You've already forked prometheus-fail2ban-exporter-charts
							
							Compare commits
	
		
			43 Commits
		
	
	
		
			0.2.0
			...
			00231f462b
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 
						
						
							
						
						00231f462b
	
				 | 
					
					
						|||
| 
						
						
							
						
						9e962fbffd
	
				 | 
					
					
						|||
| 
						
						
							
						
						63125f1849
	
				 | 
					
					
						|||
| 
						
						
							
						
						65d2452df4
	
				 | 
					
					
						|||
| 
						
						
							
						
						2885f08ed6
	
				 | 
					
					
						|||
| 
						
						
							
						
						5ca76168e6
	
				 | 
					
					
						|||
| 
						
						
							
						
						0591f3c6ee
	
				 | 
					
					
						|||
| 
						
						
							
						
						ec1e7f7b7a
	
				 | 
					
					
						|||
| 
						
						
							
						
						ea0183bb1b
	
				 | 
					
					
						|||
| 
						
						
							
						
						36492ede79
	
				 | 
					
					
						|||
| 
						
						
							
						
						660cbdb3a8
	
				 | 
					
					
						|||
| 
						
						
							
						
						9298cbdd2c
	
				 | 
					
					
						|||
| 
						
						
							
						
						6aa80bc0cf
	
				 | 
					
					
						|||
| 
						
						
							
						
						a702f8678f
	
				 | 
					
					
						|||
| 
						
						
							
						
						e7ccd21400
	
				 | 
					
					
						|||
| 
						
						
							
						
						e97e6695d7
	
				 | 
					
					
						|||
| 
						
						
							
						
						1f45cd0eda
	
				 | 
					
					
						|||
| 
						
						
							
						
						ec402f5490
	
				 | 
					
					
						|||
| 
						
						
							
						
						7db144b527
	
				 | 
					
					
						|||
| 
						
						
							
						
						e9dcea3568
	
				 | 
					
					
						|||
| 
						
						
							
						
						9053f2b406
	
				 | 
					
					
						|||
| 
						
						
							
						
						356bc276a7
	
				 | 
					
					
						|||
| 
						
						
							
						
						5b3fb80716
	
				 | 
					
					
						|||
| 
						
						
							
						
						4a2b968daf
	
				 | 
					
					
						|||
| 
						
						
							
						
						fb69f54dd8
	
				 | 
					
					
						|||
| 
						
						
							
						
						58cf0244a0
	
				 | 
					
					
						|||
| 
						
						
							
						
						85fca15ad6
	
				 | 
					
					
						|||
| 
						
						
							
						
						27bc608b4e
	
				 | 
					
					
						|||
| 
						
						
							
						
						6e9548ba92
	
				 | 
					
					
						|||
| 
						
						
							
						
						da0daf74aa
	
				 | 
					
					
						|||
| 
						
						
							
						
						7f921ff1eb
	
				 | 
					
					
						|||
| 
						
						
							
						
						f8cf436855
	
				 | 
					
					
						|||
| 
						
						
							
						
						a17476a942
	
				 | 
					
					
						|||
| 
						
						
							
						
						f99a401095
	
				 | 
					
					
						|||
| 
						
						
							
						
						76d6979ad3
	
				 | 
					
					
						|||
| 
						
						
							
						
						59a5f5ba0b
	
				 | 
					
					
						|||
| 
						
						
							
						
						203eea0181
	
				 | 
					
					
						|||
| 
						
						
							
						
						d36990bcf1
	
				 | 
					
					
						|||
| 
						
						
							
						
						493e0b684e
	
				 | 
					
					
						|||
| 
						
						
							
						
						93de55e1a5
	
				 | 
					
					
						|||
| 
						
						
							
						
						e3b2ab35be
	
				 | 
					
					
						|||
| 
						
						
							
						
						cddb286bf6
	
				 | 
					
					
						|||
| 
						
						
							
						
						7578a7a525
	
				 | 
					
					
						
@@ -15,7 +15,7 @@ on:
 | 
			
		||||
jobs:
 | 
			
		||||
  generate-parameters:
 | 
			
		||||
    container:
 | 
			
		||||
      image: docker.io/library/node:22.13.0-alpine
 | 
			
		||||
      image: docker.io/library/node:24.1.0-alpine
 | 
			
		||||
    runs-on:
 | 
			
		||||
    - ubuntu-latest
 | 
			
		||||
    steps:
 | 
			
		||||
 
 | 
			
		||||
@@ -13,7 +13,7 @@ on:
 | 
			
		||||
jobs:
 | 
			
		||||
  helm-lint:
 | 
			
		||||
    container:
 | 
			
		||||
      image: docker.io/volkerraschek/helm:3.16.4
 | 
			
		||||
      image: docker.io/volkerraschek/helm:3.18.0
 | 
			
		||||
    runs-on:
 | 
			
		||||
    - ubuntu-latest
 | 
			
		||||
    steps:
 | 
			
		||||
@@ -28,7 +28,7 @@ jobs:
 | 
			
		||||
 | 
			
		||||
  helm-unittest:
 | 
			
		||||
    container:
 | 
			
		||||
      image: docker.io/volkerraschek/helm:3.16.4
 | 
			
		||||
      image: docker.io/volkerraschek/helm:3.18.0
 | 
			
		||||
    runs-on:
 | 
			
		||||
    - ubuntu-latest
 | 
			
		||||
    steps:
 | 
			
		||||
 
 | 
			
		||||
@@ -15,7 +15,7 @@ on:
 | 
			
		||||
jobs:
 | 
			
		||||
  markdown-link-checker:
 | 
			
		||||
    container:
 | 
			
		||||
      image: docker.io/library/node:22.13.0-alpine
 | 
			
		||||
      image: docker.io/library/node:24.1.0-alpine
 | 
			
		||||
    runs-on:
 | 
			
		||||
    - ubuntu-latest
 | 
			
		||||
    steps:
 | 
			
		||||
@@ -31,7 +31,7 @@ jobs:
 | 
			
		||||
 | 
			
		||||
  markdown-lint:
 | 
			
		||||
    container:
 | 
			
		||||
      image: docker.io/library/node:22.13.0-alpine
 | 
			
		||||
      image: docker.io/library/node:24.1.0-alpine
 | 
			
		||||
    runs-on:
 | 
			
		||||
    - ubuntu-latest
 | 
			
		||||
    steps:
 | 
			
		||||
 
 | 
			
		||||
@@ -8,7 +8,7 @@ on:
 | 
			
		||||
jobs:
 | 
			
		||||
  publish-chart:
 | 
			
		||||
    container:
 | 
			
		||||
      image: docker.io/volkerraschek/helm:3.16.4
 | 
			
		||||
      image: docker.io/volkerraschek/helm:3.18.0
 | 
			
		||||
    runs-on: ubuntu-latest
 | 
			
		||||
    steps:
 | 
			
		||||
      - name: Install tooling
 | 
			
		||||
 
 | 
			
		||||
@@ -4,7 +4,7 @@ description: Prometheus metric exporter for Fail2Ban
 | 
			
		||||
type: application
 | 
			
		||||
kubeVersion: ">=1.20.0"
 | 
			
		||||
version: "0.1.0"
 | 
			
		||||
appVersion: "0.1.0"
 | 
			
		||||
appVersion: "0.1.1"
 | 
			
		||||
 | 
			
		||||
# icon: https://annotations.example.com/icon.png
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										4
									
								
								Makefile
									
									
									
									
									
								
							
							
						
						
									
										4
									
								
								Makefile
									
									
									
									
									
								
							@@ -4,13 +4,13 @@ CONTAINER_RUNTIME?=$(shell which podman)
 | 
			
		||||
# HELM_IMAGE
 | 
			
		||||
HELM_IMAGE_REGISTRY_HOST?=docker.io
 | 
			
		||||
HELM_IMAGE_REPOSITORY?=volkerraschek/helm
 | 
			
		||||
HELM_IMAGE_VERSION?=3.16.1 # renovate: datasource=docker registryUrl=https://docker.io depName=volkerraschek/helm
 | 
			
		||||
HELM_IMAGE_VERSION?=3.18.0 # renovate: datasource=docker registryUrl=https://docker.io depName=volkerraschek/helm
 | 
			
		||||
HELM_IMAGE_FULLY_QUALIFIED=${HELM_IMAGE_REGISTRY_HOST}/${HELM_IMAGE_REPOSITORY}:${HELM_IMAGE_VERSION}
 | 
			
		||||
 | 
			
		||||
# NODE_IMAGE
 | 
			
		||||
NODE_IMAGE_REGISTRY_HOST?=docker.io
 | 
			
		||||
NODE_IMAGE_REPOSITORY?=library/node
 | 
			
		||||
NODE_IMAGE_VERSION?=22.9.0-alpine # renovate: datasource=docker registryUrl=https://docker.io depName=library/node
 | 
			
		||||
NODE_IMAGE_VERSION?=24.1.0-alpine # renovate: datasource=docker registryUrl=https://docker.io depName=docker.io/library/node packageName=library/node
 | 
			
		||||
NODE_IMAGE_FULLY_QUALIFIED=${NODE_IMAGE_REGISTRY_HOST}/${NODE_IMAGE_REPOSITORY}:${NODE_IMAGE_VERSION}
 | 
			
		||||
 | 
			
		||||
# MISSING DOT
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										84
									
								
								README.md
									
									
									
									
									
								
							
							
						
						
									
										84
									
								
								README.md
									
									
									
									
									
