Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package kubeshark-cli for openSUSE:Factory checked in at 2025-11-26 17:18:28 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/kubeshark-cli (Old) and /work/SRC/openSUSE:Factory/.kubeshark-cli.new.14147 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "kubeshark-cli" Wed Nov 26 17:18:28 2025 rev:24 rq:1320123 version:52.10.0 Changes: -------- --- /work/SRC/openSUSE:Factory/kubeshark-cli/kubeshark-cli.changes 2025-10-04 18:53:12.974704204 +0200 +++ /work/SRC/openSUSE:Factory/.kubeshark-cli.new.14147/kubeshark-cli.changes 2025-11-26 17:18:38.698310351 +0100 @@ -1,0 +2,16 @@ +Wed Nov 26 06:47:35 UTC 2025 - Johannes Kastl <[email protected]> + +- Update to version 52.10.0: + * Bump the Helm chart version to 52.10.0 + * Bump the Helm chart version to 52.10.0 + * Update kubeshark.co references (#1807) + * Migrate from `kubeshark.co` to `kubehq.com` (#1805) + * Adding Slack Support (#1804) + * Make host-network in worker daemonset configurable (#1803) + * Revert "Add `-save-objects-pcaps` worker command flag + (#1794)" (#1802) + * Add volume for snapshots in hub (#1801) + * Add `-save-objects-pcaps` worker command flag (#1794) + * Set default dbMaxSize to 500Mi (#1796) + +------------------------------------------------------------------- Old: ---- kubeshark-cli-52.9.0.obscpio New: ---- kubeshark-cli-52.10.0.obscpio ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ kubeshark-cli.spec ++++++ --- /var/tmp/diff_new_pack.EJFsJ0/_old 2025-11-26 17:18:39.954363338 +0100 +++ /var/tmp/diff_new_pack.EJFsJ0/_new 2025-11-26 17:18:39.958363507 +0100 @@ -19,7 +19,7 @@ %define executable_name kubeshark Name: kubeshark-cli -Version: 52.9.0 +Version: 52.10.0 Release: 0 Summary: CLI for the API traffic analyzer for Kubernetes License: Apache-2.0 ++++++ _service ++++++ --- /var/tmp/diff_new_pack.EJFsJ0/_old 2025-11-26 17:18:40.058367726 +0100 +++ /var/tmp/diff_new_pack.EJFsJ0/_new 2025-11-26 17:18:40.062367895 +0100 @@ -3,7 +3,7 @@ <param name="url">https://github.com/kubeshark/kubeshark</param> <param name="scm">git</param> <param name="exclude">.git</param> - <param name="revision">v52.9.0</param> + <param name="revision">v52.10.0</param> <param name="versionformat">@PARENT_TAG@</param> <param name="versionrewrite-pattern">v(.*)</param> <param name="changesgenerate">enable</param> ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.EJFsJ0/_old 2025-11-26 17:18:40.098369414 +0100 +++ /var/tmp/diff_new_pack.EJFsJ0/_new 2025-11-26 17:18:40.118370257 +0100 @@ -1,6 +1,6 @@ <servicedata> <service name="tar_scm"> <param name="url">https://github.com/kubeshark/kubeshark</param> - <param name="changesrevision">d640128e85f69a10fdb1b28cad3e9870c1b1f8dc</param></service></servicedata> + <param name="changesrevision">03a53ad6d5ce6861fe500cd5cd0d8a08f3db5492</param></service></servicedata> (No newline at EOF) ++++++ kubeshark-cli-52.9.0.obscpio -> kubeshark-cli-52.10.0.obscpio ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/README.md new/kubeshark-cli-52.10.0/README.md --- old/kubeshark-cli-52.9.0/README.md 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/README.md 2025-11-25 20:49:50.000000000 +0100 @@ -15,15 +15,13 @@ <a href="https://discord.gg/WkvRGMUcx7"> <img alt="Discord" src="https://img.shields.io/discord/1042559155224973352?logo=Discord&style=flat-square&label=discord"> </a> - <a href="https://join.slack.com/t/kubeshark/shared_invite/zt-1m90td3n7-VHxN_~V5kVp80SfQW3SfpA"> + <a href="https://join.slack.com/t/kubeshark/shared_invite/zt-3jdcdgxdv-1qNkhBh9c6CFoE7bSPkpBQ"> <img alt="Slack" src="https://img.shields.io/badge/slack-join_chat-green?logo=Slack&style=flat-square&label=slack"> </a> </p> - <p align="center"> <b> - Want to see Kubeshark in action right now? Visit this - <a href="https://demo.kubeshark.co/">live demo deployment</a> of Kubeshark. + We're currently experiencing issues and our team is working around the clock to resolve them as quickly as possible. We'll keep you updated once everything is back to normal. In the meantime, feel free to reach out to us on <a href="https://join.slack.com/t/kubeshark/shared_invite/zt-3jdcdgxdv-1qNkhBh9c6CFoE7bSPkpBQ">Slack</a> or email us at <a href="mailto:[email protected]">[email protected]</a>. </b> </p> @@ -42,7 +40,7 @@  ## Getting Started -Download **Kubeshark**'s binary distribution [latest release](https://github.com/kubeshark/kubeshark/releases/latest) or use one of the following methods to deploy **Kubeshark**. The [web-based dashboard](https://docs.kubeshark.co/en/ui) should open in your browser, showing a real-time view of your cluster's traffic. +Download **Kubeshark**'s binary distribution [latest release](https://github.com/kubeshark/kubeshark/releases/latest) or use one of the following methods to deploy **Kubeshark**. The [web-based dashboard](https://docs.kubehq.com/en/ui) should open in your browser, showing a real-time view of your cluster's traffic. ### Homebrew @@ -63,7 +61,7 @@ Add the Helm repository and install the chart: ```shell -helm repo add kubeshark https://helm.kubeshark.co +helm repo add kubeshark https://helm.kubehq.com helm install kubeshark kubeshark/kubeshark ``` Follow the on-screen instructions how to connect to the dashboard. @@ -79,7 +77,7 @@ ## Documentation -To learn more, read the [documentation](https://docs.kubeshark.co). +To learn more, read the [documentation](https://docs.kubehq.com). ## Contributing diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/cmd/pcapDumpRunner.go new/kubeshark-cli-52.10.0/cmd/pcapDumpRunner.go --- old/kubeshark-cli-52.9.0/cmd/pcapDumpRunner.go 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/cmd/pcapDumpRunner.go 2025-11-25 20:49:50.000000000 +0100 @@ -24,7 +24,7 @@ ) const ( - label = "app.kubeshark.co/app=worker" + label = "app.kubehq.com/app=worker" srcDir = "pcapdump" maxSnaplen uint32 = 262144 maxTimePerFile = time.Minute * 5 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/config/configStructs/tapConfig.go new/kubeshark-cli-52.10.0/config/configStructs/tapConfig.go --- old/kubeshark-cli-52.9.0/config/configStructs/tapConfig.go 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/config/configStructs/tapConfig.go 2025-11-25 20:49:50.000000000 +0100 @@ -207,7 +207,7 @@ } type ReleaseConfig struct { - Repo string `yaml:"repo" json:"repo" default:"https://helm.kubeshark.co"` + Repo string `yaml:"repo" json:"repo" default:"https://helm.kubehq.com"` Name string `yaml:"name" json:"name" default:"kubeshark"` Namespace string `yaml:"namespace" json:"namespace" default:"default"` } @@ -305,11 +305,16 @@ StorageSize string `yaml:"storageSize" json:"storageSize" default:"1Gi"` } +type