Overwrite security context and disable graphql init container #370
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary
Added possibility to overwrite security context and to disable init container for graphql db upgrades.
Importance
When using Istio, having the init container causes the the application to malfunction with Istio sidecar injection.
If we update the chart, we don't need the database to always be upgrading. So either adding the possibility to overwrite the init container security context (Istio suggestion
Set the uid of the init container to 1337 using runAsUser. 1337 is the uid used by the sidecar proxy. Traffic sent by this uid is not captured by the Istio's iptables rule. Application container traffic will still be captured as usual.
) or to completely disable would be pretty helpful.Checklist
This PR:
changes/
directory (if appropriate)