You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add checksum if externally-referenced Secret name or Secret entry name for the sensitive data changes.
This won't cause the Deployment/DaemonSet to redeploy if the secret data itself changes, but it will redeploy if what the external secret reference is changes.
Additional updates:
* Brought over podAnnotations and priorityClass to the API Reader pod, for parity.
* Updated documentation
Copy file name to clipboardExpand all lines: README.md
+9-1Lines changed: 9 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,6 +46,8 @@ The following kubernetes objects are created when the chart is installed:
46
46
| apiReader.affinity | object |`{}`||
47
47
| apiReader.nodeSelector | object |`{}`||
48
48
| apiReader.tolerations | list |`[]`||
49
+
| apiReader.podAnnotations | string | {} ||
50
+
| apiReader.priorityClassName | string |`""`| Optionally set the priority class name for the daemonset pods. Note that priority classes are not created via this helm chart. Ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/|
49
51
| capabilities | string |`"[\"AUDIT_CONTROL\", \"SYS_ADMIN\", \"SYS_PTRACE\"]\n"`| Docker capabilites required for the proper operation of the agent |
50
52
| customDaemonsetCmd | object |`{}`| Uncomment the `command` and `args` sub-attributes, and define them as desired to run custom commands in the daemonset. |
@@ -148,13 +150,19 @@ Assuming you override the default values to match our environment in a `values.y
148
150
149
151
##### Using the `agentSetupExternalSecretRef` value block
150
152
151
-
> **WARNING:** Do not set the `agentSetupExternalSecretRef` block *and* the `agentDeployKey` settings at the same time. This will cause unnecessary kubernetes resource definitions to be created. If you had previously used the `agentDeployKey` value, the secret associated with it may be destroyed on deployment.
153
+
>>>
154
+
**IMPORTANT:** Using `agentSetupExternalSecretRef` decouples secret management from the helm chart. Therefore, if the value of the secret changes, the agent DaemonSet and Deployment will _not_ be redeployed/restarted. The user will need to force a redeployment of the helm chart explicitly.
155
+
156
+
However, if the secret's name or secret's entry name changes in the `values.yaml` of the chart, helm will recognize this change with a new release, and trigger a redeployment of the DaemonsSet and Deployment. One way to take advantage of this is to update the secrets entry value name (what is defined at `agentSetupExternalSecretRef.value`) when changing the secret data, and doing a redeploy of the chart. The chart trigger a redeployment of the agent pods.
157
+
>>>
152
158
153
159
An alternative to having the chart define the `ts-setup-args` secret itself, you can instead have it point to your own self-managed secret. Doing so requires the following three values to be set:
154
160
155
161
*`agentSetupExternalSecretRef.name` :: This is the name of your self-managed secret.
156
162
*`agentSetupExternalSecretRef.key` :: This is the key in your self-managed secret that is associated with the data you want to supply from the secret, to the Threat Stack agent setup registration.
157
163
164
+
Do not set the `agentSetupExternalSecretRef` block *and* the `agentDeployKey` settings at the same time. This will cause unnecessary kubernetes resource definitions to be created. If you had previously used the `agentDeployKey` value, the secret associated with it may be destroyed on deployment.
165
+
158
166
Using the `agentSetupExternalSecretRef` block will cause the chart to ignore the `agentDeployKey`, `rulesets`, and `additionalSetupConfig` values defined in `values.yaml` or any other values override file, until existing pods are terminated/rescheduled.
159
167
160
168
The value defined in the secret by `agentSetupExternalSecretRef.name`/`agentSetupExternalSecretRef.key` should be defined as in the example below to properly setup up the agent. Failure to do so can cause the agent to not properly register itself with the Threat Stack platform.
0 commit comments