								
							@@ -1,6 +1,5 @@
 | 
			
		||||
# Prometheus Fail2Ban exporter
 | 
			
		||||
 | 
			
		||||
[](https://drone.cryptic.systems/volker.raschek/prometheus-fail2ban-exporter)
 | 
			
		||||
[](https://artifacthub.io/packages/search?repo=prometheus-exporters)
 | 
			
		||||
 | 
			
		||||
This helm chart enables the deployment of a Prometheus metrics exporter for Fail2Ban and allows the individual
 | 
			
		||||
@@ -20,7 +19,7 @@ helm chart is tested for deployment scenarios with **ArgoCD**.
 | 
			
		||||
## Helm: configuration and installation
 | 
			
		||||
 | 
			
		||||
1. A helm chart repository must be configured, to pull the helm charts from.
 | 
			
		||||
2. All available parameters are [here](#parameters) in detail documented. The parameters can be defined via the helm
 | 
			
		||||
2. All available [parameters](#parameters) are documented in detail below. The parameters can be defined via the helm
 | 
			
		||||
   `--set` flag or directly as part of a `values.yaml` file. The following example defines the `prometheus-exporter`
 | 
			
		||||
   repository and use the `--set` flag for a basic deployment.
 | 
			
		||||
 | 
			
		||||
@@ -43,7 +42,7 @@ version of the chart must be in sync with the `values.yaml`. Newer *minor* versi
 | 
			
		||||
versions can break something!
 | 
			
		||||
 | 
			
		||||
```bash
 | 
			
		||||
CHART_VERSION=0.1.0
 | 
			
		||||
CHART_VERSION=0.3.1
 | 
			
		||||
helm show values prometheus-exporters/prometheus-fail2ban-exporter --version "${CHART_VERSION}" > values.yaml
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
@@ -68,14 +67,17 @@ cannot use the available CPU time to perform computing operations.
 | 
			
		||||
 | 
			
		||||
The application must be informed that despite several CPUs only a part (limit) of the available computing time is
 | 
			
		||||
available. As this is a Golang application, this can be implemented using `GOMAXPROCS`. The following example is one way
 | 
			
		||||
of defining `GOMAXPROCS` automatically based on the defined CPU limit like `100m`. Please keep in mind, that the CFS
 | 
			
		||||
of defining `GOMAXPROCS` automatically based on the defined CPU limit like `1000m`. Please keep in mind, that the CFS
 | 
			
		||||
rate of `100ms` - default on each kubernetes node, is also very important to avoid CPU throttling.
 | 
			
		||||
 | 
			
		||||
Further information about this topic can be found [here](https://kanishk.io/posts/cpu-throttling-in-containerized-go-apps/).
 | 
			
		||||
Further information about this topic can be found in one of Kanishk's blog
 | 
			
		||||
[posts](https://kanishk.io/posts/cpu-throttling-in-containerized-go-apps/).
 | 
			
		||||
 | 
			
		||||
> [!NOTE]
 | 
			
		||||
> The environment variable `GOMAXPROCS` is set automatically, when a CPU limit is defined. An explicit configuration is
 | 
			
		||||
> not anymore required.
 | 
			
		||||
>
 | 
			
		||||
> Please take care the a CPU limit < `1000m` can also lead to CPU throttling. Please read the linked documentation carefully.
 | 
			
		||||
 | 
			
		||||
```bash
 | 
			
		||||
helm install prometheus-fail2ban-exporter prometheus-exporters/prometheus-fail2ban-exporter \
 | 
			
		||||
@@ -83,10 +85,11 @@ helm install prometheus-fail2ban-exporter prometheus-exporters/prometheus-fail2b
 | 
			
		||||
  --set 'prometheus.metrics.serviceMonitor.enabled=true' \
 | 
			
		||||
  --set 'daemonSet.fail2banExporter.env.name=GOMAXPROCS' \
 | 
			
		||||
  --set 'daemonSet.fail2banExporter.env.valueFrom.resourceFieldRef.resource=limits.cpu' \
 | 
			
		||||
  --set 'daemonSet.fail2banExporter.resources.limits.cpu=100m'
 | 
			
		||||
  --set 'daemonSet.fail2banExporter.resources.limits.cpu=1000m'
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
<!-- #### TLS authentication and encryption
 | 
			
		||||
<!--
 | 
			
		||||
#### TLS authentication and encryption
 | 
			
		||||
 | 
			
		||||
The first example shows how to deploy the metric exporter with TLS encryption. The verification of the custom TLS
 | 
			
		||||
certification will be skipped by Prometheus.
 | 
			
		||||
@@ -129,7 +132,8 @@ replaced:
 | 
			
		||||
+   --set 'Prometheus.metrics.serviceMonitor.tlsConfig.caFile=/etc/Prometheus/TLS/ca.crt' \
 | 
			
		||||
+   --set 'Prometheus.metrics.serviceMonitor.tlsConfig.certFile=/etc/Prometheus/TLS/TLS.crt' \
 | 
			
		||||
+   --set 'Prometheus.metrics.serviceMonitor.tlsConfig.keyFile=/etc/Prometheus/TLS/TLS.key'
 | 
			
		||||
``` -->
 | 
			
		||||
```
 | 
			
		||||
-->
 | 
			
		||||
 | 
			
		||||
#### Grafana dashboard
 | 
			
		||||
 | 
			
		||||
@@ -144,6 +148,56 @@ helm install prometheus-fail2ban-exporter prometheus-exporters/prometheus-fail2b
 | 
			
		||||
  --set 'grafana.enabled=true'
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
### Network policies
 | 
			
		||||
 | 
			
		||||
Network policies can only take effect, when the used CNI plugin support network policies. The chart supports no custom
 | 
			
		||||
network policy implementation of CNI plugins. It's support only the official API resource of `networking.k8s.io/v1`.
 | 
			
		||||
 | 
			
		||||
The object networkPolicies can contains multiple networkPolicy definitions. There is currently only one example
 | 
			
		||||
predefined - it's named `default`. Further networkPolicy rules can easy be added by defining additional objects. For example:
 | 
			
		||||
 | 
			
		||||
> [!NOTE]
 | 
			
		||||
> The structure of each custom network policy must be equal like that of default. For this reason don't forget to define
 | 
			
		||||
> `annotations`, `labels` and the other properties as well.
 | 
			
		||||
 | 
			
		||||
```yaml
 | 
			
		||||
networkPolicies:
 | 
			
		||||
  enabled: false
 | 
			
		||||
  default: {}
 | 
			
		||||
  my-custom-network-policy: {}
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
The example below is an excerpt of the `values.yaml` file. The network policy `default` contains ingress rules to allow
 | 
			
		||||
incoming traffic from Prometheus.
 | 
			
		||||
 | 
			
		||||
> [!IMPORTANT]
 | 
			
		||||
> Please keep in mind, that the namespace and pod selector labels can be different from environment to environment. For
 | 
			
		||||
> this reason, there is are not default network policy rules defined.
 | 
			
		||||
 | 
			
		||||
```yaml
 | 
			
		||||
networkPolicies:
 | 
			
		||||
  enabled: true
 | 
			
		||||
  default:
 | 
			
		||||
    enabled: true
 | 
			
		||||
    annotations: {}
 | 
			
		||||
    labels: {}
 | 
			
		||||
    policyTypes:
 | 
			
		||||
    - Egress
 | 
			
		||||
    - Ingress
 | 
			
		||||
    egress: []
 | 
			
		||||
    ingress:
 | 
			
		||||
    - from:
 | 
			
		||||
      - namespaceSelector:
 | 
			
		||||
          matchLabels:
 | 
			
		||||
            kubernetes.io/metadata.name: monitoring
 | 
			
		||||
        podSelector:
 | 
			
		||||
          matchLabels:
 | 
			
		||||
            app.kubernetes.io/name: prometheus
 | 
			
		||||
      ports:
 | 
			
		||||
      - port: http
 | 
			
		||||
        protocol: TCP
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
## Parameters
 | 
			
		||||
 | 
			
		||||
### Global
 | 
			
		||||
@@ -227,11 +281,17 @@ helm install prometheus-fail2ban-exporter prometheus-exporters/prometheus-fail2b
 | 
			
		||||
| --------------------- | ---------------------- | ----- |
 | 
			
		||||
| `podDisruptionBudget` | Pod disruption budget. | `{}`  |
 | 
			
		||||
 | 
			
		||||
### Network
 | 
			
		||||
### NetworkPolicies
 | 
			
		||||
 | 
			
		||||
| Name              | Description                                                                                                        | Value |
 | 
			
		||||
| ----------------- | ------------------------------------------------------------------------------------------------------------------ | ----- |
 | 
			
		||||
| `networkPolicies` | Deploy network policies based on the used container network interface (CNI) implementation - like calico or weave. | `{}`  |
 | 
			
		||||
| Name                                  | Description                                                                                           | Value   |
 | 
			
		||||
| ------------------------------------- | ----------------------------------------------------------------------------------------------------- | ------- |
 | 
			
		||||
| `networkPolicies.enabled`             | Enable network policies in general.                                                                   | `false` |
 | 
			
		||||
| `networkPolicies.default.enabled`     | Enable the network policy for accessing the application by default. For example to scape the metrics. | `false` |
 | 
			
		||||
| `networkPolicies.default.annotations` | Additional network policy annotations.                                                                | `{}`    |
 | 
			
		||||
| `networkPolicies.default.labels`      | Additional network policy labels.                                                                     | `{}`    |
 | 
			
		||||
| `networkPolicies.default.policyTypes` | List of policy types. Supported is ingress, egress or ingress and egress.                             | `[]`    |
 | 
			
		||||
| `networkPolicies.default.egress`      | Concrete egress network policy implementation.                                                        | `[]`    |
 | 
			
		||||
| `networkPolicies.default.ingress`     | Concrete ingress network policy implementation.                                                       | `[]`    |
 | 
			
		||||
 | 
			
		||||
### Prometheus
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										1183
									
								
								package-lock.json
									
									
									
										generated
									
									
									
								
							
							
						
						
									
