chore(deps): update helm release grafana to v6.38.0#764
Conversation
|
Path: @@ -334,7 +334,7 @@
@test "Test Health" {
url="http://grafana/api/health"
- code=$(wget --server-response --spider --timeout 10 --tries 1 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
+ code=$(wget --server-response --spider --timeout 90 --tries 10 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
[ "$code" == "200" ]
}
---
@@ -486,10 +486,10 @@
app.kubernetes.io/name: grafana
app.kubernetes.io/instance: grafana
annotations:
- checksum/config: 948846197f9e2ac9362c5344ed361a219bda24f1bcafae049315578628b98d57
- checksum/dashboards-json-config: 7aec669807c5de05de89034f14d103550d767e3632121e98a0f5c58c530eb3cb
- checksum/sc-dashboard-provider-config: 0e74904bc78332f49fcd2c76d51a1b22d1e597015e73de00106dc8553937faaa
- checksum/secret: 3f6963680875ad45e55726401a603845c39c69e2cdfdba6a1e6c42863a37401e
+ checksum/config: 7407f99d6073a6f0e40c194b76cb0a3f568ed45d3aeb72ecef397180e00b6176
+ checksum/dashboards-json-config: bddb20887ac5da10247501a5fe97eaacbcaa221f54effe9bfb1971ed049e25e0
+ checksum/sc-dashboard-provider-config: 3f4874aa9261086bdcfa0127f09337d851c5bc38243d8dc0d68c47ec5d572638
+ checksum/secret: 21a9fe60d9dfa6e5e0ecf7052f95ee4583f53ad39fc915521b792b0ecebd9131
spec:
serviceAccountName: grafana
automountServiceAccountToken: true
@@ -579,7 +579,7 @@
- name: sc-datasources-volume
mountPath: "/etc/grafana/provisioning/datasources"
- name: grafana
- image: "grafana/grafana:9.0.5"
+ image: "grafana/grafana:9.1.1"
imagePullPolicy: IfNotPresent
volumeMounts:
- name: config |
6bea258 to
857ef72
Compare
|
Path: @@ -334,7 +334,7 @@
@test "Test Health" {
url="http://grafana/api/health"
- code=$(wget --server-response --spider --timeout 10 --tries 1 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
+ code=$(wget --server-response --spider --timeout 90 --tries 10 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
[ "$code" == "200" ]
}
---
@@ -486,10 +486,10 @@
app.kubernetes.io/name: grafana
app.kubernetes.io/instance: grafana
annotations:
- checksum/config: 948846197f9e2ac9362c5344ed361a219bda24f1bcafae049315578628b98d57
- checksum/dashboards-json-config: 7aec669807c5de05de89034f14d103550d767e3632121e98a0f5c58c530eb3cb
- checksum/sc-dashboard-provider-config: 0e74904bc78332f49fcd2c76d51a1b22d1e597015e73de00106dc8553937faaa
- checksum/secret: 3f6963680875ad45e55726401a603845c39c69e2cdfdba6a1e6c42863a37401e
+ checksum/config: 30f32ad6f9a99dd0fe795cad415d8ef9d8e51ee7fc7450be41767669bba4bf18
+ checksum/dashboards-json-config: 884c8b4e2de8a6583d2a8921e1d29d0ae64c253b41212e8be272031878f2cd8d
+ checksum/sc-dashboard-provider-config: 049344061de249bc2168d679d2a1812611d132b96e1578b593c39489349fa32d
+ checksum/secret: 74404590a481f1f3d1d2f4cf3155c48be9e1546499cb473d0106002defba0d27
spec:
serviceAccountName: grafana
automountServiceAccountToken: true
@@ -579,7 +579,7 @@
- name: sc-datasources-volume
mountPath: "/etc/grafana/provisioning/datasources"
- name: grafana
- image: "grafana/grafana:9.0.5"
+ image: "grafana/grafana:9.1.1"
imagePullPolicy: IfNotPresent
volumeMounts:
- name: config |
857ef72 to
4638730
Compare
|
Path: @@ -1,83 +1,3 @@
-# Source: grafana/templates/podsecuritypolicy.yaml
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: grafana
- labels:
- app.kubernetes.io/name: grafana
- app.kubernetes.io/instance: grafana
- app.kubernetes.io/managed-by: Helm
- annotations:
- seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default,runtime/default'
- seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default'
- apparmor.security.beta.kubernetes.io/allowedProfileNames: 'runtime/default'
- apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default'
-spec:
- privileged: false
- allowPrivilegeEscalation: false
- requiredDropCapabilities:
- # Default set from Docker, with DAC_OVERRIDE and CHOWN
- - ALL
- volumes:
- - 'configMap'
- - 'emptyDir'
- - 'projected'
- - 'csi'
- - 'secret'
- - 'downwardAPI'
- - 'persistentVolumeClaim'
- hostNetwork: false
- hostIPC: false
- hostPID: false
- runAsUser:
- rule: 'RunAsAny'
- seLinux:
- rule: 'RunAsAny'
- supplementalGroups:
- rule: 'MustRunAs'
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- fsGroup:
