You've already forked prometheus-fail2ban-exporter-charts
							
							Compare commits
	
		
			49 Commits
		
	
	
		
			0.2.0
			...
			553d8e11b5
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 
						
						
							
						
						553d8e11b5
	
				 | 
					
					
						|||
| 
						
						
							
						
						d8efe91340
	
				 | 
					
					
						|||
| 
						
						
							
						
						5833d4de38
	
				 | 
					
					
						|||
| 
						
						
							
						
						38b4f95a1f
	
				 | 
					
					
						|||
| 
						
						
							
						
						51ee91fed1
	
				 | 
					
					
						|||
| c0416cdf48 | |||
| 
						
						
							
						
						00231f462b
	
				 | 
					
					
						|||
| 
						
						
							
						
						9e962fbffd
	
				 | 
					
					
						|||
| 
						
						
							
						
						63125f1849
	
				 | 
					
					
						|||
| 
						
						
							
						
						65d2452df4
	
				 | 
					
					
						|||
| 
						
						
							
						
						2885f08ed6
	
				 | 
					
					
						|||
| 
						
						
							
						
						5ca76168e6
	
				 | 
					
					
						|||
| 
						
						
							
						
						0591f3c6ee
	
				 | 
					
					
						|||
| 
						
						
							
						
						ec1e7f7b7a
	
				 | 
					
					
						|||
| 
						
						
							
						
						ea0183bb1b
	
				 | 
					
					
						|||
| 
						
						
							
						
						36492ede79
	
				 | 
					
					
						|||
| 
						
						
							
						
						660cbdb3a8
	
				 | 
					
					
						|||
| 
						
						
							
						
						9298cbdd2c
	
				 | 
					
					
						|||
| 
						
						
							
						
						6aa80bc0cf
	
				 | 
					
					
						|||
| 
						
						
							
						
						a702f8678f
	
				 | 
					
					
						|||
| 
						
						
							
						
						e7ccd21400
	
				 | 
					
					
						|||
| 
						
						
							
						
						e97e6695d7
	
				 | 
					
					
						|||
| 
						
						
							
						
						1f45cd0eda
	
				 | 
					
					
						|||
| 
						
						
							
						
						ec402f5490
	
				 | 
					
					
						|||
| 
						
						
							
						
						7db144b527
	
				 | 
					
					
						|||
| 
						
						
							
						
						e9dcea3568
	
				 | 
					
					
						|||
| 
						
						
							
						
						9053f2b406
	
				 | 
					
					
						|||
| 
						
						
							
						
						356bc276a7
	
				 | 
					
					
						|||
| 
						
						
							
						
						5b3fb80716
	
				 | 
					
					
						|||
| 
						
						
							
						
						4a2b968daf
	
				 | 
					
					
						|||
| 
						
						
							
						
						fb69f54dd8
	
				 | 
					
					
						|||
| 
						
						
							
						
						58cf0244a0
	
				 | 
					
					
						|||
| 
						
						
							
						
						85fca15ad6
	
				 | 
					
					
						|||
| 
						
						
							
						
						27bc608b4e
	
				 | 
					
					
						|||
| 
						
						
							
						
						6e9548ba92
	
				 | 
					
					
						|||
| 
						
						
							
						
						da0daf74aa
	
				 | 
					
					
						|||
| 
						
						
							
						
						7f921ff1eb
	
				 | 
					
					
						|||
| 
						
						
							
						
						f8cf436855
	
				 | 
					
					
						|||
| 
						
						
							
						
						a17476a942
	
				 | 
					
					
						|||
| 
						
						
							
						
						f99a401095
	
				 | 
					
					
						|||
| 
						
						
							
						
						76d6979ad3
	
				 | 
					
					
						|||
| 
						
						
							
						
						59a5f5ba0b
	
				 | 
					
					
						|||
| 
						
						
							
						
						203eea0181
	
				 | 
					
					
						|||
| 
						
						
							
						
						d36990bcf1
	
				 | 
					
					
						|||
| 
						
						
							
						
						493e0b684e
	
				 | 
					
					
						|||
| 
						
						
							
						
						93de55e1a5
	
				 | 
					
					
						|||
| 
						
						
							
						
						e3b2ab35be
	
				 | 
					
					
						|||
| 
						
						
							
						
						cddb286bf6
	
				 | 
					
					
						|||
| 
						
						
							
						
						7578a7a525
	
				 | 
					
					
						
@@ -15,7 +15,7 @@ on:
 | 
				
			|||||||
jobs:
 | 
					jobs:
 | 
				
			||||||
  generate-parameters:
 | 
					  generate-parameters:
 | 
				
			||||||
    container:
 | 
					    container:
 | 
				
			||||||
      image: docker.io/library/node:22.13.0-alpine
 | 
					      image: docker.io/library/node:24.1.0-alpine
 | 
				
			||||||
    runs-on:
 | 
					    runs-on:
 | 
				
			||||||
    - ubuntu-latest
 | 
					    - ubuntu-latest
 | 
				
			||||||
    steps:
 | 
					    steps:
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -13,7 +13,7 @@ on:
 | 
				
			|||||||
jobs:
 | 
					jobs:
 | 
				
			||||||
  helm-lint:
 | 
					  helm-lint:
 | 
				
			||||||
    container:
 | 
					    container:
 | 
				
			||||||
      image: docker.io/volkerraschek/helm:3.16.4
 | 
					      image: docker.io/volkerraschek/helm:3.18.1
 | 
				
			||||||
    runs-on:
 | 
					    runs-on:
 | 
				
			||||||
    - ubuntu-latest
 | 
					    - ubuntu-latest
 | 
				
			||||||
    steps:
 | 
					    steps:
 | 
				
			||||||
@@ -28,7 +28,7 @@ jobs:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
  helm-unittest:
 | 
					  helm-unittest:
 | 
				
			||||||
    container:
 | 
					    container:
 | 
				
			||||||
      image: docker.io/volkerraschek/helm:3.16.4
 | 
					      image: docker.io/volkerraschek/helm:3.18.1
 | 
				
			||||||
    runs-on:
 | 
					    runs-on:
 | 
				
			||||||
    - ubuntu-latest
 | 
					    - ubuntu-latest
 | 
				
			||||||
    steps:
 | 
					    steps:
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -15,7 +15,7 @@ on:
 | 
				
			|||||||
jobs:
 | 
					jobs:
 | 
				
			||||||
  markdown-link-checker:
 | 
					  markdown-link-checker:
 | 
				
			||||||
    container:
 | 
					    container:
 | 
				
			||||||
      image: docker.io/library/node:22.13.0-alpine
 | 
					      image: docker.io/library/node:24.1.0-alpine
 | 
				
			||||||
    runs-on:
 | 
					    runs-on:
 | 
				
			||||||
    - ubuntu-latest
 | 
					    - ubuntu-latest
 | 
				
			||||||
    steps:
 | 
					    steps:
 | 
				
			||||||
@@ -31,7 +31,7 @@ jobs:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
  markdown-lint:
 | 
					  markdown-lint:
 | 
				
			||||||
    container:
 | 
					    container:
 | 
				
			||||||
      image: docker.io/library/node:22.13.0-alpine
 | 
					      image: docker.io/library/node:24.1.0-alpine
 | 
				
			||||||
    runs-on:
 | 
					    runs-on:
 | 
				
			||||||
    - ubuntu-latest
 | 
					    - ubuntu-latest
 | 
				
			||||||
    steps:
 | 
					    steps:
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -8,7 +8,7 @@ on:
 | 
				
			|||||||
jobs:
 | 
					jobs:
 | 
				
			||||||
  publish-chart:
 | 
					  publish-chart:
 | 
				
			||||||
    container:
 | 
					    container:
 | 
				
			||||||
      image: docker.io/volkerraschek/helm:3.16.4
 | 
					      image: docker.io/volkerraschek/helm:3.18.1
 | 
				
			||||||
    runs-on: ubuntu-latest
 | 
					    runs-on: ubuntu-latest
 | 
				
			||||||
    steps:
 | 
					    steps:
 | 
				
			||||||
      - name: Install tooling
 | 
					      - name: Install tooling
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -2,9 +2,8 @@ apiVersion: v2
 | 
				
			|||||||
name: prometheus-fail2ban-exporter
 | 
					name: prometheus-fail2ban-exporter
 | 
				
			||||||
description: Prometheus metric exporter for Fail2Ban
 | 
					description: Prometheus metric exporter for Fail2Ban
 | 
				
			||||||
type: application
 | 
					type: application
 | 
				
			||||||
kubeVersion: ">=1.20.0"
 | 
					 | 
				
			||||||
version: "0.1.0"
 | 
					version: "0.1.0"
 | 
				
			||||||
appVersion: "0.1.0"
 | 
					appVersion: "0.1.1"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# icon: https://annotations.example.com/icon.png
 | 
					# icon: https://annotations.example.com/icon.png
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										4
									
