Changelog of the Helm Chart
0.5.12 (2025-04-28)
- Simplification of mounting the root-ca for an external database
- Fix for mounting the
third_party
volume - Removal of the possibility of privilege escalation in certain pods
- Elimination of duplicate volume mounts in offline mode
- Allow adding the ingress certificate/key directly to the values.yml file
0.5.11 (2025-02-27)
- Ability to add additional annotations to pods
- Ability to replicate the
web
andsidekiq_node
pods - Improved database performance in single-node deployment when the database is managed by the Helm chart
- Removal of privilege escalation in the
sidekiq_node
pod
0.5.9 (2024-11-14)
- Removal of exposing port 6380 for Redis
- Allow labeling pods via additional labels
- Replaced the cron deployment with a
sidekiq-master
container, and removed the cron service from the chart - Fixed certificate usage with MariaDB (adjusted mounting of the configuration file)
- Allowed privilege escalation for the
web-scanner
pod to enable nmap scans
0.5.8 (2024-07-12)
- Allowed privilege escalation for the
sidekiq_node
pod (necessary to run nmap with thecyberwatch
user directly inside the container; addedCAP_NET_RAW+ep
capability to the nmap binary in the Dockerfile)
0.5.7 (2024-07-02)
- Added an environment variable to indicate the presence of
container-scanner
- Added the
container-scanner
service (integrating the dedicated image as a service)
0.5.6 (2024-02-05)
- Added
resources.requests
to chart pods (requests set to 10% of defined limits)
0.5.5
- Added limitations (quotas) to configurable Helm chart pods in the values.yml file
0.5.2
- The Helm chart is now signed with a certificate
- Added the cyberwatch namespace to store chart elements
0.5.1
- Fixed the image name for MariaDB
0.5.0
This version facilitates deployment of Cyberwatch on a multi-node cluster. New features:
Generation of a self-signed certificate for the Ingress
Ability to specify container registry credentials from
values.yml
Specification of the number of replicas for the
sidekiq
containerRestart only containers impacted by a change in secrets or
ConfigMap
Specification of a unique Cyberwatch node name for a multi-node cluster
Specification of the IngressClass name to use if multiple IngressClasses are available
Reactivation of the
thirdParties
volume shared between theweb
andsidekiqNode
containers (necessary to transmit the.cab
file fromsidekiqNode
toweb
)