Chart: Remove OpenTelemetry.
This commit is contained in:
parent
bdfb495d29
commit
0d8189f927
10 changed files with 18 additions and 173 deletions
|
@ -310,7 +310,7 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
|
||||||
| controller.extraContainers | list | `[]` | Additional containers to be added to the controller pod. See https://github.com/lemonldap-ng-controller/lemonldap-ng-controller as example. |
|
| controller.extraContainers | list | `[]` | Additional containers to be added to the controller pod. See https://github.com/lemonldap-ng-controller/lemonldap-ng-controller as example. |
|
||||||
| controller.extraEnvs | list | `[]` | Additional environment variables to set |
|
| controller.extraEnvs | list | `[]` | Additional environment variables to set |
|
||||||
| controller.extraInitContainers | list | `[]` | Containers, which are run before the app containers are started. |
|
| controller.extraInitContainers | list | `[]` | Containers, which are run before the app containers are started. |
|
||||||
| controller.extraModules | list | `[]` | Modules, which are mounted into the core nginx image. See values.yaml for a sample to add opentelemetry module |
|
| controller.extraModules | list | `[]` | Modules, which are mounted into the core nginx image. |
|
||||||
| controller.extraVolumeMounts | list | `[]` | Additional volumeMounts to the controller main container. |
|
| controller.extraVolumeMounts | list | `[]` | Additional volumeMounts to the controller main container. |
|
||||||
| controller.extraVolumes | list | `[]` | Additional volumes to the controller pod. |
|
| controller.extraVolumes | list | `[]` | Additional volumes to the controller pod. |
|
||||||
| controller.healthCheckHost | string | `""` | Address to bind the health check endpoint. It is better to set this option to the internal node address if the Ingress-Nginx Controller is running in the `hostNetwork: true` mode. |
|
| controller.healthCheckHost | string | `""` | Address to bind the health check endpoint. It is better to set this option to the internal node address if the Ingress-Nginx Controller is running in the `hostNetwork: true` mode. |
|
||||||
|
@ -393,21 +393,6 @@ As of version `1.26.0` of this chart, by simply not providing any clusterIP valu
|
||||||
| controller.name | string | `"controller"` | |
|
| controller.name | string | `"controller"` | |
|
||||||
| controller.networkPolicy.enabled | bool | `false` | Enable 'networkPolicy' or not |
|
| controller.networkPolicy.enabled | bool | `false` | Enable 'networkPolicy' or not |
|
||||||
| controller.nodeSelector | object | `{"kubernetes.io/os":"linux"}` | Node labels for controller pod assignment # Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/ # |
|
| controller.nodeSelector | object | `{"kubernetes.io/os":"linux"}` | Node labels for controller pod assignment # Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/ # |
|
||||||
| controller.opentelemetry.containerSecurityContext.allowPrivilegeEscalation | bool | `false` | |
|
|
||||||
| controller.opentelemetry.containerSecurityContext.capabilities.drop[0] | string | `"ALL"` | |
|
|
||||||
| controller.opentelemetry.containerSecurityContext.readOnlyRootFilesystem | bool | `true` | |
|
|
||||||
| controller.opentelemetry.containerSecurityContext.runAsGroup | int | `65532` | |
|
|
||||||
| controller.opentelemetry.containerSecurityContext.runAsNonRoot | bool | `true` | |
|
|
||||||
| controller.opentelemetry.containerSecurityContext.runAsUser | int | `65532` | The image's default user, inherited from its base image `cgr.dev/chainguard/static`. |
|
|
||||||
| controller.opentelemetry.containerSecurityContext.seccompProfile.type | string | `"RuntimeDefault"` | |
|
|
||||||
| controller.opentelemetry.enabled | bool | `false` | |
|
|
||||||
| controller.opentelemetry.image.digest | string | `"sha256:f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f922"` | |
|
|
||||||
| controller.opentelemetry.image.distroless | bool | `true` | |
|
|
||||||
| controller.opentelemetry.image.image | string | `"ingress-nginx/opentelemetry-1.25.3"` | |
|
|
||||||
| controller.opentelemetry.image.registry | string | `"registry.k8s.io"` | |
|
|
||||||
| controller.opentelemetry.image.tag | string | `"v20240813-b933310d"` | |
|
|
||||||
| controller.opentelemetry.name | string | `"opentelemetry"` | |
|
|
||||||
| controller.opentelemetry.resources | object | `{}` | |
|
|
||||||
| controller.podAnnotations | object | `{}` | Annotations to be added to controller pods # |
|
| controller.podAnnotations | object | `{}` | Annotations to be added to controller pods # |
|
||||||
| controller.podLabels | object | `{}` | Labels to add to the pod container metadata |
|
| controller.podLabels | object | `{}` | Labels to add to the pod container metadata |
|
||||||
| controller.podSecurityContext | object | `{}` | Security context for controller pods |
|
| controller.podSecurityContext | object | `{}` | Security context for controller pods |
|
||||||
|
|
|
@ -1,30 +0,0 @@
|
||||||
controller:
|
|
||||||
image:
|
|
||||||
repository: ingress-controller/controller
|
|
||||||
tag: 1.0.0-dev
|
|
||||||
digest: null
|
|
||||||
|
|
||||||
service:
|
|
||||||
type: ClusterIP
|
|
||||||
|
|
||||||
kind: DaemonSet
|
|
||||||
|
|
||||||
extraModules:
|
|
||||||
- name: opentelemetry
|
|
||||||
image:
|
|
||||||
registry: registry.k8s.io
|
|
||||||
image: ingress-nginx/opentelemetry-1.25.3
|
|
||||||
tag: v20240813-b933310d
|
|
||||||
digest: sha256:f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f922
|
|
||||||
distroless: true
|
|
||||||
containerSecurityContext:
|
|
||||||
runAsNonRoot: true
|
|
||||||
runAsUser: 65532
|
|
||||||
runAsGroup: 65532
|
|
||||||
allowPrivilegeEscalation: false
|
|
||||||
seccompProfile:
|
|
||||||
type: RuntimeDefault
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- ALL
|
|
||||||
readOnlyRootFilesystem: true
|
|
|
@ -1,13 +0,0 @@
|
||||||
controller:
|
|
||||||
image:
|
|
||||||
repository: ingress-controller/controller
|
|
||||||
tag: 1.0.0-dev
|
|
||||||
digest: null
|
|
||||||
|
|
||||||
service:
|
|
||||||
type: ClusterIP
|
|
||||||
|
|
||||||
kind: DaemonSet
|
|
||||||
|
|
||||||
opentelemetry:
|
|
||||||
enabled: true
|
|
|
@ -1,30 +0,0 @@
|
||||||
controller:
|
|
||||||
image:
|
|
||||||
repository: ingress-controller/controller
|
|
||||||
tag: 1.0.0-dev
|
|
||||||
digest: null
|
|
||||||
|
|
||||||
service:
|
|
||||||
type: ClusterIP
|
|
||||||
|
|
||||||
kind: Deployment
|
|
||||||
|
|
||||||
extraModules:
|
|
||||||
- name: opentelemetry
|
|
||||||
image:
|
|
||||||
registry: registry.k8s.io
|
|
||||||
image: ingress-nginx/opentelemetry-1.25.3
|
|
||||||
tag: v20240813-b933310d
|
|
||||||
digest: sha256:f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f922
|
|
||||||
distroless: true
|
|
||||||
containerSecurityContext:
|
|
||||||
runAsNonRoot: true
|
|
||||||
runAsUser: 65532
|
|
||||||
runAsGroup: 65532
|
|
||||||
allowPrivilegeEscalation: false
|
|
||||||
seccompProfile:
|
|
||||||
type: RuntimeDefault
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- ALL
