|Z#FJ%?got^sW$19tXvwiaoMXXT0Uc7_s*aw^$3yEHPi`plRi}qE zl1(Gg&~gBodSo?DN}44n_pgN+l}_zVYtBr``=ou~w%xY%W%<8R{*O_RVE!Nrz&!cC zyW6SCfB9-H{~sZ2z$-jJNgzNExZ<^jN#R->a5W+v2nPiJJbL@a8Bi7?A+WEQTqbyh zy#O%`W5kG*4IBi8K89GbnB-AGVL}rI0*7&c1m><~4FlRofmwh=faNcMn8*4DfRQsj z7@&Y-^>PEm2m`}I!Udba%?L9LCDFx_=F1_npR(!>^-n; z3qW$MCjwn-QG}TuX_*8nUZ7zQ#vQlYcDt6Ohhrhd6xUq|WFQ*~Hz*Q{RG#!5EqP3r zkcbPUh?Bjdia<(^@)&s-7!o5a1s{q`>r~;Y2ss2N08TBy)sE-3ZC1UCW;+zbl5Jy6$xWI#4qRM_@5tgGVl>zGUR>CoJ zh6(X;E22JjI1aEUWqZro*s$cQOZA4b9^Br^65kLmfDS;$fj}hEJtb&>84?(_82&RM z40HHLRvjp{;b7Y`sgxoE?>~HDvH6z?jq*QZ&(_(ytCLGtd=jhHF-QKlyPd;|{6E}3 zJY38F#|Ta1F9l3QZwfMsMoNkqef2-AbEWtK!viU#sESNtE*M53_|!|Jpim5{1PDgn z$ZQAHvqz%=877)#fhw(!yHDL6-(6UM|38j!5KA>!#H*=-bNK&Y@36A}@3!~bYyIz0 z!tJdCJ|2(=gRM2AkG@uoKBlUb4bI)2B@>bXxWDRsf!5g4-E6H+m1T<=iNpZxXS`*v zQ~-|rso&P^ZR@%9o8H)`Qb{X)$oIiCLaPx<;3!Lg(k=LoC6n}VKyS?Jg7zR~*$rja z0YyFsk0yak3fvoEKaqk^$vVn$u|(^6OVgD1riyix>Qg9Pccuf^Sn8Zbi-y!cmEzbl zdF2Z{7+_EIz&@jwh5-4R#ttFmRh_0-yOHJ z=d^8bk5P>JBp`xd?*1d+&bqIOFh5l}eJqe$*8g(zj3O)GSf!kqsBwr-KE){V)$$^> zT&W>B zV?%+wjJjinrD}?@8U{%aOh68bvYG*kV@0=X{f2efD!q_3$To23V-F=91E(P_YPPDi z1A+segB+WHghZtCk8s%PPgGC5I=hrbdq>OZDYsEH091Mh=nvV>ra!UF@BN$mh;E_{!c}F@8#kHn$wu|f-c0p&|ReS zrgWBGE=gQ2=bUHUu9T%KU3_}g|13?q!e~kkF_t4al4?ZF^w6o)R&K_qs#JE3$kt6M z_Okw+ih$2@pB%{js{LO!*dOiXS%`)qjm&1VnL-_}NgUxIboodd@_KN43ncP_#Gh`E ztE-%jPle$dQ>nfX=5p*XIHxy)2|ds~y`GyIuQfh$d(E=8LteWyRs1*Nm* z60$wkpWEX(#eLnnXg1 zw}j(aO;YKPbn>$%NmNeedb;w;aSrdd_-ea4tMs&bjkPf{Ft#?m4S$Q`)F^4h(TtTs!Ge3)Ie`T5j4w}%M}?EljfN=5^`(s|IF{eO4r{J-1T z+do+E{~se5UXuFbRzyVu4{w(vr#WsrlLG@p0{dBj3^`jRy%6<`h`};I@UFb{2m3Tr}Y=u}L9|_dU4yfyt zoWhz9cXtl*LlQYvl}4Y*+}&AVl&<=+f=r$K43S(cA_03k8_b{{4TlU5k-(0int&eI zf+g6tSQ21$eB%I$$!kWFn5V~Ljy|>mV3^Z{dAJah$!T6nq1w`*GM6QLu?Yuh6ULbJ zi`753Eyr;leT=YA#8VEDtbaX1vqor4@Xb?>kgWgfA0Y=ehgfW;zolN1J=`GSjW(ak z|07@jM~L}2!v4y>AamCL!`O2E?1#Jy0)s;&~YR z*x!LZ9#DoI^;%gI2#qWrV^7xIN8U9Z4Bn7Xt_vLtGWQluS(;A$o-$x8+pD@1FJVMX zj%g(DCy^Eoz>?^QpV8=oQehlAN>RUX%zDsix7+4D!;%HWxoUV1&hS|Ic*;=m(kKvF zd#q3#qZc(hwPJC`E+^8LoWTX1tf&+_MSp?t0DX1RBEKon0m3JPCqywww;m zs5obs<46?Jc{B`>6e90!Q<%L2wiDSq4RRp2mhOP9S}!vgRxzeQ`6e~3$)m}sW(UJJ%v75=-zL)<7)L#cyHSuDjF!f zugraJl4#u#-rGa0m_W0NjGK8tAM-dfj;YS55MY{7Lq<&fbg5B^2(FMK!+Sg7xRP5d z$(bs>+z=P!>HQ|#k0kO*H2j|D91ZXV9?0s`A)nES7Qi&auF_>Z>HmQ}VP<=+m{l6a zN-N?b0#?qOWq6`E$8-<3#+^PED4kX3)W0;GpjW@|cv7YMY|O}*1bA3<%^p!M&ak+l z?7IB&^!&K|;{5bg{vuaSwHQeP+=I=x2^SXyjaKfCIesHGyiz)q<|vw|_#}=4tlSTS z;$FX6q~2+(BcFnxQnt5FrpturQx6XI_jmU#fC1P1^FYNhjQn>|Fp&-Wi3C`yb9tAH zX^><>)PYToJ%+`mHA6Z^y5mVSoRW%WOztyxjrQfBAfPw$?}ExsHeDnO6`Z~SNHk=a zXH8V^@boJ^JFg~j-W#Vnr+GTj4^O?F{^r60_Mb5dh>xU*;BhKdma+xS^Z!0*w=4Fa z-S)xm+WzwxVZ$tuLjhX>j$kXG^g4;bo~35lU>DQ_8*KUi_BOQDfz8G;t8SV&q5`(c zK8Hu=r$(%C_h-bxF0ab1sr6W&)^6mdP*)=i0w@uf_X(Fo!};Yo2ND(U;^-9;Vn*efDMhcHcZ8ACO~0Rd{2TfI;^gSn+Y>kR?_bBf z`+wd2>ixg{z3%$__ff(IT<94veP`RcDqJ_yVxOz?T*@Gn6aIbiiY@$RF6CaBOSy0w z2|P6BvJYFSKU19D(9Ld&X>Vo{4O^s;rL}fCmB#HokB3!l7$8kU>Qb`0lC|wo?L4iy5RP`&rn1~88AfCRf5@K(JBEmxs zVuXb9&6N@*LV}EOFj4v^Wdi%IWgRDs;Yb9Noub4rDYz0q11hztLeKXs2i_8oQBDT} zt}qJu4)hV%mvG+ar|)^M7QDoWk5NFlK!wZP+m-{DZ!e3bT&e^9+7d#{IU3?VVZOPm zy=_@X11UbuJdngTNsb+e*EfT{nb0WzQ5-vRe-h$*uK{!9|K9HIZuS26erJvU@hD*} z|JU;Wn~?wNR{Af>iY03ow0Ko!+;O}6|7BU10_izSqN(T|cz;fPNOgTUH`eUD3u-R0 zdo=QJEO;xmfwyAnJL!Wlnzgp|ZlaHI1Pq6CZ14tD%L{ZIou9g3Sw|d@++ZYu*n#KI z&GsRg)wbu)VT&?3a0mtr^HJtHN93!iu1NPg+dGhO$qjOn;!iR5%nhO#vjJtHWC;>E z`T~cs5o*W$Y_8rAF@oP4H*vpf*aHf`E34J-ax+Kd_KNHNh#4LensCV%CZS*n{@u0y z|Ns4e*5Bdz^D`=N@A-4)Fg zV}by|?;{+9X;Ht!79Qg$#ghn8l%OD(fEQpCK@#U}-ImiSz1S7tbcg%1EG)ecrshkZ z(Q6z57f4{$Z=`g&8+hW4bRQ2ArcfwU8Aedk$e?RTsdq!!HEbDzBQq<1->EcV2e9zm zZCCbG)>jM+9ERMWbCG!0*~VH?mPrziMqFLy9N}!alI$t@VMK3a_hy};$}P26TTP_| z`6Z^2oP|n6%$m}IY8&iM;Rcmzv7SOTvrI21TDB4)=l%!+-75Or~Fp`pF zaE^F-xlv9sBPi>Tx znCq2ya$f|fdG?>q?iBvtVYj>1{~sfGNZ=u5By~$DK${f~cC?Ii@<>M?Rax0A(YaI5 zrv@-ObK=>96ZNX9?bkTM3+8CO4VTJTwqCn(;ViDxgab>WNUj|P z{X(f1J6c&txPT<~^~K8!nkrr2T)Ws`w&}1M>g+i^n2TS%lyUpXE!*p`NNAM*C9KB# zp~22O|J&~#O!xlS1&Mz%3587G}q-vl-XW*i?-Q6m5=#kd{wIG#R zskU|G#*dOgVj%;FRf0Fwa!@Lt#wKJ{kW8O?R2L5m^8dZiK&sngY4d|Ce9GG5qzuc-~(CEZ^i+X_rihS*ZR)_x?62>UQzVinOL*h?3 zjhyVtm%~(U3l!#PgNM9E4Q;y}DYgm_oEzF+iWQ#5LNck<4`{y?BB=?s@Fx_;0ahFQ z0U0VzRsMN&Onl6^a<@{AGLXp%B-3J8$*^OZMC#s(rEeL`Ykh$jCqr|d*Jv%Nt?UZH zrMAmxLSpJ46_z4JZJg_&*)12V=HAQnwU*jDFzTi8e^u!$<6A#)MG? z+{(3SB_NXR%&aq{>}abW;_#M4smWd#xTd0X;@9It06dDrkSiAuMUYw}$49#Hpo`y~_IEUE_a0 zQYb6h503g;dzRO$12?MCxu3dkzK5_h|F3`sJJ0{4dr-xH+3j}M`v0SZHU8@w|Mly} ze?5}=r1{oE<-pMFHL2dn`B<+xVG;=9>DL{8tBaIezOA7?#eMo zr|-B_X7$vDv=-uTNo3msU29<52L!gQ!p;4qaBZEXfo+{4c};k*OG4Yu66DhyKL-%j zjMr>D*e?oTTL56twEVTfWE&c}D3)wVZrvM7cD*Zj(6F@rpIbX)h8MdIIM4py*{k9| z?H?Yj@t+uIXIq)rNQW`rot@7O74 zYZo$slHT)6?-=Tvged~8U4Ubr*1=rZo{le~HE&lh@#k<5X$@1Cp7VRlGiz42?i&SL z`HpnMwf@SYwbHHroZoiTL-U>f8%%~HVfVn^wad||F*U#Me~oc$rJYhZJ?Oz_N9COZ z5trNVhOrW`{_4qc_d9PVefb;KvjVM<$z%0J%u>?+*l7 zOLPSeat6(1T*yU8o|+lyacyBvAXxbzpns}t*^--*- z?EC@K7@alQ7i+{E#Ll7xsW2NBqKP*W)ajNBGa#R4d(S$fjL&YO`(^b>msr6Qmv~}tnOUB8*+4U zg%nealsg%f#;xeNG&NK6Jk4`-igWUTH?%S1MfVkQN!iV>nO!RBmg1XA-X;b@Y&bO$ z%&VJ}+>0N%J4R@0@|;X^D&)PH&Y?((WB2^UBt-0`T7Uv@Lp=c!}~3tq}8+iSHt z-9xwSw%ty#M~skn<>ZFDJ2mx$F1#;Ny6hKt!>q|w}EEU$CnwC~AAwO_uef&Er- zm9GmW9IrY+iy?DA`8chHp4|wW-Q1p)0kiAXmj#XQORxV%4Rj1H{UW-+T>tOG>iw_1 zgZ26E;L7-rg^jSKIhC9G;pny=-5lP`aihOGWB0SV?Tw5{2 z1M(@wZTydI7v4p|L;=jknk0y^y0(K|%YAkE@lsHRtqm~l;lCbVf=?K?+#wMy^;eT` zx&42$min8%7!6zUPx{EmQ7bQ~kG$(7Rt}KddhYU@*m~~v(Y5v56`}l185vs7|Btl+ zzapkUC{JIVaLbJul{+@eB|b(iot)7>EO*R3>f_e8AXgXUf7Lme7APCKgaLRS|97VF zf4cjf{WbqTMtCUL34sGVWGGZq<6D^c>!89s{?BpzR>uIFyZ(2p_kTNk`|JJRqlB*< z|0|zE=y7{lZ)ek)j_EnB(TDZaSlb+b=%*V>|28WSH=LF!~eV8 zz1=GRA9mLGua6RH@xKb-t$#5Lu)JkWIAALxVr8PDD6$Ojl@?Dk0J5y&0bCKSs03A1 zMK;P|kaV(cC0V!KeoGbtxq8ul@i)uL3GbOhY$?*zf8~_QwI(w5CNaWJ_UI%mC`RY# zSPCfiqyD1C$NnV!I*0n4$Uvpovb7cQGuQ=5uAbA|q3VI-F=j+e^n>zk(m#_hL`=UP zkZ6dRx&y49SrYXrz5bZ6z}~i?N{t4F3g|GvV;q!egRNI5KmPI>KEvtRPw(I}{C0G4 zc6ugXoLpSIyMWJdd~tepdVKUomYf#SQ^^Y+;>KZ+#-b=wM>q)e(RWMp+aKNR7S_zv z=Assfhy{Q@35HIhv4N7x!O&Azx|q>e%6H7`@Y6O@UejDYC_@=n3$qHWX^_=6au0_T z+CGuLPhaUP_<|}ZG6ims`hiw)+d6qU>XbDtC}u|B<@b)wMHx4|+MdmiCYSx|K;WKV|v=ECs^d)MlNCVHiX{v<`5 zmn(;q9i9llDZuSCeFR#4Yz-5)hKc+7VB(epQ!AJ_z5t+F z1FqF~1F2T%-Q{4_ocrLa)gqTIkF4hWg`w3R9Za#pXI}(Rabe`R0x`joAZAnYLOHKJ zD(>8}sA*<|n<3S{VsJWV?UnX8VI}=P!+=}tFldhc-#t8>(*Ji4*7z@v64VkoMgj5V z8W|8Sz*Yut8|>4wpWfME8-uqEwla9zV5bJ}(weT2-A0J#NDKvOo0`^jRohv<0U`m| zr;(;0phHmU?3#tlK#|Axm%Fa%#_yWh-5f@?|;6!I#<5?n0-)hepY9A1#j{~14oo+&g4^G=Y@1d$N2Y^ z4|aa22a&6t>!yg~{Nzy9Hv^YW-8O~)yvCCqB{rmdn$6c)W|a%>?o=HrZ+$iI^~sO= z_`hk)Px|}c^?gx2#7v8MLx(!|8-4UwpF0zRX|^k~pz6FD8=*dH@enZup3;IA%aC6rGgU&(K{=c_>xc2{el<)xfZ?mNADsp^P z$^2kga47)S%G<)G{ImCK^U&mi5_R{dZxss5SaI`kzh=#hFAGvOg;6vIJ!TcynAxpc z9Z>9h!2mP9M8(jA0X7R*s9_joC}IvZyV4Xg;b>eeJ}vy{{QTqbyR)B8Uw{1R^vy}B z7GsOAU$=D)MFYun;pZ3c-gd7}j^18=Jb!m_wRqu5Gh4LipQ`{-GmBQr;i5$!zdJiS zIlg*#u~ffADZ=AomAt-q_sjXmqczE0pLGji$tQa^vn@*8`^Mpr{?MHZTf*A!4maUX5fPJWa+wiL&;NFjq~EXyn2UR z$UIme=b)Ue`1zKn-tVkKIjpq*UlIdw-u;jE?v(#ux4pjq`6%H@@&6ikP*dP#U({f* z#sd7lu>faI!$&q^JtQvR1F_dvjSu)$jokxd1v6(8@E^Yr z<68?b{u4n#7EY|@LP3^~m+yC0yX-mb663!F|F4VzIFJALr|`cz2M25ak4Fh>{J**Q ze}7HjKNFVV|FUP<5_Qb8|L(S{{@>ls;Tr$_QNryr2e|q?vKZkIfAnZT8Hbl}t5%*( zhB*z!*x!U6Y<6EAA9i1D?&v6w5kWi@sHhjmoukfC8l^B=a81MwViAdkD(0u3{&v*< zF^x&0>xkY&D&|;)O$*@8a-Q8;mL|sjUveq8dtkrSsD#Ie`Sy;9GYAY&l2SIs?^t(7@$pQ%fZ>W=%%mxWe8yHh8hg}!mqNVvO$+h_WeZaUff zkPknq)36k<=0lnx^2q?6-KCVIz%{eU*t#$e+r=_&Zy~QomjicM$%2SL_18J0Ar>Q? za8Qg6i&qpB(`AG7><+dJB7k|fUE4Gb8^Y}#yuZzi!#45+851$NO6i-~43%YoJfVwG zlxL~c{kUg$x21!6jU?0qTY2^ticyiuL!w%1lmZQ;$?kTF-CV9T)xMf5K8=*+f1#?g z(iW{golwoyU#1vIi`1VLw`lzZc&26&UKKE$7NMe8Xfq)V&DAJS3pG|x+ENXb<|!wf zj|M+}18KLnU_5pfp{`iy`)jO3Mww6?`I4GvcZFWb9a8EVQn;=# zuQlbQ580$b$&0t^L$Q22MC{t9H<6veP66C~u-1m3by$aWScjFu{{#R4|Nr^Sd;9?W F003rUf0zIO literal 0 HcmV?d00001 diff --git a/charts/rancher-alerting-drivers/106.0.0/Chart.yaml b/charts/rancher-alerting-drivers/106.0.0/Chart.yaml new file mode 100644 index 0000000000..7ae66edc06 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/Chart.yaml @@ -0,0 +1,29 @@ +annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/display-name: Alerting Drivers + catalog.cattle.io/kube-version: '>= 1.28.0-0 < 1.32.0-0' + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/rancher-version: '>= 2.10.0-0 < 2.11.0-0' + catalog.cattle.io/release-name: rancher-alerting-drivers + catalog.cattle.io/type: cluster-tool +apiVersion: v2 +appVersion: 1.16.0 +dependencies: +- condition: prom2teams.enabled + name: prom2teams + repository: file://./charts/prom2teams + version: 0.2.0 +- condition: sachet.enabled + name: sachet + repository: file://./charts/sachet + version: 1.0.1 +description: The manager for third-party webhook receivers used in Prometheus Alertmanager +icon: https://charts.rancher.io/assets/logos/alerting-drivers.svg +keywords: +- monitoring +- alertmanger +- webhook +kubeVersion: '>=1.28.0-0' +name: rancher-alerting-drivers +version: 106.0.0 diff --git a/charts/rancher-alerting-drivers/106.0.0/README.md