SnapshotsConfig struct { + StorageClass string `yaml:"storageClass" json:"storageClass" default:""` + StorageSize string `yaml:"storageSize" json:"storageSize" default:"1Gi"` +} + type CaptureConfig struct { Stopped bool `yaml:"stopped" json:"stopped" default:"false"` StopAfter string `yaml:"stopAfter" json:"stopAfter" default:"5m"` Raw RawCaptureConfig `yaml:"raw" json:"raw"` - DbMaxSize string `yaml:"dbMaxSize" json:"dbMaxSize" default:""` + DbMaxSize string `yaml:"dbMaxSize" json:"dbMaxSize" default:"500Mi"` } type TapConfig struct { @@ -320,6 +325,7 @@ ExcludedNamespaces []string `yaml:"excludedNamespaces" json:"excludedNamespaces" default:"[]"` BpfOverride string `yaml:"bpfOverride" json:"bpfOverride" default:""` Capture CaptureConfig `yaml:"capture" json:"capture"` + Snapshots SnapshotsConfig `yaml:"snapshots" json:"snapshots"` Release ReleaseConfig `yaml:"release" json:"release"` PersistentStorage bool `yaml:"persistentStorage" json:"persistentStorage" default:"false"` PersistentStorageStatic bool `yaml:"persistentStorageStatic" json:"persistentStorageStatic" default:"false"` @@ -363,6 +369,7 @@ Misc MiscConfig `yaml:"misc" json:"misc"` SecurityContext SecurityContextConfig `yaml:"securityContext" json:"securityContext"` MountBpf bool `yaml:"mountBpf" json:"mountBpf" default:"true"` + HostNetwork bool `yaml:"hostNetwork" json:"hostNetwork" default:"true"` } func (config *TapConfig) PodRegex() *regexp.Regexp { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/Chart.yaml new/kubeshark-cli-52.10.0/helm-chart/Chart.yaml --- old/kubeshark-cli-52.9.0/helm-chart/Chart.yaml 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/helm-chart/Chart.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -1,8 +1,8 @@ apiVersion: v2 name: kubeshark -version: "52.9.0" +version: "52.10.0" description: The API Traffic Analyzer for Kubernetes -home: https://kubeshark.co +home: https://kubehq.com keywords: - kubeshark - packet capture @@ -16,9 +16,9 @@ - api kubeVersion: '>= 1.16.0-0' maintainers: - - email: [email protected] + - email: [email protected] name: Kubeshark - url: https://kubeshark.co + url: https://kubehq.com sources: - https://github.com/kubeshark/kubeshark/tree/master/helm-chart type: application diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/README.md new/kubeshark-cli-52.10.0/helm-chart/README.md --- old/kubeshark-cli-52.9.0/helm-chart/README.md 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/helm-chart/README.md 2025-11-25 20:49:50.000000000 +0100 @@ -5,7 +5,7 @@ Add the Helm repo for Kubeshark: ```shell -helm repo add kubeshark https://helm.kubeshark.co +helm repo add kubeshark https://helm.kubehq.com ``` then install Kubeshark: @@ -69,7 +69,7 @@ --set license=YOUR_LICENSE_GOES_HERE ``` -Get your license from Kubeshark's [Admin Console](https://console.kubeshark.co/). +Get your license from Kubeshark's [Admin Console](https://console.kubehq.com/). ## Installing with Ingress (EKS) enabled @@ -120,118 +120,121 @@ ## Configuration -| Parameter | Description | Default | -|-------------------------------------------|-----------------------------------------------|---------------------------------------------------------| -| `tap.docker.registry` | Docker registry to pull from | `docker.io/kubeshark` | -| `tap.docker.tag` | Tag of the Docker images | `latest` | -| `tap.docker.tagLocked` | Lock the Docker image tags to prevent automatic upgrades to the latest branch image version. | `true` | -| `tap.docker.tagLocked` | If `false` - use latest minor tag | `true` | -| `tap.docker.imagePullPolicy` | Kubernetes image pull policy | `Always` | -| `tap.docker.imagePullSecrets` | Kubernetes secrets to pull the images | `[]` | -| `tap.docker.overrideImage` | Can be used to directly override image names | `""` | -| `tap.docker.overrideTag` | Can be used to override image tags | `""` | -| `tap.proxy.hub.srvPort` | Hub server port. Change if already occupied. | `8898` | -| `tap.proxy.worker.srvPort` | Worker server port. Change if already occupied.| `48999` | -| `tap.proxy.front.port` | Front service port. Change if already occupied.| `8899` | -| `tap.proxy.host` | Change to 0.0.0.0 top open up to the world. | `127.0.0.1` | -| `tap.regex` | Target (process traffic from) pods that match regex | `.*` | -| `tap.namespaces` | Target pods in namespaces | `[]` | -| `tap.excludedNamespaces` | Exclude pods in namespaces | `[]` | -| `tap.bpfOverride` | When using AF_PACKET as a traffic capture backend, override any existing pod targeting rules and set explicit BPF expression (e.g. `net 0.0.0.0/0`). | `[]` | -| `tap.capture.stopped` | Set to `false` to have traffic processing start automatically. When set to `true`, traffic processing is stopped by default, resulting in almost no resource consumption (e.g. Kubeshark is dormant). This property can be dynamically control via the dashboard. | `false` | -| `tap.capture.stopAfter` | Set to a duration (e.g. `30s`) to have traffic processing stop after no websocket activity between worker and hub. | `30s` | -| `tap.capture.raw.enabled` | Enable raw capture of packets and syscalls to disk for offline analysis | `false` | -| `tap.capture.raw.storageSize` | Maximum storage size for raw capture files (supports K8s quantity format: `1Gi`, `500Mi`, etc.) | `1Gi` | -| `tap.capture.dbMaxSize` | Maximum size for capture database (e.g., `4Gi`, `2000Mi`). When empty, automatically uses 80% of allocated storage (`tap.storageLimit`). | `""` | -| `tap.release.repo` | URL of the Helm chart repository | `https://helm.kubeshark.co` | -| `tap.release.name` | Helm release name | `kubeshark` | -| `tap.release.namespace` | Helm release namespace | `default` | -| `tap.persistentStorage` | Use `persistentVolumeClaim` instead of `emptyDir` | `false` | -| `tap.persistentStorageStatic` | Use static persistent volume provisioning (explicitly defined `PersistentVolume` ) | `false` | -| `tap.persistentStoragePvcVolumeMode` | Set the pvc volume mode (Filesystem\|Block) | `Filesystem` | -| `tap.efsFileSytemIdAndPath` | [EFS file system ID and, optionally, subpath and/or access point](https://github.com/kubernetes-sigs/aws-efs-csi-driver/blob/master/examples/kubernetes/access_points/README.md) `<FileSystemId>:<Path>:<AccessPointId>` | "" | -| `tap.storageLimit` | Limit of either the `emptyDir` or `persistentVolumeClaim` | `5Gi` | -| `tap.storageClass` | Storage class of the `PersistentVolumeClaim` | `standard` | -| `tap.dryRun` | Preview of all pods matching the regex, without tapping them | `false` | -| `tap.dnsConfig.nameservers` | Nameservers to use for DNS resolution | `[]` | -| `tap.dnsConfig.searches` | Search domains to use for DNS resolution | `[]` | -| `tap.dnsConfig.options` | DNS options to use for DNS resolution | `[]` | -| `tap.resources.hub.limits.cpu` | CPU limit for hub | `""` (no limit) | -| `tap.resources.hub.limits.memory` | Memory limit for hub | `5Gi` | -| `tap.resources.hub.requests.cpu` | CPU request for hub | `50m` | -| `tap.resources.hub.requests.memory` | Memory request for hub | `50Mi` | -| `tap.resources.sniffer.limits.cpu` | CPU limit for sniffer | `""` (no limit) | -| `tap.resources.sniffer.limits.memory` | Memory limit for sniffer | `3Gi` | -| `tap.resources.sniffer.requests.cpu` | CPU request for sniffer | `50m` | -| `tap.resources.sniffer.requests.memory` | Memory request for sniffer | `50Mi` | -| `tap.resources.tracer.limits.cpu` | CPU limit for tracer | `""` (no limit) | -| `tap.resources.tracer.limits.memory` | Memory limit for tracer | `3Gi` | -| `tap.resources.tracer.requests.cpu` | CPU request for tracer | `50m` | -| `tap.resources.tracer.requests.memory` | Memory request for tracer | `50Mi` | -| `tap.probes.hub.initialDelaySeconds` | Initial delay before probing the hub | `15` | -| `tap.probes.hub.periodSeconds` | Period between probes for the hub | `10` | -| `tap.probes.hub.successThreshold` | Number of successful probes before considering the hub healthy | `1` | -| `tap.probes.hub.failureThreshold` | Number of failed probes before considering the hub unhealthy | `3` | -| `tap.probes.sniffer.initialDelaySeconds` | Initial delay before probing the sniffer | `15` | -| `tap.probes.sniffer.periodSeconds` | Period between probes for the sniffer | `10` | -| `tap.probes.sniffer.successThreshold` | Number of successful probes before considering the sniffer healthy | `1` | -| `tap.probes.sniffer.failureThreshold` | Number of failed probes before considering the sniffer unhealthy | `3` | -| `tap.serviceMesh` | Capture traffic from service meshes like Istio, Linkerd, Consul, etc. | `true` | -| `tap.tls` | Capture the encrypted/TLS traffic from cryptography libraries like OpenSSL | `true` | -| `tap.disableTlsLog` | Suppress logging for TLS/eBPF | `true` | -| `tap.labels` | Kubernetes labels to apply to all Kubeshark resources | `{}` | -| `tap.annotations` | Kubernetes annotations to apply to all Kubeshark resources | `{}` | -| `tap.nodeSelectorTerms.workers` | Node selector terms for workers components | `[{"matchExpressions":[{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]` | -| `tap.nodeSelectorTerms.hub` | Node selector terms for hub component | `[{"matchExpressions":[{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]` | -| `tap.nodeSelectorTerms.front` | Node selector terms for front-end component | `[{"matchExpressions":[{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]` | -| `tap.priorityClass` | Priority class name for Kubeshark components | `""` | -| `tap.tolerations.workers` | Tolerations for workers components | `[ {"operator": "Exists", "effect": "NoExecute"}` | -| `tap.tolerations.hub` | Tolerations for hub component | `[]` | -| `tap.tolerations.front` | Tolerations for front-end component | `[]` | -| `tap.auth.enabled` | Enable authentication | `false` | -| `tap.auth.type` | Authentication type (1 option available: `saml`) | `saml` | -| `tap.auth.approvedEmails` | List of approved email addresses for authentication | `[]` | -| `tap.auth.approvedDomains` | List of approved email domains for authentication | `[]` | -| `tap.auth.saml.idpMetadataUrl` | SAML IDP metadata URL <br/>(effective, if `tap.auth.type = saml`) | `` | -| `tap.auth.saml.x509crt` | A self-signed X.509 `.cert` contents <br/>(effective, if `tap.auth.type = saml`) | `` | -| `tap.auth.saml.x509key` | A self-signed X.509 `.key` contents <br/>(effective, if `tap.auth.type = saml`) | `` | -| `tap.auth.saml.roleAttribute` | A SAML attribute name corresponding to user's authorization role <br/>(effective, if `tap.auth.type = saml`) | `role` | +| Parameter | Description | Default | +|-------------------------------------------|-----------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| `tap.docker.registry` | Docker registry to pull from | `docker.io/kubeshark` | +| `tap.docker.tag` | Tag of the Docker images | `latest` | +| `tap.docker.tagLocked` | Lock the Docker image tags to prevent automatic upgrades to the latest branch image version. | `true` | +| `tap.docker.tagLocked` | If `false` - use latest minor tag | `true` | +| `tap.docker.imagePullPolicy` | Kubernetes image pull policy | `Always` | +| `tap.docker.imagePullSecrets` | Kubernetes secrets to pull the images | `[]` | +| `tap.docker.overrideImage` | Can be used to directly override image names | `""` | +| `tap.docker.overrideTag` | Can be used to override image tags | `""` | +| `tap.proxy.hub.srvPort` | Hub server port. Change if already occupied. | `8898` | +| `tap.proxy.worker.srvPort` | Worker server port. Change if already occupied.| `48999` | +| `tap.proxy.front.port` | Front service port. Change if already occupied.| `8899` | +| `tap.proxy.host` | Change to 0.0.0.0 top open up to the world. | `127.0.0.1` | +| `tap.regex` | Target (process traffic from) pods that match regex | `.*` | +| `tap.namespaces` | Target pods in namespaces | `[]` | +| `tap.excludedNamespaces` | Exclude pods in namespaces | `[]` | +| `tap.bpfOverride` | When using AF_PACKET as a traffic capture backend, override any existing pod targeting rules and set explicit BPF expression (e.g. `net 0.0.0.0/0`). | `[]` | +| `tap.capture.stopped` | Set to `false` to have traffic processing start automatically. When set to `true`, traffic processing is stopped by default, resulting in almost no resource consumption (e.g. Kubeshark is dormant). This property can be dynamically control via the dashboard. | `false` | +| `tap.capture.stopAfter` | Set to a duration (e.g. `30s`) to have traffic processing stop after no websocket activity between worker and hub. | `30s` | +| `tap.capture.raw.enabled` | Enable raw capture of packets and syscalls to disk for offline analysis | `false` | +| `tap.capture.raw.storageSize` | Maximum storage size for raw capture files (supports K8s quantity format: `1Gi`, `500Mi`, etc.) | `1Gi` | +| `tap.capture.dbMaxSize` | Maximum size for capture database (e.g., `4Gi`, `2000Mi`). When empty, automatically uses 80% of allocated storage (`tap.storageLimit`). | `""` | +| `tap.snapshots.storageClass` | Storage class for snapshots volume. When empty, uses `emptyDir`. When set, creates a PVC with this storage class | `""` | +| `tap.snapshots.storageSize` | Storage size for snapshots volume (supports K8s quantity format: `1Gi`, `500Mi`, etc.) | `1Gi` | +| `tap.release.repo` | URL