										1183
									
								
								package-lock.json
									
									
									
										generated
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							@@ -16,6 +16,6 @@
 | 
			
		||||
  "devDependencies": {
 | 
			
		||||
    "@bitnami/readme-generator-for-helm": "^2.5.0",
 | 
			
		||||
    "markdown-link-check": "^3.13.6",
 | 
			
		||||
    "markdownlint-cli": "^0.43.0"
 | 
			
		||||
    "markdownlint-cli": "^0.45.0"
 | 
			
		||||
  }
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -1,6 +1,12 @@
 | 
			
		||||
{
 | 
			
		||||
  "$schema": "https://docs.renovatebot.com/renovate-schema.json",
 | 
			
		||||
  "assignees": [ "volker.raschek" ],
 | 
			
		||||
  "extends": [
 | 
			
		||||
    "local>volker.raschek/renovate-config:default#master",
 | 
			
		||||
    "local>volker.raschek/renovate-config:container#master",
 | 
			
		||||
    "local>volker.raschek/renovate-config:actions#master",
 | 
			
		||||
    "local>volker.raschek/renovate-config:npm#master",
 | 
			
		||||
    "local>volker.raschek/renovate-config:regexp#master"
 | 
			
		||||
  ],
 | 
			
		||||
  "customManagers": [
 | 
			
		||||
    {
 | 
			
		||||
      "fileMatch": [
 | 
			
		||||
@@ -25,21 +31,12 @@
 | 
			
		||||
      "versioningTemplate": "semver"
 | 
			
		||||
    }
 | 
			
		||||
  ],
 | 
			
		||||
  "labels": [ "renovate" ],
 | 
			
		||||
  "packageRules": [
 | 
			
		||||
    {
 | 
			
		||||
      "addLabels": [ "renovate/automerge", "renovate/npm" ],
 | 
			
		||||
      "automerge": true,
 | 
			
		||||
      "matchPackageNames": [
 | 
			
		||||
        "markdownlint-cli",
 | 
			
		||||
        "markdown-link-check",
 | 
			
		||||
        "@bitnami/readme-generator-for-helm"
 | 
			
		||||
      "addLabels": [
 | 
			
		||||
        "renovate/automerge",
 | 
			
		||||
        "renovate/container"
 | 
			
		||||
      ],
 | 
			
		||||
      "matchManagers": [ "npm" ],
 | 
			
		||||
      "matchUpdateTypes": [ "minor", "patch"]
 | 
			
		||||
    },
 | 
			
		||||
    {
 | 
			
		||||
      "addLabels": [ "renovate/automerge", "renovate/container" ],
 | 
			
		||||
      "automerge": true,
 | 
			
		||||
      "excludePackagePatterns": [
 | 
			
		||||
        "volker.raschek/prometheus-fail2ban-exporter"
 | 
			
		||||
@@ -51,8 +48,21 @@
 | 
			
		||||
        "minor",
 | 
			
		||||
        "patch"
 | 
			
		||||
      ]
 | 
			
		||||
    },
 | 
			
		||||
    {
 | 
			
		||||
      "addLabels": [
 | 
			
		||||
        "renovate/automerge",
 | 
			
		||||
        "renovate/documentation"
 | 
			
		||||
      ],
 | 
			
		||||
      "automerge": true,
 | 
			
		||||
      "matchDepNames": [
 | 
			
		||||
        "volker.raschek/prometheus-fail2ban-exporter-charts"
 | 
			
		||||
      ],
 | 
			
		||||
      "matchUpdateTypes": [
 | 
			
		||||
        "major",
 | 
			
		||||
        "minor",
 | 
			
		||||
        "patch"
 | 
			
		||||
      ]
 | 
			
		||||
    }
 | 
			
		||||
  ],
 | 
			
		||||
  "rebaseLabel": "renovate/rebase",
 | 
			
		||||
  "rebaseWhen": "behind-base-branch"
 | 
			
		||||
  ]
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										19
									
								
								templates/prometheus-fail2ban-exporter/_networkPolicies.tpl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										19
									
								
								templates/prometheus-fail2ban-exporter/_networkPolicies.tpl
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,19 @@
 | 
			
		||||
{{/* vim: set filetype=mustache: */}}
 | 
			
		||||
 | 
			
		||||
{{/* annotations */}}
 | 
			
		||||
 | 
			
		||||
{{- define "prometheus-fail2ban-exporter.networkPolicies.annotations" -}}
 | 
			
		||||
{{ include "prometheus-fail2ban-exporter.annotations" .context }}
 | 
			
		||||
{{- if .networkPolicy.annotations }}
 | 
			
		||||
{{ toYaml .networkPolicy.annotations }}
 | 
			
		||||
{{- end }}
 | 
			
		||||
{{- end }}
 | 
			
		||||
 | 
			
		||||
{{/* labels */}}
 | 
			
		||||
 | 
			
		||||
{{- define "prometheus-fail2ban-exporter.networkPolicies.labels" -}}
 | 
			
		||||
{{ include "prometheus-fail2ban-exporter.labels" .context }}
 | 
			
		||||
{{- if .networkPolicy.labels }}
 | 
			
		||||
{{ toYaml .networkPolicy.labels }}
 | 
			
		||||
{{- end }}
 | 
			
		||||
{{- end }}
 | 
			
		||||
@@ -5,7 +5,7 @@ kind: ConfigMap
 | 
			
		||||
metadata:
 | 
			
		||||
  {{- with (include "prometheus-fail2ban-exporter.configMap.grafanaDashboards.fail2banExporter.annotations" . | fromYaml) }}
 | 
			