								
								Makefile
									
									
									
									
									
								
							
							
						
						
									
										4
									
								
								Makefile
									
									
									
									
									
								
							@@ -4,13 +4,13 @@ CONTAINER_RUNTIME?=$(shell which podman)
 | 
				
			|||||||
# HELM_IMAGE
 | 
					# HELM_IMAGE
 | 
				
			||||||
HELM_IMAGE_REGISTRY_HOST?=docker.io
 | 
					HELM_IMAGE_REGISTRY_HOST?=docker.io
 | 
				
			||||||
HELM_IMAGE_REPOSITORY?=volkerraschek/helm
 | 
					HELM_IMAGE_REPOSITORY?=volkerraschek/helm
 | 
				
			||||||
HELM_IMAGE_VERSION?=3.16.1 # renovate: datasource=docker registryUrl=https://docker.io depName=volkerraschek/helm
 | 
					HELM_IMAGE_VERSION?=3.18.1 # renovate: datasource=docker registryUrl=https://docker.io depName=volkerraschek/helm
 | 
				
			||||||
HELM_IMAGE_FULLY_QUALIFIED=${HELM_IMAGE_REGISTRY_HOST}/${HELM_IMAGE_REPOSITORY}:${HELM_IMAGE_VERSION}
 | 
					HELM_IMAGE_FULLY_QUALIFIED=${HELM_IMAGE_REGISTRY_HOST}/${HELM_IMAGE_REPOSITORY}:${HELM_IMAGE_VERSION}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# NODE_IMAGE
 | 
					# NODE_IMAGE
 | 
				
			||||||
NODE_IMAGE_REGISTRY_HOST?=docker.io
 | 
					NODE_IMAGE_REGISTRY_HOST?=docker.io
 | 
				
			||||||
NODE_IMAGE_REPOSITORY?=library/node
 | 
					NODE_IMAGE_REPOSITORY?=library/node
 | 
				
			||||||
NODE_IMAGE_VERSION?=22.9.0-alpine # renovate: datasource=docker registryUrl=https://docker.io depName=library/node
 | 
					NODE_IMAGE_VERSION?=24.1.0-alpine # renovate: datasource=docker registryUrl=https://docker.io depName=docker.io/library/node packageName=library/node
 | 
				
			||||||
NODE_IMAGE_FULLY_QUALIFIED=${NODE_IMAGE_REGISTRY_HOST}/${NODE_IMAGE_REPOSITORY}:${NODE_IMAGE_VERSION}
 | 
					NODE_IMAGE_FULLY_QUALIFIED=${NODE_IMAGE_REGISTRY_HOST}/${NODE_IMAGE_REPOSITORY}:${NODE_IMAGE_VERSION}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# MISSING DOT
 | 
					# MISSING DOT
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										82
									
								
								README.md
									
									
									
									
									
								
							
							
						
						
									
										82
									
								
								README.md
									
									
									
									
									
								
							@@ -1,6 +1,5 @@
 | 
				
			|||||||
# Prometheus Fail2Ban exporter
 | 
					# Prometheus Fail2Ban exporter
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[](https://drone.cryptic.systems/volker.raschek/prometheus-fail2ban-exporter)
 | 
					 | 
				
			||||||
[](https://artifacthub.io/packages/search?repo=prometheus-exporters)
 | 
					[](https://artifacthub.io/packages/search?repo=prometheus-exporters)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
This helm chart enables the deployment of a Prometheus metrics exporter for Fail2Ban and allows the individual
 | 
					This helm chart enables the deployment of a Prometheus metrics exporter for Fail2Ban and allows the individual
 | 
				
			||||||
@@ -20,7 +19,7 @@ helm chart is tested for deployment scenarios with **ArgoCD**.
 | 
				
			|||||||
## Helm: configuration and installation
 | 
					## Helm: configuration and installation
 | 
				
			||||||
 | 
					
 | 
				
			||||||
1. A helm chart repository must be configured, to pull the helm charts from.
 | 
					1. A helm chart repository must be configured, to pull the helm charts from.
 | 
				
			||||||
2. All available parameters are [here](#parameters) in detail documented. The parameters can be defined via the helm
 | 
					2. All available [parameters](#parameters) are documented in detail below. The parameters can be defined via the helm
 | 
				
			||||||
   `--set` flag or directly as part of a `values.yaml` file. The following example defines the `prometheus-exporter`
 | 
					   `--set` flag or directly as part of a `values.yaml` file. The following example defines the `prometheus-exporter`
 | 
				
			||||||
   repository and use the `--set` flag for a basic deployment.
 | 
					   repository and use the `--set` flag for a basic deployment.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -43,7 +42,7 @@ version of the chart must be in sync with the `values.yaml`. Newer *minor* versi
 | 
				
			|||||||
versions can break something!
 | 
					versions can break something!
 | 
				
			||||||
 | 
					
 | 
				
			||||||
```bash
 | 
					```bash
 | 
				
			||||||
CHART_VERSION=0.1.0
 | 
					CHART_VERSION=0.4.0
 | 
				
			||||||
helm show values prometheus-exporters/prometheus-fail2ban-exporter --version "${CHART_VERSION}" > values.yaml
 | 
					helm show values prometheus-exporters/prometheus-fail2ban-exporter --version "${CHART_VERSION}" > values.yaml
 | 
				
			||||||
```
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -68,14 +67,17 @@ cannot use the available CPU time to perform computing operations.
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
The application must be informed that despite several CPUs only a part (limit) of the available computing time is
 | 
					The application must be informed that despite several CPUs only a part (limit) of the available computing time is
 | 
				
			||||||
available. As this is a Golang application, this can be implemented using `GOMAXPROCS`. The following example is one way
 | 
					available. As this is a Golang application, this can be implemented using `GOMAXPROCS`. The following example is one way
 | 
				
			||||||
of defining `GOMAXPROCS` automatically based on the defined CPU limit like `100m`. Please keep in mind, that the CFS
 | 
					of defining `GOMAXPROCS` automatically based on the defined CPU limit like `1000m`. Please keep in mind, that the CFS
 | 
				
			||||||
rate of `100ms` - default on each kubernetes node, is also very important to avoid CPU throttling.
 | 
					rate of `100ms` - default on each kubernetes node, is also very important to avoid CPU throttling.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Further information about this topic can be found [here](https://kanishk.io/posts/cpu-throttling-in-containerized-go-apps/).
 | 
					Further information about this topic can be found in one of Kanishk's blog
 | 
				
			||||||
 | 
					[posts](https://kanishk.io/posts/cpu-throttling-in-containerized-go-apps/).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
> [!NOTE]
 | 
					> [!NOTE]
 | 
				
			||||||
> The environment variable `GOMAXPROCS` is set automatically, when a CPU limit is defined. An explicit configuration is
 | 
					> The environment variable `GOMAXPROCS` is set automatically, when a CPU limit is defined. An explicit configuration is
 | 
				
			||||||
> not anymore required.
 | 
					> not anymore required.
 | 
				
			||||||
 | 
					>
 | 
				
			||||||
 | 
					> Please take care the a CPU limit < `1000m` can also lead to CPU throttling. Please read the linked documentation carefully.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
```bash
 | 
					```bash
 | 
				
			||||||
helm install prometheus-fail2ban-exporter prometheus-exporters/prometheus-fail2ban-exporter \
 | 
					helm install prometheus-fail2ban-exporter prometheus-exporters/prometheus-fail2ban-exporter \
 | 
				
			||||||
@@ -83,10 +85,11 @@ helm install prometheus-fail2ban-exporter prometheus-exporters/prometheus-fail2b
 | 
				
			|||||||
  --set 'prometheus.metrics.serviceMonitor.enabled=true' \
 | 
					  --set 'prometheus.metrics.serviceMonitor.enabled=true' \
 | 
				
			||||||
  --set 'daemonSet.fail2banExporter.env.name=GOMAXPROCS' \
 | 
					  --set 'daemonSet.fail2banExporter.env.name=GOMAXPROCS' \
 | 
				
			||||||
  --set 'daemonSet.fail2banExporter.env.valueFrom.resourceFieldRef.resource=limits.cpu' \
 | 
					  --set 'daemonSet.fail2banExporter.env.valueFrom.resourceFieldRef.resource=limits.cpu' \
 | 
				
			||||||
  --set 'daemonSet.fail2banExporter.resources.limits.cpu=100m'
 | 
					  --set 'daemonSet.fail2banExporter.resources.limits.cpu=1000m'
 | 
				
			||||||
```
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
<!-- #### TLS authentication and encryption
 | 
					<!--
 | 
				
			||||||
 | 
					#### TLS authentication and encryption
 | 
				
			||||||
 | 
					
 | 
				
			||||||
The first example shows how to deploy the metric exporter with TLS encryption. The verification of the custom TLS
 | 
					The first example shows how to deploy the metric exporter with TLS encryption. The verification of the custom TLS
 | 
				
			||||||
certification will be skipped by Prometheus.
 | 
					certification will be skipped by Prometheus.
 | 
				
			||||||
@@ -129,7 +132,8 @@ replaced:
 | 
				
			|||||||
+   --set 'Prometheus.metrics.serviceMonitor.tlsConfig.caFile=/etc/Prometheus/TLS/ca.crt' \
 | 
					+   --set 'Prometheus.metrics.serviceMonitor.tlsConfig.caFile=/etc/Prometheus/TLS/ca.crt' \
 | 
				
			||||||
+   --set 'Prometheus.metrics.serviceMonitor.tlsConfig.certFile=/etc/Prometheus/TLS/TLS.crt' \
 | 
					+   --set 'Prometheus.metrics.serviceMonitor.tlsConfig.certFile=/etc/Prometheus/TLS/TLS.crt' \
 | 
				
			||||||
+   --set 'Prometheus.metrics.serviceMonitor.tlsConfig.keyFile=/etc/Prometheus/TLS/TLS.key'
 | 
					+   --set 'Prometheus.metrics.serviceMonitor.tlsConfig.keyFile=/etc/Prometheus/TLS/TLS.key'
 | 
				
			||||||
``` -->
 | 
					```
 | 
				
			||||||
 | 
					-->
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#### Grafana dashboard
 | 
					#### Grafana dashboard
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -144,6 +148,56 @@ helm install prometheus-fail2ban-exporter prometheus-exporters/prometheus-fail2b
 | 
				
			|||||||
  --set 'grafana.enabled=true'
 | 
					  --set 'grafana.enabled=true'
 | 
				
			||||||
```
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					### Network policies
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Network policies can only take effect, when the used CNI plugin support network policies. The chart supports no custom
 | 
				
			||||||
 | 
					network policy implementation of CNI plugins. It's support only the official API resource of `networking.k8s.io/v1`.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The object networkPolicies can contains multiple networkPolicy definitions. There is currently only one example
 | 
				
			||||||
 | 
					predefined - it's named `default`. Further networkPolicy rules can easy be added by defining additional objects. For example:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					> [!NOTE]
 | 
				
			||||||
 | 
					> The structure of each custom network policy must be equal like that of default. For this reason don't forget to define
 | 
				
			||||||
 | 
					> `annotations`, `labels` and the other properties as well.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					```yaml
 | 
				
			||||||
 | 
					networkPolicies:
 | 
				
			||||||
 | 
					  enabled: false
 | 
				
			||||||
 | 
					  default: {}
 | 
				
			||||||
 | 
					  my-custom-network-policy: {}
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The example below is an excerpt of the `values.yaml` file. The network policy `default` contains ingress rules to allow
 | 
				
			||||||
 | 
					incoming traffic from Prometheus.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					> [!IMPORTANT]
 | 
				
			||||||
 | 
					> Please keep in mind, that the namespace and pod selector labels can be different from environment to environment. For
 | 
				
			||||||
 | 
					> this reason, there is are not default network policy rules defined.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					```yaml
 | 
				
			||||||
 | 
					networkPolicies:
 | 
				
			||||||
 | 
					  enabled: true
 | 
				
			||||||
 | 
					  default:
 | 
				
			||||||
 | 
					    enabled: true
 | 
				
			||||||
 | 
					    annotations: {}
 | 
				
			||||||
 | 
					    labels: {}
 | 
				
			||||||
 | 
					    policyTypes:
 | 
				
			||||||
 | 
					    - Egress
 | 
				
			||||||
 | 
					    - Ingress
 | 
				
			||||||
 | 
					    egress: []
 | 
				
			||||||
 | 
					    ingress:
 | 
				
			||||||
 | 
					    - from:
 | 
				
			||||||
 | 
					      - namespaceSelector:
 | 
				
			||||||
 | 
					          matchLabels:
 | 
				
			||||||
 | 
					            kubernetes.io/metadata.name: monitoring
 | 
				
			||||||
 | 
					        podSelector:
 | 
				
			||||||
 | 
					          matchLabels:
 | 
				
			||||||
 | 
					            app.kubernetes.io/name: prometheus
 | 
				
			||||||
 | 
					      ports:
 | 
				
			||||||
 | 
					      - port: http
 | 
				
			||||||
 | 
					        protocol: TCP
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## Parameters
 | 
					## Parameters
 | 
				
			||||||
 | 
					
 | 
				
			||||||
### Global
 | 
					### Global
 | 
				
			||||||
@@ -227,11 +281,17 @@ helm install prometheus-fail2ban-exporter prometheus-exporters/prometheus-fail2b
 | 
				
			|||||||
| --------------------- | ---------------------- | ----- |
 | 
					| --------------------- | ---------------------- | ----- |
 | 
				
			||||||
| `podDisruptionBudget` | Pod disruption budget. | `{}`  |
 | 
					| `podDisruptionBudget` | Pod disruption budget. | `{}`  |
 | 
				
			||||||
 | 
					
 | 
				
			||||||
### Network
 | 
					### NetworkPolicies
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| Name                                  | Description                                                                                           | Value   |
 | 
					| Name                                  | Description                                                                                           | Value   |
 | 
				
			||||||
| ----------------- | ------------------------------------------------------------------------------------------------------------------ | ----- |
 | 
					| ------------------------------------- | ----------------------------------------------------------------------------------------------------- | ------- |
 | 
				
			||||||
| `networkPolicies` | Deploy network policies based on the used container network interface (CNI) implementation - like calico or weave. | `{}`  |
 | 
					| `networkPolicies.enabled`             | Enable network policies in general.                                                                   | `false` |
 | 
				
			||||||
 | 
					| `networkPolicies.default.enabled`     | Enable the network policy for accessing the application by default. For example to scape the metrics. | `false` |
 | 
				
			||||||
 | 
					| `networkPolicies.default.annotations` | Additional network policy annotations.                                                                | `{}`    |
 | 
				
			||||||
 | 
					| `networkPolicies.default.labels`      | Additional network policy labels.                                                                     | `{}`    |
 | 
				
			||||||
 | 
					| `networkPolicies.default.policyTypes` | List of policy types. Supported is ingress, egress or ingress and egress.                             | `[]`    |
 | 
				
			||||||
 | 
					| `networkPolicies.default.egress`      | Concrete egress network policy implementation.                                                        | `[]`    |
 | 
				
			||||||
 | 
					| `networkPolicies.default.ingress`     | Concrete ingress network policy implementation.                                                       | `[]`    |
 | 
				
			||||||
 | 
					
 | 
				
			||||||
### Prometheus
 | 
					### Prometheus
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										1181
									
								
								package-lock.json
									
									
									
										generated
									
									
									
								
							
							
						
						
									
										1181
									
								
								package-lock.json
									
									
									
										generated
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							@@ -16,6 +16,6 @@
 | 
				
			|||||||
  "devDependencies": {
 | 
					  "devDependencies": {
 | 
				
			||||||
    "@bitnami/readme-generator-for-helm": "^2.5.0",
 | 
					    "@bitnami/readme-generator-for-helm": "^2.5.0",
 | 
				
			||||||
    "markdown-link-check": "^3.13.6",
 | 
					    "markdown-link-check": "^3.13.6",
 | 
				
			||||||
    "markdownlint-cli": "^0.43.0"
 | 
					    "markdownlint-cli": "^0.45.0"
 | 
				
			||||||
  }
 | 
					  }
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,6 +1,12 @@
 | 
				
			|||||||
{
 | 
					{
 | 
				
			||||||
  "$schema": "https://docs.renovatebot.com/renovate-schema.json",
 | 
					  "$schema": "https://docs.renovatebot.com/renovate-schema.json",
 | 
				
			||||||
  "assignees": [ "volker.raschek" ],
 | 
					  "extends": [
 | 
				
			||||||
 | 
					    "local>volker.raschek/renovate-config:default#master",
 | 
				
			||||||
 | 
					    "local>volker.raschek/renovate-config:container#master",
 | 
				
			||||||
 | 
					    "local>volker.raschek/renovate-config:actions#master",
 | 
				
			||||||
 | 
					    "local>volker.raschek/renovate-config:npm#master",
 | 
				
			||||||
 | 
					    "local>volker.raschek/renovate-config:regexp#master"
 | 
				
			||||||
 | 
					  ],
 | 
				
			||||||
  "customManagers": [
 | 
					  "customManagers": [
 | 
				
			||||||
    {
 | 
					    {
 | 
				
			||||||
      "fileMatch": [
 | 
					      "fileMatch": [
 | 
				
			||||||
@@ -25,21 +31,12 @@
 | 
				
			|||||||
      "versioningTemplate": "semver"
 | 
					      "versioningTemplate": "semver"
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
  ],
 | 
					  ],
 | 
				
			||||||
  "labels": [ "renovate" ],
 | 
					 | 
				
			||||||
  "packageRules": [
 | 
					  "packageRules": [
 | 
				
			||||||
    {
 | 
					    {
 | 
				
			||||||
      "addLabels": [ "renovate/automerge", "renovate/npm" ],
 | 
					      "addLabels": [
 | 
				
			||||||
      "automerge": true,
 | 
					        "renovate/automerge",
 | 
				
			||||||
      "matchPackageNames": [
 | 
					        "renovate/container"
 | 
				
			||||||
        "markdownlint-cli",
 | 
					 | 
				
			||||||
        "markdown-link-check",
 | 
					 | 
				
			||||||
        "@bitnami/readme-generator-for-helm"
 | 
					 | 
				
			||||||
      ],
 | 
					      ],
 | 
				
			||||||
      "matchManagers": [ "npm" ],
 | 
					 | 
				
			||||||
      "matchUpdateTypes": [ "minor", "patch"]
 | 
					 | 
				
			||||||
    },
 | 
					 | 
				
			||||||
    {
 | 
					 | 
				
			||||||
      "addLabels": [ "renovate/automerge", "renovate/container" ],
 | 
					 | 
				
			||||||
      "automerge": true,
 | 
					      "automerge": true,
 | 
				
			||||||
      "excludePackagePatterns": [
 | 
					      "excludePackagePatterns": [
 | 
				
			||||||
        "volker.raschek/prometheus-fail2ban-exporter"
 | 
					        "volker.raschek/prometheus-fail2ban-exporter"
 | 
				
			||||||
@@ -51,8 +48,21 @@
 | 
				
			|||||||
        "minor",
 | 
					        "minor",
 | 
				
			||||||
        "patch"
 | 
					        "patch"
 | 
				
			||||||
      ]
 | 
					      ]
 | 
				
			||||||
    }
 | 
					    },
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					      "addLabels": [
 | 
				
			||||||
 | 
					        "renovate/automerge",
 | 
				
			||||||
 | 
					        "renovate/documentation"
 | 
				
			||||||
      ],
 | 
					      ],
 | 
				
			||||||
  "rebaseLabel": "renovate/rebase",
 | 
					      "automerge": true,
 | 
				
			||||||
  "rebaseWhen": "behind-base-branch"
 | 
					      "matchDepNames": [
 | 
				
			||||||
 | 
					        "volker.raschek/prometheus-fail2ban-exporter-charts"
 | 
				
			||||||
 | 
					      ],
 | 
				
			||||||
 | 
					      "matchUpdateTypes": [
 | 
				
			||||||
 | 
					        "major",
 | 
				
			||||||
 | 
					        "minor",
 | 
				
			||||||
 | 
					        "patch"
 | 
				
			||||||
 | 
					      ]
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					  ]
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										19
									
								
								templates/prometheus-fail2ban-exporter/_networkPolicies.tpl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										19
									
								
								templates/prometheus-fail2ban-exporter/_networkPolicies.tpl
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,19 @@
 | 
				
			|||||||
 | 
					{{/* vim: set filetype=mustache: */}}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					{{/* annotations */}}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					{{- define "prometheus-fail2ban-exporter.networkPolicies.annotations" -}}
 | 
				
			||||||
 | 
					{{ include "prometheus-fail2ban-exporter.annotations" .context }}
 | 
				
			||||||
 | 
					{{- if .networkPolicy.annotations }}
 | 
				
			||||||
 | 
					{{ toYaml .networkPolicy.annotations }}
 | 
				
			||||||
 | 
					{{- end }}
 | 
				
			||||||
 | 
					{{- end }}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					{{/* labels */}}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					{{- define "prometheus-fail2ban-exporter.networkPolicies.labels" -}}
 | 
				
			||||||
 | 
					{{ include "prometheus-fail2ban-exporter.labels" .context }}
 | 
				
			||||||
 | 
					{{- if .networkPolicy.labels }}
 | 
				
			||||||
 | 
					{{ toYaml .networkPolicy.labels }}
 | 
				
			||||||
 | 
					{{- end }}
 | 
				
			||||||
 | 
					{{- end }}
 | 
				
			||||||
@@ -4,6 +4,21 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
{{- define "prometheus-fail2ban-exporter.pod.annotations" -}}
 | 
					{{- define "prometheus-fail2ban-exporter.pod.annotations" -}}
 | 
				
			||||||
{{ include "prometheus-fail2ban-exporter.annotations" . }}
 | 
					{{ include "prometheus-fail2ban-exporter.annotations" . }}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# The following annotations are required to trigger a rolling update. Further information can be found in the official
 | 
				
			||||||
 | 
					# documentation of helm:
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#   https://helm.sh/docs/howto/charts_tips_and_tricks/#automatically-roll-deployments
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					{{/* web config */}}
 | 
				
			||||||
 | 
					{{- if and .Values.config.webConfig.existingSecret.enabled .Values.config.webConfig.existingSecret.secretName }}
 | 
				
			||||||
 | 
					{{- $secret := default (dict "data" (dict)) (lookup "v1" "Secret" .Release.Namespace .Values.config.webConfig.existingSecret.secretName ) }}
 | 
				
			||||||
 | 
					checksum/secret-web-config: {{ print $secret.spec | sha256sum }}
 | 
				
			||||||
 | 
					{{- else }}
 | 
				
			||||||
 | 
					checksum/secret-web-config: {{ include (print $.Template.BasePath "/prometheus-fail2ban-exporter/secretWebConfig.yaml") . | sha256sum }}
 | 
				
			||||||
 | 
					{{- end }}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
{{- end }}
 | 
					{{- end }}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
{{/* labels */}}
 | 
					{{/* labels */}}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -5,7 +5,7 @@ kind: ConfigMap
 | 
				
			|||||||
metadata:
 | 
					metadata:
 | 
				
			||||||
  {{- with (include "prometheus-fail2ban-exporter.configMap.grafanaDashboards.fail2banExporter.annotations" . | fromYaml) }}
 | 
					  {{- with (include "prometheus-fail2ban-exporter.configMap.grafanaDashboards.fail2banExporter.annotations" . | fromYaml) }}
 | 
				
			||||||
  annotations:
 | 
					  annotations:
 | 
				
			||||||
    {{- tpl (. | toYaml) $ | nindent 4 }}
 | 
					    {{- tpl (toYaml .) $ | nindent 4 }}
 | 
				
			||||||
  {{- end }}
 | 
					  {{- end }}
 | 
				
			||||||
  {{- with (include "prometheus-fail2ban-exporter.configMap.grafanaDashboards.fail2banExporter.labels" . | fromYaml) }}
 | 
					  {{- with (include "prometheus-fail2ban-exporter.configMap.grafanaDashboards.fail2banExporter.labels" . | fromYaml) }}
 | 
				
			||||||
  labels:
 | 
					  labels:
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -3,7 +3,7 @@ kind: DaemonSet
 | 
				
			|||||||
metadata:
 | 
					metadata:
 | 
				
			||||||
  {{- with (include "prometheus-fail2ban-exporter.daemonSet.annotations" . | fromYaml) }}
 | 
					  {{- with (include "prometheus-fail2ban-exporter.daemonSet.annotations" . | fromYaml) }}
 | 
				
			||||||
  annotations:
 | 
					  annotations:
 | 
				
			||||||
    {{- tpl (. | toYaml) $ | nindent 4 }}
 | 
					    {{- tpl (toYaml .) $ | nindent 4 }}
 | 
				
			||||||
  {{- end }}
 | 
					  {{- end }}
 | 
				
			||||||
  {{- with (include "prometheus-fail2ban-exporter.daemonSet.labels" . | fromYaml) }}
 | 
					  {{- with (include "prometheus-fail2ban-exporter.daemonSet.labels" . | fromYaml) }}
 | 
				
			||||||
  labels:
 | 
					  labels:
 | 
				
			||||||
@@ -17,6 +17,8 @@ spec:
 | 
				
			|||||||
      {{- include "prometheus-fail2ban-exporter.pod.selectorLabels" . | nindent 6 }}
 | 
					      {{- include "prometheus-fail2ban-exporter.pod.selectorLabels" . | nindent 6 }}
 | 
				
			||||||
  template:
 | 
					  template:
 | 
				
			||||||
    metadata:
 | 
					    metadata:
 | 
				
			||||||
 | 
					      annotations:
 | 
				
			||||||
 | 
					        {{- include "prometheus-fail2ban-exporter.pod.annotations" . | nindent 8 }}
 | 
				
			||||||
      labels:
 | 
					      labels:
 | 
				
			||||||
        {{- include "prometheus-fail2ban-exporter.pod.labels" . | nindent 8 }}
 | 
					        {{- include "prometheus-fail2ban-exporter.pod.labels" . | nindent 8 }}
 | 
				
			||||||
    spec:
 | 
					    spec:
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -5,7 +5,7 @@ kind: Ingress
 | 
				
			|||||||
metadata:
 | 
					metadata:
 | 
				
			||||||
  {{- with (include "prometheus-fail2ban-exporter.ingress.annotations" . | fromYaml) }}
 | 
					  {{- with (include "prometheus-fail2ban-exporter.ingress.annotations" . | fromYaml) }}
 | 
				
			||||||
  annotations:
 | 
					  annotations:
 | 
				
			||||||
    {{- tpl (. | toYaml) $ | nindent 4 }}
 | 
					    {{- tpl (toYaml .) $ | nindent 4 }}
 | 
				
			||||||
  {{- end }}
 | 
					  {{- end }}
 | 
				
			||||||
  {{- with (include "prometheus-fail2ban-exporter.ingress.labels" . | fromYaml) }}
 | 
					  {{- with (include "prometheus-fail2ban-exporter.ingress.labels" . | fromYaml) }}
 | 
				
			||||||
  labels:
 | 
					  labels:
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										36
									
								
								templates/prometheus-fail2ban-exporter/networkPolicies.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										36
									
								
								templates/prometheus-fail2ban-exporter/networkPolicies.yaml
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,36 @@
 | 
				
			|||||||
 | 
					{{- if .Values.networkPolicies.enabled }}
 | 
				
			||||||
 | 
					{{- range $key, $value := .Values.networkPolicies -}}
 | 
				
			||||||
 | 
					{{- if and (not (eq $key "enabled")) $value.enabled }}
 | 
				
			||||||
 | 
					---
 | 
				
			||||||
 | 
					apiVersion: networking.k8s.io/v1
 | 
				
			||||||
 | 
					kind: NetworkPolicy
 | 
				
			||||||
 | 
					metadata:
 | 
				
			||||||
 | 
					  {{- with (include "prometheus-fail2ban-exporter.networkPolicies.annotations" (dict "networkPolicy" $value "context" $) | fromYaml) }}
 | 
				
			||||||
 | 
					  annotations:
 | 
				
			||||||
 | 
					    {{- toYaml . | nindent 4 }}
 | 
				
			||||||
 | 
					  {{- end }}
 | 
				
			||||||
 | 
					  {{- with (include "prometheus-fail2ban-exporter.networkPolicies.labels" (dict "networkPolicy" $value "context" $) | fromYaml) }}
 | 
				
			||||||
 | 
					  labels:
 | 
				
			||||||
 | 
					    {{- toYaml . | nindent 4 }}
 | 
				
			||||||
 | 
					  {{- end }}
 | 
				
			||||||
 | 
					  name: {{ printf "%s-%s" (include "prometheus-fail2ban-exporter.fullname" $ ) $key }}
 | 
				
			||||||
 | 
					  namespace: {{ $.Release.Namespace }}
 | 
				
			||||||
 | 
					spec:
 | 
				
			||||||
 | 
					  podSelector:
 | 
				
			||||||
 | 
					    matchLabels:
 | 
				
			||||||
 | 
					      {{- include "prometheus-fail2ban-exporter.pod.selectorLabels" $ | nindent 6 }}
 | 
				
			||||||
 | 
					  {{- with $value.policyTypes }}
 | 
				
			||||||
 | 
					  policyTypes:
 | 
				
			||||||
 | 
					  {{- toYaml . | nindent 2 }}
 | 
				
			||||||
 | 
					  {{- end }}
 | 
				
			||||||
 | 
					  {{- with $value.egress }}
 | 
				
			||||||
 | 
					  egress:
 | 
				
			||||||
 | 
					  {{- toYaml . | nindent 2 }}
 | 
				
			||||||
 | 
					  {{- end }}
 | 
				
			||||||
 | 
					  {{- with $value.ingress }}
 | 
				
			||||||
 | 
					  ingress:
 | 
				
			||||||
 | 
					  {{- toYaml . | nindent 2 }}
 | 
				
			||||||
 | 
					  {{- end }}
 | 
				
			||||||
 | 
					{{- end }}
 | 
				
			||||||
 | 
					{{- end }}
 | 
				
			||||||
 | 
					{{- end }}
 | 
				
			||||||
@@ -7,18 +7,22 @@ release:
 | 
				
			|||||||
  namespace: testing
 | 
					  namespace: testing
 | 
				
			||||||
templates:
 | 
					templates:
 | 
				
			||||||
- templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
					- templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					- templates/prometheus-fail2ban-exporter/secretWebConfig.yaml
 | 
				
			||||||
tests:
 | 
					tests:
 | 
				
			||||||
- it: Rendering default
 | 
					- it: Rendering default
 | 
				
			||||||
  asserts:
 | 
					  asserts:
 | 
				
			||||||
  - hasDocuments:
 | 
					  - hasDocuments:
 | 
				
			||||||
      count: 1
 | 
					      count: 1
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - containsDocument:
 | 
					  - containsDocument:
 | 
				
			||||||
      apiVersion: apps/v1
 | 
					      apiVersion: apps/v1
 | 
				
			||||||
      kind: DaemonSet
 | 
					      kind: DaemonSet
 | 
				
			||||||
      name: prometheus-fail2ban-exporter-unittest
 | 
					      name: prometheus-fail2ban-exporter-unittest
 | 
				
			||||||
      namespace: testing
 | 
					      namespace: testing
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - notExists:
 | 
					  - notExists:
 | 
				
			||||||
      path: metadata.annotations
 | 
					      path: metadata.annotations
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: metadata.labels
 | 
					      path: metadata.labels
 | 
				
			||||||
      value:
 | 
					      value:
 | 
				
			||||||
@@ -27,15 +31,31 @@ tests:
 | 
				
			|||||||
        app.kubernetes.io/name: prometheus-fail2ban-exporter
 | 
					        app.kubernetes.io/name: prometheus-fail2ban-exporter
 | 
				
			||||||
        app.kubernetes.io/version: 0.1.0
 | 
					        app.kubernetes.io/version: 0.1.0
 | 
				
			||||||
        helm.sh/chart: prometheus-fail2ban-exporter-0.1.0
 | 
					        helm.sh/chart: prometheus-fail2ban-exporter-0.1.0
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					  - exists:
 | 
				
			||||||
 | 
					      path: spec.template.metadata.annotations.checksum/secret-web-config
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					  - equal:
 | 
				
			||||||
 | 
					      path: spec.template.metadata.labels
 | 
				
			||||||
 | 
					      value:
 | 
				
			||||||
 | 
					        app.kubernetes.io/instance: prometheus-fail2ban-exporter-unittest
 | 
				
			||||||
 | 
					        app.kubernetes.io/managed-by: Helm
 | 
				
			||||||
 | 
					        app.kubernetes.io/name: prometheus-fail2ban-exporter
 | 
				
			||||||
 | 
					        app.kubernetes.io/version: 0.1.0
 | 
				
			||||||
 | 
					        helm.sh/chart: prometheus-fail2ban-exporter-0.1.0
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - notExists:
 | 
					  - notExists:
 | 
				
			||||||
      path: spec.template.spec.affinity
 | 
					      path: spec.template.spec.affinity
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - notExists:
 | 
					  - notExists:
 | 
				
			||||||
      path: spec.template.spec.containers[0].envFrom
 | 
					      path: spec.template.spec.containers[0].envFrom
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.containers[0].args
 | 
					      path: spec.template.spec.containers[0].args
 | 
				
			||||||
      value:
 | 
					      value:
 | 
				
			||||||
      # - --web.config.file=/etc/prometheus-fail2ban-exporter/config.d/webConfig.yaml
 | 
					      # - --web.config.file=/etc/prometheus-fail2ban-exporter/config.d/webConfig.yaml
 | 
				
			||||||
      - --web.listen-address=:9191
 | 
					      - --web.listen-address=:9191
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.containers[0].volumeMounts
 | 
					      path: spec.template.spec.containers[0].volumeMounts
 | 
				
			||||||
      value:
 | 
					      value:
 | 
				
			||||||
@@ -43,6 +63,7 @@ tests:
 | 
				
			|||||||
        name: socket
 | 
					        name: socket
 | 
				
			||||||
      - mountPath: /etc/prometheus-fail2ban-exporter/config.d
 | 
					      - mountPath: /etc/prometheus-fail2ban-exporter/config.d
 | 
				
			||||||
        name: config-d
 | 
					        name: config-d
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.volumes
 | 
					      path: spec.template.spec.volumes
 | 
				
			||||||
      value:
 | 
					      value:
 | 
				
			||||||
@@ -53,42 +74,59 @@ tests:
 | 
				
			|||||||
      - name: config-d
 | 
					      - name: config-d
 | 
				
			||||||
        secret:
 | 
					        secret:
 | 
				
			||||||
          secretName: prometheus-fail2ban-exporter-unittest-web-config
 | 
					          secretName: prometheus-fail2ban-exporter-unittest-web-config
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.containers[0].image
 | 
					      path: spec.template.spec.containers[0].image
 | 
				
			||||||
      value: git.cryptic.systems/volker.raschek/prometheus-fail2ban-exporter:0.1.0
 | 
					      value: git.cryptic.systems/volker.raschek/prometheus-fail2ban-exporter:0.1.0
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.containers[0].imagePullPolicy
 | 
					      path: spec.template.spec.containers[0].imagePullPolicy
 | 
				
			||||||
      value: IfNotPresent
 | 
					      value: IfNotPresent
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - notExists:
 | 
					  - notExists:
 | 
				
			||||||
      path: spec.template.spec.containers[0].resources
 | 
					      path: spec.template.spec.containers[0].resources
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - notExists:
 | 
					  - notExists:
 | 
				
			||||||
      path: spec.template.spec.containers[0].securityContext
 | 
					      path: spec.template.spec.containers[0].securityContext
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - notExists:
 | 
					  - notExists:
 | 
				
			||||||
      path: spec.template.spec.dnsConfig
 | 
					      path: spec.template.spec.dnsConfig
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - notExists:
 | 
					  - notExists:
 | 
				
			||||||
      path: spec.template.spec.dnsPolicy
 | 
					      path: spec.template.spec.dnsPolicy
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - notExists:
 | 
					  - notExists:
 | 
				
			||||||
      path: spec.template.spec.hostname
 | 
					      path: spec.template.spec.hostname
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.hostNetwork
 | 
					      path: spec.template.spec.hostNetwork
 | 
				
			||||||
      value: false
 | 
					      value: false
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - notExists:
 | 
					  - notExists:
 | 
				
			||||||
      path: spec.template.spec.imagePullSecrets
 | 
					      path: spec.template.spec.imagePullSecrets
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - notExists:
 | 
					  - notExists:
 | 
				
			||||||
      path: spec.template.spec.nodeSelector
 | 
					      path: spec.template.spec.nodeSelector
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - notExists:
 | 
					  - notExists:
 | 
				
			||||||
      path: spec.template.spec.priorityClassName
 | 
					      path: spec.template.spec.priorityClassName
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - notExists:
 | 
					  - notExists:
 | 
				
			||||||
      path: spec.template.spec.restartPolicy
 | 
					      path: spec.template.spec.restartPolicy
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - notExists:
 | 
					  - notExists:
 | 
				
			||||||
      path: spec.template.spec.subdomain
 | 
					      path: spec.template.spec.subdomain
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.terminationGracePeriodSeconds
 | 
					      path: spec.template.spec.terminationGracePeriodSeconds
 | 
				
			||||||
      value: 60
 | 
					      value: 60
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - notExists:
 | 
					  - notExists:
 | 
				
			||||||
      path: spec.template.spec.tolerations
 | 
					      path: spec.template.spec.tolerations
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - notExists:
 | 
					  - notExists:
 | 
				
			||||||
      path: spec.template.spec.topologySpreadConstraints
 | 
					      path: spec.template.spec.topologySpreadConstraints
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.updateStrategy
 | 
					      path: spec.updateStrategy
 | 
				
			||||||
      value:
 | 
					      value:
 | 
				
			||||||
@@ -96,6 +134,7 @@ tests:
 | 
				
			|||||||
          maxSurge: 1
 | 
					          maxSurge: 1
 | 
				
			||||||
          maxUnavailable: 0
 | 
					          maxUnavailable: 0
 | 
				
			||||||
        type: "RollingUpdate"
 | 
					        type: "RollingUpdate"
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test custom affinity
 | 
					- it: Test custom affinity
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -122,6 +161,7 @@ tests:
 | 
				
			|||||||
                values:
 | 
					                values:
 | 
				
			||||||
                - antarctica-east1
 | 
					                - antarctica-east1
 | 
				
			||||||
                - antarctica-west1
 | 
					                - antarctica-west1
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test additional arguments
 | 
					- it: Test additional arguments
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -136,6 +176,7 @@ tests:
 | 
				
			|||||||
      - --web.listen-address=:9191
 | 
					      - --web.listen-address=:9191
 | 
				
			||||||
      - --foo=bar
 | 
					      - --foo=bar
 | 
				
			||||||
      - --bar=foo
 | 
					      - --bar=foo
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test custom imageRegistry and imageRepository
 | 
					- it: Test custom imageRegistry and imageRepository
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -145,6 +186,7 @@ tests:
 | 
				
			|||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.containers[0].image
 | 
					      path: spec.template.spec.containers[0].image
 | 
				
			||||||
      value: registry.example.local/path/special/prometheus-fail2ban-exporter:0.1.0
 | 
					      value: registry.example.local/path/special/prometheus-fail2ban-exporter:0.1.0
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test custom imagePullPolicy
 | 
					- it: Test custom imagePullPolicy
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -153,6 +195,7 @@ tests:
 | 
				
			|||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.containers[0].imagePullPolicy
 | 
					      path: spec.template.spec.containers[0].imagePullPolicy
 | 
				
			||||||
      value: Always
 | 
					      value: Always
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test config.webConfig.existingSecret
 | 
					- it: Test config.webConfig.existingSecret
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -166,6 +209,7 @@ tests:
 | 
				
			|||||||
        name: socket
 | 
					        name: socket
 | 
				
			||||||
      - mountPath: /etc/prometheus-fail2ban-exporter/config.d
 | 
					      - mountPath: /etc/prometheus-fail2ban-exporter/config.d
 | 
				
			||||||
        name: config-d
 | 
					        name: config-d
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.volumes
 | 
					      path: spec.template.spec.volumes
 | 
				
			||||||
      value:
 | 
					      value:
 | 
				
			||||||
@@ -176,6 +220,7 @@ tests:
 | 
				
			|||||||
      - name: config-d
 | 
					      - name: config-d
 | 
				
			||||||
        secret:
 | 
					        secret:
 | 
				
			||||||
          secretName: web-config-secret
 | 
					          secretName: web-config-secret
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test custom resource limits and requests
 | 
					- it: Test custom resource limits and requests
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -195,6 +240,7 @@ tests:
 | 
				
			|||||||
          resourceFieldRef:
 | 
					          resourceFieldRef:
 | 
				
			||||||
            divisor: "1"
 | 
					            divisor: "1"
 | 
				
			||||||
            resource: limits.cpu
 | 
					            resource: limits.cpu
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.containers[0].resources
 | 
					      path: spec.template.spec.containers[0].resources
 | 
				
			||||||
      value:
 | 
					      value:
 | 
				
			||||||
@@ -204,6 +250,7 @@ tests:
 | 
				
			|||||||
        requests:
 | 
					        requests:
 | 
				
			||||||
          cpu: 25m
 | 
					          cpu: 25m
 | 
				
			||||||
          memory: 100MB
 | 
					          memory: 100MB
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test custom securityContext
 | 
					- it: Test custom securityContext
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -230,6 +277,7 @@ tests:
 | 
				
			|||||||
        readOnlyRootFilesystem: true
 | 
					        readOnlyRootFilesystem: true
 | 
				
			||||||
        runAsNonRoot: true
 | 
					        runAsNonRoot: true
 | 
				
			||||||
        runAsUser: 1000
 | 
					        runAsUser: 1000
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test dnsConfig
 | 
					- it: Test dnsConfig
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -244,6 +292,7 @@ tests:
 | 
				
			|||||||
        nameservers:
 | 
					        nameservers:
 | 
				
			||||||
        - "8.8.8.8"
 | 
					        - "8.8.8.8"
 | 
				
			||||||
        - "8.8.4.4"
 | 
					        - "8.8.4.4"
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test dnsPolicy
 | 
					- it: Test dnsPolicy
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -252,6 +301,7 @@ tests:
 | 
				
			|||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.dnsPolicy
 | 
					      path: spec.template.spec.dnsPolicy
 | 
				
			||||||
      value: ClusterFirst
 | 
					      value: ClusterFirst
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test hostNetwork, hostname, subdomain
 | 
					- it: Test hostNetwork, hostname, subdomain
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -262,12 +312,15 @@ tests:
 | 
				
			|||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.hostNetwork
 | 
					      path: spec.template.spec.hostNetwork
 | 
				
			||||||
      value: true
 | 
					      value: true
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.hostname
 | 
					      path: spec.template.spec.hostname
 | 
				
			||||||
      value: pg-exporter
 | 
					      value: pg-exporter
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.subdomain
 | 
					      path: spec.template.spec.subdomain
 | 
				
			||||||
      value: exporters.internal
 | 
					      value: exporters.internal
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test imagePullSecrets
 | 
					- it: Test imagePullSecrets
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -280,6 +333,7 @@ tests:
 | 
				
			|||||||
      value:
 | 
					      value:
 | 
				
			||||||
      - name: my-pull-secret
 | 
					      - name: my-pull-secret
 | 
				
			||||||
      - name: my-special-secret
 | 
					      - name: my-special-secret
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test nodeSelector
 | 
					- it: Test nodeSelector
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -290,6 +344,7 @@ tests:
 | 
				
			|||||||
      path: spec.template.spec.nodeSelector
 | 
					      path: spec.template.spec.nodeSelector
 | 
				
			||||||
      value:
 | 
					      value:
 | 
				
			||||||
        foo: bar
 | 
					        foo: bar
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test priorityClassName
 | 
					- it: Test priorityClassName
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -298,6 +353,7 @@ tests:
 | 
				
			|||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.priorityClassName
 | 
					      path: spec.template.spec.priorityClassName
 | 
				
			||||||
      value: my-priority
 | 
					      value: my-priority
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test restartPolicy
 | 
					- it: Test restartPolicy
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -306,6 +362,7 @@ tests:
 | 
				
			|||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.restartPolicy
 | 
					      path: spec.template.spec.restartPolicy
 | 
				
			||||||
      value: Always
 | 
					      value: Always
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test terminationGracePeriodSeconds
 | 
					- it: Test terminationGracePeriodSeconds
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -314,6 +371,7 @@ tests:
 | 
				
			|||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.terminationGracePeriodSeconds
 | 
					      path: spec.template.spec.terminationGracePeriodSeconds
 | 
				
			||||||
      value: 120
 | 
					      value: 120
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test tolerations
 | 
					- it: Test tolerations
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -330,6 +388,7 @@ tests:
 | 
				
			|||||||
        operator: Equal
 | 
					        operator: Equal
 | 
				
			||||||
        value: fail2ban
 | 
					        value: fail2ban
 | 
				
			||||||
        effect: NoSchedule
 | 
					        effect: NoSchedule
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test topologySpreadConstraints
 | 
					- it: Test topologySpreadConstraints
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -348,6 +407,7 @@ tests:
 | 
				
			|||||||
        labelSelector:
 | 
					        labelSelector:
 | 
				
			||||||
          matchLabels:
 | 
					          matchLabels:
 | 
				
			||||||
            app.kubernetes.io/instance: prometheus-fail2ban-exporter
 | 
					            app.kubernetes.io/instance: prometheus-fail2ban-exporter
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- it: Test additional volumeMounts and volumes
 | 
					- it: Test additional volumeMounts and volumes
 | 
				
			||||||
  set:
 | 
					  set:
 | 
				
			||||||
@@ -366,6 +426,7 @@ tests:
 | 
				
			|||||||
        mountPath: /usr/lib/prometheus-fail2ban-exporter/data
 | 
					        mountPath: /usr/lib/prometheus-fail2ban-exporter/data
 | 
				
			||||||
      - name: config-d
 | 
					      - name: config-d
 | 
				
			||||||
        mountPath: /etc/prometheus-fail2ban-exporter/config.d
 | 
					        mountPath: /etc/prometheus-fail2ban-exporter/config.d
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
  - equal:
 | 
					  - equal:
 | 
				
			||||||
      path: spec.template.spec.volumes
 | 
					      path: spec.template.spec.volumes
 | 
				
			||||||
      value:
 | 
					      value:
 | 
				
			||||||
@@ -375,3 +436,4 @@ tests:
 | 
				
			|||||||
      - name: config-d
 | 
					      - name: config-d
 | 
				
			||||||
        secret:
 | 
					        secret:
 | 
				
			||||||
          secretName: prometheus-fail2ban-exporter-unittest-web-config
 | 
					          secretName: prometheus-fail2ban-exporter-unittest-web-config
 | 
				
			||||||
 | 
					    template: templates/prometheus-fail2ban-exporter/daemonSet.yaml
 | 
				
			||||||
							
								
								
									
										118
									
								
								unittests/networkPolicies/default.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										118
									
								
								unittests/networkPolicies/default.yaml
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,118 @@
 | 
				
			|||||||
 | 
					chart:
 | 
				
			||||||
 | 
					  appVersion: 0.1.0
 | 
				
			||||||
 | 
					  version: 0.1.0
 | 
				
			||||||
 | 
					suite: NetworkPolicies template (basic)
 | 
				
			||||||
 | 
					release:
 | 
				
			||||||
 | 
					  name: prometheus-fail2ban-exporter-unittest
 | 
				
			||||||
 | 
					  namespace: testing
 | 
				
			||||||
 | 
					templates:
 | 
				
			||||||
 | 
					- templates/prometheus-fail2ban-exporter/networkPolicies.yaml
 | 
				
			||||||
 | 
					tests:
 | 
				
			||||||
 | 
					- it: Skip networkPolicies in general disabled.
 | 
				
			||||||
 | 
					  set:
 | 
				
			||||||
 | 
					    networkPolicies.enabled: false
 | 
				
			||||||
 | 
					  asserts:
 | 
				
			||||||
 | 
					  - hasDocuments:
 | 
				
			||||||
 | 
					      count: 0
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					- it: Skip networkPolicy 'default' when disabled.
 | 
				
			||||||
 | 
					  set:
 | 
				
			||||||
 | 
					    networkPolicies.enabled: true
 | 
				
			||||||
 | 
					    networkPolicies.default.enabled: false
 | 
				
			||||||
 | 
					  asserts:
 | 
				
			||||||
 | 
					  - hasDocuments:
 | 
				
			||||||
 | 
					      count: 0
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					- it: Loop over networkPolicies
 | 
				
			||||||
 | 
					  set:
 | 
				
			||||||
 | 
					    networkPolicies.enabled: true
 | 
				
			||||||
 | 
					    networkPolicies.default.enabled: false
 | 
				
			||||||
 | 
					    networkPolicies.nginx.enabled: true
 | 
				
			||||||
 | 
					    networkPolicies.prometheus.enabled: true
 | 
				
			||||||
 | 
					  asserts:
 | 
				
			||||||
 | 
					  - hasDocuments:
 | 
				
			||||||
 | 
					      count: 2
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					- it: Template networkPolicy 'default' without policyTypes, egress and ingress configuration
 | 
				
			||||||
 | 
					  set:
 | 
				
			||||||
 | 
					    networkPolicies.enabled: true
 | 
				
			||||||
 | 
					    networkPolicies.default.enabled: true
 | 
				
			||||||
 | 
					  asserts:
 | 
				
			||||||
 | 
					  - hasDocuments:
 | 
				
			||||||
 | 
					      count: 1
 | 
				
			||||||
 | 
					  - containsDocument:
 | 
				
			||||||
 | 
					      apiVersion: networking.k8s.io/v1
 | 
				
			||||||
 | 
					      kind: NetworkPolicy
 | 
				
			||||||
 | 
					      name: prometheus-fail2ban-exporter-unittest-default
 | 
				
			||||||
 | 
					      namespace: testing
 | 
				
			||||||
 | 
					  - notExists:
 | 
				
			||||||
 | 
					      path: metadata.annotations
 | 
				
			||||||
 | 
					  - equal:
 | 
				
			||||||
 | 
					      path: metadata.labels
 | 
				
			||||||
 | 
					      value:
 | 
				
			||||||
 | 
					        app.kubernetes.io/instance: prometheus-fail2ban-exporter-unittest
 | 
				
			||||||
 | 
					        app.kubernetes.io/managed-by: Helm
 | 
				
			||||||
 | 
					        app.kubernetes.io/name: prometheus-fail2ban-exporter
 | 
				
			||||||
 | 
					        app.kubernetes.io/version: 0.1.0
 | 
				
			||||||
 | 
					        helm.sh/chart: prometheus-fail2ban-exporter-0.1.0
 | 
				
			||||||
 | 
					  - equal:
 | 
				
			||||||
 | 
					      path: spec.podSelector.matchLabels
 | 
				
			||||||
 | 
					      value:
 | 
				
			||||||
 | 
					        app.kubernetes.io/instance: prometheus-fail2ban-exporter-unittest
 | 
				
			||||||
 | 
					        app.kubernetes.io/name: prometheus-fail2ban-exporter
 | 
				
			||||||
 | 
					  - notExists:
 | 
				
			||||||
 | 
					      path: spec.policyTypes
 | 
				
			||||||
 | 
					  - notExists:
 | 
				
			||||||
 | 
					      path: spec.egress
 | 
				
			||||||
 | 
					  - notExists:
 | 
				
			||||||
 | 
					      path: spec.ingress
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					- it: Template networkPolicy 'default' with policyTypes, egress and ingress configuration
 | 
				
			||||||
 | 
					  set:
 | 
				
			||||||
 | 
					    networkPolicies.enabled: true
 | 
				
			||||||
 | 
					    networkPolicies.default.enabled: true
 | 
				
			||||||
 | 
					    networkPolicies.default.policyTypes:
 | 
				
			||||||
 | 
					    - Egress
 | 
				
			||||||
 | 
					    - Ingress
 | 
				
			||||||
 | 
					    networkPolicies.default.ingress:
 | 
				
			||||||
 | 
					    - from:
 | 
				
			||||||
 | 
					      - namespaceSelector:
 | 
				
			||||||
 | 
					          matchLabels:
 | 
				
			||||||
 | 
					            kubernetes.io/metadata.name: khv-production
 | 
				
			||||||
 | 
					        podSelector:
 | 
				
			||||||
 | 
					          matchLabels:
 | 
				
			||||||
 | 
					            app.kubernetes.io/name: prometheus
 | 
				
			||||||
 | 
					    networkPolicies.default.egress:
 | 
				
			||||||
 | 
					    - to:
 | 
				
			||||||
 | 
					      - namespaceSelector:
 | 
				
			||||||
 | 
					          matchLabels:
 | 
				
			||||||
 | 
					            kubernetes.io/metadata.name: database
 | 
				
			||||||
 | 
					        podSelector:
 | 
				
			||||||
 | 
					          matchLabels:
 | 
				
			||||||
 | 
					            app.kubernetes.io/name: oracle
 | 
				
			||||||
 | 
					  asserts:
 | 
				
			||||||
 | 
					  - equal:
 | 
				
			||||||
 | 
					      path: spec.policyTypes
 | 
				
			||||||
 | 
					      value:
 | 
				
			||||||
 | 
					      - Egress
 | 
				
			||||||
 | 
					      - Ingress
 | 
				
			||||||
 | 
					  - equal:
 | 
				
			||||||
 | 
					      path: spec.egress
 | 
				
			||||||
 | 
					      value:
 | 
				
			||||||
 | 
					      - to:
 | 
				
			||||||
 | 
					        - namespaceSelector:
 | 
				
			||||||
 | 
					            matchLabels:
 | 
				
			||||||
 | 
					              kubernetes.io/metadata.name: database
 | 
				
			||||||
 | 
					          podSelector:
 | 
				
			||||||
 | 
					            matchLabels:
 | 
				
			||||||
 | 
					              app.kubernetes.io/name: oracle
 | 
				
			||||||
 | 
					  - equal:
 | 
				
			||||||
 | 
					      path: spec.ingress
 | 
				
			||||||
 | 
					      value:
 | 
				
			||||||
 | 
					      - from:
 | 
				
			||||||
 | 
					        - namespaceSelector:
 | 
				
			||||||
 | 
					            matchLabels:
 | 
				
			||||||
 | 
					              kubernetes.io/metadata.name: khv-production
 | 
				
			||||||
 | 
					          podSelector:
 | 
				
			||||||
 | 
					            matchLabels:
 | 
				
			||||||
 | 
					              app.kubernetes.io/name: prometheus
 | 
				
			||||||
							
								
								
									
										50
									
								
								values.yaml
									
									
									
									
									
								
							
							
						
						
									
										50
									
								
								values.yaml
									
									
									
									
									
								
							@@ -270,9 +270,53 @@ podDisruptionBudget: {}
 | 
				
			|||||||
#  maxUnavailable: 1
 | 
					#  maxUnavailable: 1
 | 
				
			||||||
#  minAvailable: 1
 | 
					#  minAvailable: 1
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## @section Network
 | 
					## @section NetworkPolicies
 | 
				
			||||||
## @param networkPolicies Deploy network policies based on the used container network interface (CNI) implementation - like calico or weave.
 | 
					## @param networkPolicies.enabled Enable network policies in general.
 | 
				
			||||||
networkPolicies: {}
 | 
					networkPolicies:
 | 
				
			||||||
 | 
					  enabled: false
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## @param networkPolicies.default.enabled Enable the network policy for accessing the application by default. For example to scape the metrics.
 | 
				
			||||||
 | 
					  ## @param networkPolicies.default.annotations Additional network policy annotations.
 | 
				
			||||||
 | 
					  ## @param networkPolicies.default.labels Additional network policy labels.
 | 
				
			||||||
 | 
					  ## @param networkPolicies.default.policyTypes List of policy types. Supported is ingress, egress or ingress and egress.
 | 
				
			||||||
 | 
					  ## @param networkPolicies.default.egress Concrete egress network policy implementation.
 | 
				
			||||||
 | 
					  ## @skip networkPolicies.default.egress Skip individual egress configuration.
 | 
				
			||||||
 | 
					  ## @param networkPolicies.default.ingress Concrete ingress network policy implementation.
 | 
				
			||||||
 | 
					  ## @skip networkPolicies.default.ingress Skip individual ingress configuration.
 | 
				
			||||||
 | 
					  default:
 | 
				
			||||||
 | 
					    enabled: false
 | 
				
			||||||
 | 
					    annotations: {}
 | 
				
			||||||
 | 
					    labels: {}
 | 
				
			||||||
 | 
					    policyTypes: []
 | 
				
			||||||
 | 
					    # - Egress
 | 
				
			||||||
 | 
					    # - Ingress
 | 
				
			||||||
 | 
					    egress: []
 | 
				
			||||||
 | 
					    ingress: []
 | 
				
			||||||
 | 
					    # Allow incoming HTTP traffic from prometheus.
 | 
				
			||||||
 | 
					    #
 | 
				
			||||||
 | 
					    # - from:
 | 
				
			||||||
 | 
					    #   - namespaceSelector:
 | 
				
			||||||
 | 
					    #       matchLabels:
 | 
				
			||||||
 | 
					    #         kubernetes.io/metadata.name: monitoring
 | 
				
			||||||
 | 
					    #     podSelector:
 | 
				
			||||||
 | 
					    #       matchLabels:
 | 
				
			||||||
 | 
					    #         app.kubernetes.io/name: prometheus
 | 
				
			||||||
 | 
					    #   ports:
 | 
				
			||||||
 | 
					    #   - port: http
 | 
				
			||||||
 | 
					    #     protocol: TCP
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    # Allow incoming HTTP traffic from ingress-nginx.
 | 
				
			||||||
 | 
					    #
 | 
				
			||||||
 | 
					    # - from:
 | 
				
			||||||
 | 
					    #   - namespaceSelector:
 | 
				
			||||||
 | 
					    #       matchLabels:
 | 
				
			||||||
 | 
					    #         kubernetes.io/metadata.name: ingress-nginx
 | 
				
			||||||
 | 
					    #     podSelector:
 | 
				
			||||||
 | 
					    #       matchLabels:
 | 
				
			||||||
 | 
					    #         app.kubernetes.io/name: ingress-nginx
 | 
				
			||||||
 | 
					    #   ports:
 | 
				
			||||||
 | 
					    #   - port: http
 | 
				
			||||||
 | 
					    #     protocol: TCP
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## @section Prometheus
 | 
					## @section Prometheus
 | 
				
			||||||
prometheus:
 | 
					prometheus:
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user