of the Helm chart repository | `https://helm.kubehq.com` | +| `tap.release.name` | Helm release name | `kubeshark` | +| `tap.release.namespace` | Helm release namespace | `default` | +| `tap.persistentStorage` | Use `persistentVolumeClaim` instead of `emptyDir` | `false` | +| `tap.persistentStorageStatic` | Use static persistent volume provisioning (explicitly defined `PersistentVolume` ) | `false` | +| `tap.persistentStoragePvcVolumeMode` | Set the pvc volume mode (Filesystem\|Block) | `Filesystem` | +| `tap.efsFileSytemIdAndPath` | [EFS file system ID and, optionally, subpath and/or access point](https://github.com/kubernetes-sigs/aws-efs-csi-driver/blob/master/examples/kubernetes/access_points/README.md) `<FileSystemId>:<Path>:<AccessPointId>` | "" | +| `tap.storageLimit` | Limit of either the `emptyDir` or `persistentVolumeClaim` | `5Gi` | +| `tap.storageClass` | Storage class of the `PersistentVolumeClaim` | `standard` | +| `tap.dryRun` | Preview of all pods matching the regex, without tapping them | `false` | +| `tap.dnsConfig.nameservers` | Nameservers to use for DNS resolution | `[]` | +| `tap.dnsConfig.searches` | Search domains to use for DNS resolution | `[]` | +| `tap.dnsConfig.options` | DNS options to use for DNS resolution | `[]` | +| `tap.resources.hub.limits.cpu` | CPU limit for hub | `""` (no limit) | +| `tap.resources.hub.limits.memory` | Memory limit for hub | `5Gi` | +| `tap.resources.hub.requests.cpu` | CPU request for hub | `50m` | +| `tap.resources.hub.requests.memory` | Memory request for hub | `50Mi` | +| `tap.resources.sniffer.limits.cpu` | CPU limit for sniffer | `""` (no limit) | +| `tap.resources.sniffer.limits.memory` | Memory limit for sniffer | `3Gi` | +| `tap.resources.sniffer.requests.cpu` | CPU request for sniffer | `50m` | +| `tap.resources.sniffer.requests.memory` | Memory request for sniffer | `50Mi` | +| `tap.resources.tracer.limits.cpu` | CPU limit for tracer | `""` (no limit) | +| `tap.resources.tracer.limits.memory` | Memory limit for tracer | `3Gi` | +| `tap.resources.tracer.requests.cpu` | CPU request for tracer | `50m` | +| `tap.resources.tracer.requests.memory` | Memory request for tracer | `50Mi` | +| `tap.probes.hub.initialDelaySeconds` | Initial delay before probing the hub | `15` | +| `tap.probes.hub.periodSeconds` | Period between probes for the hub | `10` | +| `tap.probes.hub.successThreshold` | Number of successful probes before considering the hub healthy | `1` | +| `tap.probes.hub.failureThreshold` | Number of failed probes before considering the hub unhealthy | `3` | +| `tap.probes.sniffer.initialDelaySeconds` | Initial delay before probing the sniffer | `15` | +| `tap.probes.sniffer.periodSeconds` | Period between probes for the sniffer | `10` | +| `tap.probes.sniffer.successThreshold` | Number of successful probes before considering the sniffer healthy | `1` | +| `tap.probes.sniffer.failureThreshold` | Number of failed probes before considering the sniffer unhealthy | `3` | +| `tap.serviceMesh` | Capture traffic from service meshes like Istio, Linkerd, Consul, etc. | `true` | +| `tap.tls` | Capture the encrypted/TLS traffic from cryptography libraries like OpenSSL | `true` | +| `tap.disableTlsLog` | Suppress logging for TLS/eBPF | `true` | +| `tap.labels` | Kubernetes labels to apply to all Kubeshark resources | `{}` | +| `tap.annotations` | Kubernetes annotations to apply to all Kubeshark resources | `{}` | +| `tap.nodeSelectorTerms.workers` | Node selector terms for workers components | `[{"matchExpressions":[{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]` | +| `tap.nodeSelectorTerms.hub` | Node selector terms for hub component | `[{"matchExpressions":[{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]` | +| `tap.nodeSelectorTerms.front` | Node selector terms for front-end component | `[{"matchExpressions":[{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]` | +| `tap.priorityClass` | Priority class name for Kubeshark components | `""` | +| `tap.tolerations.workers` | Tolerations for workers components | `[ {"operator": "Exists", "effect": "NoExecute"}` | +| `tap.tolerations.hub` | Tolerations for hub component | `[]` | +| `tap.tolerations.front` | Tolerations for front-end component | `[]` | +| `tap.auth.enabled` | Enable authentication | `false` | +| `tap.auth.type` | Authentication type (1 option available: `saml`) | `saml` | +| `tap.auth.approvedEmails` | List of approved email addresses for authentication | `[]` | +| `tap.auth.approvedDomains` | List of approved email domains for authentication | `[]` | +| `tap.auth.saml.idpMetadataUrl` | SAML IDP metadata URL <br/>(effective, if `tap.auth.type = saml`) | `` | +| `tap.auth.saml.x509crt` | A self-signed X.509 `.cert` contents <br/>(effective, if `tap.auth.type = saml`) | `` | +| `tap.auth.saml.x509key` | A self-signed X.509 `.key` contents <br/>(effective, if `tap.auth.type = saml`) | `` | +| `tap.auth.saml.roleAttribute` | A SAML attribute name corresponding to user's authorization role <br/>(effective, if `tap.auth.type = saml`) | `role` | | `tap.auth.saml.roles` | A list of SAML authorization roles and their permissions <br/>(effective, if `tap.auth.type = saml`) | `{"admin":{"canDownloadPCAP":true,"canUpdateTargetedPods":true,"canUseScripting":true, "scriptingPermissions":{"canSave":true, "canActivate":true, "canDelete":true}, "canStopTrafficCapturing":true, "filter":"","showAdminConsoleLink":true}}` | -| `tap.ingress.enabled` | Enable `Ingress` | `false` | -| `tap.ingress.className` | Ingress class name | `""` | -| `tap.ingress.host` | Host of the `Ingress` | `ks.svc.cluster.local` | -| `tap.ingress.tls` | `Ingress` TLS configuration | `[]` | -| `tap.ingress.annotations` | `Ingress` annotations | `{}` | -| `tap.routing.front.basePath` | Set this value to serve `front` under specific base path. Example: `/custompath` (forward slash must be present) | `""` | -| `tap.ipv6` | Enable IPv6 support for the front-end | `true` | -| `tap.debug` | Enable debug mode | `false` | -| `tap.telemetry.enabled` | Enable anonymous usage statistics collection | `true` | -| `tap.resourceGuard.enabled` | Enable resource guard worker process, which watches RAM/disk usage and enables/disables traffic capture based on available resources | `false` | -| `tap.secrets` | List of secrets to be used as source for environment variables (e.g. `kubeshark-license`) | `[]` | -| `tap.sentry.enabled` | Enable sending of error logs to Sentry | `true` (only for qualified users) | -| `tap.sentry.environment` | Sentry environment to label error logs with | `production` | -| `tap.defaultFilter` | Sets the default dashboard