- rule: 'MustRunAs'
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- readOnlyRootFilesystem: false
----
-# Source: grafana/templates/tests/test-podsecuritypolicy.yaml
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: grafana-test
- labels:
- app.kubernetes.io/name: grafana
- app.kubernetes.io/instance: grafana
- app.kubernetes.io/managed-by: Helm
-spec:
- allowPrivilegeEscalation: true
- privileged: false
- hostNetwork: false
- hostIPC: false
- hostPID: false
- fsGroup:
- rule: RunAsAny
- seLinux:
- rule: RunAsAny
- supplementalGroups:
- rule: RunAsAny
- runAsUser:
- rule: RunAsAny
- volumes:
- - configMap
- - downwardAPI
- - emptyDir
- - projected
- - csi
- - secret
----
# Source: grafana/templates/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
@@ -334,7 +254,7 @@
@test "Test Health" {
url="http://grafana/api/health"
- code=$(wget --server-response --spider --timeout 10 --tries 1 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
+ code=$(wget --server-response --spider --timeout 90 --tries 10 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
[ "$code" == "200" ]
}
---
@@ -486,10 +406,10 @@
app.kubernetes.io/name: grafana
app.kubernetes.io/instance: grafana
annotations:
- checksum/config: 948846197f9e2ac9362c5344ed361a219bda24f1bcafae049315578628b98d57
- checksum/dashboards-json-config: 7aec669807c5de05de89034f14d103550d767e3632121e98a0f5c58c530eb3cb
- checksum/sc-dashboard-provider-config: 0e74904bc78332f49fcd2c76d51a1b22d1e597015e73de00106dc8553937faaa
- checksum/secret: 3f6963680875ad45e55726401a603845c39c69e2cdfdba6a1e6c42863a37401e
+ checksum/config: b3073c655950e5ba192910c4e2e6db853dfba9a16650fa3646fc934fb9aec744
+ checksum/dashboards-json-config: 274b8388fc3e0249de9248f5458f7a3698f1696f6564f4328b696616e37c2db8
+ checksum/sc-dashboard-provider-config: 6f9e76a60be112d66ed4bfa1aee360fc932445deaba6534bb40128d7b8d5c433
+ checksum/secret: 40344855b8cd4262b5be36ebe32919c7d14a4f6239b5ed915da17b178af26397
spec:
serviceAccountName: grafana
automountServiceAccountToken: true
@@ -579,7 +499,7 @@
- name: sc-datasources-volume
mountPath: "/etc/grafana/provisioning/datasources"
- name: grafana
- image: "grafana/grafana:9.0.5"
+ image: "grafana/grafana:9.1.1"
imagePullPolicy: IfNotPresent
volumeMounts:
- name: config |
4638730 to
a72ed12
Compare
|
Path: @@ -1,83 +1,3 @@
-# Source: grafana/templates/podsecuritypolicy.yaml
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: grafana
- labels:
- app.kubernetes.io/name: grafana
- app.kubernetes.io/instance: grafana
- app.kubernetes.io/managed-by: Helm
- annotations:
- seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default,runtime/default'
- seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default'
- apparmor.security.beta.kubernetes.io/allowedProfileNames: 'runtime/default'
- apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default'
-spec:
- privileged: false
- allowPrivilegeEscalation: false
- requiredDropCapabilities:
- # Default set from Docker, with DAC_OVERRIDE and CHOWN
- - ALL
- volumes:
- - 'configMap'
- - 'emptyDir'
- - 'projected'
- - 'csi'
- - 'secret'
- - 'downwardAPI'
- - 'persistentVolumeClaim'
- hostNetwork: false
- hostIPC: false
- hostPID: false
- runAsUser:
- rule: 'RunAsAny'
- seLinux:
- rule: 'RunAsAny'
- supplementalGroups:
- rule: 'MustRunAs'
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- fsGroup:
- rule: 'MustRunAs'
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- readOnlyRootFilesystem: false
----
-# Source: grafana/templates/tests/test-podsecuritypolicy.yaml
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: grafana-test
- labels:
- app.kubernetes.io/name: grafana
- app.kubernetes.io/instance: grafana
- app.kubernetes.io/managed-by: Helm
-spec:
- allowPrivilegeEscalation: true
- privileged: false
- hostNetwork: false
- hostIPC: false
- hostPID: false
- fsGroup:
- rule: RunAsAny
- seLinux:
- rule: RunAsAny
- supplementalGroups:
- rule: RunAsAny
- runAsUser:
- rule: RunAsAny
- volumes:
- - configMap
- - downwardAPI
- - emptyDir
- - projected
- - csi
- - secret
----
# Source: grafana/templates/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
@@ -334,7 +254,7 @@
@test "Test Health" {
url="http://grafana/api/health"