b/charts/rancher-alerting-drivers/106.0.0/README.md new file mode 100644 index 0000000000..ea3f118015 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/README.md @@ -0,0 +1,11 @@ +# Rancher Alerting Drivers + +This chart installs one or more [Alertmanager Webhook Receiver Integrations](https://prometheus.io/docs/operating/integrations/#alertmanager-webhook-receiver) (i.e. Drivers). + +Those Drivers can be targeted by an existing deployment of Alertmanager to send alerts to notification mechanisms that are not natively supported. + +Currently, this chart supports the following Drivers: +- Microsoft Teams, based on [prom2teams](https://github.com/idealista/prom2teams) +- SMS, based on [Sachet](https://github.com/messagebird/sachet) + +After installing rancher-alerting-drivers, please refer to the upstream documentation for each Driver for configuration options. \ No newline at end of file diff --git a/charts/rancher-alerting-drivers/106.0.0/app-readme.md b/charts/rancher-alerting-drivers/106.0.0/app-readme.md new file mode 100644 index 0000000000..fe228d96f7 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/app-readme.md @@ -0,0 +1,29 @@ +# Rancher Alerting Drivers + +This chart installs one or more [Alertmanager Webhook Receiver Integrations](https://prometheus.io/docs/operating/integrations/#alertmanager-webhook-receiver) (i.e. Drivers). + +Those Drivers can be targeted by an existing deployment of Alertmanager to send alerts to notification mechanisms that are not natively supported. + +Currently, this chart supports the following Drivers: +- Microsoft Teams, based on [prom2teams](https://github.com/idealista/prom2teams) +- SMS, based on [Sachet](https://github.com/messagebird/sachet) + +After installing rancher-alerting-drivers, please refer to the upstream documentation for each Driver for configuration options. + +## Upgrading to Kubernetes v1.25+ + +Starting in Kubernetes v1.25, [Pod Security Policies](https://kubernetes.io/docs/concepts/security/pod-security-policy/) have been removed from the Kubernetes API. + +As a result, **before upgrading to Kubernetes v1.25** (or on a fresh install in a Kubernetes v1.25+ cluster), users are expected to perform an in-place upgrade of this chart with `global.cattle.psp.enabled` set to `false` if it has been previously set to `true`. +​ +> **Note:** +> In this chart release, any previous field that was associated with any PSP resources have been removed in favor of a single global field: `global.cattle.psp.enabled`. + ​ +> **Note:** +> If you upgrade your cluster to Kubernetes v1.25+ before removing PSPs via a `helm upgrade` (even if you manually clean up resources), **it will leave the Helm release in a broken state within the cluster such that further Helm operations will not work (`helm uninstall`, `helm upgrade`, etc.).** +> +> If your charts get stuck in this state, please consult the Rancher docs on how to clean up your Helm release secrets. + +Upon setting `global.cattle.psp.enabled` to false, the chart will remove any PSP resources deployed on its behalf from the cluster. This is the default setting for this chart. +​ +As a replacement for PSPs, [Pod Security Admission](https://kubernetes.io/docs/concepts/security/pod-security-admission/) should be used. Please consult the Rancher docs for more details on how to configure your chart release namespaces to work with the new Pod Security Admission and apply Pod Security Standards. \ No newline at end of file diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/.helmignore b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/.helmignore new file mode 100644 index 0000000000..50af031725 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/.helmignore @@ -0,0 +1,22 @@ +# Patterns to ignore when building packages. +# This supports shell glob matching, relative path matching, and +# negation (prefixed with !). Only one pattern per line. +.DS_Store +# Common VCS dirs +.git/ +.gitignore +.bzr/ +.bzrignore +.hg/ +.hgignore +.svn/ +# Common backup files +*.swp +*.bak +*.tmp +*~ +# Various IDEs +.project +.idea/ +*.tmproj +.vscode/ diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/Chart.yaml b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/Chart.yaml new file mode 100644 index 0000000000..aeae0df709 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/Chart.yaml @@ -0,0 +1,10 @@ +annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/os: linux + catalog.cattle.io/release-name: rancher-prom2teams +apiVersion: v1 +appVersion: 4.2.1 +description: A Helm chart for Prom2Teams based on the upstream https://github.com/idealista/prom2teams +name: prom2teams +version: 0.2.0 diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/files/teams.j2 b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/files/teams.j2 new file mode 100644 index 0000000000..f1cf61d4ef --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/files/teams.j2 @@ -0,0 +1,44 @@ +{%- set + theme_colors = { + 'resolved' : '2DC72D', + 'critical' : '8C1A1A', + 'severe' : '8C1A1A', + 'warning' : 'FF9A0B', + 'unknown' : 'CCCCCC' + } +-%} + +{ + "@type": "MessageCard", + "@context": "http://schema.org/extensions", + "themeColor": "{% if status=='resolved' %} {{ theme_colors.resolved }} {% else %} {{ theme_colors[msg_text.severity] }} {% endif %}", + "summary": "{% if status=='resolved' %}(Resolved) {% endif %}{{ msg_text.summary }}", + "title": "Prometheus alert {% if status=='resolved' %}(Resolved) {% elif status=='unknown' %} (status unknown) {% endif %}", + "sections": [{ + "activityTitle": "{{ msg_text.summary }}", + "facts": [{% if msg_text.name %}{ + "name": "Alert", + "value": "{{ msg_text.name }}" + },{% endif %}{% if msg_text.instance %}{ + "name": "In host", + "value": "{{ msg_text.instance }}" + },{% endif %}{% if msg_text.severity %}{ + "name": "Severity", + "value": "{{ msg_text.severity }}" + },{% endif %}{% if msg_text.description %}{ + "name": "Description", + "value": "{{ msg_text.description }}" + },{% endif %}{ + "name": "Status", + "value": "{{ msg_text.status }}" + }{% if msg_text.extra_labels %}{% for key in msg_text.extra_labels %},{ + "name": "{{ key }}", + "value": "{{ msg_text.extra_labels[key] }}" + }{% endfor %}{% endif %} + {% if msg_text.extra_annotations %}{% for key in msg_text.extra_annotations %},{ + "name": "{{ key }}", + "value": "{{ msg_text.extra_annotations[key] }}" + }{% endfor %}{% endif %}], + "markdown": true + }] +} diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/NOTES.txt b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/NOTES.txt new file mode 100644 index 0000000000..a94c4132b6 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/NOTES.txt @@ -0,0 +1,2 @@ +Prom2Teams has been installed. Check its status by running: + kubectl --namespace {{ .Release.Namespace }} get pods -l "app.kubernetes.io/instance={{ .Release.Name }}" diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/_helpers.tpl b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/_helpers.tpl new file mode 100644 index 0000000000..ffc0fa3567 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/_helpers.tpl @@ -0,0 +1,73 @@ +{{/* vim: set filetype=mustache: */}} + +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} + +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +{{- if semverCompare "<1.14-0" .Capabilities.KubeVersion.GitVersion -}} +beta.kubernetes.io/os: linux +{{- else -}} +kubernetes.io/os: linux +{{- end -}} +{{- end -}} + +{{/* +Expand the name of the chart. +*/}} +{{- define "prom2teams.name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +If release name contains chart name it will be used as a full name. +*/}} +{{- define "prom2teams.fullname" -}} +{{- if .Values.fullnameOverride -}} +{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" -}} +{{- else -}} +{{- $name := default .Chart.Name .Values.nameOverride -}} +{{- if contains $name .Release.Name -}} +{{- .Release.Name | trunc 63 | trimSuffix "-" -}} +{{- else -}} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}} +{{- end -}} +{{- end -}} +{{- end -}} + +{{/* +Allow the release namespace to be overridden for multi-namespace deployments in combined charts +*/}} +{{- define "prom2teams.namespace" -}} +{{ default .Release.Namespace .Values.global.namespaceOverride }} +{{- end -}} + +{{/* +Common labels +*/}} +{{- define "prom2teams.labels" -}} +app.kubernetes.io/name: {{ include "prom2teams.name" . }} +helm.sh/chart: {{ printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" }} +app.kubernetes.io/instance: {{ .Release.Name }} +release: {{ .Release.Name }} +{{- if .Chart.AppVersion }} +app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} +{{- end }} +app.kubernetes.io/managed-by: {{ .Release.Service }} +{{- end -}} diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/configmap.yaml