Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[stable/redis-ha] add containerSecurityContext to redis-exporter container #236

Conversation

eyenx
Copy link
Contributor

@eyenx eyenx commented Oct 11, 2022

What this PR does / why we need it:

It adds securityContext to the redis-exporter container in redis-ha-sts

Special notes for your reviewer:

Same securityContext as in other containers

Checklist

[Place an '[x]' (no spaces) in all applicable fields. Please remove unrelated fields.]

  • DCO signed
  • Chart Version bumped
  • Variables are documented in the README.md
  • Title of the PR starts with chart name (e.g. [stable/mychartname])

Signed-off-by: Toni Tauro toni.tauro@adfinis.com

Signed-off-by: Toni Tauro <toni.tauro@adfinis.com>
@eyenx eyenx changed the title feat(redis-ha): add containerSecurityContext to redis-exporter container [stable/redis-ha] add containerSecurityContext to redis-exporter container Oct 11, 2022
@bkrein-vertex
Copy link

I was about to open this same PR so would love to see it merged in.

@DandyDeveloper
Copy link
Owner

Sorry for the delay @eyenx @bkrein-vertex

I'm not being assigned as the reviewer by the automation so I missed a bunch of stuff on this repo.

@DandyDeveloper DandyDeveloper reopened this Dec 8, 2022
@DandyDeveloper DandyDeveloper merged commit 169cad7 into DandyDeveloper:master Dec 8, 2022
@eyenx eyenx deleted the feat/add-containersecuritycontext-to-redis-exporter branch December 8, 2022 05:44
@eyenx
Copy link
Contributor Author

eyenx commented Dec 8, 2022

Thanks @DandyDeveloper

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants