Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Windows update helm chart #1176

Open
wants to merge 23 commits into
base: main
Choose a base branch
from
Open

Windows update helm chart #1176

wants to merge 23 commits into from

Conversation

TmNguyen12
Copy link
Contributor

@TmNguyen12 TmNguyen12 commented Mar 7, 2025

Description

  • Adds daemonset_windows.yaml to the chart templates

  • Removed linux specific securityContexts

  • Added windowsNodeSelector param

  • Added securityContext.windowsOptions defaults

  • Update and add helm unit tests

  • do not merge until ready for public preview

Type of change

  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • New feature / enhancement (non-breaking change which adds functionality)
  • Security fix
  • Bug fix (non-breaking change which fixes an issue)

Checklist:

  • Add changelog entry following the contributing guide
  • Documentation has been updated
  • This change requires changes in testing:
    • unit tests
    • E2E tests

@TmNguyen12 TmNguyen12 requested a review from a team as a code owner March 7, 2025 01:39
@TmNguyen12 TmNguyen12 requested a review from kondracek-nr March 13, 2025 17:00
CHANGELOG.md Outdated
@@ -9,7 +9,7 @@ and this project adheres to [Semantic Versioning](http://semver.org/).

### 🚀 Enhancements
- Add options for Windows server 2019 and Windows server 2022 deployments in E2E-resources @TmNguyen12 [#1149](https://github.com/newrelic/nri-kubernetes/pull/1149)

- Add Windows Helm templates and unit tests for kubelet support @TmNguyen12 [#1176] (https://github.com/newrelic/nri-kubernetes/pull/1176)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Add Windows Helm templates and unit tests for kubelet support @TmNguyen12 [#1176] (https://github.com/newrelic/nri-kubernetes/pull/1176)
- Add Windows Helm templates and unit tests for kubelet support @TmNguyen12 [#1176](https://github.com/newrelic/nri-kubernetes/pull/1176)

@@ -192,6 +193,20 @@ integrations that you have configured.
| tolerations | list | `[]` | Sets pod's tolerations to node taints almost globally. (See [Affinities and tolerations](README.md#affinities-and-tolerations)) |
| updateStrategy | object | See `values.yaml` | Update strategy for the deployed DaemonSets. |
| verboseLog | bool | `false` | Sets the debug logs to this integration or all integrations if it is set globally. Can be configured also with `global.verboseLog` |
| windowsNodeSelector | object | `{ kubernetes.io/os: windows, node.kubernetes.io/windows-build: BUILD_NUMBER }` | Sets windows pod's selector. Refer to [Windows support](#tbd) |
| windowsOsList.agentImage | string | `""` | Overrides the infrastructure-agent windows image |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Are we not able to auto-detect the image we want? We seem to already be using taints on a windows-flavoured deployment/daemonset.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We can. This option is if people wanted to override the auto-selected images (like I am for development purposes)

{{- end }}
nodeSelector:
{{- if $.Values.kubelet.windowsNodeSelector }}
{{ toYaml $.Values.kubelet.windowsNodeSelector | indent 8 }}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
{{ toYaml $.Values.kubelet.windowsNodeSelector | indent 8 }}
{{- toYaml $.Values.kubelet.windowsNodeSelector | indent 8 }}

@dbudziwojskiNR
Copy link
Contributor

Are we planning on remove the enableWindows flag in the future? Or is this flag intended to be in the agent.

@TmNguyen12
Copy link
Contributor Author

Are we planning on remove the enableWindows flag in the future? Or is this flag intended to be in the agent.

Was intended to be part of the agent, but open to discuss if you have concerns

@TmNguyen12 TmNguyen12 changed the title WIP: Windows update helm chart Windows update helm chart Mar 27, 2025
CHANGELOG.md Outdated

### ⛓️ Dependencies
- Updated github.com/spf13/viper to v1.20.0 - [Changelog 🔗](https://github.com/spf13/viper/releases/tag/v1.20.0)
- Updated go to v1.24.1
- Updated golang.org/x/crypto to v0.36.0
- Updated github.com/google/go-cmp to v0.7.0 - [Changelog 🔗](https://github.com/google/go-cmp/releases/tag/v0.7.0)

## v3.36.0 - 2025-03-24
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So we can't change releases that have already been cut. You'll need to stick to adding any new changes in the unreleased section. Details here

@@ -2,7 +2,7 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: windows-server-2019
name: {{ .Release.Name }}-windows-server-2019
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Appending to a variable sized string could cause installation failure if the total size exceeds DNS limits. You'll need to use several helper methods from the common library to do this safely. Example here: usage and helper

@@ -2,7 +2,7 @@
apiVersion: apps/v1
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could we remove this .Values.windows.is2019 config since we're using this node selector: node.kubernetes.io/windows-build: 10.0.17763?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In that scenario, e2e-resources when installed will always have 2 windows pods stuck in "Pending" because they're looking for a node.

@@ -47,7 +51,7 @@ spec:
apiVersion: apps/v1
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same thing here for Windows 2022

@@ -136,6 +136,7 @@ integrations that you have configured.
| customSecretName | string | `""` | In case you don't want to have the license key in you values, this allows you to point to a user created secret to get the key from there. Can be configured also with `global.customSecretName` |
| dnsConfig | object | `{}` | Sets pod's dnsConfig. Can be configured also with `global.dnsConfig` |
| enableProcessMetrics | bool | `false` | Collect detailed metrics from processes running in the host. This defaults to true for accounts created before July 20, 2020. ref: https://docs.newrelic.com/docs/release-notes/infrastructure-release-notes/infrastructure-agent-release-notes/new-relic-infrastructure-agent-1120 |
| enableWindows | bool | `false` | Enables collection of metrics from Windows containers. Refer to the [Windows support](#tbd) section for more details. |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could we have this link to a GH README while we wait for docs on NR? That way folks don't think it's a broken link.

@@ -116,3 +116,12 @@ readOnlyRootFilesystem: true

{{- toYaml $finalSecurityContext -}}
{{- end -}}

{{- define "windowsIntegrationImage" -}}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this the infrastructure image? If so, we may want to call it windowsInfrastructureImage to be clear

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We also may want to use namespacing of these helpers: nriKubernetes. windowsInfrastructureImage

@@ -4,8 +4,10 @@ kind: PodSecurityPolicy
metadata:
name: privileged-{{ include "newrelic.common.naming.fullname" . }}
spec:
{{- if not .Values.enableWindows }}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is there a change to the linux experience if this is off? Enabling windows shouldn't cause a regression on the linux experience, if it does, we should create a new security policy just for Windows.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants