compliantkubernetes-apps icon indicating copy to clipboard operation
compliantkubernetes-apps copied to clipboard

Update helm/trivy-operator to 0.26.0 and trivy-operator to 0.24.0

Open OlleLarsson opened this issue 4 weeks ago • 1 comments

[!warning] This is a public repository, ensure not to disclose:

  • [x] personal data beyond what is necessary for interacting with this pull request, nor
  • [x] business confidential information, such as customer names.

What kind of PR is this?

Required: Mark one of the following that is applicable:

  • [ ] kind/feature
  • [x] kind/improvement
  • [ ] kind/deprecation
  • [ ] kind/documentation
  • [ ] kind/clean-up
  • [ ] kind/bug
  • [ ] kind/other

Optional: Mark one or more of the following that are applicable:

[!important] Breaking changes should be marked kind/admin-change or kind/dev-change depending on type Critical security fixes should be marked with kind/security

  • [ ] kind/admin-change
  • [ ] kind/dev-change
  • [ ] kind/security
  • [ ] [kind/adr](set-me)

What does this PR do / why do we need this PR?

Upgrades Trivy-operator helm chart to version 0.26.0 which run Trivy-operator app version 0.24.0.

  • Fixes https://github.com/elastisys/compliantkubernetes-apps/issues/2169

Information to reviewers

Checklist

  • [ ] Proper commit message prefix on all commits
  • Change checks:
    • [ ] The change is transparent
    • [ ] The change is disruptive
    • [ ] The change requires no migration steps
    • [x] The change requires migration steps
    • [x] The change updates CRDs
    • [ ] The change updates the config and the schema
  • Documentation checks:
  • Metrics checks:
    • [ ] The metrics are still exposed and present in Grafana after the change
    • [x] The metrics names didn't change (Grafana dashboards and Prometheus alerts required no updates)
    • [ ] The metrics names did change (Grafana dashboards and Prometheus alerts required an update)
  • Logs checks:
    • [x] The logs do not show any errors after the change
  • PodSecurityPolicy checks:
    • [ ] Any changed Pod is covered by Kubernetes Pod Security Standards
    • [ ] Any changed Pod is covered by Gatekeeper Pod Security Policies
    • [x] The change does not cause any Pods to be blocked by Pod Security Standards or Policies
  • NetworkPolicy checks:
    • [ ] Any changed Pod is covered by Network Policies
    • [ ] The change does not cause any dropped packets in the NetworkPolicy Dashboard
  • Audit checks:
    • [ ] The change does not cause any unnecessary Kubernetes audit events
    • [ ] The change requires changes to Kubernetes audit policy
  • Falco checks:
    • [ ] The change does not cause any alerts to be generated by Falco
  • Bug checks:
    • [ ] The bug fix is covered by regression tests

OlleLarsson avatar Jan 29 '25 12:01 OlleLarsson