Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions charts/airbyte/templates/airbyte-db.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -56,6 +56,9 @@ spec:
value: /var/lib/postgresql/data/pgdata
ports:
- containerPort: 5432
{{ if .Values.postgresql.resources }}
resources: {{- toYaml .Values.postgresql.resources | nindent 12 }}
{{- end }}
securityContext: {{- toYaml .Values.postgresql.containerSecurityContext | nindent 12 }}
volumeMounts:
- name: airbyte-volume-db
Expand Down
47 changes: 29 additions & 18 deletions charts/airbyte/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ global:
image:
# Docker registry to pull platform images from, e.g. http://my-registry:8000/
registry: ""
# Image tag to use for airbyte images.
# Image tag to use for airbyte images.
# Does not include non-airbyte images such as temporal, minio, etc.
tag: ""

Expand All @@ -46,7 +46,7 @@ global:
emailSecretKey: "instance-admin-email"
# -- The key within `passwordSecretName` where the initial user's password is stored
passwordSecretKey: "instance-admin-password"

# -- SSO Identify Provider configuration; (requires Enterprise)
#identityProvider:
# # -- Secret name where the OIDC configuration is stored
Expand Down Expand Up @@ -237,7 +237,7 @@ webapp:
fsGroup: 1000

containerSecurityContext:
allowPrivilegeEscalation: false
allowPrivilegeEscalation: false
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
Expand Down Expand Up @@ -463,7 +463,7 @@ server:
fsGroup: 1000

containerSecurityContext:
allowPrivilegeEscalation: false
allowPrivilegeEscalation: false
runAsNonRoot: true
# uid=1000(airbyte)
runAsUser: 1000
Expand Down Expand Up @@ -645,7 +645,7 @@ worker:
fsGroup: 1000

containerSecurityContext:
allowPrivilegeEscalation: false
allowPrivilegeEscalation: false
runAsNonRoot: true
# uid=1000(airbyte)
runAsUser: 1000
Expand Down Expand Up @@ -780,7 +780,7 @@ workload-launcher:
fsGroup: 1000

containerSecurityContext:
allowPrivilegeEscalation: false
allowPrivilegeEscalation: false
runAsNonRoot: true
# uid=1000(airbyte)
runAsUser: 1000
Expand Down Expand Up @@ -1080,7 +1080,7 @@ metrics:
fsGroup: 1000

containerSecurityContext:
allowPrivilegeEscalation: false
allowPrivilegeEscalation: false
runAsNonRoot: true
# uid=1000(airbyte)
runAsUser: 1000
Expand Down Expand Up @@ -1202,7 +1202,7 @@ airbyte-bootloader:
fsGroup: 1000

containerSecurityContext:
allowPrivilegeEscalation: false
allowPrivilegeEscalation: false
runAsNonRoot: true
# uid=1000(airbyte)
runAsUser: 1000
Expand Down Expand Up @@ -1333,7 +1333,7 @@ temporal:
fsGroup: 1000

containerSecurityContext:
allowPrivilegeEscalation: false
allowPrivilegeEscalation: false
runAsNonRoot: true
# uid=1000(temporal)
runAsUser: 1000
Expand Down Expand Up @@ -1577,7 +1577,7 @@ postgresql:
fsGroup: 70
containerSecurityContext:
# -- Ensures the container will run with a non-root user
allowPrivilegeEscalation: false
allowPrivilegeEscalation: false
runAsNonRoot: true
# uid=70(postgres)
runAsUser: 70
Expand All @@ -1588,6 +1588,17 @@ postgresql:
drop: ["ALL"]
seccompProfile:
type: RuntimeDefault
resources:
## Example:
## limits:
## cpu: 200m
## memory: 1Gi
limits: {}
## Examples:
## requests:
## memory: 256Mi
## cpu: 250m
requests: {}

commonAnnotations:
# -- It will determine when the hook should be rendered
Expand Down Expand Up @@ -1656,7 +1667,7 @@ cron:
fsGroup: 1000

containerSecurityContext:
allowPrivilegeEscalation: false
allowPrivilegeEscalation: false
runAsNonRoot: true
# uid=1000(airbyte)
runAsUser: 1000
Expand Down Expand Up @@ -1827,7 +1838,7 @@ connector-builder-server:
fsGroup: 1000

containerSecurityContext:
allowPrivilegeEscalation: false
allowPrivilegeEscalation: false
runAsNonRoot: true
# uid=1000(airbyte)
runAsUser: 1000
Expand Down Expand Up @@ -1926,7 +1937,7 @@ keycloak:
image: "postgres:13-alpine"

initContainerSecurityContext:
allowPrivilegeEscalation: false
allowPrivilegeEscalation: false
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
Expand All @@ -1935,9 +1946,9 @@ keycloak:
drop: ["ALL"]
seccompProfile:
type: RuntimeDefault

containerSecurityContext:
allowPrivilegeEscalation: false
allowPrivilegeEscalation: false
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
Expand Down Expand Up @@ -1971,7 +1982,7 @@ keycloak-setup:
fsGroup: 1000

initContainerSecurityContext:
allowPrivilegeEscalation: false
allowPrivilegeEscalation: false
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
Expand All @@ -1982,7 +1993,7 @@ keycloak-setup:
type: RuntimeDefault

containerSecurityContext:
allowPrivilegeEscalation: false
allowPrivilegeEscalation: false
runAsNonRoot: true
# uid=1000(airbyte)
runAsUser: 1000
Expand Down Expand Up @@ -2024,7 +2035,7 @@ workload-api-server:
fsGroup: 1000

containerSecurityContext:
allowPrivilegeEscalation: false
allowPrivilegeEscalation: false
runAsNonRoot: true
# uid=1000(airbyte)
runAsUser: 1000
Expand Down
Loading