|
|
||||||
readOnlyRootFilesystem: true
|
|
|
@ -1,13 +0,0 @@
|
||||||
controller:
|
|
||||||
image:
|
|
||||||
repository: ingress-controller/controller
|
|
||||||
tag: 1.0.0-dev
|
|
||||||
digest: null
|
|
||||||
|
|
||||||
service:
|
|
||||||
type: ClusterIP
|
|
||||||
|
|
||||||
kind: Deployment
|
|
||||||
|
|
||||||
opentelemetry:
|
|
||||||
enabled: true
|
|
|
@ -144,9 +144,9 @@ spec:
|
||||||
hostPort: {{ $key }}
|
hostPort: {{ $key }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- if (or .Values.controller.customTemplate.configMapName .Values.controller.extraVolumeMounts .Values.controller.admissionWebhooks.enabled .Values.controller.extraModules .Values.controller.opentelemetry.enabled) }}
|
{{- if (or .Values.controller.customTemplate.configMapName .Values.controller.extraVolumeMounts .Values.controller.admissionWebhooks.enabled .Values.controller.extraModules) }}
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
{{- if (or .Values.controller.extraModules .Values.controller.opentelemetry.enabled) }}
|
{{- if .Values.controller.extraModules }}
|
||||||
- name: modules
|
- name: modules
|
||||||
{{- if .Values.controller.image.chroot }}
|
{{- if .Values.controller.image.chroot }}
|
||||||
mountPath: /chroot/modules_mount
|
mountPath: /chroot/modules_mount
|
||||||
|
@ -174,7 +174,7 @@ spec:
|
||||||
{{- if .Values.controller.extraContainers }}
|
{{- if .Values.controller.extraContainers }}
|
||||||
{{- toYaml .Values.controller.extraContainers | nindent 8 }}
|
{{- toYaml .Values.controller.extraContainers | nindent 8 }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- if (or .Values.controller.extraInitContainers .Values.controller.extraModules .Values.controller.opentelemetry.enabled) }}
|
{{- if (or .Values.controller.extraInitContainers .Values.controller.extraModules) }}
|
||||||
initContainers:
|
initContainers:
|
||||||
{{- if .Values.controller.extraInitContainers }}
|
{{- if .Values.controller.extraInitContainers }}
|
||||||
{{- toYaml .Values.controller.extraInitContainers | nindent 8 }}
|
{{- toYaml .Values.controller.extraInitContainers | nindent 8 }}
|
||||||
|
@ -185,12 +185,6 @@ spec:
|
||||||
{{- include "extraModules" (dict "name" .name "image" .image "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
|
{{- include "extraModules" (dict "name" .name "image" .image "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- if .Values.controller.opentelemetry.enabled }}
|
|
||||||
{{- with .Values.controller.opentelemetry }}
|
|
||||||
{{- $containerSecurityContext := .containerSecurityContext | default $.Values.controller.containerSecurityContext }}
|
|
||||||
{{- include "extraModules" (dict "name" .name "image" .image "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- if .Values.controller.hostNetwork }}
|
{{- if .Values.controller.hostNetwork }}
|
||||||
hostNetwork: {{ .Values.controller.hostNetwork }}
|
hostNetwork: {{ .Values.controller.hostNetwork }}
|
||||||
|
@ -209,9 +203,9 @@ spec:
|
||||||
{{- end }}
|
{{- end }}
|
||||||
serviceAccountName: {{ template "ingress-nginx.serviceAccountName" . }}
|
serviceAccountName: {{ template "ingress-nginx.serviceAccountName" . }}
|
||||||
terminationGracePeriodSeconds: {{ .Values.controller.terminationGracePeriodSeconds }}
|
terminationGracePeriodSeconds: {{ .Values.controller.terminationGracePeriodSeconds }}
|
||||||
{{- if (or .Values.controller.customTemplate.configMapName .Values.controller.extraVolumeMounts .Values.controller.admissionWebhooks.enabled .Values.controller.extraVolumes .Values.controller.extraModules .Values.controller.opentelemetry.enabled) }}