b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/configmap.yaml new file mode 100644 index 0000000000..ccf38953e2 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/configmap.yaml @@ -0,0 +1,39 @@ +{{- $valid := list "DEBUG" "INFO" "WARNING" "ERROR" "CRITICAL" -}} +{{- if not (has .Values.prom2teams.loglevel $valid) -}} +{{- fail "Invalid log level"}} +{{- end -}} +{{- if and .Values.prom2teams.connector (hasKey .Values.prom2teams.connectors "Connector") -}} +{{- fail "Invalid configuration: prom2teams.connectors can't have a connector named Connector when prom2teams.connector is set"}} +{{- end -}} +{{/* Create the configmap when the operation is helm install and the target configmap does not exist. */}} +{{- if not (lookup "v1" "ConfigMap" (include "prom2teams.namespace" . ) (include "prom2teams.fullname" .)) }} +apiVersion: v1 +kind: ConfigMap +metadata: + namespace: {{ include "prom2teams.namespace" . }} + name: {{ include "prom2teams.fullname" . }} + labels: {{ include "prom2teams.labels" . | nindent 4 }} + annotations: + "helm.sh/hook": pre-install, pre-upgrade + "helm.sh/hook-weight": "3" + "helm.sh/resource-policy": keep +data: + config.ini: |- + [HTTP Server] + Host: {{ .Values.prom2teams.host }} + Port: {{ .Values.prom2teams.port }} + [Microsoft Teams] + {{- with .Values.prom2teams.connector }} + Connector: {{ . }} + {{- end }} + {{- range $key, $val := .Values.prom2teams.connectors }} + {{ $key }}: {{ $val }} + {{- end }} + [Group Alerts] + Field: {{ .Values.prom2teams.group_alerts_by }} + [Log] + Level: {{ .Values.prom2teams.loglevel }} + [Template] + Path: {{ .Values.prom2teams.templatepath }} + teams.j2: {{ .Files.Get "files/teams.j2" | quote }} + {{- end -}} diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/deployment.yaml b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/deployment.yaml new file mode 100644 index 0000000000..34f7d0f465 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/deployment.yaml @@ -0,0 +1,83 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: {{ include "prom2teams.fullname" . }} + namespace: {{ include "prom2teams.namespace" . }} + labels: {{ include "prom2teams.labels" . | nindent 4 }} +spec: + replicas: {{ .Values.replicaCount }} + selector: + matchLabels: + app.kubernetes.io/name: {{ include "prom2teams.name" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + template: + metadata: + labels: + app.kubernetes.io/name: {{ include "prom2teams.name" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + spec: + serviceAccountName: {{ include "prom2teams.fullname" . }} + {{- with .Values.imagePullSecrets }} + imagePullSecrets: {{ toYaml . | nindent 8 }} + {{- end }} + volumes: + - name: config + configMap: + name: {{ include "prom2teams.fullname" . }} + containers: + - name: {{ .Chart.Name }} + image: {{ include "system_default_registry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag }} + imagePullPolicy: {{ .Values.image.pullPolicy }} + ports: + - name: http + containerPort: 8089 + protocol: TCP + volumeMounts: + - name: config + mountPath: /opt/prom2teams/helmconfig/ + env: + - name: APP_CONFIG_FILE + value: {{ .Values.prom2teams.config | quote }} + - name: PROM2TEAMS_PORT + value: {{ .Values.prom2teams.port | quote }} + - name: PROM2TEAMS_HOST + value: {{ .Values.prom2teams.host | quote }} + - name: PROM2TEAMS_CONNECTOR + value: {{ .Values.prom2teams.connector | quote }} + - name: PROM2TEAMS_GROUP_ALERTS_BY + value: {{ .Values.prom2teams.group_alerts_by | quote }} + - name: PROM2TEAMS_LOGLEVEL + value: {{ .Values.prom2teams.loglevel }} + {{- range $key, $value := .Values.prom2teams.extraEnv }} + - name: "{{ $key }}" + value: "{{ $value }}" + {{- end }} + resources: {{ toYaml .Values.resources | nindent 12 }} + {{- if .Values.securityContext.enabled }} + securityContext: + privileged: false + readOnlyRootFilesystem: false + allowPrivilegeEscalation: false + capabilities: + drop: + - ALL + {{- end }} + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} + {{- if .Values.nodeSelector }} + {{- toYaml .Values.nodeSelector | nindent 8 }} + {{- end }} + {{- with .Values.affinity }} + affinity: {{ toYaml . | nindent 8 }} + {{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} + {{- if .Values.tolerations }} + {{- toYaml .Values.tolerations | nindent 8 }} + {{- end }} + {{- if .Values.securityContext.enabled }} + securityContext: + runAsNonRoot: {{ if eq (int .Values.securityContext.runAsUser) 0 }}false{{ else }}true{{ end }} + runAsUser: {{ .Values.securityContext.runAsUser }} + runAsGroup: {{ .Values.securityContext.runAsGroup }} + fsGroup: {{ .Values.securityContext.fsGroup }} + {{- end }} + diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/psp.yaml b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/psp.yaml new file mode 100644 index 0000000000..3e49a6c5d4 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/psp.yaml @@ -0,0 +1,61 @@ +{{- if .Values.global.cattle.psp.enabled }} +apiVersion: policy/v1beta1 +kind: PodSecurityPolicy +metadata: + name: {{ include "prom2teams.fullname" . }}-psp-{{ include "prom2teams.namespace" . }} + labels: {{ include "prom2teams.labels" . | nindent 4 }} +spec: + privileged: false + allowPrivilegeEscalation: false + hostNetwork: false + hostIPC: false + hostPID: false + runAsUser: + rule: 'MustRunAsNonRoot' + seLinux: + rule: 'RunAsAny' + supplementalGroups: + rule: 'MustRunAs' + ranges: + - min: 1 + max: 65535 + fsGroup: + rule: 'MustRunAs' + ranges: + - min: 1 + max: 65535 + readOnlyRootFilesystem: false + volumes: + - 'configMap' + - 'secret' +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: {{ include "prom2teams.fullname" . }}-psp + namespace: {{ include "prom2teams.namespace" . }} + labels: {{ include "prom2teams.labels" . | nindent 4 }} +rules: + - apiGroups: + - policy + resourceNames: + - {{ include "prom2teams.fullname" . }}-psp-{{ include "prom2teams.namespace" . }} + resources: + - podsecuritypolicies + verbs: + - use +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: {{ include "prom2teams.fullname" . }}-psp + namespace: {{ include "prom2teams.namespace" . }} + labels: {{ include "prom2teams.labels" . | nindent 4 }} +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: {{ include "prom2teams.fullname" . }}-psp +subjects: + - kind: ServiceAccount + name: {{ include "prom2teams.fullname" . }} +{{- end }} diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/service-account.yaml b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/service-account.yaml new file mode 100644 index 0000000000..a9572c5cd9 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/service-account.yaml @@ -0,0 +1,6 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ include "prom2teams.fullname" . }} + namespace: {{ include "prom2teams.namespace" . }} + labels: {{ include "prom2teams.labels" . | nindent 4 }} diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/service.yaml b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/service.yaml new file mode 100644 index 0000000000..cc95cad355 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/templates/service.yaml @@ -0,0 +1,17 @@ +apiVersion: v1 +kind: Service +metadata: + name: {{ include "prom2teams.fullname" . }} + namespace: {{ include "prom2teams.namespace" . }} + labels: +{{ include "prom2teams.labels" . | indent 4 }} +spec: + type: {{ .Values.service.type }} + ports: + - port: {{ .Values.service.port }} + targetPort: 8089 + protocol: TCP + name: http + selector: + app.kubernetes.io/name: {{ include "prom2teams.name" . }} + app.kubernetes.io/instance: {{ .Release.Name }} diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/values.yaml b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/values.yaml new file mode 100644 index 0000000000..e53d361eea --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/prom2teams/values.yaml @@ -0,0 +1,69 @@ +# Default values for prom2teams. +# This is a YAML-formatted file. +# Declare variables to be passed into your templates. + +global: + cattle: + psp: + enabled: false + systemDefaultRegistry: "" + namespaceOverride: "" + +nameOverride: "prom2teams" +fullnameOverride: "" + +replicaCount: 1 + +image: + repository: rancher/mirrored-idealista-prom2teams + tag: 4.2.1 + pullPolicy: IfNotPresent + +resources: + requests: + cpu: 100m + memory: 128Mi + limits: + cpu: 200m + memory: 200Mi + +service: + type: ClusterIP + port: 8089 + +prom2teams: + host: 0.0.0.0 + port: 8089 + connector: the-connector-url + connectors: {} + # group_alerts_by can be one of + # ("name" | "description" | "instance" | "severity" | "status" | "summary" | "fingerprint" | "runbook_url") + group_alerts_by: + # loglevel can be one of (DEBUG | INFO | WARNING | ERROR | CRITICAL) + loglevel: INFO + templatepath: /opt/prom2teams/helmconfig/teams.j2 + config: /opt/prom2teams/helmconfig/config.ini + extraEnv: {} + +# Security Context properties +securityContext: + # enabled is a flag to enable Security Context + enabled: true + # runAsUser is the user ID used to run the container + runAsUser: 101 + # runAsGroup is the primary group ID used to run all processes within any container of the pod + runAsGroup: 101 + # fsGroup is the group ID associated with the container + fsGroup: 101 + # readOnlyRootFilesystem is a flag to enable readOnlyRootFilesystem for the Hazelcast security context + readOnlyRootFilesystem: true + +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} + +## List of node taints to tolerate (requires Kubernetes >= 1.6) +tolerations: [] + +affinity: {} diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/sachet/.helmignore b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/.helmignore new file mode 100644 index 0000000000..0e8a0eb36f --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/.helmignore @@ -0,0 +1,23 @@ +# Patterns to ignore when building packages. +# This supports shell glob matching, relative path matching, and +# negation (prefixed with !). Only one pattern per line. +.DS_Store +# Common VCS dirs +.git/ +.gitignore +.bzr/ +.bzrignore +.hg/ +.hgignore +.svn/ +# Common backup files +*.swp +*.bak +*.tmp +*.orig +*~ +# Various IDEs +.project +.idea/ +*.tmproj +.vscode/ diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/sachet/Chart.yaml b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/Chart.yaml new file mode 100644 index 0000000000..dd0d706a60 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/Chart.yaml @@ -0,0 +1,11 @@ +annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/os: linux + catalog.cattle.io/release-name: rancher-sachet +apiVersion: v2 +appVersion: 0.3.1 +description: A Helm chart for Sachet based on the upstream https://github.com/messagebird/sachet +name: sachet +type: application +version: 1.0.1 diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/sachet/files/template.tmpl b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/files/template.tmpl new file mode 100644 index 0000000000..08f24e1387 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/files/template.tmpl @@ -0,0 +1 @@ +# reference: https://github.com/messagebird/sachet/blob/master/examples/telegram.tmpl diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/NOTES.txt b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/NOTES.txt new file mode 100644 index 0000000000..247a91fc13 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/NOTES.txt @@ -0,0 +1,3 @@ +rancher-sachet is now installed on the cluster! +Please refer to the upstream documentation for configuration options: +https://github.com/messagebird/sachet diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/_helpers.tpl b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/_helpers.tpl new file mode 100644 index 0000000000..eaa61fee50 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/_helpers.tpl @@ -0,0 +1,79 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} + +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +{{- if semverCompare "<1.14-0" .Capabilities.KubeVersion.GitVersion -}} +beta.kubernetes.io/os: linux +{{- else -}} +kubernetes.io/os: linux +{{- end -}} +{{- end -}} + +{{/* +Allow the release namespace to be overridden for multi-namespace deployments in combined charts +*/}} +{{- define "sachet.namespace" -}} +{{ default .Release.Namespace .Values.global.namespaceOverride }} +{{- end }} + +{{/* +Expand the name of the chart. +*/}} +{{- define "sachet.name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" }} +{{- end }} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +If release name contains chart name it will be used as a full name. +*/}} +{{- define "sachet.fullname" -}} +{{- if .Values.fullnameOverride }} +{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" }} +{{- else }} +{{- $name := default .Chart.Name .Values.nameOverride }} +{{- if contains $name .Release.Name -}} +{{- .Release.Name | trunc 63 | trimSuffix "-" -}} +{{- else -}} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}} +{{- end -}} +{{- end -}} +{{- end -}} + +{{/* +Common labels +*/}} +{{- define "sachet.labels" -}} +helm.sh/chart: {{ printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" }} +{{ include "sachet.selectorLabels" . }} +{{- if .Chart.AppVersion }} +app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} +{{- end }} +app.kubernetes.io/managed-by: {{ .Release.Service }} +{{- end }} + +{{/* +Selector labels +*/}} +{{- define "sachet.selectorLabels" -}} +app.kubernetes.io/name: {{ include "sachet.name" . }} +app.kubernetes.io/instance: {{ .Release.Name }} +{{- end }} + + diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/configmap-pre-install.yaml b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/configmap-pre-install.yaml new file mode 100644 index 0000000000..e8c63ac039 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/configmap-pre-install.yaml @@ -0,0 +1,34 @@ +{{/*This file is applied when the operation is helm install and the target confimap does not exist. */}} +{{- if not (lookup "v1" "ConfigMap" (include "sachet.namespace" . ) (include "sachet.fullname" .)) }} +apiVersion: v1 +kind: ConfigMap +metadata: + namespace: {{ include "sachet.namespace" . }} + name: {{ include "sachet.fullname" . }} + labels: {{ include "sachet.labels" . | nindent 4 }} + annotations: + "helm.sh/hook": pre-install, pre-upgrade + "helm.sh/hook-weight": "3" + "helm.sh/resource-policy": keep +data: + config.yaml: |- + {{- if and (not .Values.sachet.providers) (not .Values.sachet.receivers) }} + # please refer to the upstream documentation for configuration options: + # https://github.com/messagebird/sachet + # + # providers: + # aliyun: + # region_id: + # ... + # receivers: + # - name: 'team-sms' + # provider: 'aliyu' + # ... + {{- end }} + {{- with .Values.sachet.providers }} + providers: {{ toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.sachet.receivers }} + receivers: {{ toYaml . | nindent 6 }} + {{- end }} +{{- end }} diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/deployment.yaml b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/deployment.yaml new file mode 100644 index 0000000000..17215eebd0 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/deployment.yaml @@ -0,0 +1,75 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: {{ include "sachet.fullname" . }} + namespace: {{ include "sachet.namespace" . }} + labels: {{ include "sachet.labels" . | nindent 4 }} +spec: + replicas: {{ .Values.replicaCount }} + selector: + matchLabels: {{ include "sachet.selectorLabels" . | nindent 6 }} + template: + metadata: + {{- with .Values.podAnnotations }} + annotations: {{ toYaml . | nindent 8 }} + {{- end }} + labels: {{ include "sachet.selectorLabels" . | nindent 8 }} + spec: + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} + {{- if .Values.nodeSelector }} + {{- toYaml .Values.nodeSelector | nindent 8 }} + {{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} + {{- if .Values.tolerations }} + {{- toYaml .Values.tolerations | nindent 8 }} + {{- end }} + {{- with .Values.affinity }} + affinity: {{ toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.imagePullSecrets }} + imagePullSecrets: {{ toYaml . | nindent 8 }} + {{- end }} + serviceAccountName: {{ include "sachet.fullname" . }} + {{- with .Values.podSecurityContext }} + securityContext: {{ toYaml .Values.podSecurityContext | nindent 8 }} + {{- end }} + containers: + - name: {{ .Chart.Name }} + securityContext: {{ toYaml .Values.securityContext | nindent 12 }} + image: {{ include "system_default_registry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag }} + imagePullPolicy: {{ .Values.image.pullPolicy }} + ports: + - name: http + containerPort: 9876 + protocol: TCP + livenessProbe: + httpGet: + path: /-/live + port: http + readinessProbe: + httpGet: + path: /-/ready + port: http + volumeMounts: + - mountPath: /etc/sachet/ + name: config-volume + {{- with .Values.resources }} + resources: {{ toYaml .Values.resources | nindent 12 }} + {{- end }} + - name: config-reloader + securityContext: {{ toYaml .Values.securityContext | nindent 12 }} + image: {{ include "system_default_registry" . }}{{ .Values.configReloader.repository }}:{{ .Values.configReloader.tag }} + imagePullPolicy: {{ .Values.configReloader.pullPolicy }} + args: + - -volume-dir=/watch-config + - -webhook-method=POST + - -webhook-status-code=200 + - -webhook-url=http://127.0.0.1:{{ .Values.service.port }}/-/reload + volumeMounts: + - mountPath: /watch-config + name: config-volume + volumes: + - name: config-volume + configMap: + name: {{ include "sachet.fullname" . }} + defaultMode: 0777 diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/psp.yaml b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/psp.yaml