KFL filter (e.g. `http`). By default, this value is set to filter out noisy protocols such as DNS, UDP, ICMP and TCP. The user can easily change this, **temporarily**, in the Dashboard. For a permanent change, you should change this value in the `values.yaml` or `config.yaml` file. | `""` | -| `tap.liveConfigMapChangesDisabled` | If set to `true`, all user functionality (scripting, targeting settings, global & default KFL modification, traffic recording, traffic capturing on/off, protocol dissectors) involving dynamic ConfigMap changes from UI will be disabled | `false` | -| `tap.globalFilter` | Prepends to any KFL filter and can be used to limit what is visible in the dashboard. For example, `redact("request.headers.Authorization")` will redact the appropriate field. Another example `!dns` will not show any DNS traffic. | `""` | -| `tap.metrics.port` | Pod port used to expose Prometheus metrics | `49100` | -| `tap.enabledDissectors` | This is an array of strings representing the list of supported protocols. Remove or comment out redundant protocols (e.g., dns).| The default list excludes: `udp` and `tcp` | +| `tap.ingress.enabled` | Enable `Ingress` | `false` | +| `tap.ingress.className` | Ingress class name | `""` | +| `tap.ingress.host` | Host of the `Ingress` | `ks.svc.cluster.local` | +| `tap.ingress.tls` | `Ingress` TLS configuration | `[]` | +| `tap.ingress.annotations` | `Ingress` annotations | `{}` | +| `tap.routing.front.basePath` | Set this value to serve `front` under specific base path. Example: `/custompath` (forward slash must be present) | `""` | +| `tap.ipv6` | Enable IPv6 support for the front-end | `true` | +| `tap.debug` | Enable debug mode | `false` | +| `tap.telemetry.enabled` | Enable anonymous usage statistics collection | `true` | +| `tap.resourceGuard.enabled` | Enable resource guard worker process, which watches RAM/disk usage and enables/disables traffic capture based on available resources | `false` | +| `tap.secrets` | List of secrets to be used as source for environment variables (e.g. `kubeshark-license`) | `[]` | +| `tap.sentry.enabled` | Enable sending of error logs to Sentry | `true` (only for qualified users) | +| `tap.sentry.environment` | Sentry environment to label error logs with | `production` | +| `tap.defaultFilter` | Sets the default dashboard KFL filter (e.g. `http`). By default, this value is set to filter out noisy protocols such as DNS, UDP, ICMP and TCP. The user can easily change this, **temporarily**, in the Dashboard. For a permanent change, you should change this value in the `values.yaml` or `config.yaml` file. | `""` | +| `tap.liveConfigMapChangesDisabled` | If set to `true`, all user functionality (scripting, targeting settings, global & default KFL modification, traffic recording, traffic capturing on/off, protocol dissectors) involving dynamic ConfigMap changes from UI will be disabled | `false` | +| `tap.globalFilter` | Prepends to any KFL filter and can be used to limit what is visible in the dashboard. For example, `redact("request.headers.Authorization")` will redact the appropriate field. Another example `!dns` will not show any DNS traffic. | `""` | +| `tap.metrics.port` | Pod port used to expose Prometheus metrics | `49100` | +| `tap.enabledDissectors` | This is an array of strings representing the list of supported protocols. Remove or comment out redundant protocols (e.g., dns).| The default list excludes: `udp` and `tcp` | | `tap.mountBpf` | BPF filesystem needs to be mounted for eBPF to work properly. This helm value determines whether Kubeshark will attempt to mount the filesystem. This option is not required if filesystem is already mounts. │ `true`| -| `tap.gitops.enabled` | Enable GitOps functionality. This will allow you to use GitOps to manage your Kubeshark configuration. | `false` | -| `logs.file` | Logs dump path | `""` | -| `pcapdump.enabled` | Enable recording of all traffic captured according to other parameters. Whatever Kubeshark captures, considering pod targeting rules, will be stored in pcap files ready to be viewed by tools | `true` | -| `pcapdump.maxTime` | The time window into the past that will be stored. Older traffic will be discarded. | `2h` | -| `pcapdump.maxSize` | The maximum storage size the PCAP files will consume. Old files that cause to surpass storage consumption will get discarded. | `500MB` | -| `kube.configPath` | Path to the `kubeconfig` file (`$HOME/.kube/config`) | `""` | -| `kube.context` | Kubernetes context to use for the deployment | `""` | -| `dumpLogs` | Enable dumping of logs | `false` | -| `headless` | Enable running in headless mode | `false` | -| `license` | License key for the Pro/Enterprise edition | `""` | -| `scripting.env` | Environment variables for the scripting | `{}` | -| `scripting.source` | Source directory of the scripts | `""` | -| `scripting.watchScripts` | Enable watch mode for the scripts in source directory | `true` | -| `timezone` | IANA time zone applied to time shown in the front-end | `""` (local time zone applies) | -| `supportChatEnabled` | Enable real-time support chat channel based on Intercom | `false` | -| `internetConnectivity` | Turns off API requests that are dependent on Internet connectivity such as `telemetry` and `online-support`. | `true` | +| `tap.hostNetwork` | Enable host network mode for worker DaemonSet pods. When enabled, worker pods use the host's network namespace for direct network access. | `true` | +| `tap.gitops.enabled` | Enable GitOps functionality. This will allow you to use GitOps to manage your Kubeshark configuration. | `false` | +| `logs.file` | Logs dump path | `""` | +| `pcapdump.enabled` | Enable recording of all traffic captured according to other parameters. Whatever Kubeshark captures, considering pod targeting rules, will be stored in pcap files ready to be viewed by tools | `true` | +| `pcapdump.maxTime` | The time window into the past that will be stored. Older traffic will be discarded. | `2h` | +| `pcapdump.maxSize` | The maximum storage size the PCAP files will consume. Old files that cause to surpass storage consumption will get discarded. | `500MB` | +| `kube.configPath` | Path to the `kubeconfig` file (`$HOME/.kube/config`) | `""` | +| `kube.context` | Kubernetes context to use for the deployment | `""` | +| `dumpLogs` | Enable dumping of logs | `false` | +| `headless` | Enable running in headless mode | `false` | +| `license` | License key for the Pro/Enterprise edition | `""` | +| `scripting.env` | Environment variables for the scripting | `{}` | +| `scripting.source` | Source directory of the scripts | `""` | +| `scripting.watchScripts` | Enable watch mode for the scripts in source directory | `true` | +| `timezone` | IANA time zone applied to time shown in the front-end | `""` (local time zone applies) | +| `supportChatEnabled` | Enable real-time support chat channel based on Intercom | `false` | +| `internetConnectivity` | Turns off API requests that are dependent on Internet connectivity such as `telemetry` and `online-support`. | `true` | KernelMapping pairs kernel versions with a DriverContainer image. Kernel versions can be matched @@ -305,7 +308,7 @@ # Installing with Dex OIDC authentication -[**Click here to see full docs**](https://docs.kubeshark.co/en/saml#installing-with-oidc-enabled-dex-idp). +[**Click here to see full docs**](https://docs.kubehq.com/en/saml#installing-with-oidc-enabled-dex-idp). Choose this option, if **you already have a running instance** of Dex in your cluster & you want to set up Dex OIDC authentication for Kubeshark users. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/templates/04-hub-deployment.yaml new/kubeshark-cli-52.10.0/helm-chart/templates/04-hub-deployment.yaml --- old/kubeshark-cli-52.9.0/helm-chart/templates/04-hub-deployment.yaml 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/helm-chart/templates/04-hub-deployment.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -3,7 +3,7 @@ kind: Deployment metadata: labels: - app.kubeshark.co/app: hub + app.kubehq.com/app: hub {{- include "kubeshark.labels" . | nindent 4 }} {{- if .Values.tap.annotations }} annotations: @@ -15,12 +15,12 @@ replicas: 1 # Set the desired number of replicas selector: matchLabels: - app.kubeshark.co/app: hub + app.kubehq.com/app: hub {{- include "kubeshark.selectorLabels" . | nindent 6 }} template: metadata: labels: - app.kubeshark.co/app: hub + app.kubehq.com/app: hub {{- include "kubeshark.labels" . | nindent 8 }} spec: dnsPolicy: ClusterFirstWithHostNet @@ -38,6 +38,8 @@ - '{{ .Values.logLevel | default "warning" }}' - -capture-stop-after - "{{ if hasKey .Values.tap.capture "stopAfter" }}{{ .Values.tap.capture.stopAfter }}{{ else }}5m{{ end }}" + - -snapshot-size-limit + - '{{ .Values.tap.snapshots.storageSize }}' {{- if .Values.tap.gitops.enabled }} - -gitops {{- end }} @@ -62,7 +64,7 @@ - name: SENTRY_ENVIRONMENT value: '{{ .Values.tap.sentry.environment }}' - name: KUBESHARK_CLOUD_API_URL - value: 'https://api.kubeshark.co' + value: 'https://api.kubehq.com' - name: PROFILING_ENABLED value: '{{ .Values.tap.pprof.enabled }}' {{- if .Values.tap.docker.overrideImage.hub }} @@ -106,6 +108,8 @@ - name: saml-x509-volume mountPath: "/etc/saml/x509" readOnly: true + - name: snapshots-volume + mountPath: "/app/data/snapshots" {{- if gt (len .Values.tap.nodeSelectorTerms.hub) 0}} affinity: nodeAffinity: @@ -167,3 +171,11 @@ items: - key: AUTH_SAML_X509_KEY path: kubeshark.key + - name: snapshots-volume + {{- if .Values.tap.snapshots.storageClass }} + persistentVolumeClaim: + claimName: {{ include "kubeshark.name" . }}-snapshots-pvc + {{- else }} + emptyDir: + sizeLimit: {{ .Values.tap.snapshots.storageSize }} + {{- end }} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/templates/05-hub-service.yaml new/kubeshark-cli-52.10.0/helm-chart/templates/05-hub-service.yaml --- old/kubeshark-cli-52.9.0/helm-chart/templates/05-hub-service.yaml 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/helm-chart/templates/05-hub-service.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -3,7 +3,7 @@ kind: Service metadata: labels: - app.kubeshark.co/app: hub + app.kubehq.com/app: hub {{- include "kubeshark.labels" . | nindent 4 }} {{- if .Values.tap.annotations }} annotations: @@ -17,5 +17,5 @@ port: 80 targetPort: 8080 selector: - app.kubeshark.co/app: hub + app.kubehq.com/app: hub type: ClusterIP diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/templates/06-front-deployment.yaml new/kubeshark-cli-52.10.0/helm-chart/templates/06-front-deployment.yaml --- old/kubeshark-cli-52.9.0/helm-chart/templates/06-front-deployment.yaml 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/helm-chart/templates/06-front-deployment.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -2,7 +2,7 @@ kind: Deployment metadata: labels: - app.kubeshark.co/app: front + app.kubehq.com/app: front {{- include "kubeshark.labels" . | nindent 4 }} {{- if .Values.tap.annotations }} annotations: @@ -14,12 +14,12 @@ replicas: 1 # Set the desired number of replicas selector: matchLabels: - app.kubeshark.co/app: front + app.kubehq.com/app: front {{- include "kubeshark.selectorLabels" . | nindent 6 }} template: metadata: labels: - app.kubeshark.co/app: front + app.kubehq.com/app: front {{- include "kubeshark.labels" . | nindent 8 }} spec: containers: diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/templates/07-front-service.yaml new/kubeshark-cli-52.10.0/helm-chart/templates/07-front-service.yaml --- old/kubeshark-cli-52.9.0/helm-chart/templates/07-front-service.yaml 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/helm-chart/templates/07-front-service.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -16,5 +16,5 @@ port: 80 targetPort: 8080 selector: - app.kubeshark.co/app: front + app.kubehq.com/app: front type: ClusterIP diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/templates/09-snapshots-pvc.yaml new/kubeshark-cli-52.10.0/helm-chart/templates/09-snapshots-pvc.yaml --- old/kubeshark-cli-52.9.0/helm-chart/templates/09-snapshots-pvc.yaml 1970-01-01 01:00:00.000000000 +0100 +++ new/kubeshark-cli-52.10.0/helm-chart/templates/09-snapshots-pvc.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -0,0 +1,22 @@ +--- +{{- if .Values.tap.snapshots.storageClass }} +apiVersion: v1 +kind: PersistentVolumeClaim +metadata: + labels: + {{- include "kubeshark.labels" . | nindent 4 }} + {{- if .Values.tap.annotations }} + annotations: + {{- toYaml .Values.tap.annotations | nindent 4 }} + {{- end }} + name: {{ include "kubeshark.name" . }}-snapshots-pvc + namespace: {{ .Release.Namespace }} +spec: + accessModes: + - ReadWriteOnce + resources: + requests: + storage: {{ .Values.tap.snapshots.storageSize }} + storageClassName: {{ .Values.tap.snapshots.storageClass }} +status: {} +{{- end }} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/templates/09-worker-daemon-set.yaml new/kubeshark-cli-52.10.0/helm-chart/templates/09-worker-daemon-set.yaml --- old/kubeshark-cli-52.9.0/helm-chart/templates/09-worker-daemon-set.yaml 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/helm-chart/templates/09-worker-daemon-set.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -3,7 +3,7 @@ kind: DaemonSet metadata: labels: - app.kubeshark.co/app: worker + app.kubehq.com/app: worker sidecar.istio.io/inject: "false" {{- include "kubeshark.labels" . | nindent 4 }} {{- if .Values.tap.annotations }} @@ -15,12 +15,12 @@ spec: selector: matchLabels: - app.kubeshark.co/app: worker + app.kubehq.com/app: worker {{- include "kubeshark.selectorLabels" . | nindent 6 }} template: metadata: labels: - app.kubeshark.co/app: worker + app.kubehq.com/app: worker {{- include "kubeshark.labels" . | nindent 8 }} name: kubeshark-worker-daemon-set namespace: kubeshark @@ -130,7 +130,7 @@ - name: TCP_STREAM_CHANNEL_TIMEOUT_SHOW value: '{{ .Values.tap.misc.tcpStreamChannelTimeoutShow }}' - name: KUBESHARK_CLOUD_API_URL - value: 'https://api.kubeshark.co' + value: 'https://api.kubehq.com' - name: PROFILING_ENABLED value: '{{ .Values.tap.pprof.enabled }}' - name: SENTRY_ENABLED @@ -333,7 +333,7 @@ readOnly: true {{- end }} dnsPolicy: ClusterFirstWithHostNet - hostNetwork: true + hostNetwork: {{ .Values.tap.hostNetwork }} serviceAccountName: {{ include "kubeshark.serviceAccountName" . }} {{- if .Values.tap.priorityClass }} priorityClassName: {{ .Values.tap.priorityClass | quote }} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/templates/12-config-map.yaml new/kubeshark-cli-52.10.0/helm-chart/templates/12-config-map.yaml --- old/kubeshark-cli-52.9.0/helm-chart/templates/12-config-map.yaml 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/helm-chart/templates/12-config-map.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -4,7 +4,7 @@ name: {{ include "kubeshark.configmapName" . }} namespace: {{ .Release.Namespace }} labels: - app.kubeshark.co/app: hub + app.kubehq.com/app: hub {{- include "kubeshark.labels" . | nindent 4 }} data: POD_REGEX: '{{ .Values.tap.regex }}' diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/templates/13-secret.yaml new/kubeshark-cli-52.10.0/helm-chart/templates/13-secret.yaml --- old/kubeshark-cli-52.9.0/helm-chart/templates/13-secret.yaml 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/helm-chart/templates/13-secret.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -4,7 +4,7 @@ name: {{ include "kubeshark.secretName" . }} namespace: {{ .Release.Namespace }} labels: - app.kubeshark.co/app: hub + app.kubehq.com/app: hub {{- include "kubeshark.labels" . | nindent 4 }} stringData: LICENSE: '{{ .Values.license }}' @@ -20,7 +20,7 @@ name: kubeshark-saml-x509-crt-secret namespace: {{ .Release.Namespace }} labels: - app.kubeshark.co/app: hub + app.kubehq.com/app: hub {{- include "kubeshark.labels" . | nindent 4 }} stringData: AUTH_SAML_X509_CRT: | @@ -34,7 +34,7 @@ name: kubeshark-saml-x509-key-secret namespace: {{ .Release.Namespace }} labels: - app.kubeshark.co/app: hub + app.kubehq.com/app: hub {{- include "kubeshark.labels" . | nindent 4 }} stringData: AUTH_SAML_X509_KEY: | diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/templates/15-worker-service-metrics.yaml new/kubeshark-cli-52.10.0/helm-chart/templates/15-worker-service-metrics.yaml --- old/kubeshark-cli-52.9.0/helm-chart/templates/15-worker-service-metrics.yaml 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/helm-chart/templates/15-worker-service-metrics.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -14,7 +14,7 @@ namespace: {{ .Release.Namespace }} spec: selector: - app.kubeshark.co/app: worker + app.kubehq.com/app: worker {{- include "kubeshark.labels" . | nindent 4 }} ports: - name: metrics diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/templates/16-hub-service-metrics.yaml new/kubeshark-cli-52.10.0/helm-chart/templates/16-hub-service-metrics.yaml --- old/kubeshark-cli-52.9.0/helm-chart/templates/16-hub-service-metrics.yaml 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/helm-chart/templates/16-hub-service-metrics.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -14,7 +14,7 @@ namespace: {{ .Release.Namespace }} spec: selector: - app.kubeshark.co/app: hub + app.kubehq.com/app: hub {{- include "kubeshark.labels" . | nindent 4 }} ports: - name: metrics diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/templates/17-network-policies.yaml new/kubeshark-cli-52.10.0/helm-chart/templates/17-network-policies.yaml --- old/kubeshark-cli-52.9.0/helm-chart/templates/17-network-policies.yaml 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/helm-chart/templates/17-network-policies.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -12,7 +12,7 @@ spec: podSelector: matchLabels: - app.kubeshark.co/app: hub + app.kubehq.com/app: hub policyTypes: - Ingress - Egress @@ -40,7 +40,7 @@ spec: podSelector: matchLabels: - app.kubeshark.co/app: front + app.kubehq.com/app: front policyTypes: - Ingress - Egress @@ -65,7 +65,7 @@ spec: podSelector: matchLabels: - app.kubeshark.co/app: dex + app.kubehq.com/app: dex policyTypes: - Ingress - Egress @@ -90,7 +90,7 @@ spec: podSelector: matchLabels: - app.kubeshark.co/app: worker + app.kubehq.com/app: worker policyTypes: - Ingress - Egress diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/templates/18-dex-deployment.yaml new/kubeshark-cli-52.10.0/helm-chart/templates/18-dex-deployment.yaml --- old/kubeshark-cli-52.9.0/helm-chart/templates/18-dex-deployment.yaml 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/helm-chart/templates/18-dex-deployment.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -5,7 +5,7 @@ kind: Deployment metadata: labels: - app.kubeshark.co/app: dex + app.kubehq.com/app: dex {{- include "kubeshark.labels" . | nindent 4 }} {{- if .Values.tap.annotations }} annotations: @@ -17,12 +17,12 @@ replicas: 1 # Set the desired number of replicas selector: matchLabels: - app.kubeshark.co/app: dex + app.kubehq.com/app: dex {{- include "kubeshark.selectorLabels" . | nindent 6 }} template: metadata: labels: - app.kubeshark.co/app: dex + app.kubehq.com/app: dex {{- include "kubeshark.labels" . | nindent 8 }} spec: containers: diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/templates/19-dex-service.yaml new/kubeshark-cli-52.10.0/helm-chart/templates/19-dex-service.yaml --- old/kubeshark-cli-52.9.0/helm-chart/templates/19-dex-service.yaml 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/helm-chart/templates/19-dex-service.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -5,7 +5,7 @@ kind: Service metadata: labels: - app.kubeshark.co/app: dex + app.kubehq.com/app: dex {{- include "kubeshark.labels" . | nindent 4 }} {{- if .Values.tap.annotations }} annotations: @@ -19,7 +19,7 @@ port: 80 targetPort: 5556 selector: - app.kubeshark.co/app: dex + app.kubehq.com/app: dex type: ClusterIP {{- end }} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/templates/20-dex-secret.yaml new/kubeshark-cli-52.10.0/helm-chart/templates/20-dex-secret.yaml --- old/kubeshark-cli-52.9.0/helm-chart/templates/20-dex-secret.yaml 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/helm-chart/templates/20-dex-secret.