- code=$(wget --server-response --spider --timeout 10 --tries 1 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
+ code=$(wget --server-response --spider --timeout 90 --tries 10 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
[ "$code" == "200" ]
}
---
@@ -486,10 +406,10 @@
app.kubernetes.io/name: grafana
app.kubernetes.io/instance: grafana
annotations:
- checksum/config: 948846197f9e2ac9362c5344ed361a219bda24f1bcafae049315578628b98d57
- checksum/dashboards-json-config: 7aec669807c5de05de89034f14d103550d767e3632121e98a0f5c58c530eb3cb
- checksum/sc-dashboard-provider-config: 0e74904bc78332f49fcd2c76d51a1b22d1e597015e73de00106dc8553937faaa
- checksum/secret: 3f6963680875ad45e55726401a603845c39c69e2cdfdba6a1e6c42863a37401e
+ checksum/config: a1c359ef09be89124c18caab22134d5ee19f59a2e87ca703f65e99689b38cb99
+ checksum/dashboards-json-config: c0624f528fd21dd0580697ec09850446588dc74adcb64ce2b6e62b5a7b162dac
+ checksum/sc-dashboard-provider-config: 7e189035e1bc442eb7e7f4656792809aef2a2fbb75944aea211d49a432f8989a
+ checksum/secret: 3bfe0ccb20cfb098d8a61bd6bdffc4aa467534f7fc25acfc0f365d1994e89b14
spec:
serviceAccountName: grafana
automountServiceAccountToken: true
@@ -579,7 +499,7 @@
- name: sc-datasources-volume
mountPath: "/etc/grafana/provisioning/datasources"
- name: grafana
- image: "grafana/grafana:9.0.5"
+ image: "grafana/grafana:9.1.1"
imagePullPolicy: IfNotPresent
volumeMounts:
- name: config |
a72ed12 to
cfccfb6
Compare
|
Path: @@ -1,83 +1,3 @@
-# Source: grafana/templates/podsecuritypolicy.yaml
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: grafana
- labels:
- app.kubernetes.io/name: grafana
- app.kubernetes.io/instance: grafana
- app.kubernetes.io/managed-by: Helm
- annotations:
- seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default,runtime/default'
- seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default'
- apparmor.security.beta.kubernetes.io/allowedProfileNames: 'runtime/default'
- apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default'
-spec:
- privileged: false
- allowPrivilegeEscalation: false
- requiredDropCapabilities:
- # Default set from Docker, with DAC_OVERRIDE and CHOWN
- - ALL
- volumes:
- - 'configMap'
- - 'emptyDir'
- - 'projected'
- - 'csi'
- - 'secret'
- - 'downwardAPI'
- - 'persistentVolumeClaim'
- hostNetwork: false
- hostIPC: false
- hostPID: false
- runAsUser:
- rule: 'RunAsAny'
- seLinux:
- rule: 'RunAsAny'
- supplementalGroups:
- rule: 'MustRunAs'
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- fsGroup:
- rule: 'MustRunAs'
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- readOnlyRootFilesystem: false
----
-# Source: grafana/templates/tests/test-podsecuritypolicy.yaml
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: grafana-test
- labels:
- app.kubernetes.io/name: grafana
- app.kubernetes.io/instance: grafana
- app.kubernetes.io/managed-by: Helm
-spec:
- allowPrivilegeEscalation: true
- privileged: false
- hostNetwork: false
- hostIPC: false
- hostPID: false
- fsGroup:
- rule: RunAsAny
- seLinux:
- rule: RunAsAny
- supplementalGroups:
- rule: RunAsAny
- runAsUser:
- rule: RunAsAny
- volumes:
- - configMap
- - downwardAPI
- - emptyDir
- - projected
- - csi
- - secret
----
# Source: grafana/templates/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
@@ -334,7 +254,7 @@
@test "Test Health" {
url="http://grafana/api/health"
- code=$(wget --server-response --spider --timeout 10 --tries 1 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
+ code=$(wget --server-response --spider --timeout 90 --tries 10 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
[ "$code" == "200" ]
}
---
@@ -486,10 +406,10 @@
app.kubernetes.io/name: grafana
app.kubernetes.io/instance: grafana
annotations:
- checksum/config: 948846197f9e2ac9362c5344ed361a219bda24f1bcafae049315578628b98d57
- checksum/dashboards-json-config: 7aec669807c5de05de89034f14d103550d767e3632121e98a0f5c58c530eb3cb
- checksum/sc-dashboard-provider-config: 0e74904bc78332f49fcd2c76d51a1b22d1e597015e73de00106dc8553937faaa
- checksum/secret: 3f6963680875ad45e55726401a603845c39c69e2cdfdba6a1e6c42863a37401e
+ checksum/config: a3b050713f6d68c7ddc8397125f65fae1d4323b7e535f38849881ef79adc4ad5
+ checksum/dashboards-json-config: bdfdb0749184b1e42d948884e863c8584fdaf13cf978a67f9c5225f3d4e8768c
+ checksum/sc-dashboard-provider-config: 5dbd90516f21b4556eb99d8cf02a4f47b332e3a18c02bf8d020935c1adc4e3a0
+ checksum/secret: f88479d68d311461452f5593d8a7f5eb76973d2cb289d698e817a090e2f6b221
spec:
serviceAccountName: grafana
automountServiceAccountToken: true
@@ -579,7 +499,7 @@
- name: sc-datasources-volume
mountPath: "/etc/grafana/provisioning/datasources"
- name: grafana
- image: "grafana/grafana:9.0.5"
+ image: "grafana/grafana:9.1.1"
imagePullPolicy: IfNotPresent
volumeMounts:
- name: config |
cfccfb6 to
4591796
Compare
|
Path: @@ -1,83 +1,3 @@
-# Source: grafana/templates/podsecuritypolicy.yaml
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: grafana
- labels:
- app.kubernetes.io/name: grafana
- app.kubernetes.io/instance: grafana
- app.kubernetes.io/managed-by: Helm
- annotations:
- seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default,runtime/default'
- seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default'
- apparmor.security.beta.kubernetes.io/allowedProfileNames: 'runtime/default'
- apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default'
-spec:
- privileged: false
- allowPrivilegeEscalation: false
- requiredDropCapabilities:
- # Default set from Docker, with DAC_OVERRIDE and CHOWN
- - ALL
- volumes:
- - 'configMap'
- - 'emptyDir'
- - 'projected'
- - 'csi'
- - 'secret'
- - 'downwardAPI'
- - 'persistentVolumeClaim'
- hostNetwork: false
- hostIPC: false
- hostPID: false
- runAsUser:
- rule: 'RunAsAny'
- seLinux:
- rule: 'RunAsAny'
- supplementalGroups:
- rule: 'MustRunAs'
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- fsGroup:
- rule: 'MustRunAs'
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- readOnlyRootFilesystem: false
----
-# Source: grafana/templates/tests/test-podsecuritypolicy.yaml
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: grafana-test
- labels:
- app.kubernetes.io/name: grafana
- app.kubernetes.io/instance: grafana
- app.kubernetes.io/managed-by: Helm
-spec:
- allowPrivilegeEscalation: true
- privileged: false
- hostNetwork: false
- hostIPC: false
- hostPID: false
- fsGroup:
- rule: RunAsAny
- seLinux:
- rule: RunAsAny
- supplementalGroups:
- rule: RunAsAny
- runAsUser:
- rule: RunAsAny
- volumes:
- - configMap
- - downwardAPI
- - emptyDir
- - projected
- - csi
- - secret
----
# Source: grafana/templates/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
@@ -334,7 +254,7 @@
@test "Test Health" {
url="http://grafana/api/health"
- code=$(wget --server-response --spider --timeout 10 --tries 1 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
+ code=$(wget --server-response --spider --timeout 90 --tries 10 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
[ "$code" == "200" ]
}
---
@@ -486,10 +406,10 @@
app.kubernetes.io/name: grafana
app.kubernetes.io/instance: grafana
annotations:
- checksum/config: 948846197f9e2ac9362c5344ed361a219bda24f1bcafae049315578628b98d57
- checksum/dashboards-json-config: 7aec669807c5de05de89034f14d103550d767e3632121e98a0f5c58c530eb3cb
- checksum/sc-dashboard-provider-config: 0e74904bc78332f49fcd2c76d51a1b22d1e597015e73de00106dc8553937faaa
- checksum/secret: 3f6963680875ad45e55726401a603845c39c69e2cdfdba6a1e6c42863a37401e
+ checksum/config: d5b0d225dd7cc08abf2ed552655b9ec7d11a617d3e5bc478aef2fa8030e66a4e
+ checksum/dashboards-json-config: 91d8b5bb0c366e5335a74f468f4d057524d833fdc3f9aecfe564f7f77db8b7fa
+ checksum/sc-dashboard-provider-config: f074b0b0be3411e6fb7c9c9c1b2c42643e741340d1f69307eaba1f389b8bd5b7
+ checksum/secret: 7d6b0f3cc23504b8a3cd36867feee41442a355951952f359602e51546a11a7fd
spec:
serviceAccountName: grafana
automountServiceAccountToken: true
@@ -579,7 +499,7 @@
- name: sc-datasources-volume
mountPath: "/etc/grafana/provisioning/datasources"
- name: grafana
- image: "grafana/grafana:9.0.5"
+ image: "grafana/grafana:9.1.1"
imagePullPolicy: IfNotPresent
volumeMounts:
- name: config |
4591796 to
9b67fa4
Compare
|
Path: @@ -1,83 +1,3 @@
-# Source: grafana/templates/podsecuritypolicy.yaml
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: grafana
- labels:
- app.kubernetes.io/name: grafana
- app.kubernetes.io/instance: grafana
- app.kubernetes.io/managed-by: Helm
