1715 Commits

Author SHA1 Message Date
Zuul
f29fd53acb Merge "prometheus-alertmanager: Fix security context" 2019-04-23 14:35:45 +00:00
Zuul
0c1a144c1b Merge "prometheus-kube-state-metrics: Fix security context" 2019-04-23 14:35:44 +00:00
Zuul
a9af19a7da Merge "prometheus-node-exporter: Fix security context" 2019-04-23 14:35:43 +00:00
RAHUL KHIYANI
2cc0317fc3 Memcached: Fix security context
This PS adds the missing allowPrivilegeEscalation flag in container
securityContext

Change-Id: Ie10951bd43de563fec09795feedc0050dcd4ebbe
2019-04-23 13:29:44 +00:00
Zuul
d7830c55c6 Merge "Nagios: Fix security context" 2019-04-23 13:05:28 +00:00
RAHUL KHIYANI
cd99469454 Kibana: Fix security context
This PS fixes the use of the security context macros for the
Kibana chart.

Change-Id: Iaad821ac3df7e42eb52ba2f274fe47e4847d30af
2019-04-23 04:32:41 +00:00
RAHUL KHIYANI
e1c9a35230 Grafana: Add security context to chart and read-only-fs
This PS adds the security context macros to the grafana chart,
and moves the default to read-only-rootfs for all containers

Change-Id: Ie79e3bfc6af07b16cd53eddae17eceac3d9f8613
2019-04-23 03:22:21 +00:00
Zuul
c5eee25fbd Merge "prometheus-openstack-exporter: Fix security context" 2019-04-23 02:12:58 +00:00
Zuul
a0360d07ea Merge "Mariadb: Display error if user is not create" 2019-04-23 02:02:14 +00:00
RAHUL KHIYANI
916bdabee7 prometheus: Fix security context
This PS fixes the use of the security context macros for the
prometheus chart.

Change-Id: I0abb309132a9954a140cbf76463724c5e2c7c5f3
2019-04-23 00:00:36 +00:00
RAHUL KHIYANI
95bb125207 prometheus-alertmanager: Fix security context
This PS fixes the pod application name and also adds security context
to initcontainer

Change-Id: Ia7cd5057247b0a07f88406259d41601659688f1a
2019-04-22 15:59:36 -05:00
RAHUL KHIYANI
2cdcaa84b5 prometheus-openstack-exporter: Fix security context
This PS fixes the use of the security context macros for the
openstack-exporter chart.

Change-Id: I91e9f6810442477c167a07e2d8ffa4f01beb66d3
2019-04-22 18:35:32 +00:00
Zuul
5aa3d47398 Merge "ceph-rgw: Add pod/container security context" 2019-04-22 18:19:53 +00:00
Gupta, Sangeet (sg774j)
003f765e91 Mariadb: Display error if user is not create
This PS updates the create-mysql-user.sh to display the error
if the exporter user was not created successfully.

Change-Id: I03505b5fb569cda199c2803086b77206b810ea3f
2019-04-22 18:07:28 +00:00
Zuul
2f747ad6ba Merge "Libvirt: Fix security context" 2019-04-22 16:17:39 +00:00
rk0850
9ea6575ed9 ceph-rgw: Add pod/container security context
This updates the ceph-rgw  chart to include the pod
security context on the pod template

This also adds the container security context

Change-Id: Ic75a1decfe156e1e8aa2ebe38238f6b77abb71f8
2019-04-22 15:33:23 +00:00
RAHUL KHIYANI
0ae22f4c1c prometheus-kube-state-metrics: Fix security context
This PS fixes the application name to holistic manner

Change-Id: Ib68c6fc114962fd53a5fcd2ce9e79bfefd5d94a3
2019-04-22 10:29:33 -05:00
RAHUL KHIYANI
bc9bbe4e34 prometheus-node-exporter: Fix security context
This PS fixes the use of the security context macros for the
node-exporter chart.

Change-Id: I7009a5675096036ac9f214d70c853830b7132264
2019-04-22 10:17:38 -05:00
RAHUL KHIYANI
77f20875b5 Libvirt: Fix security context
This PS fixes the use of the security context macros for the
libvirt chart.

