Skip to content

Commit 9895cb0

Browse files
airadiermavimo
andauthored
chore(node-analyzer): Improve template to reflect eveEnabled settings in CM (#1536)
Co-authored-by: Marco Vito Moscaritolo <[email protected]>
1 parent dd5d9e9 commit 9895cb0

File tree

4 files changed

+53
-14
lines changed

4 files changed

+53
-14
lines changed

charts/node-analyzer/Chart.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ apiVersion: v2
22
name: node-analyzer
33
description: Sysdig Node Analyzer
44
# currently matching Sysdig's appVersion 1.14.34
5-
version: 1.20.0
5+
version: 1.20.1
66
appVersion: 12.9.0
77
keywords:
88
- monitoring

charts/node-analyzer/templates/daemonset-node-analyzer.yaml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -712,7 +712,6 @@ spec:
712712
- name: "{{ $key }}"
713713
value: "{{ $value }}"
714714
{{- end }}
715-
{{- if .Values.nodeAnalyzer.runtimeScanner.settings.eveEnabled }}
716715
- name: EVE_ENABLED
717716
valueFrom:
718717
configMapKeyRef:
@@ -725,7 +724,6 @@ spec:
725724
name: {{ .Release.Name }}-runtime-scanner
726725
key: eve_integration_enabled
727726
optional: true
728-
{{- end }}
729727
volumeMounts:
730728
# Needed for some IBM OpenShift clusters which symlink /var/run/containers/storage to contents of /var/data by default
731729
- mountPath: /var/data

charts/node-analyzer/templates/runtimeScanner/runtime-scanner-configmap.yaml

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -14,28 +14,26 @@ data:
1414
{{- end }}
1515
{{- if (.Values.nodeAnalyzer.runtimeScanner.httpProxy | default .Values.nodeAnalyzer.httpProxy | default .Values.global.proxy.httpProxy) }}
1616
http_proxy: {{ .Values.nodeAnalyzer.runtimeScanner.httpProxy | default .Values.nodeAnalyzer.httpProxy | default .Values.global.proxy.httpProxy }}
17-
{{- end -}}
17+
{{- end }}
1818
{{- if (.Values.nodeAnalyzer.runtimeScanner.httpsProxy | default .Values.nodeAnalyzer.httpsProxy | default .Values.global.proxy.httpsProxy) }}
1919
https_proxy: {{ .Values.nodeAnalyzer.runtimeScanner.httpsProxy | default .Values.nodeAnalyzer.httpsProxy | default .Values.global.proxy.httpsProxy }}
20-
{{- end -}}
20+
{{- end }}
2121
{{- if (.Values.nodeAnalyzer.runtimeScanner.noProxy | default .Values.nodeAnalyzer.noProxy | default .Values.global.proxy.noProxy) }}
2222
no_proxy: {{ .Values.nodeAnalyzer.runtimeScanner.noProxy | default .Values.nodeAnalyzer.noProxy | default .Values.global.proxy.noProxy }}
23-
{{- end -}}
24-
{{- if .Values.nodeAnalyzer.runtimeScanner.settings.eveEnabled }}
25-
eve_enabled: "true"
26-
eve_integration_enabled: "true"
27-
{{- end -}}
23+
{{- end }}
24+
eve_enabled: {{ .Values.nodeAnalyzer.runtimeScanner.settings.eveEnabled | quote }}
25+
eve_integration_enabled: {{ .Values.nodeAnalyzer.runtimeScanner.settings.eveEnabled | quote }}
2826
{{- if hasKey .Values.nodeAnalyzer.runtimeScanner "settings" }}
2927
prom_port: {{ .Values.nodeAnalyzer.runtimeScanner.settings.prometheusPort | default 25001 | quote }}
30-
{{- end -}}
28+
{{- end }}
3129

3230
{{- if .Values.nodeAnalyzer.runtimeScanner.settings.maxImageSizeAllowed }}
3331
max_image_size_allowed: {{ .Values.nodeAnalyzer.runtimeScanner.settings.maxImageSizeAllowed | int64 | quote }}
34-
{{- end -}}
32+
{{- end }}
3533
{{- if .Values.nodeAnalyzer.runtimeScanner.settings.maxFileSizeAllowed }}
3634
analyzer.maxFileSizeAllowed: {{ .Values.nodeAnalyzer.runtimeScanner.settings.maxFileSizeAllowed | int64 | quote }}
37-
{{- end -}}
35+
{{- end }}
3836
{{- if .Values.nodeAnalyzer.runtimeScanner.settings.vulnerabilityDBVersion }}
3937
vuln_db_version: {{ .Values.nodeAnalyzer.runtimeScanner.settings.vulnerabilityDBVersion | quote }}
40-
{{- end -}}
38+
{{- end }}
4139
{{- end }}

charts/node-analyzer/tests/runtimescanner_test.yaml

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -106,3 +106,46 @@ tests:
106106
- lengthEqual:
107107
path: spec.template.spec.containers
108108
count: 3
109+
110+
- it: "always expose the EVE_ENABLED and EVE_INTEGRATION_ENABLED variables when eveEnabled is not specified"
111+
set:
112+
nodeAnalyzer:
113+
runtimeScanner:
114+
deploy: true
115+
templates:
116+
- ../templates/daemonset-node-analyzer.yaml
117+
asserts:
118+
- isNotNull:
119+
path: spec.template.spec.containers[?(@.name == "sysdig-runtime-scanner")].env[?(@.name == "EVE_ENABLED")]
120+
- isNotNull:
121+
path: spec.template.spec.containers[?(@.name == "sysdig-runtime-scanner")].env[?(@.name == "EVE_INTEGRATION_ENABLED")]
122+
123+
- it: "always expose the EVE_ENABLED and EVE_INTEGRATION_ENABLED variables when eveEnabled is true"
124+
set:
125+
nodeAnalyzer:
126+
runtimeScanner:
127+
deploy: true
128+
settings:
129+
eveEnabled: true
130+
templates:
131+
- ../templates/daemonset-node-analyzer.yaml
132+
asserts:
133+
- isNotNull:
134+
path: spec.template.spec.containers[?(@.name == "sysdig-runtime-scanner")].env[?(@.name == "EVE_ENABLED")]
135+
- isNotNull:
136+
path: spec.template.spec.containers[?(@.name == "sysdig-runtime-scanner")].env[?(@.name == "EVE_INTEGRATION_ENABLED")]
137+
138+
- it: "always expose the EVE_ENABLED and EVE_INTEGRATION_ENABLED variables when eveEnabled is false"
139+
set:
140+
nodeAnalyzer:
141+
runtimeScanner:
142+
deploy: true
143+
settings:
144+
eveEnabled: false
145+
templates:
146+
- ../templates/daemonset-node-analyzer.yaml
147+
asserts:
148+
- isNotNull:
149+
path: spec.template.spec.containers[?(@.name == "sysdig-runtime-scanner")].env[?(@.name == "EVE_ENABLED")]
150+
- isNotNull:
151+
path: spec.template.spec.containers[?(@.name == "sysdig-runtime-scanner")].env[?(@.name == "EVE_INTEGRATION_ENABLED")]

0 commit comments

Comments
 (0)