|
{{- if (or .Values.controller.customTemplate.configMapName .Values.controller.extraVolumeMounts .Values.controller.admissionWebhooks.enabled .Values.controller.extraVolumes .Values.controller.extraModules) }}
|
||||||
volumes:
|
volumes:
|
||||||
{{- if (or .Values.controller.extraModules .Values.controller.opentelemetry.enabled)}}
|
{{- if .Values.controller.extraModules }}
|
||||||
- name: modules
|
- name: modules
|
||||||
emptyDir: {}
|
emptyDir: {}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
|
@ -150,9 +150,9 @@ spec:
|
||||||
hostPort: {{ $key }}
|
hostPort: {{ $key }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- if (or .Values.controller.customTemplate.configMapName .Values.controller.extraVolumeMounts .Values.controller.admissionWebhooks.enabled .Values.controller.extraModules .Values.controller.opentelemetry.enabled) }}
|
{{- if (or .Values.controller.customTemplate.configMapName .Values.controller.extraVolumeMounts .Values.controller.admissionWebhooks.enabled .Values.controller.extraModules) }}
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
{{- if (or .Values.controller.extraModules .Values.controller.opentelemetry.enabled) }}
|
{{- if .Values.controller.extraModules }}
|
||||||
- name: modules
|
- name: modules
|
||||||
{{- if .Values.controller.image.chroot }}
|
{{- if .Values.controller.image.chroot }}
|
||||||
mountPath: /chroot/modules_mount
|
mountPath: /chroot/modules_mount
|
||||||
|
@ -180,7 +180,7 @@ spec:
|
||||||
{{- if .Values.controller.extraContainers }}
|
{{- if .Values.controller.extraContainers }}
|
||||||
{{- toYaml .Values.controller.extraContainers | nindent 8 }}
|
{{- toYaml .Values.controller.extraContainers | nindent 8 }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- if (or .Values.controller.extraInitContainers .Values.controller.extraModules .Values.controller.opentelemetry.enabled) }}
|
{{- if (or .Values.controller.extraInitContainers .Values.controller.extraModules) }}
|
||||||
initContainers:
|
initContainers:
|
||||||
{{- if .Values.controller.extraInitContainers }}
|
{{- if .Values.controller.extraInitContainers }}
|
||||||
{{- toYaml .Values.controller.extraInitContainers | nindent 8 }}
|
{{- toYaml .Values.controller.extraInitContainers | nindent 8 }}
|
||||||
|
@ -191,12 +191,6 @@ spec:
|
||||||
{{- include "extraModules" (dict "name" .name "image" .image "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
|
{{- include "extraModules" (dict "name" .name "image" .image "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- if .Values.controller.opentelemetry.enabled }}
|
|
||||||
{{- with .Values.controller.opentelemetry }}
|
|
||||||
{{- $containerSecurityContext := .containerSecurityContext | default $.Values.controller.containerSecurityContext }}
|
|
||||||
{{- include "extraModules" (dict "name" .name "image" .image "containerSecurityContext" $containerSecurityContext "resources" .resources) | nindent 8 }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- if .Values.controller.hostNetwork }}
|
{{- if .Values.controller.hostNetwork }}
|
||||||
hostNetwork: {{ .Values.controller.hostNetwork }}
|
hostNetwork: {{ .Values.controller.hostNetwork }}
|
||||||
|
@ -215,9 +209,9 @@ spec:
|
||||||
{{- end }}
|
{{- end }}
|
||||||
serviceAccountName: {{ template "ingress-nginx.serviceAccountName" . }}
|
serviceAccountName: {{ template "ingress-nginx.serviceAccountName" . }}
|
||||||
terminationGracePeriodSeconds: {{ .Values.controller.terminationGracePeriodSeconds }}
|
terminationGracePeriodSeconds: {{ .Values.controller.terminationGracePeriodSeconds }}
|
||||||
{{- if (or .Values.controller.customTemplate.configMapName .Values.controller.extraVolumeMounts .Values.controller.admissionWebhooks.enabled .Values.controller.extraVolumes .Values.controller.extraModules .Values.controller.opentelemetry.enabled) }}
|
{{- if (or .Values.controller.customTemplate.configMapName .Values.controller.extraVolumeMounts .Values.controller.admissionWebhooks.enabled .Values.controller.extraVolumes .Values.controller.extraModules) }}
|
||||||
volumes:
|
volumes:
|
||||||
{{- if (or .Values.controller.extraModules .Values.controller.opentelemetry.enabled)}}
|
{{- if .Values.controller.extraModules }}
|
||||||
- name: modules
|
- name: modules
|
||||||
emptyDir: {}
|
emptyDir: {}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
|
@ -682,7 +682,7 @@ controller:
|
||||||
# image: busybox
|
# image: busybox
|
||||||
# command: ['sh', '-c', 'until nslookup myservice; do echo waiting for myservice; sleep 2; done;']
|
# command: ['sh', '-c', 'until nslookup myservice; do echo waiting for myservice; sleep 2; done;']
|
||||||
|
|
||||||
# -- Modules, which are mounted into the core nginx image. See values.yaml for a sample to add opentelemetry module
|
# -- Modules, which are mounted into the core nginx image.
|
||||||
extraModules: []
|
extraModules: []
|
||||||
# - name: mytestmodule
|
# - name: mytestmodule
|
||||||
# image:
|
# image:
|
||||||
|
@ -711,31 +711,6 @@ controller:
|
||||||
# will be executed as initContainers, to move its config files within the
|
# will be executed as initContainers, to move its config files within the
|
||||||
# mounted volume.
|
# mounted volume.
|
||||||
|
|
||||||
opentelemetry:
|
|
||||||
enabled: false
|
|
||||||
name: opentelemetry
|
|
||||||
image:
|
|
||||||
registry: registry.k8s.io
|
|
||||||
image: ingress-nginx/opentelemetry-1.25.3
|
|
||||||
## for backwards compatibility consider setting the full image url via the repository value below
|
|
||||||
## use *either* current default registry/image or repository format or installing chart by providing the values.yaml will fail
|
|
||||||
## repository:
|
|
||||||
tag: v20240813-b933310d
|
|
||||||
digest: sha256:f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f922
|
|
||||||
distroless: true
|
|
||||||
containerSecurityContext:
|
|
||||||
runAsNonRoot: true
|
|
||||||
# -- The image's default user, inherited from its base image `cgr.dev/chainguard/static`.
|
|
||||||
runAsUser: 65532
|
|
||||||
runAsGroup: 65532
|
|
||||||
allowPrivilegeEscalation: false
|
|
||||||
seccompProfile:
|
|
||||||
type: RuntimeDefault
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- ALL
|
|
||||||
readOnlyRootFilesystem: true
|
|
||||||
resources: {}
|
|
||||||
admissionWebhooks:
|
admissionWebhooks:
|
||||||
name: admission
|
name: admission
|
||||||
annotations: {}
|
annotations: {}
|
||||||
|
|
|
@ -147,17 +147,7 @@ graph TB
|
||||||
|
|
||||||
To install the example and collectors run:
|
To install the example and collectors run:
|
||||||
|
|
||||||
1. Enable Ingress addon with:
|
1. Enable OpenTelemetry and set the otlp-collector-host:
|
||||||
|
|
||||||
```yaml
|
|
||||||
opentelemetry:
|
|
||||||
enabled: true
|
|
||||||
image: registry.k8s.io/ingress-nginx/opentelemetry-1.25.3:v20240813-b933310d@sha256:f7604ac0547ed64d79b98d92133234e66c2c8aade3c1f4809fed5eec1fb7f922
|
|
||||||
containerSecurityContext:
