Skip to content

Commit

Permalink
ISSUE-761: Add containerSecurityPolicy to clustering-service deployment
Browse files Browse the repository at this point in the history
  • Loading branch information
rbogendoerfer committed Sep 9, 2024
1 parent e53c8c2 commit 1256f6f
Show file tree
Hide file tree
Showing 3 changed files with 15 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,10 @@ spec:
envFrom:
- configMapRef:
name: {{ template "clusteringServiceEnvironmentConfig" }}
{{- if .Values.containerSecurityContext }}
securityContext:
{{ toYaml .Values.containerSecurityContext | indent 10 }}
{{- end }}
resources:
requests:
cpu: "{{ .Values.resources.requests.cpu }}"
Expand Down
4 changes: 4 additions & 0 deletions charts/pega/charts/hazelcast/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -62,3 +62,7 @@ server:
# Apply securityContext to clustering service pods. For example to set `runAsUser: 1000`:
# securityContext:
# runAsUser: 1000

# Apply securityContext to clustering service containers. For example to set `allowPrivilegeEscalation: false`:
# containerSecurityContext:
# allowPrivilegeEscalation: false
7 changes: 7 additions & 0 deletions charts/pega/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -610,6 +610,13 @@ hazelcast:
# Enter the external secret for these credentials below.
external_secret_name: ""

# Apply securityContext to clustering service pods. For example to set `runAsUser: 1000`:
# securityContext:
# runAsUser: 1000
# Apply securityContext to clustering service containers. For example to set `allowPrivilegeEscalation: false`:
# containerSecurityContext:
# allowPrivilegeEscalation: false

# Stream (externalized Kafka service) settings.
stream:
# Beginning with Pega Platform '23, enabled by default; when disabled, your deployment does not use a"Kafka stream service" configuration.
Expand Down

0 comments on commit 1256f6f

Please sign in to comment.