		||||
  annotations:
 | 
			
		||||
    {{- tpl (. | toYaml) $ | nindent 4 }}
 | 
			
		||||
    {{- tpl (toYaml .) $ | nindent 4 }}
 | 
			
		||||
  {{- end }}
 | 
			
		||||
  {{- with (include "prometheus-fail2ban-exporter.configMap.grafanaDashboards.fail2banExporter.labels" . | fromYaml) }}
 | 
			
		||||
  labels:
 | 
			
		||||
 
 | 
			
		||||
@@ -3,7 +3,7 @@ kind: DaemonSet
 | 
			
		||||
metadata:
 | 
			
		||||
  {{- with (include "prometheus-fail2ban-exporter.daemonSet.annotations" . | fromYaml) }}
 | 
			
		||||
  annotations:
 | 
			
		||||
    {{- tpl (. | toYaml) $ | nindent 4 }}
 | 
			
		||||
    {{- tpl (toYaml .) $ | nindent 4 }}
 | 
			
		||||
  {{- end }}
 | 
			
		||||
  {{- with (include "prometheus-fail2ban-exporter.daemonSet.labels" . | fromYaml) }}
 | 
			
		||||
  labels:
 | 
			
		||||
 
 | 
			
		||||
@@ -5,7 +5,7 @@ kind: Ingress
 | 
			
		||||
metadata:
 | 
			
		||||
  {{- with (include "prometheus-fail2ban-exporter.ingress.annotations" . | fromYaml) }}
 | 
			
		||||
  annotations:
 | 
			
		||||
    {{- tpl (. | toYaml) $ | nindent 4 }}
 | 
			
		||||
    {{- tpl (toYaml .) $ | nindent 4 }}
 | 
			
		||||
  {{- end }}
 | 
			
		||||
  {{- with (include "prometheus-fail2ban-exporter.ingress.labels" . | fromYaml) }}
 | 
			
		||||
  labels:
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										36
									
								
								templates/prometheus-fail2ban-exporter/networkPolicies.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										36
									
								
								templates/prometheus-fail2ban-exporter/networkPolicies.yaml
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,36 @@
 | 
			
		||||
{{- if .Values.networkPolicies.enabled }}
 | 
			
		||||
{{- range $key, $value := .Values.networkPolicies -}}
 | 
			
		||||
{{- if and (not (eq $key "enabled")) $value.enabled }}
 | 
			
		||||
---
 | 
			
		||||
apiVersion: networking.k8s.io/v1
 | 
			
		||||
kind: NetworkPolicy
 | 
			
		||||
metadata:
 | 
			
		||||
  {{- with (include "prometheus-fail2ban-exporter.networkPolicies.annotations" (dict "networkPolicy" $value "context" $) | fromYaml) }}
 | 
			
		||||
  annotations:
 | 
			
		||||
    {{- toYaml . | nindent 4 }}
 | 
			
		||||
  {{- end }}
 | 
			
		||||
  {{- with (include "prometheus-fail2ban-exporter.networkPolicies.labels" (dict "networkPolicy" $value "context" $) | fromYaml) }}
 | 
			
		||||
  labels:
 | 
			
		||||
    {{- toYaml . | nindent 4 }}
 | 
			
		||||
  {{- end }}
 | 
			
		||||
  name: {{ printf "%s-%s" (include "prometheus-fail2ban-exporter.fullname" $ ) $key }}
 | 
			
		||||
  namespace: {{ $.Release.Namespace }}
 | 
			
		||||
spec:
 | 
			
		||||
  podSelector:
 | 
			
		||||
    matchLabels:
 | 
			
		||||
      {{- include "prometheus-fail2ban-exporter.pod.selectorLabels" $ | nindent 6 }}
 | 
			
		||||
  {{- with $value.policyTypes }}
 | 
			
		||||
  policyTypes:
 | 
			
		||||
  {{- toYaml . | nindent 2 }}
 | 
			
		||||
  {{- end }}
 | 
			
		||||
  {{- with $value.egress }}
 | 
			
		||||
  egress:
 | 
			
		||||
  {{- toYaml . | nindent 2 }}
 | 
			
		||||
  {{- end }}
 | 
			
		||||
  {{- with $value.ingress }}
 | 
			
		||||
  ingress:
 | 
			
		||||
  {{- toYaml . | nindent 2 }}
 | 
			
		||||
  {{- end }}
 | 
			
		||||
{{- end }}
 | 
			
		||||
{{- end }}
 | 
			
		||||
{{- end }}
 | 
			
		||||
							
								
								
									
										118
									
								
								unittests/networkPolicies/default.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										118
									
								
								unittests/networkPolicies/default.yaml
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,118 @@
 | 
			
		||||
chart:
 | 
			
		||||
  appVersion: 0.1.0
 | 
			
		||||
  version: 0.1.0
 | 
			
		||||
suite: NetworkPolicies template (basic)
 | 
			
		||||
release:
 | 
			
		||||
  name: prometheus-fail2ban-exporter-unittest
 | 
			
		||||
  namespace: testing
 | 
			
		||||
templates:
 | 
			
		||||
- templates/prometheus-fail2ban-exporter/networkPolicies.yaml
 | 
			
		||||
tests:
 | 
			
		||||
- it: Skip networkPolicies in general disabled.
 | 
			
		||||
  set:
 | 
			
		||||
    networkPolicies.enabled: false
 | 
			
		||||
  asserts:
 | 
			
		||||
  - hasDocuments:
 | 
			
		||||
      count: 0
 | 
			
		||||
 | 
			
		||||
- it: Skip networkPolicy 'default' when disabled.
 | 
			
		||||
  set:
 | 
			
		||||
    networkPolicies.enabled: true
 | 
			
		||||
    networkPolicies.default.enabled: false
 | 
			
		||||
  asserts:
 | 
			
		||||
  - hasDocuments:
 | 
			
		||||
      count: 0
 | 
			
		||||
 | 
			
		||||
- it: Loop over networkPolicies
 | 
			
		||||
  set:
 | 
			
		||||
    networkPolicies.enabled: true
 | 
			
		||||
    networkPolicies.default.enabled: false
 | 
			
		||||
    networkPolicies.nginx.enabled: true
 | 
			
		||||
    networkPolicies.prometheus.enabled: true
 | 
			
		||||
  asserts:
 | 
			
		||||
  - hasDocuments:
 | 
			
		||||
      count: 2
 | 
			
		||||
 | 
			
		||||
- it: Template networkPolicy 'default' without policyTypes, egress and ingress configuration
 | 
			
		||||
  set:
 | 
			
		||||
    networkPolicies.enabled: true
 | 
			
		||||
    networkPolicies.default.enabled: true
 | 
			
		||||
  asserts:
 | 
			
		||||
  - hasDocuments:
 | 
			
		||||
      count: 1
 | 
			
		||||
  - containsDocument:
 | 
			
		||||
      apiVersion: networking.k8s.io/v1
 | 
			
		||||
      kind: NetworkPolicy
 | 
			
		||||
      name: prometheus-fail2ban-exporter-unittest-default
 | 
			
		||||
      namespace: testing
 | 
			
		||||
  - notExists:
 | 
			
		||||
      path: metadata.annotations
 | 
			
		||||
  - equal:
 | 
			
		||||
      path: metadata.labels
 | 
			
		||||
      value:
 | 
			
		||||
        app.kubernetes.io/instance: prometheus-fail2ban-exporter-unittest
 | 
			
		||||
        app.kubernetes.io/managed-by: Helm
 | 
			
		||||
        app.kubernetes.io/name: prometheus-fail2ban-exporter
 | 
			
		||||
        app.kubernetes.io/version: 0.1.0
 | 
			
		||||
        helm.sh/chart: prometheus-fail2ban-exporter-0.1.0
 | 
			
		||||
  - equal:
 | 
			
		||||
      path: spec.podSelector.matchLabels
 | 
			
		||||
      value:
 | 
			
		||||
        app.kubernetes.io/instance: prometheus-fail2ban-exporter-unittest
 | 
			
		||||
        app.kubernetes.io/name: prometheus-fail2ban-exporter
 | 
			
		||||
  - notExists:
 | 
			
		||||
      path: spec.policyTypes
 | 
			
		||||
  - notExists:
 | 
			
		||||
      path: spec.egress
 | 
			
		||||
  - notExists:
 | 
			
		||||
      path: spec.ingress
 | 
			
		||||
 | 
			
		||||
- it: Template networkPolicy 'default' with policyTypes, egress and ingress configuration
 | 
			
		||||
  set:
 | 
			
		||||
    networkPolicies.enabled: true
 | 
			
		||||
    networkPolicies.default.enabled: true
 | 
			
		||||
    networkPolicies.default.policyTypes:
 | 
			
		||||
    - Egress
 | 
			
		||||
    - Ingress
 | 
			
		||||
    networkPolicies.default.ingress:
 | 
			
		||||
    - from:
 | 
			
		||||
      - namespaceSelector:
 | 
			
		||||
          matchLabels:
 | 
			
		||||
            kubernetes.io/metadata.name: khv-production
 | 
			
		||||
        podSelector:
 | 
			
		||||
          matchLabels:
 | 
			
		||||
            app.kubernetes.io/name: prometheus
 | 
			
		||||
    networkPolicies.default.egress:
 | 
			
		||||
    - to:
 | 
			
		||||
      - namespaceSelector:
 | 
			
		||||
          matchLabels:
 | 
			
		||||
            kubernetes.io/metadata.name: database
 | 
			
		||||
        podSelector:
 | 
			
		||||
          matchLabels:
 | 
			
		||||
            app.kubernetes.io/name: oracle
 | 
			
		||||
  asserts:
 | 
			
		||||
  - equal:
 | 
			
		||||
      path: spec.policyTypes
 | 
			
		||||
      value:
 | 
			
		||||
      - Egress
 | 
			
		||||
      - Ingress
 | 
			
		||||
  - equal:
 | 
			
		||||
      path: spec.egress
 | 
			
		||||
      value:
 | 
			
		||||
      - to:
 | 
			
		||||
        - namespaceSelector:
 | 
			
		||||
            matchLabels:
 | 
			
		||||
              kubernetes.io/metadata.name: database
 | 
			
		||||
          podSelector:
 | 
			
		||||
            matchLabels:
 | 
			
		||||
              app.kubernetes.io/name: oracle
 | 
			
		||||
  - equal:
 | 
			
		||||
      path: spec.ingress
 | 
			
		||||
      value:
 | 
			
		||||
      - from:
 | 
			
		||||
        - namespaceSelector:
 | 
			
		||||
            matchLabels:
 | 
			
		||||
              kubernetes.io/metadata.name: khv-production
 | 
			
		||||
          podSelector:
 | 
			
		||||
            matchLabels:
 | 
			
		||||
              app.kubernetes.io/name: prometheus
 | 
			
		||||
							
								
								
									
										50
									
								
								values.yaml
									
									
									
									
									
								
							
							
						
						
									
										50
									
								
								values.yaml
									
									
									
									
									
								
							@@ -270,9 +270,53 @@ podDisruptionBudget: {}
 | 
			
		||||
#  maxUnavailable: 1
 | 
			
		||||
#  minAvailable: 1
 | 
			
		||||
 | 
			
		||||
## @section Network
 | 
			
		||||
## @param networkPolicies Deploy network policies based on the used container network interface (CNI) implementation - like calico or weave.
 | 
			
		||||
networkPolicies: {}
 | 
			
		||||
## @section NetworkPolicies
 | 
			
		||||
## @param networkPolicies.enabled Enable network policies in general.
 | 
			
		||||
networkPolicies:
 | 
			
		||||
  enabled: false
 | 
			
		||||
 | 
			
		||||
  ## @param networkPolicies.default.enabled Enable the network policy for accessing the application by default. For example to scape the metrics.
 | 
			
		||||
  ## @param networkPolicies.default.annotations Additional network policy annotations.
 | 
			
		||||
  ## @param networkPolicies.default.labels Additional network policy labels.
 | 
			
		||||
  ## @param networkPolicies.default.policyTypes List of policy types. Supported is ingress, egress or ingress and egress.
 | 
			
		||||
  ## @param networkPolicies.default.egress Concrete egress network policy implementation.
 | 
			
		||||
  ## @skip networkPolicies.default.egress Skip individual egress configuration.
 | 
			
		||||
  ## @param networkPolicies.default.ingress Concrete ingress network policy implementation.
 | 
			
		||||
  ## @skip networkPolicies.default.ingress Skip individual ingress configuration.
 | 
			
		||||
  default:
 | 
			
		||||
    enabled: false
 | 
			
		||||
    annotations: {}
 | 
			
		||||
    labels: {}
 | 
			
		||||
    policyTypes: []
 | 
			
		||||
    # - Egress
 | 
			
		||||
    # - Ingress
 | 
			
		||||
    egress: []
 | 
			
		||||
    ingress: []
 | 
			
		||||
    # Allow incoming HTTP traffic from prometheus.
 | 
			
		||||
    #
 | 
			
		||||
    # - from:
 | 
			
		||||
    #   - namespaceSelector:
 | 
			
		||||
    #       matchLabels:
 | 
			
		||||
    #         kubernetes.io/metadata.name: monitoring
 | 
			
		||||
    #     podSelector:
 | 
			
		||||
    #       matchLabels:
 | 
			
		||||
    #         app.kubernetes.io/name: prometheus
 | 
			
		||||
    #   ports:
 | 
			
		||||
    #   - port: http
 | 
			
		||||
    #     protocol: TCP
 | 
			
		||||
 | 
			
		||||
    # Allow incoming HTTP traffic from ingress-nginx.
 | 
			
		||||
    #
 | 
			
		||||
    # - from:
 | 
			
		||||
    #   - namespaceSelector:
 | 
			
		||||
    #       matchLabels:
 | 
			
		||||
    #         kubernetes.io/metadata.name: ingress-nginx
 | 
			
		||||
    #     podSelector:
 | 
			
		||||
    #       matchLabels:
 | 
			
		||||
    #         app.kubernetes.io/name: ingress-nginx
 | 
			
		||||
    #   ports:
 | 
			
		||||
    #   - port: http
 | 
			
		||||
    #     protocol: TCP
 | 
			
		||||
 | 
			
		||||
## @section Prometheus
 | 
			
		||||
prometheus:
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user