Skip to content

Commit 89e180d

Browse files
committed
bumped terraform on sumologic's provider terraform
1 parent d625afc commit 89e180d

File tree

2 files changed

+84
-1
lines changed

2 files changed

+84
-1
lines changed

deploy/helm/sumologic/conf/setup/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ terraform {
22
required_providers {
33
sumologic = {
44
source = "sumologic/sumologic"
5-
version = ">= 3.0.9, < 3.1.0"
5+
version = "3.0.12"
66
}
77
kubernetes = {
88
source = "hashicorp/kubernetes"

deploy/helm/sumologic/myvalues.yaml

Lines changed: 83 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,83 @@
1+
sumologic:
2+
accessId: sukfAAu9YwLxSD
3+
accessKey: sdsp8iClNyxic5nk7xD227tszMfj9of5GbveQ2UvlP6iyJ9hRIXdCHrexXSY4NJu
4+
endpoint: https://long-api.sumologic.net/api/v1/
5+
clusterName: vagrant-box-sa
6+
scc:
7+
create: true
8+
9+
otellogs:
10+
daemonset:
11+
containers:
12+
otelcol:
13+
securityContext:
14+
privileged: true
15+
initContainers:
16+
changeowner:
17+
securityContext:
18+
privileged: true
19+
20+
tailing-sidecar-operator:
21+
enabled: true
22+
23+
kube-prometheus-stack:
24+
prometheus-node-exporter:
25+
service:
26+
port: 9200
27+
targetPort: 9200
28+
29+
prometheusOperator:
30+
denyNamespaces:
31+
- openshift-apiserver
32+
- openshift-apiserver-operator
33+
- openshift-authentication
34+
- openshift-authentication-operator
35+
- openshift-cloud-credential-operator
36+
- openshift-cluster-machine-approver
37+
- openshift-cluster-samples-operator
38+
- openshift-cluster-storage-operator
39+
- openshift-cluster-version
40+
- openshift-config-operator
41+
- openshift-console-operator
42+
- openshift-controller-manager
43+
- openshift-controller-manager-operator
44+
- openshift-dns,openshift-dns-operator
45+
- openshift-etcd-operator
46+
- openshift-image-registry
47+
- openshift-ingress
48+
- openshift-ingress-operator
49+
- openshift-insights
50+
- openshift-kube-apiserver
51+
- openshift-kube-apiserver-operator
52+
- openshift-kube-controller-manager
53+
- openshift-kube-controller-manager-operator
54+
- openshift-kube-scheduler
55+
- openshift-kube-scheduler-operator
56+
- openshift-kube-storage-version-migrator
57+
- openshift-kube-storage-version-migrator-operator
58+
- openshift-machine-api
59+
- openshift-machine-config-operator
60+
- openshift-marketplace
61+
- openshift-monitoring
62+
- openshift-multus
63+
- openshift-oauth-apiserver
64+
- openshift-operator-lifecycle-manager
65+
- openshift-sdn
66+
- openshift-service-ca-operator
67+
- openshift-user-workload-monitoring
68+
69+
metrics-server:
70+
enabled: true
71+
apiService:
72+
create: false
73+
global:
74+
compatibility:
75+
## Compatibility adaptations for Openshift
76+
##
77+
openshift:
78+
## @param global.compatibility.openshift.adaptSecurityContext Adapt the securityContext sections of the deployment to make them compatible with Openshift restricted-v2 SCC: remove runAsUser, runAsGroup and fsGroup and let the platform use their allowed default IDs. Possible values: auto (apply if the detected running cluster is Openshift), force (perform the adaptation always), disabled (do not perform adaptation)
79+
##
80+
adaptSecurityContext: auto
81+
82+
telegraf-operator:
83+
enabled: true

0 commit comments

Comments
 (0)