- annotations:
- seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default,runtime/default'
- seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default'
- apparmor.security.beta.kubernetes.io/allowedProfileNames: 'runtime/default'
- apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default'
-spec:
- privileged: false
- allowPrivilegeEscalation: false
- requiredDropCapabilities:
- # Default set from Docker, with DAC_OVERRIDE and CHOWN
- - ALL
- volumes:
- - 'configMap'
- - 'emptyDir'
- - 'projected'
- - 'csi'
- - 'secret'
- - 'downwardAPI'
- - 'persistentVolumeClaim'
- hostNetwork: false
- hostIPC: false
- hostPID: false
- runAsUser:
- rule: 'RunAsAny'
- seLinux:
- rule: 'RunAsAny'
- supplementalGroups:
- rule: 'MustRunAs'
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- fsGroup:
- rule: 'MustRunAs'
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- readOnlyRootFilesystem: false
----
-# Source: grafana/templates/tests/test-podsecuritypolicy.yaml
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: grafana-test
- labels:
- app.kubernetes.io/name: grafana
- app.kubernetes.io/instance: grafana
- app.kubernetes.io/managed-by: Helm
-spec:
- allowPrivilegeEscalation: true
- privileged: false
- hostNetwork: false
- hostIPC: false
- hostPID: false
- fsGroup:
- rule: RunAsAny
- seLinux:
- rule: RunAsAny
- supplementalGroups:
- rule: RunAsAny
- runAsUser:
- rule: RunAsAny
- volumes:
- - configMap
- - downwardAPI
- - emptyDir
- - projected
- - csi
- - secret
----
# Source: grafana/templates/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
@@ -334,7 +254,7 @@
@test "Test Health" {
url="http://grafana/api/health"
- code=$(wget --server-response --spider --timeout 10 --tries 1 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
+ code=$(wget --server-response --spider --timeout 90 --tries 10 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
[ "$code" == "200" ]
}
---
@@ -486,10 +406,10 @@
app.kubernetes.io/name: grafana
app.kubernetes.io/instance: grafana
annotations:
- checksum/config: 948846197f9e2ac9362c5344ed361a219bda24f1bcafae049315578628b98d57
- checksum/dashboards-json-config: 7aec669807c5de05de89034f14d103550d767e3632121e98a0f5c58c530eb3cb
- checksum/sc-dashboard-provider-config: 0e74904bc78332f49fcd2c76d51a1b22d1e597015e73de00106dc8553937faaa
- checksum/secret: 3f6963680875ad45e55726401a603845c39c69e2cdfdba6a1e6c42863a37401e
+ checksum/config: 33bd928d54f139851fc42892135d57e7e48ff98a6d57e3eb9e1c58249c58a6e4
+ checksum/dashboards-json-config: 5bbc78cfefa4cdc4ef6d1f51eb94b158347a165c248cd164e575bcc6252b1500
+ checksum/sc-dashboard-provider-config: 6c7b9916b3ac9df5fa853c8d3678928dfe856b830d094c823bff3b9e3b8da642
+ checksum/secret: 773f9bd0e1572e493e4727c2fb48c3f4c99e0cfc1cc750940ded53f144989764
spec:
serviceAccountName: grafana
automountServiceAccountToken: true
@@ -579,7 +499,7 @@
- name: sc-datasources-volume
mountPath: "/etc/grafana/provisioning/datasources"
- name: grafana
- image: "grafana/grafana:9.0.5"
+ image: "grafana/grafana:9.1.2"
imagePullPolicy: IfNotPresent
volumeMounts:
- name: config |
9b67fa4 to
a39cff3
Compare
|
Path: @@ -1,83 +1,3 @@
-# Source: grafana/templates/podsecuritypolicy.yaml
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: grafana
- labels:
- app.kubernetes.io/name: grafana
- app.kubernetes.io/instance: grafana
- app.kubernetes.io/managed-by: Helm
- annotations:
- seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default,runtime/default'
- seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default'
- apparmor.security.beta.kubernetes.io/allowedProfileNames: 'runtime/default'
- apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default'
-spec:
- privileged: false
- allowPrivilegeEscalation: false
- requiredDropCapabilities:
- # Default set from Docker, with DAC_OVERRIDE and CHOWN
- - ALL
- volumes:
- - 'configMap'
- - 'emptyDir'
- - 'projected'
- - 'csi'
- - 'secret'
- - 'downwardAPI'
- - 'persistentVolumeClaim'
- hostNetwork: false
- hostIPC: false
- hostPID: false
- runAsUser:
- rule: 'RunAsAny'
- seLinux:
- rule: 'RunAsAny'
- supplementalGroups:
- rule: 'MustRunAs'
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- fsGroup:
- rule: 'MustRunAs'
