You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat(sec) - customize service account mounting (#283)
It's best practice to disable automounting the service
account tokens. In heavily audited environments there
is often an admission controller preventing pods starting
that have automountServiceAccountToken enabled on the
service account. They require it specified on the pod
instead.
This change makes that behaviour configurable per SA
and pod.
| annotations | object |`{}`| Annotations to add to the all the resources |
33
+
| clusterName | string |`"cluster.local"`| Override the default name of cluster - Can be found in /etc/kubernetes/admin.conf: clusters -> cluster -> name |
24
34
| extraVolumes | list |`[]`| A list of volumes to be added to the pod |
25
35
| fullnameOverride | string |`""`| Overwrite all resources name created by the chart |
26
36
| imagePullSecrets | list |`[]`| List of secret names to use for pulling the images |
| opencost.exporter.collectorDataSource.networkPort | int |`3001`| The port at which network pods are open to egress |
73
+
| opencost.exporter.collectorDataSource.retentionResolution10m | int |`36`| The number of 10m intervals the Collector DataSource should maintain |
74
+
| opencost.exporter.collectorDataSource.retentionResolution1d | int |`15`| The number of 1d intervals the Collector DataSource should maintain |
75
+
| opencost.exporter.collectorDataSource.retentionResolution1h | int |`49`| The number of 1h intervals the Collector DataSource should maintain |
76
+
| opencost.exporter.collectorDataSource.scrapeInterval | string |`"30s"`| define the interval at which the collector scrapes for data points (10s, 15s, 1m) |
61
77
| opencost.exporter.csv_path | string |`""`||
62
78
| opencost.exporter.defaultClusterId | string |`"default-cluster"`| Default cluster ID to use if cluster_id is not set in Prometheus metrics. |
63
79
| opencost.exporter.env | list |`[]`| List of additional environment variables to set in the container |
| opencost.nodeSelector | object |`{}`| Node labels for pod assignment |
133
+
| opencost.platforms.openshift.createMonitoringClusterRoleBinding | bool |`false`| If true, the helm chart will create a ClusterRoleBinding to grant the OpenCost ServiceAccount access to query Prometheus. |
134
+
| opencost.platforms.openshift.createMonitoringResourceReaderRoleBinding | bool |`false`| If true, create a Role and RoleBinding to allow Prometheus to list and watch OpenCost resources. |
| opencost.platforms.openshift.enableSCC | bool |`false`| If true, set Security Context Constraints on serviceaccount for read/write premissions |
137
+
| opencost.platforms.openshift.enabled | bool |`false`| Enable OpenShift specific configurations |
138
+
| opencost.platforms.openshift.monitoringServiceAccountName | string |`"prometheus-k8s"`| Name of the Prometheus serviceaccount to bind to the Resource Reader Role Binding. |
139
+
| opencost.platforms.openshift.monitoringServiceAccountNamespace | string |`"openshift-monitoring"`| Namespace of the Prometheus serviceaccount to bind to the Resource Reader Role Binding. |
116
140
| opencost.prometheus.amp.enabled | bool |`false`| Use Amazon Managed Service for Prometheus (AMP) |
117
141
| opencost.prometheus.amp.workspaceId | string |`""`| Workspace ID for AMP |
| opencost.prometheus.internal.enabled | bool |`true`| Use in-cluster Prometheus |
124
148
| opencost.prometheus.internal.namespaceName | string |`"prometheus-system"`| Namespace of in-cluster Prometheus |
125
149
| opencost.prometheus.internal.port | int |`80`| Service port of in-cluster Prometheus |
150
+
| opencost.prometheus.internal.scheme | string |`"http"`| Scheme to use for in-cluster Prometheus |
126
151
| opencost.prometheus.internal.serviceName | string |`"prometheus-server"`| Service name of in-cluster Prometheus |
152
+
| opencost.prometheus.kubeRBACProxy | bool |`false`| If true, opencost will use kube-rbac-proxy to authenticate with in cluster Prometheus for openshift |
| opencost.prometheus.username_key | string |`"DB_BASIC_AUTH_USERNAME"`| Key in the secret that references the username |
141
-
| opencost.platforms.openshift.enabled | bool |`false`| Enable OpenShift specific configurations |
142
-
| opencost.platforms.openshift.createMonitoringClusterRoleBinding | bool |`false`| Create a ClusterRoleBinding to grant the OpenCost ServiceAccount access to query Prometheus. (Only when using in-cluster prometheus) |
143
-
| opencost.platforms.openshift.createMonitoringResourceReaderRoleBinding | bool |`false`| Create a Role and RoleBinding to allow Prometheus to list and watch OpenCost resources. (Only when using in-cluster prometheus) |
144
-
| opencost.platforms.openshift.monitoringServiceAccountName | string |`prometheus-k8s`| Name of the Prometheus serviceaccount to bind to the Resource Reader Role Binding. (Only when using in-cluster prometheus) |
145
-
| opencost.platforms.openshift.monitoringServiceAccountNamespace | string |`openshift-monitoring`| Namespace of the Prometheus serviceaccount to bind to the Resource Reader Role Binding.. (Only when using in-cluster prometheus) |
0 commit comments