compliantkubernetes-apps
compliantkubernetes-apps copied to clipboard
Update helm/trivy-operator to 0.26.0 and trivy-operator to 0.24.0
[!warning] This is a public repository, ensure not to disclose:
- [x] personal data beyond what is necessary for interacting with this pull request, nor
- [x] business confidential information, such as customer names.
What kind of PR is this?
Required: Mark one of the following that is applicable:
- [ ] kind/feature
- [x] kind/improvement
- [ ] kind/deprecation
- [ ] kind/documentation
- [ ] kind/clean-up
- [ ] kind/bug
- [ ] kind/other
Optional: Mark one or more of the following that are applicable:
[!important] Breaking changes should be marked
kind/admin-change
orkind/dev-change
depending on type Critical security fixes should be marked withkind/security
- [ ] kind/admin-change
- [ ] kind/dev-change
- [ ] kind/security
- [ ] [kind/adr](set-me)
What does this PR do / why do we need this PR?
Upgrades Trivy-operator helm chart to version 0.26.0 which run Trivy-operator app version 0.24.0.
- Fixes https://github.com/elastisys/compliantkubernetes-apps/issues/2169
Information to reviewers
Checklist
- [ ] Proper commit message prefix on all commits
- Change checks:
- [ ] The change is transparent
- [ ] The change is disruptive
- [ ] The change requires no migration steps
- [x] The change requires migration steps
- [x] The change updates CRDs
- [ ] The change updates the config and the schema
- Documentation checks:
- [x] The public documentation required no updates
- [ ] The public documentation required an update - [link to change](set-me)
- Metrics checks:
- [ ] The metrics are still exposed and present in Grafana after the change
- [x] The metrics names didn't change (Grafana dashboards and Prometheus alerts required no updates)
- [ ] The metrics names did change (Grafana dashboards and Prometheus alerts required an update)
- Logs checks:
- [x] The logs do not show any errors after the change
- PodSecurityPolicy checks:
- [ ] Any changed Pod is covered by Kubernetes Pod Security Standards
- [ ] Any changed Pod is covered by Gatekeeper Pod Security Policies
- [x] The change does not cause any Pods to be blocked by Pod Security Standards or Policies
- NetworkPolicy checks:
- [ ] Any changed Pod is covered by Network Policies
- [ ] The change does not cause any dropped packets in the NetworkPolicy Dashboard
- Audit checks:
- [ ] The change does not cause any unnecessary Kubernetes audit events
- [ ] The change requires changes to Kubernetes audit policy
- Falco checks:
- [ ] The change does not cause any alerts to be generated by Falco
- Bug checks:
- [ ] The bug fix is covered by regression tests