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- readOnlyRootFilesystem: false
----
-# Source: grafana/templates/tests/test-podsecuritypolicy.yaml
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: grafana-test
- labels:
- app.kubernetes.io/name: grafana
- app.kubernetes.io/instance: grafana
- app.kubernetes.io/managed-by: Helm
-spec:
- allowPrivilegeEscalation: true
- privileged: false
- hostNetwork: false
- hostIPC: false
- hostPID: false
- fsGroup:
- rule: RunAsAny
- seLinux:
- rule: RunAsAny
- supplementalGroups:
- rule: RunAsAny
- runAsUser:
- rule: RunAsAny
- volumes:
- - configMap
- - downwardAPI
- - emptyDir
- - projected
- - csi
- - secret
----
# Source: grafana/templates/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
@@ -334,7 +254,7 @@
@test "Test Health" {
url="http://grafana/api/health"
- code=$(wget --server-response --spider --timeout 10 --tries 1 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
+ code=$(wget --server-response --spider --timeout 90 --tries 10 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
[ "$code" == "200" ]
}
---
@@ -486,10 +406,10 @@
app.kubernetes.io/name: grafana
app.kubernetes.io/instance: grafana
annotations:
- checksum/config: 948846197f9e2ac9362c5344ed361a219bda24f1bcafae049315578628b98d57
- checksum/dashboards-json-config: 7aec669807c5de05de89034f14d103550d767e3632121e98a0f5c58c530eb3cb
- checksum/sc-dashboard-provider-config: 0e74904bc78332f49fcd2c76d51a1b22d1e597015e73de00106dc8553937faaa
- checksum/secret: 3f6963680875ad45e55726401a603845c39c69e2cdfdba6a1e6c42863a37401e
+ checksum/config: 651555d106d32db494e4501117ff524edab05aff2363ce52ff2a6eb3d872076d
+ checksum/dashboards-json-config: e3e12f3887eeed0c34b1827e1208dedae94b79f01799b3bf570d1c95d1fe9b13
+ checksum/sc-dashboard-provider-config: a95e49d408d033d67604dba77d437576aec4205800efa24a1f46d4bc004f6322
+ checksum/secret: 6eb2c972e2c92b424ab4ef7763555679f6e32a2337ed89782709b4a7c368996e
spec:
serviceAccountName: grafana
automountServiceAccountToken: true
@@ -505,7 +425,6 @@
runAsNonRoot: false
runAsUser: 0
command: ["chown", "-R", "472:472", "/var/lib/grafana"]
- resources: {}
volumeMounts:
- name: storage
mountPath: "/var/lib/grafana"
@@ -514,7 +433,6 @@
imagePullPolicy: IfNotPresent
command: ["/bin/sh"]
args: ["-c", "mkdir -p /var/lib/grafana/dashboards/default && /bin/sh -x /etc/grafana/download_dashboards.sh"]
- resources: {}
env:
volumeMounts:
- name: config
@@ -542,7 +460,6 @@
value: "ALL"
- name: FOLDER_ANNOTATION
value: "grafana_folder"
- resources: {}
volumeMounts:
- name: sc-dashboard-volume
mountPath: "/tmp/dashboards"
@@ -574,12 +491,11 @@
value: http://localhost:3000/api/admin/provisioning/datasources/reload
- name: REQ_METHOD
value: POST
- resources: {}
volumeMounts:
- name: sc-datasources-volume
mountPath: "/etc/grafana/provisioning/datasources"
- name: grafana
- image: "grafana/grafana:9.0.5"
+ image: "grafana/grafana:9.1.2"
imagePullPolicy: IfNotPresent
volumeMounts:
- name: config
@@ -647,7 +563,6 @@
httpGet:
path: /api/health
port: 3000
- resources: {}
volumes:
- name: config
configMap: |
a39cff3 to
7c794aa
Compare
|
Path: @@ -1,83 +1,3 @@
-# Source: grafana/templates/podsecuritypolicy.yaml
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: grafana
- labels:
- app.kubernetes.io/name: grafana
- app.kubernetes.io/instance: grafana
- app.kubernetes.io/managed-by: Helm
- annotations:
- seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default,runtime/default'
- seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default'
- apparmor.security.beta.kubernetes.io/allowedProfileNames: 'runtime/default'
- apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default'
-spec:
- privileged: false
- allowPrivilegeEscalation: false
- requiredDropCapabilities:
- # Default set from Docker, with DAC_OVERRIDE and CHOWN
- - ALL
- volumes:
- - 'configMap'
- - 'emptyDir'
- - 'projected'
- - 'csi'
- - 'secret'
- - 'downwardAPI'
- - 'persistentVolumeClaim'
- hostNetwork: false
- hostIPC: false
- hostPID: false
- runAsUser:
- rule: 'RunAsAny'
- seLinux:
- rule: 'RunAsAny'
- supplementalGroups:
- rule: 'MustRunAs'
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- fsGroup:
- rule: 'MustRunAs'
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- readOnlyRootFilesystem: false
----
-# Source: grafana/templates/tests/test-podsecuritypolicy.yaml
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: grafana-test
- labels:
- app.kubernetes.io/name: grafana
- app.kubernetes.io/instance: grafana
- app.kubernetes.io/managed-by: Helm
-spec:
- allowPrivilegeEscalation: true
- privileged: false
- hostNetwork: false
- hostIPC: false
- hostPID: false
- fsGroup:
- rule: RunAsAny
- seLinux:
- rule: RunAsAny
- supplementalGroups:
- rule: RunAsAny
- runAsUser:
- rule: RunAsAny
- volumes:
- - configMap
- - downwardAPI
- - emptyDir
- - projected
- - csi
- - secret
----
# Source: grafana/templates/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
@@ -334,7 +254,7 @@
@test "Test Health" {
url="http://grafana/api/health"
- code=$(wget --server-response --spider --timeout 10 --tries 1 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
+ code=$(wget --server-response --spider --timeout 90 --tries 10 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
[ "$code" == "200" ]
}
---
@@ -486,10 +406,10 @@
app.kubernetes.io/name: grafana
app.kubernetes.io/instance: grafana
annotations:
- checksum/config: 948846197f9e2ac9362c5344ed361a219bda24f1bcafae049315578628b98d57
- checksum/dashboards-json-config: 7aec669807c5de05de89034f14d103550d767e3632121e98a0f5c58c530eb3cb
- checksum/sc-dashboard-provider-config: 0e74904bc78332f49fcd2c76d51a1b22d1e597015e73de00106dc8553937faaa
- checksum/secret: 3f6963680875ad45e55726401a603845c39c69e2cdfdba6a1e6c42863a37401e
+ checksum/config: 0efd9149984f58307ab83836c280f2e51aa9ed137e1f38d06890a009c172cf0f
+ checksum/dashboards-json-config: f9d2d846a57985665407b1e1888bb571ca3f61b96d20f424f2c5dafb3812f375
+ checksum/sc-dashboard-provider-config: fb2b6c8857a62d57cceb0f337e88778b90816a4b959716cc93e9913ffaa9d85e
+ checksum/secret: 9d5e96a75b40077e1350b0195a66309006250988a24dba6f6ea2d8c403882da6
spec:
serviceAccountName: grafana
automountServiceAccountToken: true
@@ -505,7 +425,6 @@
runAsNonRoot: false
runAsUser: 0
command: ["chown", "-R", "472:472", "/var/lib/grafana"]
- resources: {}
volumeMounts:
- name: storage
mountPath: "/var/lib/grafana"
@@ -514,7 +433,6 @@
imagePullPolicy: IfNotPresent
command: ["/bin/sh"]
args: ["-c", "mkdir -p /var/lib/grafana/dashboards/default && /bin/sh -x /etc/grafana/download_dashboards.sh"]
- resources: {}
env:
volumeMounts:
- name: config
@@ -542,7 +460,6 @@
value: "ALL"
- name: FOLDER_ANNOTATION
value: "grafana_folder"
- resources: {}
volumeMounts:
- name: sc-dashboard-volume
mountPath: "/tmp/dashboards"
@@ -574,12 +491,11 @@
value: http://localhost:3000/api/admin/provisioning/datasources/reload
- name: REQ_METHOD
value: POST
- resources: {}
volumeMounts:
- name: sc-datasources-volume
mountPath: "/etc/grafana/provisioning/datasources"
- name: grafana
- image: "grafana/grafana:9.0.5"
+ image: "grafana/grafana:9.1.4"
imagePullPolicy: IfNotPresent
volumeMounts:
- name: config
@@ -647,7 +563,6 @@
httpGet:
path: /api/health
port: 3000
- resources: {}
volumes:
- name: config
configMap: |
7c794aa to
1664ad6
Compare
|
Path: @@ -1,83 +1,3 @@
-# Source: grafana/templates/podsecuritypolicy.yaml
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: grafana
- labels:
- app.kubernetes.io/name: grafana
- app.kubernetes.io/instance: grafana
- app.kubernetes.io/managed-by: Helm
- annotations:
- seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default,runtime/default'
- seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default'
- apparmor.security.beta.kubernetes.io/allowedProfileNames: 'runtime/default'
- apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default'
-spec:
- privileged: false
- allowPrivilegeEscalation: false
- requiredDropCapabilities:
- # Default set from Docker, with DAC_OVERRIDE and CHOWN
- - ALL
- volumes:
- - 'configMap'
- - 'emptyDir'
- - 'projected'
- - 'csi'
- - 'secret'
- - 'downwardAPI'
- - 'persistentVolumeClaim'
- hostNetwork: false
- hostIPC: false
- hostPID: false
- runAsUser:
- rule: 'RunAsAny'
- seLinux:
- rule: 'RunAsAny'
- supplementalGroups:
- rule: 'MustRunAs'
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- fsGroup:
- rule: 'MustRunAs'
- ranges:
- # Forbid adding the root group.
- - min: 1
- max: 65535
- readOnlyRootFilesystem: false
----
-# Source: grafana/templates/tests/test-podsecuritypolicy.yaml
-apiVersion: policy/v1beta1
-kind: PodSecurityPolicy
-metadata:
- name: grafana-test
- labels:
- app.kubernetes.io/name: grafana
- app.kubernetes.io/instance: grafana
- app.kubernetes.io/managed-by: Helm
-spec:
- allowPrivilegeEscalation: true
- privileged: false
- hostNetwork: false
- hostIPC: false
- hostPID: false
- fsGroup:
- rule: RunAsAny
- seLinux:
- rule: RunAsAny
- supplementalGroups:
- rule: RunAsAny
- runAsUser:
- rule: RunAsAny
- volumes:
- - configMap
- - downwardAPI
- - emptyDir
- - projected
- - csi
- - secret
----
# Source: grafana/templates/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
@@ -334,7 +254,7 @@
@test "Test Health" {
url="http://grafana/api/health"
- code=$(wget --server-response --spider --timeout 10 --tries 1 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
+ code=$(wget --server-response --spider --timeout 90 --tries 10 ${url} 2>&1 | awk '/^ HTTP/{print $2}')
[ "$code" == "200" ]
}
---
@@ -486,10 +406,10 @@
app.kubernetes.io/name: grafana
app.kubernetes.io/instance: grafana
annotations:
- checksum/config: 948846197f9e2ac9362c5344ed361a219bda24f1bcafae049315578628b98d57
- checksum/dashboards-json-config: 7aec669807c5de05de89034f14d103550d767e3632121e98a0f5c58c530eb3cb
- checksum/sc-dashboard-provider-config: 0e74904bc78332f49fcd2c76d51a1b22d1e597015e73de00106dc8553937faaa
- checksum/secret: 3f6963680875ad45e55726401a603845c39c69e2cdfdba6a1e6c42863a37401e
+ checksum/config: 9a58cf7c56eb9d2ba6537337af4d0f88f907787cb632211573e2ed2c2adb089c
+ checksum/dashboards-json-config: 8b3ac9577345289f182a05245de5f4322b517983d1e2cc9cb0a30022d6ce8c04
+ checksum/sc-dashboard-provider-config: 6e33f8c1ed064e796e928d44fb56314105f3e7c758e47975e6dd7fa3265803c3
+ checksum/secret: 478da69efdc1e4056341adc9761dc343160393de3d4e426b28fb49d718430efd
spec:
serviceAccountName: grafana
automountServiceAccountToken: true
@@ -505,7 +425,6 @@
runAsNonRoot: false
runAsUser: 0
command: ["chown", "-R", "472:472", "/var/lib/grafana"]
- resources: {}
volumeMounts:
- name: storage
mountPath: "/var/lib/grafana"
@@ -514,7 +433,6 @@
imagePullPolicy: IfNotPresent
command: ["/bin/sh"]
args: ["-c", "mkdir -p /var/lib/grafana/dashboards/default && /bin/sh -x /etc/grafana/download_dashboards.sh"]
- resources: {}
env:
volumeMounts:
- name: config
@@ -532,8 +450,6 @@
value: WATCH
- name: LABEL
value: "grafana_dashboard"
- - name: LOG_LEVEL
- value: "INFO"
- name: FOLDER
value: "/tmp/dashboards"
- name: RESOURCE
@@ -542,7 +458,6 @@
value: "ALL"
- name: FOLDER_ANNOTATION
value: "grafana_folder"
- resources: {}
volumeMounts:
- name: sc-dashboard-volume
mountPath: "/tmp/dashboards"
@@ -574,12 +489,11 @@
value: http://localhost:3000/api/admin/provisioning/datasources/reload
- name: REQ_METHOD
value: POST
- resources: {}
volumeMounts:
- name: sc-datasources-volume
mountPath: "/etc/grafana/provisioning/datasources"
- name: grafana
- image: "grafana/grafana:9.0.5"
+ image: "grafana/grafana:9.1.4"
imagePullPolicy: IfNotPresent
volumeMounts:
- name: config
@@ -647,7 +561,6 @@
httpGet:
path: /api/health
port: 3000
- resources: {}
volumes:
- name: config
configMap: |
This PR contains the following updates:
6.33.0->6.38.0Release Notes
grafana/helm-charts
v6.38.0Compare Source
The leading tool for querying and visualizing time series and metrics.
v6.37.3Compare Source
The leading tool for querying and visualizing time series and metrics.
v6.37.2Compare Source
The leading tool for querying and visualizing time series and metrics.
v6.37.1Compare Source
The leading tool for querying and visualizing time series and metrics.
v6.37.0Compare Source
The leading tool for querying and visualizing time series and metrics.
v6.36.3Compare Source
The leading tool for querying and visualizing time series and metrics.
v6.36.2Compare Source
The leading tool for querying and visualizing time series and metrics.
v6.36.1Compare Source
The leading tool for querying and visualizing time series and metrics.
v6.35.0Compare Source
The leading tool for querying and visualizing time series and metrics.
v6.34.0Compare Source
The leading tool for querying and visualizing time series and metrics.
v6.33.2Compare Source
The leading tool for querying and visualizing time series and metrics.
v6.33.1Compare Source
The leading tool for querying and visualizing time series and metrics.
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.