diff --git a/charts/k8s-reporter/README.md b/charts/k8s-reporter/README.md index 5f5881c2c..1c887704e 100644 --- a/charts/k8s-reporter/README.md +++ b/charts/k8s-reporter/README.md @@ -4,7 +4,7 @@ title: Kubernetes Reporter Helm Chart # k8s-reporter -![Version: 1.9.0](https://img.shields.io/badge/Version-1.8.0-informational?style=flat-square) +![Version: 1.9.0](https://img.shields.io/badge/Version-1.9.0-informational?style=flat-square) A Helm chart for installing the Kosli K8S reporter as a cronjob. The chart allows you to create a Kubernetes cronjob and all its necessary RBAC to report running images to Kosli at a given cron schedule. @@ -93,10 +93,10 @@ helm uninstall kosli-reporter | reporterConfig.kosliOrg | string | `""` | the name of the Kosli org | | reporterConfig.namespaces | string | `""` | the namespaces to scan and report. It is a comma separated list of namespace names. leave this and namespacesRegex unset if you want to report what is running in the entire cluster | | reporterConfig.namespacesRegex | string | `""` | the namespaces Regex patterns to scan and report. Does not have effect if namespaces is set. Requires cluster-wide permissions. It is a comma separated list of namespace regex patterns. leave this and namespaces unset if you want to report what is running in the entire cluster | -| reporterConfig.securityContext | object | `{"allowPrivilegeEscalation":false,"runAsNonRoot":true,"runAsUser":1000}` | the security context for the reporter cronjob | +| reporterConfig.securityContext | object | `{"allowPrivilegeEscalation":false,"runAsNonRoot":true,"runAsUser":1000}` | the security context for the reporter cronjob Set to null or {} to disable security context entirely (not recommended) For OpenShift, you can omit runAsUser to let OpenShift assign the UID | | reporterConfig.securityContext.allowPrivilegeEscalation | bool | `false` | whether to allow privilege escalation | | reporterConfig.securityContext.runAsNonRoot | bool | `true` | whether to run as non root | -| reporterConfig.securityContext.runAsUser | int | `1000` | the user id to run as | +| reporterConfig.securityContext.runAsUser | int | `1000` | the user id to run as Omit this field for OpenShift environments to allow automatic UID assignment | | resources.limits.cpu | string | `"100m"` | the cpu limit | | resources.limits.memory | string | `"256Mi"` | the memory limit | | resources.requests.memory | string | `"64Mi"` | the memory request | diff --git a/docs.kosli.com/content/helm/_index.md b/docs.kosli.com/content/helm/_index.md index df5bf7209..1c887704e 100644 --- a/docs.kosli.com/content/helm/_index.md +++ b/docs.kosli.com/content/helm/_index.md @@ -4,7 +4,7 @@ title: Kubernetes Reporter Helm Chart # k8s-reporter -![Version: 1.8.0](https://img.shields.io/badge/Version-1.8.0-informational?style=flat-square) +![Version: 1.9.0](https://img.shields.io/badge/Version-1.9.0-informational?style=flat-square) A Helm chart for installing the Kosli K8S reporter as a cronjob. The chart allows you to create a Kubernetes cronjob and all its necessary RBAC to report running images to Kosli at a given cron schedule. @@ -93,10 +93,10 @@ helm uninstall kosli-reporter | reporterConfig.kosliOrg | string | `""` | the name of the Kosli org | | reporterConfig.namespaces | string | `""` | the namespaces to scan and report. It is a comma separated list of namespace names. leave this and namespacesRegex unset if you want to report what is running in the entire cluster | | reporterConfig.namespacesRegex | string | `""` | the namespaces Regex patterns to scan and report. Does not have effect if namespaces is set. Requires cluster-wide permissions. It is a comma separated list of namespace regex patterns. leave this and namespaces unset if you want to report what is running in the entire cluster | -| reporterConfig.securityContext | object | `{"allowPrivilegeEscalation":false,"runAsNonRoot":true,"runAsUser":1000}` | the security context for the reporter cronjob | +| reporterConfig.securityContext | object | `{"allowPrivilegeEscalation":false,"runAsNonRoot":true,"runAsUser":1000}` | the security context for the reporter cronjob Set to null or {} to disable security context entirely (not recommended) For OpenShift, you can omit runAsUser to let OpenShift assign the UID | | reporterConfig.securityContext.allowPrivilegeEscalation | bool | `false` | whether to allow privilege escalation | | reporterConfig.securityContext.runAsNonRoot | bool | `true` | whether to run as non root | -| reporterConfig.securityContext.runAsUser | int | `1000` | the user id to run as | +| reporterConfig.securityContext.runAsUser | int | `1000` | the user id to run as Omit this field for OpenShift environments to allow automatic UID assignment | | resources.limits.cpu | string | `"100m"` | the cpu limit | | resources.limits.memory | string | `"256Mi"` | the memory limit | | resources.requests.memory | string | `"64Mi"` | the memory request |