new file mode 100644 index 0000000000..16ec9ba8e7 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/psp.yaml @@ -0,0 +1,61 @@ +{{- if .Values.global.cattle.psp.enabled }} +apiVersion: policy/v1beta1 +kind: PodSecurityPolicy +metadata: + name: {{ include "sachet.fullname" . }}-psp-{{ include "sachet.namespace" . }} + labels: {{ include "sachet.labels" . | nindent 4 }} +spec: + privileged: false + allowPrivilegeEscalation: false + hostNetwork: false + hostIPC: false + hostPID: false + runAsUser: + rule: 'MustRunAsNonRoot' + seLinux: + rule: 'RunAsAny' + supplementalGroups: + rule: 'MustRunAs' + ranges: + - min: 1 + max: 65535 + fsGroup: + rule: 'MustRunAs' + ranges: + - min: 1 + max: 65535 + readOnlyRootFilesystem: false + volumes: + - 'configMap' + - 'secret' +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: {{ include "sachet.fullname" . }}-psp + namespace: {{ include "sachet.namespace" . }} + labels: {{ include "sachet.labels" . | nindent 4 }} +rules: + - apiGroups: + - policy + resourceNames: + - {{ include "sachet.fullname" . }}-psp-{{ include "sachet.namespace" . }} + resources: + - podsecuritypolicies + verbs: + - use +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: {{ include "sachet.fullname" . }}-psp + namespace: {{ include "sachet.namespace" . }} + labels: {{ include "sachet.labels" . | nindent 4 }} +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: {{ include "sachet.fullname" . }}-psp +subjects: + - kind: ServiceAccount + name: {{ include "sachet.fullname" . }} +{{- end }} diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/service-account.yaml b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/service-account.yaml new file mode 100644 index 0000000000..8833f1b3b2 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/service-account.yaml @@ -0,0 +1,6 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ include "sachet.fullname" . }} + namespace: {{ include "sachet.namespace" . }} + labels: {{ include "sachet.labels" . | nindent 4 }} diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/service.yaml b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/service.yaml new file mode 100644 index 0000000000..216e8322ca --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/templates/service.yaml @@ -0,0 +1,17 @@ +apiVersion: v1 +kind: Service +metadata: + name: {{ include "sachet.fullname" . }} + namespace: {{ include "sachet.namespace" . }} + labels: {{ include "sachet.labels" . | nindent 4 }} +spec: + type: {{ .Values.service.type }} + ports: + - port: {{ .Values.service.port }} + targetPort: http + protocol: TCP + name: http + {{- if contains "NodePort" .Values.service.type }} + nodePort: {{ .Values.service.nodePort }} + {{- end }} + selector: {{ include "sachet.selectorLabels" . | nindent 4 }} diff --git a/charts/rancher-alerting-drivers/106.0.0/charts/sachet/values.yaml b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/values.yaml new file mode 100644 index 0000000000..312e1e43dd --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/charts/sachet/values.yaml @@ -0,0 +1,69 @@ +# Default values for sachet. +# This is a YAML-formatted file. +# Declare variables to be passed into your templates. + +global: + cattle: + psp: + enabled: false + systemDefaultRegistry: "" + namespaceOverride: "" + +nameOverride: "sachet" +fullnameOverride: "" + +configReloader: + repository: rancher/mirrored-jimmidyson-configmap-reload + pullPolicy: IfNotPresent + tag: v0.13.1 + +sachet: + # reference: https://github.com/messagebird/sachet/blob/master/examples/config.yaml + providers: {} + + receivers: [] + +replicaCount: 1 + +image: + repository: rancher/mirrored-messagebird-sachet + pullPolicy: IfNotPresent + tag: 0.3.1 + +imagePullSecrets: [] + +podAnnotations: {} + +podSecurityContext: + +securityContext: + runAsUser: 1000 + runAsNonRoot: true + runAsGroup: 1000 + +service: + type: ClusterIP + port: 9876 + nodePort: 30001 + +resources: {} + # We usually recommend not to specify default resources and to leave this as a conscious + # choice for the user. This also increases chances charts run on environments with little + # resources, such as Minikube. If you do want to specify resources, uncomment the following + # lines, adjust them as necessary, and remove the curly braces after 'resources:'. + # limits: + # cpu: 100m + # memory: 128Mi + # requests: + # cpu: 100m + # memory: 128Mi + +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} + +## List of node taints to tolerate (requires Kubernetes >= 1.6) +tolerations: [] + +affinity: {} diff --git a/charts/rancher-alerting-drivers/106.0.0/questions.yml b/charts/rancher-alerting-drivers/106.0.0/questions.yml new file mode 100644 index 0000000000..0eb043efdc --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/questions.yml @@ -0,0 +1,17 @@ +categories: + - monitoring +namespace: cattle-monitoring-system +questions: + - variable: prom2teams.enabled + label: Enable Microsoft Teams + type: boolean + group: "General" + - variable: sachet.enabled + label: Enable SMS + type: boolean + group: "General" + - variable: global.cattle.psp.enabled + description: "Flag to enable or disable the installation of PodSecurityPolicies by this chart in the target cluster. If the cluster is running Kubernetes 1.25+, you must update this value to false." + label: "Enable PodSecurityPolicies" + type: boolean + group: "Security Settings" diff --git a/charts/rancher-alerting-drivers/106.0.0/templates/NOTES.txt b/charts/rancher-alerting-drivers/106.0.0/templates/NOTES.txt new file mode 100644 index 0000000000..59c1415e09 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/templates/NOTES.txt @@ -0,0 +1,2 @@ +rancher-alerting-drivers is now installed on the cluster! +Please refer to the upstream documentation for each Driver for configuration options. \ No newline at end of file diff --git a/charts/rancher-alerting-drivers/106.0.0/templates/_helpers.tpl b/charts/rancher-alerting-drivers/106.0.0/templates/_helpers.tpl new file mode 100644 index 0000000000..e1dbe3370d --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/templates/_helpers.tpl @@ -0,0 +1,117 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} + +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +{{- if semverCompare "<1.14-0" .Capabilities.KubeVersion.GitVersion -}} +beta.kubernetes.io/os: linux +{{- else -}} +kubernetes.io/os: linux +{{- end -}} +{{- end -}} + +{{/* +Expand the name of the chart. +*/}} +{{- define "drivers.name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" }} +{{- end }} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +If release name contains chart name it will be used as a full name. +*/}} +{{- define "drivers.fullname" -}} +{{- if .Values.fullnameOverride }} +{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" }} +{{- else }} +{{- $name := default .Chart.Name .Values.nameOverride }} +{{- if contains $name .Release.Name }} +{{- .Release.Name | trunc 63 | trimSuffix "-" }} +{{- else }} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" }} +{{- end }} +{{- end }} +{{- end }} + +{{/* +Create chart name and version as used by the chart label. +*/}} +{{- define "drivers.chart" -}} +{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" }} +{{- end }} + +{{/* +Common labels +*/}} +{{- define "drivers.labels" -}} +helm.sh/chart: {{ include "drivers.chart" . }} +{{ include "drivers.selectorLabels" . }} +{{- if .Chart.AppVersion }} +app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} +{{- end }} +app.kubernetes.io/managed-by: {{ .Release.Service }} +{{- end }} + +{{/* +Selector labels +*/}} +{{- define "drivers.selectorLabels" -}} +app.kubernetes.io/name: {{ include "drivers.name" . }} +app.kubernetes.io/instance: {{ .Release.Name }} +{{- end }} + +{{/* +Create the name of the service account to use +*/}} +{{- define "drivers.serviceAccountName" -}} +{{- if .Values.serviceAccount.create }} +{{- default (include "drivers.fullname" .) .Values.serviceAccount.name }} +{{- else }} +{{- default "default" .Values.serviceAccount.name }} +{{- end }} +{{- end }} + +{{/* +https://github.com/helm/helm/issues/4535#issuecomment-477778391 +Usage: {{ include "call-nested" (list . "SUBCHART_NAME" "TEMPLATE") }} +e.g. {{ include "call-nested" (list . "grafana" "grafana.fullname") }} +*/}} +{{- define "call-nested" }} +{{- $dot := index . 0 }} +{{- $subchart := index . 1 | splitList "." }} +{{- $template := index . 2 }} +{{- $values := $dot.Values }} +{{- range $subchart }} +{{- $values = index $values . }} +{{- end }} +{{- include $template (dict "Chart" (dict "Name" (last $subchart)) "Values" $values "Release" $dot.Release "Capabilities" $dot.Capabilities) }} +{{- end }} + + +{{/* +Get the list of configMaps to be managed +*/}} +{{- define "drivers.configmapList" -}} +{{- if .Values.sachet.enabled -}} +- {{ include "call-nested" (list . "sachet" "sachet.fullname") }} +{{- end }} +{{- if .Values.prom2teams.enabled -}} +- {{ include "call-nested" (list . "prom2teams" "prom2teams.fullname") }} +{{- end }} +{{- end }} diff --git a/charts/rancher-alerting-drivers/106.0.0/templates/cluster-role.yaml b/charts/rancher-alerting-drivers/106.0.0/templates/cluster-role.yaml new file mode 100644 index 0000000000..9fa501af08 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/templates/cluster-role.yaml @@ -0,0 +1,50 @@ +{{- if and (not .Values.sachet.enabled) (not .Values.prom2teams.enabled) -}} +{{- fail "At least one Driver must be enabled to install the chart. " }} +{{- end -}} + +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: {{ include "drivers.fullname" . }}-admin-{{ .Release.Namespace }} + labels: {{ include "drivers.labels" . | nindent 4 }} + rbac.authorization.k8s.io/aggregate-to-admin: "true" +rules: + - apiGroups: + - "" + resources: + - configmaps + resourceNames: {{ include "drivers.configmapList" . | nindent 6 }} + verbs: + - "*" +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: {{ include "drivers.fullname" . }}-edit-{{ .Release.Namespace }} + labels: {{ include "drivers.labels" . | nindent 4 }} + rbac.authorization.k8s.io/aggregate-to-edit: "true" +rules: + - apiGroups: + - "" + resources: + - configmaps + resourceNames: {{ include "drivers.configmapList" . | nindent 6 }} + verbs: + - "*" +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: {{ include "drivers.fullname" . }}-view-{{ .Release.Namespace }} + labels: {{ include "drivers.labels" . | nindent 4 }} + rbac.authorization.k8s.io/aggregate-to-view: "true" +rules: + - apiGroups: + - "" + resources: + - configmaps + resourceNames: {{ include "drivers.configmapList" . | nindent 6 }} + verbs: + - 'get' + - 'list' + - 'watch' diff --git a/charts/rancher-alerting-drivers/106.0.0/templates/hardened.yaml b/charts/rancher-alerting-drivers/106.0.0/templates/hardened.yaml new file mode 100644 index 0000000000..be1ddc12a5 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/templates/hardened.yaml @@ -0,0 +1,126 @@ +apiVersion: batch/v1 +kind: Job +metadata: + name: {{ include "drivers.fullname" . }}-patch-sa + namespace: {{ .Release.Namespace }} + labels: {{ include "drivers.labels" . | nindent 4 }} + annotations: + "helm.sh/hook": post-install, post-upgrade + "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation +spec: + backoffLimit: 1 + template: + spec: + serviceAccountName: {{ include "drivers.fullname" . }}-patch-sa + securityContext: + runAsNonRoot: true + runAsUser: 1000 + restartPolicy: Never + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 8 }} +{{- end }} + containers: + - name: {{ include "drivers.fullname" . }}-patch-sa + image: "{{ include "system_default_registry" . }}{{ .Values.global.kubectl.repository }}:{{ .Values.global.kubectl.tag }}" + imagePullPolicy: IfNotPresent + command: ["kubectl", "-n", {{ .Release.Namespace | quote }}, "patch", "serviceaccount", "default", "-p", "{\"automountServiceAccountToken\": false}"] +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ include "drivers.fullname" . }}-patch-sa + namespace: {{ .Release.Namespace }} + labels: {{ include "drivers.labels" . | nindent 4 }} + annotations: + "helm.sh/hook": post-install, post-upgrade + "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: {{ include "drivers.fullname" . }}-patch-sa + labels: {{ include "drivers.labels" . | nindent 4 }} + annotations: + "helm.sh/hook": post-install, post-upgrade + "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation +rules: + - apiGroups: [""] + resources: ["serviceaccounts"] + verbs: ["get", "patch"] + {{- if .Values.global.cattle.psp.enabled }} + - apiGroups: ["policy"] + resources: ["podsecuritypolicies"] + verbs: ["use"] + resourceNames: + - {{ include "drivers.fullname" . }}-patch-sa + {{- end }} +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: {{ include "drivers.fullname" . }}-patch-sa + labels: {{ include "drivers.labels" . | nindent 4 }} + annotations: + "helm.sh/hook": post-install, post-upgrade + "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: {{ include "drivers.fullname" . }}-patch-sa +subjects: + - kind: ServiceAccount + name: {{ include "drivers.fullname" . }}-patch-sa + namespace: {{ .Release.Namespace }} +--- +{{- if .Values.global.cattle.psp.enabled }} +apiVersion: policy/v1beta1 +kind: PodSecurityPolicy +metadata: + name: {{ include "drivers.fullname" . }}-patch-sa + labels: {{ include "drivers.labels" . | nindent 4 }} + annotations: + "helm.sh/hook": post-install, post-upgrade + "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation +spec: + privileged: false + hostNetwork: false + hostIPC: false + hostPID: false + runAsUser: + rule: 'MustRunAsNonRoot' + seLinux: + rule: 'RunAsAny' + supplementalGroups: + rule: 'MustRunAs' + ranges: + - min: 1 + max: 65535 + fsGroup: + rule: 'MustRunAs' + ranges: + - min: 1 + max: 65535 + readOnlyRootFilesystem: false + volumes: + - 'secret' +{{- end }} +--- +apiVersion: networking.k8s.io/v1 +kind: NetworkPolicy +metadata: + name: {{ include "drivers.fullname" . }}-default-allow-all + namespace: {{ .Release.Namespace }} +spec: + podSelector: {} + ingress: + - {} + egress: + - {} + policyTypes: + - Ingress + - Egress diff --git a/charts/rancher-alerting-drivers/106.0.0/templates/validate-psp-install.yaml b/charts/rancher-alerting-drivers/106.0.0/templates/validate-psp-install.yaml new file mode 100644 index 0000000000..a30c59d3b7 --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/templates/validate-psp-install.yaml @@ -0,0 +1,7 @@ +#{{- if gt (len (lookup "rbac.authorization.k8s.io/v1" "ClusterRole" "" "")) 0 -}} +#{{- if .Values.global.cattle.psp.enabled }} +#{{- if not (.Capabilities.APIVersions.Has "policy/v1beta1/PodSecurityPolicy") }} +#{{- fail "The target cluster does not have the PodSecurityPolicy API resource. Please disable PSPs in this chart before proceeding." -}} +#{{- end }} +#{{- end }} +#{{- end }} diff --git a/charts/rancher-alerting-drivers/106.0.0/values.yaml b/charts/rancher-alerting-drivers/106.0.0/values.yaml new file mode 100644 index 0000000000..83d12f175a --- /dev/null +++ b/charts/rancher-alerting-drivers/106.0.0/values.yaml @@ -0,0 +1,29 @@ +# Default values for rancher-alerting-driver. +# This is a YAML-formatted file. +# Declare variables to be passed into your templates. + +global: + cattle: + psp: + enabled: false + # the registry where all images will be pulled from + systemDefaultRegistry: "" + kubectl: + repository: rancher/kubectl + tag: v1.20.2 + # set this value if you want the sub-charts to be installed into + # a namespace rather than where this chart is installed + namespaceOverride: "" + +prom2teams: + enabled: false + +sachet: + enabled: true + +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} +## List of node taints to tolerate (requires Kubernetes >= 1.6) +tolerations: [] diff --git a/index.yaml b/index.yaml index 2e8f861aa8..bc08ba8ce9 100755 --- a/index.yaml +++ b/index.yaml @@ -8683,6 +8683,40 @@ entries: - assets/rancher-aks-operator-crd/rancher-aks-operator-crd-101.0.0+up1.0.7.tgz version: 101.0.0+up1.0.7 rancher-alerting-drivers: + - annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/display-name: Alerting Drivers + catalog.cattle.io/kube-version: '>= 1.28.0-0 < 1.32.0-0' + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/rancher-version: '>= 2.10.0-0 < 2.11.0-0' + catalog.cattle.io/release-name: rancher-alerting-drivers + catalog.cattle.io/type: cluster-tool + apiVersion: v2 + appVersion: 1.16.0 + created: "2025-01-22T14:08:33.395514-05:00" + dependencies: + - condition: prom2teams.enabled + name: prom2teams + repository: file://./charts/prom2teams + version: 0.2.0 + - condition: sachet.enabled + name: sachet + repository: file://./charts/sachet + version: 1.0.1 + description: The manager for third-party webhook receivers used in Prometheus + Alertmanager + digest: 676c241901685bae24c23c2f3af8946a423964a525625a4a35f2469e4bd4f91b + icon: https://charts.rancher.io/assets/logos/alerting-drivers.svg + keywords: + - monitoring + - alertmanger + - webhook + kubeVersion: '>=1.28.0-0' + name: rancher-alerting-drivers + urls: + - assets/rancher-alerting-drivers/rancher-alerting-drivers-106.0.0.tgz + version: 106.0.0 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/display-name: Alerting Drivers From a01773164c4d481db86802bac91adcdc2c775ec3 Mon Sep 17 00:00:00 2001 From: Dan Pock Date: Wed, 22 Jan 2025 14:10:09 -0500 Subject: [PATCH 3/5] update alerting-drivers values to use kuberlr-kubectl image --- .../rancher-alerting-drivers/charts/values.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/packages/rancher-alerting/rancher-alerting-drivers/charts/values.yaml b/packages/rancher-alerting/rancher-alerting-drivers/charts/values.yaml index 83d12f175a..cea1f1f7e0 100644 --- a/packages/rancher-alerting/rancher-alerting-drivers/charts/values.yaml +++ b/packages/rancher-alerting/rancher-alerting-drivers/charts/values.yaml @@ -9,8 +9,8 @@ global: # the registry where all images will be pulled from systemDefaultRegistry: "" kubectl: - repository: rancher/kubectl - tag: v1.20.2 + repository: rancher/kuberlr-kubectl + tag: v4.0.0 # set this value if you want the sub-charts to be installed into # a namespace rather than where this chart is installed namespaceOverride: "" From 9a20c4b6f6afa0c6384a7c6b4f017122e0398ab5 Mon Sep 17 00:00:00 2001 From: Dan Pock Date: Wed, 22 Jan 2025 14:10:29 -0500 Subject: [PATCH 4/5] PACKAGE=rancher-alerting make charts --- .../rancher-alerting-drivers-106.0.0.tgz | Bin 8835 -> 8889 bytes .../106.0.0/values.yaml | 4 ++-- index.yaml | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/assets/rancher-alerting-drivers/rancher-alerting-drivers-106.0.0.tgz b/assets/rancher-alerting-drivers/rancher-alerting-drivers-106.0.0.tgz index c91d8173615ce6def91baf0ce55c5afa4480ea44..664fe5932559008e3d7483e45d485978a8465846 100644 GIT binary patch literal 8889 zcmV;qB1YXGiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKD1a@#oeXFl^O&d{5(oxe$4e9Nf*nOe8wq`i|kF5BH*Q<<(b zL_!kU6u|~SI~vDZ`+eVXpJWRck|0H0?Us{{P$@?wZU?u6gM)K^WGD^>n0Y9|Opv(m zg^b)_#v8{2#DqUW!|2&VL$ldz9_;O@|C`Nb_5aqvUi(>V?{IIgz1M2D_n$Re2d!rN z88jbU^Bf`N0)$^~Ygpfqw&LVnK3xM@2mN%F^*-#YM{PKXm6hd2%h<{ig_fW{#aDn-KRuq`ke zav#U28{yCa&~z114gkXmOhY~xYKC(jX*AU-Y6x^d!*^N{bso`j)DOeV-@Mw zGb+gw-4u;$`Yk8KJYXcz60pdN7)bwfkU;( zWrEi@h!DeYgBX##frFsX#gND)CfBH-Frp~~frm+i1m?cu^ds6uk=cMmgyk=QgeUq3 zfZ;P8=%I*X^>PEm00YB)!UY?_?Eo_jD2jj#Q6F=-B~hd*PNPWD$LLVy<0CHc(6su( zWbc6MIskIj1|rh6+APfUh}yGQ#5|Kwr4y*%ftx+GSS48;3(2jx?ol8;*>O1DQtXr`D8Rsw7+}f&P;45h3RgwQk;tNdGuoOGa#s-|x5JQBzIMOpCp&=m7Nk1OqSjZF?xK}V%)jctmgDPbL z8t_KSG4uK<32`H)A@(?qa3EQH!`awyJOdwp{gb)pw;v|*|9p8i&OTh7T>9d(ShkKC{J+_5 z9ai}N;X$*t=Kre*lg3|imYCjJ%!$T|eHnT6Z_c?Ae1YMfUEg5|ZwP^Gy6RlkE?(ZF$ko3U+S)U8E#Fm|AYh|iDTf#^z zdf-0i4R@&ma2$^PcJA&PFPvZW!9L?kTIfSz2&NHQeozcYX#$i`!FL>)q>CeZYhGJo zgXCqmlwC&@g&YE!MlvbzV1UC^GD5}cD93h*&Wnbospw4=>nWMXDqVM`2iI82oVG?o z%AZPN?3ldr1@855AUfcl(Mv;sd`%Nso)nqflRr`vxz(>9E7UWJtcYWka%!T9Lwxc% zL2;NmWNc zsCPu{ywm+_@H8$RhLpG)X4L&(q&>{+QqYL($%OHUEGXH0Hga z3-K>>7wNniou!ux5?Am!?>ToXW$8-ipI-GpOOwtTO}Rph=17jD8c{PnbSia*n=+~@ zm0QEIbyMtK*1t0r@I{`JBY9AD|H}pUle_p5qQfDL%_(y-g*sl7IKa`+=L4%iR| zkT{6aaJ)gju5vs+V}|ccvA#7^OcRfC^{b3SNm5~RxvK8&t|rSD_#>qPSDHLtidIpE zUU#Gm%4W?aW;Z0L=GR@89hql#TD6s4EeTpBS=UQ?q5JietFu8I;4bhI%MQ zZvLz2NL9?(XqJk}n0rWt_pw!9B~w;j_UzY;V%Ady8CxL<1h~hVBbg^XaknDGMN!}OHn^G~ zH?PAr3(M8?nkR5=`OL)GuePhRN>8h|SZg68qh!;^@b@Umw2_7#P1z|_jv-29zt=Cl z(%p~|cxTTcoz2aDRAx}Mmy7Dg@4e=(vdHS%57VnQKcD*K_BdgV^M7_j$!LU^x(}Lh z{%?=n|F>Iv2hH{Qe-**3B`H5{#Z*jK!`tP^@fEk7^MM{B5x7SJB%2aIW1MOIhA9`4 z!(@w8&`i5%9q6DWBdSxNeJRemDDY7#29%Nis1vn+{Zb2KE$5oVVF!-&biJSvc7|A> z5DC=DFR1H;9Ba>q`+E zk-(mynt%?tf~DAXSQ=qtB!1v=O=?`1UDBNY?-LkB|qOeJnP!-%>8g zA8wHd2AfZ1|55D!1H?ic<8WzPkQw{`;coT*uiZRo9jy2NRRo(YbmfFASit|H-Q|{k zBFphOvJDc(bp#LR1r^&x05{VM4Jf^KJCIN=JR@W5=%+O4GZf4J<71BUMp<^p|Qgg9LT!6D7dD*-a9gs`$Efs+`L6omZej_#}pWg z_Np!=NEs2MV;T$mS!9I+urxm6XEeT`R2WN+Qq)fzvktVH&8B(Juv`M-Ts6D{XZS|h zc*;;Q&#;KBy;iWt=w;1G%`VR9SB|O9s1RV9QA0*T!)&Wji3qNc zBEv^F<+zet3(2`Cz1R?2{Pbay?FSNvB<_FDbB;#%0{3L~*^p1^L*tY*V;F@W;%For z_J%}Qi*rSn+|Ve^nWzVw90v@GO=k*sjCIG8xIe}f&6qr7?i%UKLs3L;<=;7loqW2; zC1hE91CY4SFwdK)-r@0AdUjrolA_CkrWbv_DaseASiITJXQV5E+(de^hlt6 zRfaeipqTI>2QffG+2%@)5+gxwa5Pf#CuIVMzT+IHjNw>BqaB-Lm=s(wpdOXdl-2Vc z$AkAIV3gCIfGdoKd7E9JHsO>6q)AHN<|K&KB0_izS;<4x*_;^l3$Ygyu zH`?r?3u?UA0~!Z75xkM%<&-+;=yf~u*cV4`3{sE_@W0i4X+5r@g@?x|@lwNqZhy&uB1_a4g zDMDr1^UL$%4x?shNDMu6BfGN)2snxR5eD5rU3_O+dwr#Gsv%zEJY=1yFfOuFXWeYg zj*W^cIqd3Wc|#B&_-%lrVOG>{u!V1MoB>G;QJkVE8bJ_Y6hoR6ZQYjBDRb;M*lzwOJO%KM6e!NHIRbS~21IzLz|%5qK;(3mS{&H>K1E4e)7dKl1K*}ZvZ zsB%j!)>>1^L4HbTEN7u&5!0r$pjrpJV|h@i7V9ZgGt2aLqIoM3a_$dM)GN4v=~+Jq zP?0Y)hmnjVgLA|)=SDfn46{%xRP9zWk(?@3es&ZN3Fm~y4`FC1E2Oave31FRrW}X4 zB4pxV^fI|1!~&71G&+W*V{6z;E{aN1oV(uYrK}u<@GaE0Qkg8HB#B1l1eXHEA!6bB z#4uNwDF6SFVy<`I(L)iSX6b)gyJPr&hwZ(!{J)A2Ac6aok<2W?f;O`*b~KOlibzji zRXO=A(YZ6wrwL$m=Ek!FC+byI$kk{{3Kg$QsbuKtO3mV1XKUnucnM+*xn7my~QcD&3nsj~geckTXiO^4M`=g#QCg8k~PjJr>+*O|JVK+|79iNvG899Bn)xkw6r*AYdw&vg-2R3+_bS#_xyGh zKJ-YR0W>pJBC{+>Z8L=uq@y$wV~M;a4k-*o-?2k^}z8BmZGM95J;q4 z|4fHN#PsVPiTju-5F7Q((zr|M^{13Y?zRI}YC4L5i1s6VgQGHSu=V=nho9cU7dSn8 z^8voVFGm+=r)ToT$;HKo3-|)Z7pGUJ$4BpE$yp&CmE7_JN{|?Ipg|L1^V9*3hFUq& z(Ch8@w(h?k=}%3q|MN*q902@TFmw{%sNQxq3T23K4w4Hxk^CKVr^at+BX`MGtGrh} z%2W#*!-!B0*&WeR9eCVw{RQQmZIO*;r-;C5*^n)k9V-5k-+U zyWw0R{whT#ibq8?8OlsT!>mSQ0-aUaE7zCTQ`Ib2sqa+_s<-B>?b8WKwf+yokLW)* z3J@2$mzSzpcm5=!(Wk@geRR-X2laX+CSs(Df9fsrFC7+;|CUAso^}3f?~mDkw$|sr z)dcHUlwaB9n7=+84{&g;E;RH`3*Awsaq1L!>EL+{Shz z*jk(PXN9HK|AL6Xv+RG`Rr{azUUPqq|GkoMch`6UH)PmRxAXEuCl3j)hO%3N0q(#! zuxM1%gc)^~H$>}YP80^gn8SE{L8C*-? z15tygF~9LCcoa!yrazohvA!@$JF2@O#M(G-m_~wF(p_OTsk~qUI_#1dhsKg;<~mb_ zWJDK3GA=Jx`2U!8Zww`F9w=dpm}o&j+%bNkpg+fPi2p?3Q|6EPT(2Yqb_eh0{>neq}3-0OJn-4CyM&a#( zs}$ZYxS7Jcw5KZ%&H>_eD51G(T~}2_3q6fB1rhCoO6S&WWCo?Qru6)}LDm0HJerz_ zgL|C)b|+C%vOzCdGg;*XDBd)Vq^P*_P&;Y}c^z;&P-f6I5^g#Fa%TL)*+8Jd=Sl!=XHH?)a)aAbiL-$86{_$6xK6rch#DNwK&Q#b80kii7(jT-r2DfkVBE%XhBr+{zVV$vT7w*&63 zTaM1I1Pfq}Ym5^o>!9NPrvqO+mG$F~S6Al>V+At}#q*=O!?Wm zC6wjqK2{9&bS-icsT-21OVbo_T-+SW`m)y*{4@)S{Th#U6x)#eY5Ka(Gpk&1f3NCL zdF!kBsBeCh^N(rF8*Tqz-xt+O%&eGqw6Al&(^r4>xpO9%WxFyPs?K|^E(q(h+Lwqr zdv;r>bEtbD|1B2a_T+VQKrUY`wf`4~fVl*K8T!7Ot-`hW2+kdPi z*gP2}2`}JcUgv{611n}4mtBUBFUy%TkQrma!ApzDHtW#UWNI$W!-q%&1O1hh%m8Ki zW8tLy)6Z*F%uu`6b1Pj7PV%AjEkogANT$6rV^A8tS z^B1lpvw4gD@x$c;MJwTO-lC5`oSmHHO2tyOWEn%TGW2 zYyPULGTXcrzWea@-O0}<@8++mD&Of)C(5RHf-svIa@AAk7Lu)7N0w`(-4s_+jB!IK zqkN7d9T$#`1#@k+?E=O=w^cGLD}#+@VIpQVKs}V8P3?53ydo%Uy7R2C6CR+*oZ`pR z2G-?Or@}l!Mw9A0502iwb0&7{L*cS(d$tOiT_l>0ojsxC$|b4AnhfUo0}6=Y(IE4etT|1GY#kCYGKXLT;;Xo~e0ycb9!zPOwxx zl^3vOJZZ6`i6xI^HO7mx^6C?^mAN-Z&R#j2{S~sOKJTnUIV^SlPxzdge;sD|e>8W; z?El)$!}a-p72!z{k|&;^6x8U-6b5yY$80HL4Ricw!5rr&@Xadl@e)|@b9`}N>NH%j z5^MUGs`RSU127wA|B;qg?U%7?J`14YDqkNW_Pr2UBy`_tRDG{F93 zz13HQOS=xM2}{X;M(^vHZ_;o+Y{`dY4kp1LQ$&G3-* zKkpfE*7`qe?~nU`tnI&65~i*Hr&;*U91Fkh6sMirOIj&COJ#(v!Md*Uj6-`(dfVa! zj3L$7jaA)ERq5iZe7*dzyV^zXX%`s(1=hbmz|oNOW6JPib8Oc7-)|pO@jng@*7hGO z2^(;ZguqNYH0jaRc81-QL<){JLBTcZ;{ppLM=$0B97PHyP1{e9xW5AoM+yiTl(ACr z9>t-v0Wt1t!^N$H;U4*%dDs7K+lLQvG*YMwi6#jWto*UC@A$7TKV1sSu(JWi$p7c# zO9%<$j^8Juq5f*}9l!e@)=+=57lVF7{>dKsP24C7>Z0H}O_c8&cV77XHgR6~U3Bfd z@Wn83Ui@!o1AazKq0gSaKH-j^Fe;B;j!#028af@LzdQa74`_%R-;gY_!1^y+mMu`n zEdB3pvugj{ZXK?_|GbiL_uK=Hh1@>}c!)m*G@^{dE4WiT&nCm1MmIRzgbr-BUmqW~ zUvKW{sDKec0u-sJm&dK6)=?IvFj{a;#4TbmiTf(%&6~d;HGjxr()c>2x3P*jR$%H0mQ?=?dCF=C;+W8w@#hK!b5aHrAW!2l1DPg%c#KMNeIPYGq| zRdbJJYh{kR=gP@Z`MAG&WwrYGy}J3d`o_;9;r<@(p6gq>@nj!|y#GnvhGl>?zh)WY zko4gBeMU(JTr-`Ftqb$8ZI^L(2Sq))9JtR*7DPmGDB(eh*s) z5x~6Lu5Frz4dHGFKHlZZVHX90+z>Ik%IKTg43(va0-=jhl;^3Hf86u?yV6CyMiT0P zt1Nr1VpOEEkf_!gXFvm4vilvoo6D7E(%0mQPh+L|pR4M;w0Wz~Ce-BWFEfm!dFs!L zo40-oo@p`(uPqFxd8n`polMAt=4uqExf-h{ZK;Mz^OOwaa&h zh+T*DHg>I#+TZ``tQ9{G3bW)tjjp^r_Up5y&VS8=-L?K_CE+W_f7R2k>^ashVZS#0 z-I>_0`dc^izm4XCc;gEzQPGc|kvGthBJq_vA zAi~}>{gz}~j;5(&@FRPeVWrfaizhX@5$!gHhzrab_%j+NQSO_sR;n^>qBkVO28dNP zN`F4h04*+wc54xnvFO>2)|}cI_vMj5X#0 zlft}S`D@esV@-0YaqUgc142`-iVg;p1UQEWO?mzyArx^6Bo3I|I~8V69AKV(SBa&u z-0pCELl})UXp7ReMno<9ga5g^SJnUS?ym7aR}#vCw%qDtdRriXX40|& z&ik8lzSy@NYro~#apse`pSo|php_PaUl9BA**y542UYv8-S+NU{$EL01ADH4J-=>X z&y_Lom70EC45;)WIHfiU=+Y>qe_@c)87Q7+yle!| zmEv%gfH^cR8E1W$+bDkh5Sw{-=RV^zI=tG*d7)EFe9K=3$i$Kk=+{%a*casZ`C?2!m7O@ER^a(iDAYx0qxCdXy4GR)-Ip8aSL zlXW#ufR`L6VzLKIWz+h~VI}2q&T%Cz@YO9je7U{6Zc={5uw5ISUpQ=M*6bVEXZ;_j zMABu!oENw%byk0VE0Pz2A~H(j;u%05e`)-Qg!W6{_svsrk&;JeI6a#JqoK!###LJ9 z%dSA7ibcv*+(xk3!H$3Zb$E!5bffQ>ya^x8bdKO(ehO?9(yU?*{iNo%BH z^)VTBtp>TUCi{GiSQf5z4x0Exg36eR-w*byF{`n|B<$CS+~62@{T8YMiRRLLkE^BumyI^N!}JWEzI84OELokV##YVr`^bPZwvU7+Xk%k`|;U4_#eAf{@-fuwb%TA6=9A4I1~TTr;POfsxXjquKx`CQA>fc zp$jO0XRZI%82(RtzqQ7HUrBf@*a?9n+-GR0rpC80@z-G;)?ppK^YH%z00960Zra*0 H0Q>*|K9`^+ literal 8835 zcmV-}B7EH+iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKBvbKJJFZ~o?|=u2IfBwvxUX!Du6KJ^q?arBNYt0X0iz$|<@+SJuy7r6Hp!A550a9H#MW54(P%V&WGM1Rm^moGOps{k z_>7D(Dg49pqpH}zzs98jX9>vr0PlCIn7G*iNGfDy;0-A&w7n^jC= z+ygI2xWLR2lm-@x$*(CHQD$=j# zRFWkc=Z$N-9m~huV&uYq9?tNw+AV;@Ka z=ZuC}jBvvB95f|Z#FJ%?got^sW$19tXvwiaoMXXT0Uc7_s*aw^$3yEHPi`plRi}qE zl1(Gg&~gBodSo?DN}44n_pgN+l}_zVYtBr``=ou~w%xY%W%<8R{*O_RVE!Nrz&!cC zyW6SCfB9-H{~sZ2z$-jJNgzNExZ<^jN#R->a5W+v2nPiJJbL@a8Bi7?A+WEQTqbyh zy#O%`W5kG*4IBi8K89GbnB-AGVL}rI0*7&c1m><~4FlRofmwh=faNcMn8*4DfRQsj z7@&Y-^>PEm2m`}I!Udba%?L9LCDFx_=F1_npR(!>^-n; z3qW$MCjwn-QG}TuX_*8nUZ7zQ#vQlYcDt6Ohhrhd6xUq|WFQ*~Hz*Q{RG#!5EqP3r zkcbPUh?Bjdia<(^@)&s-7!o5a1s{q`>r~;Y2ss2N08TBy)sE-3ZC1UCW;+zbl5Jy6$xWI#4qRM_@5tgGVl>zGUR>CoJ zh6(X;E22JjI1aEUWqZro*s$cQOZA4b9^Br^65kLmfDS;$fj}hEJtb&>84?(_82&RM z40HHLRvjp{;b7Y`sgxoE?>~HDvH6z?jq*QZ&(_(ytCLGtd=jhHF-QKlyPd;|{6E}3 zJY38F#|Ta1F9l3QZwfMsMoNkqef2-AbEWtK!viU#sESNtE*M53_|!