Changed
- Update PolicyExceptions to
v2beta1
.
v2beta1
.giantswarm.io/service_type
to giantswarm.io/service-type
..podMonitors.enabled
Helm value with default: true
.{{ .Release.Name }}-monitoring
service that was used in the old monitoring stack..global.podSecurityStandards.enforced
Helm value (defaults to false) to control PSP creation when.
When the flag is disabled (default) the PSS is created and the crd-controller
ClusterRole is updated with the permission
to use the created (flux-app-pvc-psp
) PSP. Pre kubernetes v1.25 upgrade and on v1.25 clusters where PSPs are no longer
available, this flag should be enabled to skip the creation of the PSP and the update to the CLusterRole..policyException.namespace
Helm value to control where Kyverno PolicyException is created, defaults to: giantswarm
.cilium.enforce
Helm value (defaults to false) to force creation of the Cilium network policy in
cases when Helm capability checks are not available..policyException.enforce
Helm value (defaults to false) to force creation of the Cilium policy in
cases when Helm capability checks are not available.kustomzie
+ manual based to be git
patch based and made the templates structure better for readability.notification-controller
endpoint in kustomize-controller
deployment settings to point to the controller in the same namespace.app.kubernetes.io/part-of: flux
labels from upstream resourcesapp.kubernetes.io/version: ...
labels from upstream resourcesapp.kubernetes.io/component: ...-controller
labels from upstream resourcesgsoci.azurecr.io
as the default container image registry.This part of our documentation refers to our vintage product. The content may be not valid anymore for our current product. Please check our new documentation hub for the latest state of our docs.