Change-Id: I3340742a0eaf9cffa9263642fd2b987363128ed5
2019-04-22 13:45:50 +00:00
Pete Birley
a6558281a1 Gate: Remove stable helm repo is present to improve build time
This PS remvoes the stable helm repo, if present, to improve the
build time of patches.

Change-Id: Id6ec86e5ff426994b12adf4ca8e80eda2e52f147
Signed-off-by: Pete Birley <pete@port.direct>
2019-04-22 07:27:12 -05:00
Steve Wilkerson
84c6931c98 Fix prometheus metrics gathering in postrun job
This adds '|| true' to the curl command for gathering metrics from
prometheus exporters in the postrun job. After the move to
minikube for single node jobs, the headless services for the
kubernetes components no longer work as intended. The addition of
'|| true' allows the post run job to continue through the list
of services tied to the prometheus exporters without the task
failing outright

Change-Id: I56f0f56b799c3df9b2bd66a2c2044d71473606e3
2019-04-22 12:02:11 +00:00
RAHUL KHIYANI
b8f5be0fce Nagios: Fix security context
This PS fixes the use of the security context macros for the
nagios chart.

Change-Id: Ibe7ca7b87153f4e5535b9c8b1bf1ba63edb5e3af
2019-04-22 01:16:29 -05:00
Zuul
274697f9cf Merge "Registry: Add pod/container security context" 2019-04-22 05:30:59 +00:00
Rahul Khiyani
8edaf9fa31 Registry: Add pod/container security context
This updates the registry chart to include the pod
security context on the pod template

This also adds the container security context

Change-Id: I36b6a2cf291dda2f991843c07ba116f3bf936d03
2019-04-21 17:52:21 -05:00
Zuul
8029fddf60 Merge "Ceph-Client: Add security context to chart and read-only-fs" 2019-04-21 20:47:49 +00:00
Zuul
291781e6de Merge "Ceph: Make /etc/ceph and /run emptydirs uniformly across all pods" 2019-04-21 20:32:59 +00:00
Zuul
e754a6dbd9 Merge "Calico: Fix security context" 2019-04-21 19:12:02 +00:00
Pete Birley
f569cf0d5c Ceph-Client: Add security context to chart and read-only-fs
This PS adds the security context macros to the ceph-client chart,
and moves the default to read-only-rootfs for all containers.

Change-Id: I2fe03f31cc59e1cda2bf0396ae6e3aca5c440a16
Signed-off-by: Pete Birley <pete@port.direct>
2019-04-21 19:06:24 +00:00
Pete Birley
dece008337 Ceph: Make /etc/ceph and /run emptydirs uniformly across all pods
This PS updates the ceph charts to make /etc/ceph an emptydir
uniformly across all charts, both ensuring no default config is loaded,
and also permitting read-only filesystems to back the containers.

Additionally /run is uniformly applied across all long running pods
as a memory backed emptydir.

Change-Id: I00d1b15758b7eb4476fb950ddcb38db9a5149ad0
Signed-off-by: Pete Birley <pete@port.direct>
2019-04-21 19:06:18 +00:00
Zuul
b4f9df436f Merge "OpenvSwitch: use security context macros" 2019-04-21 15:48:40 +00:00
Zuul
ac7543b4e9 Merge "OvS: Improve security options for ovs-db pod" 2019-04-21 15:48:39 +00:00
Pete Birley
eb58abb880 Calico: Fix security context
This PS fixes the use of the security context macros for the
calico chart.

Change-Id: I2ed8a5e994726b625d76a2c308895441c7d174a9
Signed-off-by: Pete Birley <pete@port.direct>
2019-04-21 15:46:16 +00:00
Zuul
4e3359a931 Merge "Postgresql-exporter: Add security context for pod/container" 2019-04-21 10:48:05 +00:00
Zuul
513867511f Merge "Revert "readOnlyFilesystem: true for nagios chart"" 2019-04-21 10:41:53 +00:00
Zuul
6b03d346a2 Merge "This commit adds docker-default apparmor profile for prometheus-openstack-exporter." 2019-04-21 04:58:26 +00:00
Pete Birley
358af71da7 OpenvSwitch: use security context macros
This PS updates to use security context macros from HTK, in line
with other charts.

Change-Id: I5ca0af17eccc4856baef871cf199554aad075ebe
Signed-off-by: Pete Birley <pete@port.direct>
2019-04-21 04:16:50 +00:00
Rahul Khiyani
7aaae02f1d Postgresql-exporter: Add security context for pod/container
This adds a security context to the postgresql exporter, which
changes the pod's user from root to the nobody user instead

This also adds the container security context to set
allowPrivilegeEscalation to false and readOnlyRootFilesystem to true

Change-Id: Ibe49f77ed2d0a588b5abe175318edd1c82a57cca
2019-04-21 03:17:57 +00:00
Randeep Jalli
8ed0c1dd2b This commit adds docker-default apparmor profile for prometheus-openstack-exporter.
Change-Id: I1461246505f42c41051cebd981217c0064d39928
2019-04-21 03:17:18 +00:00
Pete Birley
d83ab26d04 OvS: Improve security options for ovs-db pod
This PS improves the securityu options for the ovs-db pod
by specifying running as a non-root user, using read only
filesystems for the containers and also preventing
privilege escalation. A subsequent ps will move to use the
helm toolkit functions that allow the control of these params.

Change-Id: I94fbf5b851be68f6fb4a1f9809ad12776e8a80b3
Signed-off-by: Pete Birley <pete@port.direct>
2019-04-21 03:16:46 +00:00
Pete Birley
8ebb89180f HTK: Remove helm test rally user by default following run
This PS updates the helm test script to remove the rally user by
default following a test run.

Change-Id: I5a28244f8f8bd8ef485cb45cc922601d631adff1
Depends-On: https://review.openstack.org/#/c/643206/
Signed-off-by: Pete Birley <pete@port.direct>
2019-04-21 03:09:29 +00:00
Zuul
d27e548f8f Merge "OSH-Infra: Add emptydirs for tmp" 2019-04-21 02:21:11 +00:00
Pete Birley
2abf62ff4d OSH-Infra: Add emptydirs for tmp
This PS adds emptydirs backing the /tmp directory in pods, which
is required in most cases for full operation when using a read only
filesystem backing the container.

Additionally some yaml indent issues are resolved.

Change-Id: I8b7f1614da059783254aa6efc09facf23fca3cad
Signed-off-by: Pete Birley <pete@port.direct>
2019-04-20 20:50:59 +00:00
Zuul
596732f16b Merge "Gate: Gather previous pod logs for failed containers" 2019-04-20 20:34:17 +00:00
Zuul
2e15054947 Merge "This commit adds docker-default apparmor profile for prometheus-node-exporter." 2019-04-20 20:34:16 +00:00
Zuul
aba5b7584d Merge "Prometheus: Add pod/container security context" 2019-04-20 20:29:32 +00:00
Zuul
7b539caf89 Merge "Revert "readOnlyFilesystem: true for elasticsearch chart"" 2019-04-20 19:32:49 +00:00
Randeep Jalli
ccfd614141 This commit adds docker-default apparmor profile for prometheus-node-exporter.
Change-Id: Ie8660e206280184eb5f4c03b7dd54047436c16ba
2019-04-20 19:01:20 +00:00
Steve Wilkerson
cc8c78dd6c Gate: Gather previous pod logs for failed containers
This updates the post-run pod logs task to gather logs from any
failed containers, allowing for identifying issues associated with
pods that fail to start in the gate jobs

Change-Id: I9195f319a064f84f62d2aa558df05f8f81b9abea
2019-04-20 18:59:12 +00:00
Rahul Khiyani
f25e458515 Prometheus: Add pod/container security context
This updates the prometheus chart to include the pod
security context on the pod template. This changes the pod's
user from root to the nobody user instead

This also adds the container security context to explicitly set
allowPrivilegeEscalation to false and readOnlyRootFilesystem to true

Change-Id: I2a3a4b77d9b25c086dc23b4fd66dca92872c422d
2019-04-20 18:54:44 +00:00
Rahul Khiyani
5e1ecd9840 Revert "readOnlyRootFilesystem: true for kibana chart"
This reverts commit 244f177ecb2574e8984b8590655af491e49420b4.

removing readOnlyRootFilesystem flag since pods are running to "crashLoopBackOff" state by implementing HTK functionality

when we have set the readOnly flag at pod without HTK functionality the changes were not effected. That is why it passed the gate.

Change-Id: I6920956b881fa358a37003d21a7b76602e2ac61c
2019-04-20 03:36:25 +00:00