|Jpim5{1PDgn z$ZQAHvqz%=877)#fhw(!yHDL6-(6UM|38j!5KA>!#H*=-bNK&Y@36A}@3!~bYyIz0 z!tJdCJ|2(=gRM2AkG@uoKBlUb4bI)2B@>bXxWDRsf!5g4-E6H+m1T<=iNpZxXS`*v zQ~-|rso&P^ZR@%9o8H)`Qb{X)$oIiCLaPx<;3!Lg(k=LoC6n}VKyS?Jg7zR~*$rja z0YyFsk0yak3fvoEKaqk^$vVn$u|(^6OVgD1riyix>Qg9Pccuf^Sn8Zbi-y!cmEzbl zdF2Z{7+_EIz&@jwh5-4R#ttFmRh_0-yOHJ z=d^8bk5P>JBp`xd?*1d+&bqIOFh5l}eJqe$*8g(zj3O)GSf!kqsBwr-KE){V)$$^> zT&W>B zV?%+wjJjinrD}?@8U{%aOh68bvYG*kV@0=X{f2efD!q_3$To23V-F=91E(P_YPPDi z1A+segB+WHghZtCk8s%PPgGC5I=hrbdq>OZDYsEH091Mh=nvV>ra!UF@BN$mh;E_{!c}F@8#kHn$wu|f-c0p&|ReS zrgWBGE=gQ2=bUHUu9T%KU3_}g|13?q!e~kkF_t4al4?ZF^w6o)R&K_qs#JE3$kt6M z_Okw+ih$2@pB%{js{LO!*dOiXS%`)qjm&1VnL-_}NgUxIboodd@_KN43ncP_#Gh`E ztE-%jPle$dQ>nfX=5p*XIHxy)2|ds~y`GyIuQfh$d(E=8LteWyRs1*Nm* z60$wkpWEX(#eLnnXg1 zw}j(aO;YKPbn>$%NmNeedb;w;aSrdd_-ea4tMs&bjkPf{Ft#?m4S$Q`)F^4h(TtTs!Ge3)Ie`T5j4w}%M}?EljfN=5^`(s|IF{eO4r{J-1T z+do+E{~se5UXuFbRzyVu4{w(vr#WsrlLG@p0{dBj3^`jRy%6<`h`};I@UFb{2m3Tr}Y=u}L9|_dU4yfyt zoWhz9cXtl*LlQYvl}4Y*+}&AVl&<=+f=r$K43S(cA_03k8_b{{4TlU5k-(0int&eI zf+g6tSQ21$eB%I$$!kWFn5V~Ljy|>mV3^Z{dAJah$!T6nq1w`*GM6QLu?Yuh6ULbJ zi`753Eyr;leT=YA#8VEDtbaX1vqor4@Xb?>kgWgfA0Y=ehgfW;zolN1J=`GSjW(ak z|07@jM~L}2!v4y>AamCL!`O2E?1#Jy0)s;&~YR z*x!LZ9#DoI^;%gI2#qWrV^7xIN8U9Z4Bn7Xt_vLtGWQluS(;A$o-$x8+pD@1FJVMX zj%g(DCy^Eoz>?^QpV8=oQehlAN>RUX%zDsix7+4D!;%HWxoUV1&hS|Ic*;=m(kKvF zd#q3#qZc(hwPJC`E+^8LoWTX1tf&+_MSp?t0DX1RBEKon0m3JPCqywww;m zs5obs<46?Jc{B`>6e90!Q<%L2wiDSq4RRp2mhOP9S}!vgRxzeQ`6e~3$)m}sW(UJJ%v75=-zL)<7)L#cyHSuDjF!f zugraJl4#u#-rGa0m_W0NjGK8tAM-dfj;YS55MY{7Lq<&fbg5B^2(FMK!+Sg7xRP5d z$(bs>+z=P!>HQ|#k0kO*H2j|D91ZXV9?0s`A)nES7Qi&auF_>Z>HmQ}VP<=+m{l6a zN-N?b0#?qOWq6`E$8-<3#+^PED4kX3)W0;GpjW@|cv7YMY|O}*1bA3<%^p!M&ak+l z?7IB&^!&K|;{5bg{vuaSwHQeP+=I=x2^SXyjaKfCIesHGyiz)q<|vw|_#}=4tlSTS z;$FX6q~2+(BcFnxQnt5FrpturQx6XI_jmU#fC1P1^FYNhjQn>|Fp&-Wi3C`yb9tAH zX^><>)PYToJ%+`mHA6Z^y5mVSoRW%WOztyxjrQfBAfPw$?}ExsHeDnO6`Z~SNHk=a zXH8V^@boJ^JFg~j-W#Vnr+GTj4^O?F{^r60_Mb5dh>xU*;BhKdma+xS^Z!0*w=4Fa z-S)xm+WzwxVZ$tuLjhX>j$kXG^g4;bo~35lU>DQ_8*KUi_BOQDfz8G;t8SV&q5`(c zK8Hu=r$(%C_h-bxF0ab1sr6W&)^6mdP*)=i0w@uf_X(Fo!};Yo2ND(U;^-9;Vn*efDMhcHcZ8ACO~0Rd{2TfI;^gSn+Y>kR?_bBf z`+wd2>ixg{z3%$__ff(IT<94veP`RcDqJ_yVxOz?T*@Gn6aIbiiY@$RF6CaBOSy0w z2|P6BvJYFSKU19D(9Ld&X>Vo{4O^s;rL}fCmB#HokB3!l7$8kU>Qb`0lC|wo?L4iy5RP`&rn1~88AfCRf5@K(JBEmxs zVuXb9&6N@*LV}EOFj4v^Wdi%IWgRDs;Yb9Noub4rDYz0q11hztLeKXs2i_8oQBDT} zt}qJu4)hV%mvG+ar|)^M7QDoWk5NFlK!wZP+m-{DZ!e3bT&e^9+7d#{IU3?VVZOPm zy=_@X11UbuJdngTNsb+e*EfT{nb0WzQ5-vRe-h$*uK{!9|K9HIZuS26erJvU@hD*} z|JU;Wn~?wNR{Af>iY03ow0Ko!+;O}6|7BU10_izSqN(T|cz;fPNOgTUH`eUD3u-R0 zdo=QJEO;xmfwyAnJL!Wlnzgp|ZlaHI1Pq6CZ14tD%L{ZIou9g3Sw|d@++ZYu*n#KI z&GsRg)wbu)VT&?3a0mtr^HJtHN93!iu1NPg+dGhO$qjOn;!iR5%nhO#vjJtHWC;>E z`T~cs5o*W$Y_8rAF@oP4H*vpf*aHf`E34J-ax+Kd_KNHNh#4LensCV%CZS*n{@u0y z|Ns4e*5Bdz^D`=N@A-4)Fg zV}by|?;{+9X;Ht!79Qg$#ghn8l%OD(fEQpCK@#U}-ImiSz1S7tbcg%1EG)ecrshkZ z(Q6z57f4{$Z=`g&8+hW4bRQ2ArcfwU8Aedk$e?RTsdq!!HEbDzBQq<1->EcV2e9zm zZCCbG)>jM+9ERMWbCG!0*~VH?mPrziMqFLy9N}!alI$t@VMK3a_hy};$}P26TTP_| z`6Z^2oP|n6%$m}IY8&iM;Rcmzv7SOTvrI21TDB4)=l%!+-75Or~Fp`pF zaE^F-xlv9sBPi>Tx znCq2ya$f|fdG?>q?iBvtVYj>1{~sfGNZ=u5By~$DK${f~cC?Ii@<>M?Rax0A(YaI5 zrv@-ObK=>96ZNX9?bkTM3+8CO4VTJTwqCn(;ViDxgab>WNUj|P z{X(f1J6c&txPT<~^~K8!nkrr2T)Ws`w&}1M>g+i^n2TS%lyUpXE!*p`NNAM*C9KB# zp~22O|J&~#O!xlS1&Mz%3587G}q-vl-XW*i?-Q6m5=#kd{wIG#R zskU|G#*dOgVj%;FRf0Fwa!@Lt#wKJ{kW8O?R2L5m^8dZiK&sngY4d|Ce9GG5qzuc-~(CEZ^i+X_rihS*ZR)_x?62>UQzVinOL*h?3 zjhyVtm%~(U3l!#PgNM9E4Q;y}DYgm_oEzF+iWQ#5LNck<4`{y?BB=?s@Fx_;0ahFQ z0U0VzRsMN&Onl6^a<@{AGLXp%B-3J8$*^OZMC#s(rEeL`Ykh$jCqr|d*Jv%Nt?UZH zrMAmxLSpJ46_z4JZJg_&*)12V=HAQnwU*jDFzTi8e^u!$<6A#)MG? z+{(3SB_NXR%&aq{>}abW;_#M4smWd#xTd0X;@9It06dDrkSiAuMUYw}$49#Hpo`y~_IEUE_a0 zQYb6h503g;dzRO$12?MCxu3dkzK5_h|F3`sJJ0{4dr-xH+3j}M`v0SZHU8@w|Mly} ze?5}=r1{oE<-pMFHL2dn`B<+xVG;=9>DL{8tBaIezOA7?#eMo zr|-B_X7$vDv=-uTNo3msU29<52L!gQ!p;4qaBZEXfo+{4c};k*OG4Yu66DhyKL-%j zjMr>D*e?oTTL56twEVTfWE&c}D3)wVZrvM7cD*Zj(6F@rpIbX)h8MdIIM4py*{k9| z?H?Yj@t+uIXIq)rNQW`rot@7O74 zYZo$slHT)6?-=Tvged~8U4Ubr*1=rZo{le~HE&lh@#k<5X$@1Cp7VRlGiz42?i&SL z`HpnMwf@SYwbHHroZoiTL-U>f8%%~HVfVn^wad||F*U#Me~oc$rJYhZJ?Oz_N9COZ z5trNVhOrW`{_4qc_d9PVefb;KvjVM<$z%0J%u>?+*l7 zOLPSeat6(1T*yU8o|+lyacyBvAXxbzpns}t*^--*- z?EC@K7@alQ7i+{E#Ll7xsW2NBqKP*W)ajNBGa#R4d(S$fjL&YO`(^b>msr6Qmv~}tnOUB8*+4U zg%nealsg%f#;xeNG&NK6Jk4`-igWUTH?%S1MfVkQN!iV>nO!RBmg1XA-X;b@Y&bO$ z%&VJ}+>0N%J4R@0@|;X^D&)PH&Y?((WB2^UBt-0`T7Uv@Lp=c!}~3tq}8+iSHt z-9xwSw%ty#M~skn<>ZFDJ2mx$F1#;Ny6hKt!>q|w}EEU$CnwC~AAwO_uef&Er- zm9GmW9IrY+iy?DA`8chHp4|wW-Q1p)0kiAXmj#XQORxV%4Rj1H{UW-+T>tOG>iw_1 zgZ26E;L7-rg^jSKIhC9G;pny=-5lP`aihOGWB0SV?Tw5{2 z1M(@wZTydI7v4p|L;=jknk0y^y0(K|%YAkE@lsHRtqm~l;lCbVf=?K?+#wMy^;eT` zx&42$min8%7!6zUPx{EmQ7bQ~kG$(7Rt}KddhYU@*m~~v(Y5v56`}l185vs7|Btl+ zzapkUC{JIVaLbJul{+@eB|b(iot)7>EO*R3>f_e8AXgXUf7Lme7APCKgaLRS|97VF zf4cjf{WbqTMtCUL34sGVWGGZq<6D^c>!89s{?BpzR>uIFyZ(2p_kTNk`|JJRqlB*< z|0|zE=y7{lZ)ek)j_EnB(TDZaSlb+b=%*V>|28WSH=LF!~eV8 zz1=GRA9mLGua6RH@xKb-t$#5Lu)JkWIAALxVr8PDD6$Ojl@?Dk0J5y&0bCKSs03A1 zMK;P|kaV(cC0V!KeoGbtxq8ul@i)uL3GbOhY$?*zf8~_QwI(w5CNaWJ_UI%mC`RY# zSPCfiqyD1C$NnV!I*0n4$Uvpovb7cQGuQ=5uAbA|q3VI-F=j+e^n>zk(m#_hL`=UP zkZ6dRx&y49SrYXrz5bZ6z}~i?N{t4F3g|GvV;q!egRNI5KmPI>KEvtRPw(I}{C0G4 zc6ugXoLpSIyMWJdd~tepdVKUomYf#SQ^^Y+;>KZ+#-b=wM>q)e(RWMp+aKNR7S_zv z=Assfhy{Q@35HIhv4N7x!O&Azx|q>e%6H7`@Y6O@UejDYC_@=n3$qHWX^_=6au0_T z+CGuLPhaUP_<|}ZG6ims`hiw)+d6qU>XbDtC}u|B<@b)wMHx4|+MdmiCYSx|K;WKV|v=ECs^d)MlNCVHiX{v<`5 zmn(;q9i9llDZuSCeFR#4Yz-5)hKc+7VB(epQ!AJ_z5t+F z1FqF~1F2T%-Q{4_ocrLa)gqTIkF4hWg`w3R9Za#pXI}(Rabe`R0x`joAZAnYLOHKJ zD(>8}sA*<|n<3S{VsJWV?UnX8VI}=P!+=}tFldhc-#t8>(*Ji4*7z@v64VkoMgj5V z8W|8Sz*Yut8|>4wpWfME8-uqEwla9zV5bJ}(weT2-A0J#NDKvOo0`^jRohv<0U`m| zr;(;0phHmU?3#tlK#|Axm%Fa%#_yWh-5f@?|;6!I#<5?n0-)hepY9A1#j{~14oo+&g4^G=Y@1d$N2Y^ z4|aa22a&6t>!yg~{Nzy9Hv^YW-8O~)yvCCqB{rmdn$6c)W|a%>?o=HrZ+$iI^~sO= z_`hk)Px|}c^?gx2#7v8MLx(!|8-4UwpF0zRX|^k~pz6FD8=*dH@enZup3;IA%aC6rGgU&(K{=c_>xc2{el<)xfZ?mNADsp^P z$^2kga47)S%G<)G{ImCK^U&mi5_R{dZxss5SaI`kzh=#hFAGvOg;6vIJ!TcynAxpc z9Z>9h!2mP9M8(jA0X7R*s9_joC}IvZyV4Xg;b>eeJ}vy{{QTqbyR)B8Uw{1R^vy}B z7GsOAU$=D)MFYun;pZ3c-gd7}j^18=Jb!m_wRqu5Gh4LipQ`{-GmBQr;i5$!zdJiS zIlg*#u~ffADZ=AomAt-q_sjXmqczE0pLGji$tQa^vn@*8`^Mpr{?MHZTf*A!4maUX5fPJWa+wiL&;NFjq~EXyn2UR z$UIme=b)Ue`1zKn-tVkKIjpq*UlIdw-u;jE?v(#ux4pjq`6%H@@&6ikP*dP#U({f* z#sd7lu>faI!$&q^JtQvR1F_dvjSu)$jokxd1v6(8@E^Yr z<68?b{u4n#7EY|@LP3^~m+yC0yX-mb663!F|F4VzIFJALr|`cz2M25ak4Fh>{J**Q ze}7HjKNFVV|FUP<5_Qb8|L(S{{@>ls;Tr$_QNryr2e|q?vKZkIfAnZT8Hbl}t5%*( zhB*z!*x!U6Y<6EAA9i1D?&v6w5kWi@sHhjmoukfC8l^B=a81MwViAdkD(0u3{&v*< zF^x&0>xkY&D&|;)O$*@8a-Q8;mL|sjUveq8dtkrSsD#Ie`Sy;9GYAY&l2SIs?^t(7@$pQ%fZ>W=%%mxWe8yHh8hg}!mqNVvO$+h_WeZaUff zkPknq)36k<=0lnx^2q?6-KCVIz%{eU*t#$e+r=_&Zy~QomjicM$%2SL_18J0Ar>Q? za8Qg6i&qpB(`AG7><+dJB7k|fUE4Gb8^Y}#yuZzi!#45+851$NO6i-~43%YoJfVwG zlxL~c{kUg$x21!6jU?0qTY2^ticyiuL!w%1lmZQ;$?kTF-CV9T)xMf5K8=*+f1#?g z(iW{golwoyU#1vIi`1VLw`lzZc&26&UKKE$7NMe8Xfq)V&DAJS3pG|x+ENXb<|!wf zj|M+}18KLnU_5pfp{`iy`)jO3Mww6?`I4GvcZFWb9a8EVQn;=# zuQlbQ580$b$&0t^L$Q22MC{t9H<6veP66C~u-1m3by$aWScjFu{{#R4|Nr^Sd;9?W F003rUf0zIO diff --git a/charts/rancher-alerting-drivers/106.0.0/values.yaml b/charts/rancher-alerting-drivers/106.0.0/values.yaml index 83d12f175a..cea1f1f7e0 100644 --- a/charts/rancher-alerting-drivers/106.0.0/values.yaml +++ b/charts/rancher-alerting-drivers/106.0.0/values.yaml @@ -9,8 +9,8 @@ global: # the registry where all images will be pulled from systemDefaultRegistry: "" kubectl: - repository: rancher/kubectl - tag: v1.20.2 + repository: rancher/kuberlr-kubectl + tag: v4.0.0 # set this value if you want the sub-charts to be installed into # a namespace rather than where this chart is installed namespaceOverride: "" diff --git a/index.yaml b/index.yaml index bc08ba8ce9..d984088e09 100755 --- a/index.yaml +++ b/index.yaml @@ -8694,7 +8694,7 @@ entries: catalog.cattle.io/type: cluster-tool apiVersion: v2 appVersion: 1.16.0 - created: "2025-01-22T14:08:33.395514-05:00" + created: "2025-01-22T14:10:13.725709-05:00" dependencies: - condition: prom2teams.enabled name: prom2teams @@ -8706,7 +8706,7 @@ entries: version: 1.0.1 description: The manager for third-party webhook receivers used in Prometheus Alertmanager - digest: 676c241901685bae24c23c2f3af8946a423964a525625a4a35f2469e4bd4f91b + digest: 2822632e261aaa44824a87230d593327fb823851750b933e574a2efb096c3780 icon: https://charts.rancher.io/assets/logos/alerting-drivers.svg keywords: - monitoring From 2d3f5367f9c2c5fbafb51e59db52b1ce8cbace2b Mon Sep 17 00:00:00 2001 From: Dan Pock Date: Wed, 22 Jan 2025 14:11:02 -0500 Subject: [PATCH 5/5] update release.yaml --- release.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/release.yaml b/release.yaml index 4a497c0752..4595d0e484 100644 --- a/release.yaml +++ b/release.yaml @@ -26,6 +26,8 @@ neuvector-monitor: - 105.0.0+up2.8.3 prometheus-federator: - 106.0.0+up0.4.5 +rancher-alerting: + - 106.0.0 rancher-aks-operator: - 106.0.0+up1.11.0-rc.3 rancher-aks-operator-crd: