From 16569cfe19ee5880bf67f1f7933fefde170582da Mon Sep 17 00:00:00 2001
From: Michele Mangili <83061719+michele-mangili@users.noreply.github.com>
Date: Mon, 4 Sep 2023 09:29:40 +0200
Subject: [PATCH] chore(cluster-scanner): bumped RSI and ISE to latest version
0.4.3 (#1329)
---
charts/cluster-scanner/Chart.yaml | 2 +-
charts/cluster-scanner/README.md | 12 ++++++------
charts/cluster-scanner/values.yaml | 4 ++--
charts/sysdig-deploy/Chart.yaml | 4 ++--
4 files changed, 11 insertions(+), 11 deletions(-)
diff --git a/charts/cluster-scanner/Chart.yaml b/charts/cluster-scanner/Chart.yaml
index 847d87108..eca92a95c 100644
--- a/charts/cluster-scanner/Chart.yaml
+++ b/charts/cluster-scanner/Chart.yaml
@@ -4,7 +4,7 @@ description: Sysdig Cluster Scanner
type: application
-version: 0.5.1
+version: 0.5.2
appVersion: "0.1.0"
home: https://www.sysdig.com/
diff --git a/charts/cluster-scanner/README.md b/charts/cluster-scanner/README.md
index b93580992..dff3d229a 100644
--- a/charts/cluster-scanner/README.md
+++ b/charts/cluster-scanner/README.md
@@ -25,7 +25,7 @@ $ pre-commit run -a
$ helm repo add sysdig https://charts.sysdig.com
$ helm repo update
$ helm upgrade --install sysdig-cluster-scanner sysdig/cluster-scanner \
- --create-namespace -n sysdig --version=0.5.1 \
+ --create-namespace -n sysdig --version=0.5.2 \
--set global.clusterConfig.name=CLUSTER_NAME \
--set global.sysdig.region=SYSDIG_REGION \
--set global.sysdig.accessKey=YOUR-KEY-HERE
@@ -55,7 +55,7 @@ To install the chart with the release name `cluster-scanner`, run:
```console
$ helm upgrade --install sysdig-cluster-scanner sysdig/cluster-scanner \
- --create-namespace -n sysdig --version=0.5.1 \
+ --create-namespace -n sysdig --version=0.5.2 \
--set global.clusterConfig.name=CLUSTER_NAME \
--set global.sysdig.region=SYSDIG_REGION \
--set global.sysdig.accessKey=YOUR-KEY-HERE
@@ -110,7 +110,7 @@ The following table lists the configurable parameters of the `cluster-scanner` c
| sslVerifyCertificate | Can be set to false to allow insecure connections to the Sysdig backend, such as for on-premise installs that use self-signed certificates. By default, certificates are always verified. | true
|
| runtimeStatusIntegrator.image.registry | The image registry to use for the Runtime Status Integrator component of Cluster Scanner | quay.io
|
| runtimeStatusIntegrator.image.repository | The image repository to use for pulling the Runtime Status Integrator image | sysdig/runtime-status-integrator
|
-| runtimeStatusIntegrator.image.tag | | "0.4.2"
|
+| runtimeStatusIntegrator.image.tag | | "0.4.3"
|
| runtimeStatusIntegrator.multiCluster | When the Cluster Scanner is running in `multi` mode, set the secret name to be used to retrieve the kubeconfig configuration to connect to the clusters to inspect. |
|
| runtimeStatusIntegrator.localCluster | Restrict access to specific Docker secrets when Cluster Scanner is running in `local` mode. The default behavior is listing all secrets. See `values.yaml` for an example. Optional. |
|
| runtimeStatusIntegrator.ports.metrics | The port to be used to expose prometheus metrics for the Runtime Status Integrator | 25000
|
@@ -122,7 +122,7 @@ The following table lists the configurable parameters of the `cluster-scanner` c
| runtimeStatusIntegrator.natsJS.user | The username to be used in the NATS JetStream instance the Runtime Status Integrator is going to start | "default-user"
|
| imageSbomExtractor.image.registry | The image registry to use for the Image SBOM Extractor component of Cluster Scanner | quay.io
|
| imageSbomExtractor.image.repository | The image repository to use for pulling the Image SBOM Extractor image | sysdig/image-sbom-extractor
|
-| imageSbomExtractor.image.tag | | "0.4.2"
|
+| imageSbomExtractor.image.tag | | "0.4.3"
|
| imageSbomExtractor.ports.metrics | The port to be used to expose prometheus metrics for the Image SBOM Extractor | 25001
|
| imageSbomExtractor.ports.probes | The port to be used for healthcheck probes for the Image SBOM Extractor | 7001
|
| imageSbomExtractor.resources.limits.cpu | Image SBOM Extractor CPU limit per replica | "1"
|
@@ -159,7 +159,7 @@ Specify each parameter using the **`--set key=value[,key=value]`** argument to `
```console
$ helm upgrade --install sysdig-cluster-scanner sysdig/cluster-scanner \
- --create-namespace -n sysdig --version=0.5.1 \
+ --create-namespace -n sysdig --version=0.5.2 \
--set global.sysdig.region="us1"
```
@@ -168,7 +168,7 @@ installing the chart. For example:
```console
$ helm upgrade --install sysdig-cluster-scanner sysdig/cluster-scanner \
- --create-namespace -n sysdig --version=0.5.1 \
+ --create-namespace -n sysdig --version=0.5.2 \
--values values.yaml
```
diff --git a/charts/cluster-scanner/values.yaml b/charts/cluster-scanner/values.yaml
index ace736341..25844bb24 100644
--- a/charts/cluster-scanner/values.yaml
+++ b/charts/cluster-scanner/values.yaml
@@ -102,7 +102,7 @@ runtimeStatusIntegrator:
# The image repository to use for pulling the Runtime Status Integrator
# image
repository: sysdig/runtime-status-integrator
- tag: "0.4.2"
+ tag: "0.4.3"
# Params to manage leader election
# Leader election is implemented leveraging the native capabilities of
# Kubernetes see: https://kubernetes.io/blog/2016/01/simple-leader-election-with-kubernetes/
@@ -161,7 +161,7 @@ imageSbomExtractor:
registry: quay.io
# The image repository to use for pulling the Image SBOM Extractor image
repository: sysdig/image-sbom-extractor
- tag: "0.4.2"
+ tag: "0.4.3"
ports:
# The port to be used to expose prometheus metrics for the Image SBOM
# Extractor
diff --git a/charts/sysdig-deploy/Chart.yaml b/charts/sysdig-deploy/Chart.yaml
index 4750a9cda..b0d9af0f8 100644
--- a/charts/sysdig-deploy/Chart.yaml
+++ b/charts/sysdig-deploy/Chart.yaml
@@ -2,7 +2,7 @@ apiVersion: v2
name: sysdig-deploy
description: A chart with various Sysdig components for Kubernetes
type: application
-version: 1.20.1
+version: 1.20.2
maintainers:
- name: AlbertoBarba
email: alberto.barba@sysdig.com
@@ -42,7 +42,7 @@ dependencies:
- name: cluster-scanner
# repository: https://charts.sysdig.com
repository: file://../cluster-scanner
- version: ~0.5.0
+ version: ~0.5.2
alias: clusterScanner
condition: clusterScanner.enabled
- name: kspm-collector