|
|
||||||
allowPrivilegeEscalation: false
|
|
||||||
```
|
|
||||||
|
|
||||||
2. Enable OpenTelemetry and set the otlp-collector-host:
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
$ echo '
|
$ echo '
|
||||||
|
@ -183,7 +173,7 @@ To install the example and collectors run:
|
||||||
' | kubectl replace -f -
|
' | kubectl replace -f -
|
||||||
```
|
```
|
||||||
|
|
||||||
4. Deploy otel-collector, grafana and Jaeger backend:
|
2. Deploy otel-collector, grafana and Jaeger backend:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
# add helm charts needed for grafana and OpenTelemetry collector
|
# add helm charts needed for grafana and OpenTelemetry collector
|
||||||
|
@ -218,7 +208,7 @@ To install the example and collectors run:
|
||||||
make deploy-app
|
make deploy-app
|
||||||
```
|
```
|
||||||
|
|
||||||
5. Make a few requests to the Service:
|
4. Make a few requests to the Service:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
kubectl port-forward --namespace=ingress-nginx service/ingress-nginx-controller 8090:80
|
kubectl port-forward --namespace=ingress-nginx service/ingress-nginx-controller 8090:80
|
||||||
|
@ -247,7 +237,7 @@ To install the example and collectors run:
|
||||||
RawContentLength : 21
|
RawContentLength : 21
|
||||||
```
|
```
|
||||||
|
|
||||||
6. View the Grafana UI:
|
5. View the Grafana UI:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
kubectl port-forward --namespace=observability service/grafana 3000:80
|
kubectl port-forward --namespace=observability service/grafana 3000:80
|
||||||
|
@ -255,7 +245,7 @@ To install the example and collectors run:
|
||||||
In the Grafana interface we can see the details:
|
In the Grafana interface we can see the details:
|
||||||

|

|
||||||
|
|
||||||
7. View the Jaeger UI:
|
6. View the Jaeger UI:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
kubectl port-forward --namespace=observability service/jaeger-all-in-one-query 16686:16686
|
kubectl port-forward --namespace=observability service/jaeger-all-in-one-query 16686:16686
|
||||||
|
@ -263,7 +253,7 @@ To install the example and collectors run:
|
||||||
In the Jaeger interface we can see the details:
|
In the Jaeger interface we can see the details:
|
||||||

|

|
||||||
|
|
||||||
8. View the Zipkin UI:
|
7. View the Zipkin UI:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
kubectl port-forward --namespace=observability service/zipkin 9411:9411
|
kubectl port-forward --namespace=observability service/zipkin 9411:9411
|
||||||
|
|
|
@ -207,13 +207,6 @@ type IngressChartValue struct {
|
||||||
ExtraVolumes []interface{} `yaml:"extraVolumes"`
|
ExtraVolumes []interface{} `yaml:"extraVolumes"`
|
||||||
ExtraInitContainers []interface{} `yaml:"extraInitContainers"`
|
ExtraInitContainers []interface{} `yaml:"extraInitContainers"`
|
||||||
ExtraModules []interface{} `yaml:"extraModules"`
|
ExtraModules []interface{} `yaml:"extraModules"`
|
||||||
Opentelemetry struct {
|
|
||||||
Enabled bool `yaml:"enabled"`
|
|
||||||
Image string `yaml:"image"`
|
|
||||||
ContainerSecurityContext struct {
|
|
||||||
AllowPrivilegeEscalation bool `yaml:"allowPrivilegeEscalation"`
|
|
||||||
} `yaml:"containerSecurityContext"`
|
|
||||||
} `yaml:"opentelemetry"`
|
|
||||||
AdmissionWebhooks struct {
|
AdmissionWebhooks struct {
|
||||||
Annotations struct{} `yaml:"annotations"`
|
Annotations struct{} `yaml:"annotations"`
|
||||||
Enabled bool `yaml:"enabled"`
|
Enabled bool `yaml:"enabled"`
|
||||||
|
|
Loading…
Reference in a new issue