Skip to content

Commit

Permalink
add support for .spec.topologySpreadConstraints on Postee server
Browse files Browse the repository at this point in the history
- solves aquasecurity#617
- allow the end user to define topologySpreadConstraints
- we focus on server instance first because we do not
  think that it is that important to spread the UI to
  different availability zones
  • Loading branch information
smangels committed Sep 29, 2023
1 parent ba3603d commit 3267960
Show file tree
Hide file tree
Showing 2 changed files with 7 additions and 0 deletions.
4 changes: 4 additions & 0 deletions deploy/helm/postee/templates/postee.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -117,6 +117,10 @@ spec:
{{- end }}
resources:
{{- toYaml .Values.resources | nindent 12 }}
{{- with .Values.topologySpreadConstraints }}
topologySpreadConstraints:
{{- toYaml . | nindent 8 }}
{{- end }}
volumes:
- secret:
secretName: {{ $fullName }}-secret
Expand Down
3 changes: 3 additions & 0 deletions deploy/helm/postee/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -210,6 +210,7 @@ imageInit:
tag: "1.34"

imagePullSecrets: []
topologySpreadConstraints: []
nameOverride: ""
fullnameOverride: ""

Expand Down Expand Up @@ -281,6 +282,8 @@ tolerations: []

affinity: {}



## Enable persistence using Persistent Volume Claims
## ref: http://kubernetes.io/docs/user-guide/persistent-volumes/
##
Expand Down

0 comments on commit 3267960

Please sign in to comment.