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -6,7 +6,7 @@ name: kubeshark-dex-conf-secret namespace: {{ .Release.Namespace }} labels: - app.kubeshark.co/app: hub + app.kubehq.com/app: hub {{- include "kubeshark.labels" . | nindent 4 }} data: dex-config.yaml: {{ .Values.tap.auth.dexConfig | toYaml | b64enc | quote }} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/templates/NOTES.txt new/kubeshark-cli-52.10.0/helm-chart/templates/NOTES.txt --- old/kubeshark-cli-52.9.0/helm-chart/templates/NOTES.txt 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/helm-chart/templates/NOTES.txt 2025-11-25 20:49:50.000000000 +0100 @@ -28,7 +28,7 @@ - Support chat using Intercom is enabled. It can be disabled using `--set supportChatEnabled=false` {{- end }} {{- if eq .Values.license ""}} -- No license key was detected. You can either log-in/sign-up through the dashboard, or download the license key from https://console.kubeshark.co/ and add it as 'license: <license>' in helm values or as `--set license=<license>` or as `LICENSE` via mounted secret (`tap.secrets`). +- No license key was detected. You can either log-in/sign-up through the dashboard, or download the license key from https://console.kubehq.com/ and add it as 'license: <license>' in helm values or as `--set license=<license>` or as `LICENSE` via mounted secret (`tap.secrets`). {{- end }} {{ if .Values.tap.ingress.enabled }} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/helm-chart/values.yaml new/kubeshark-cli-52.10.0/helm-chart/values.yaml --- old/kubeshark-cli-52.9.0/helm-chart/values.yaml 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/helm-chart/values.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -32,9 +32,12 @@ raw: enabled: false storageSize: 1Gi - dbMaxSize: "" + dbMaxSize: 500Mi + snapshots: + storageClass: "" + storageSize: 1Gi release: - repo: https://helm.kubeshark.co + repo: https://helm.kubehq.com name: kubeshark namespace: default persistentStorage: false @@ -239,6 +242,7 @@ - SYS_RESOURCE - IPC_LOCK mountBpf: true + hostNetwork: true logs: file: "" grep: "" diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/kubernetes/consts.go new/kubeshark-cli-52.10.0/kubernetes/consts.go --- old/kubeshark-cli-52.9.0/kubernetes/consts.go 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/kubernetes/consts.go 2025-11-25 20:49:50.000000000 +0100 @@ -8,5 +8,5 @@ HubServiceName = HubPodName K8sAllNamespaces = "" MinKubernetesServerVersion = "1.16.0" - AppLabelKey = "app.kubeshark.co/app" + AppLabelKey = "app.kubehq.com/app" ) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/manifests/complete.yaml new/kubeshark-cli-52.10.0/manifests/complete.yaml --- old/kubeshark-cli-52.9.0/manifests/complete.yaml 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/manifests/complete.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -4,17 +4,17 @@ kind: NetworkPolicy metadata: labels: - helm.sh/chart: kubeshark-52.9.0 + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm name: kubeshark-hub-network-policy namespace: default spec: podSelector: matchLabels: - app.kubeshark.co/app: hub + app.kubehq.com/app: hub policyTypes: - Ingress - Egress @@ -33,10 +33,10 @@ kind: NetworkPolicy metadata: labels: - helm.sh/chart: kubeshark-52.9.0 + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-front-network-policy @@ -44,7 +44,7 @@ spec: podSelector: matchLabels: - app.kubeshark.co/app: front + app.kubehq.com/app: front policyTypes: - Ingress - Egress @@ -60,10 +60,10 @@ kind: NetworkPolicy metadata: labels: - helm.sh/chart: kubeshark-52.9.0 + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-dex-network-policy @@ -71,7 +71,7 @@ spec: podSelector: matchLabels: - app.kubeshark.co/app: dex + app.kubehq.com/app: dex policyTypes: - Ingress - Egress @@ -87,10 +87,10 @@ kind: NetworkPolicy metadata: labels: - helm.sh/chart: kubeshark-52.9.0 + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-worker-network-policy @@ -98,7 +98,7 @@ spec: podSelector: matchLabels: - app.kubeshark.co/app: worker + app.kubehq.com/app: worker policyTypes: - Ingress - Egress @@ -116,10 +116,10 @@ kind: ServiceAccount metadata: labels: - helm.sh/chart: kubeshark-52.9.0 + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm name: kubeshark-service-account namespace: default @@ -131,11 +131,11 @@ name: kubeshark-secret namespace: default labels: - app.kubeshark.co/app: hub - helm.sh/chart: kubeshark-52.9.0 + app.kubehq.com/app: hub + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm stringData: LICENSE: '' @@ -150,11 +150,11 @@ name: kubeshark-saml-x509-crt-secret namespace: default labels: - app.kubeshark.co/app: hub - helm.sh/chart: kubeshark-52.9.0 + app.kubehq.com/app: hub + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm stringData: AUTH_SAML_X509_CRT: | @@ -166,11 +166,11 @@ name: kubeshark-saml-x509-key-secret namespace: default labels: - app.kubeshark.co/app: hub - helm.sh/chart: kubeshark-52.9.0 + app.kubehq.com/app: hub + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm stringData: AUTH_SAML_X509_KEY: | @@ -182,10 +182,10 @@ name: kubeshark-nginx-config-map namespace: default labels: - helm.sh/chart: kubeshark-52.9.0 + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm data: default.conf: | @@ -245,11 +245,11 @@ name: kubeshark-config-map namespace: default labels: - app.kubeshark.co/app: hub - helm.sh/chart: kubeshark-52.9.0 + app.kubehq.com/app: hub + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm data: POD_REGEX: '.*' @@ -304,10 +304,10 @@ kind: ClusterRole metadata: labels: - helm.sh/chart: kubeshark-52.9.0 + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm name: kubeshark-cluster-role-default namespace: default @@ -351,10 +351,10 @@ kind: ClusterRoleBinding metadata: labels: - helm.sh/chart: kubeshark-52.9.0 + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm name: kubeshark-cluster-role-binding-default namespace: default @@ -372,10 +372,10 @@ kind: Role metadata: labels: - helm.sh/chart: kubeshark-52.9.0 + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-self-config-role @@ -416,10 +416,10 @@ kind: RoleBinding metadata: labels: - helm.sh/chart: kubeshark-52.9.0 + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm annotations: name: kubeshark-self-config-role-binding @@ -438,11 +438,11 @@ kind: Service metadata: labels: - app.kubeshark.co/app: hub - helm.sh/chart: kubeshark-52.9.0 + app.kubehq.com/app: hub + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm name: kubeshark-hub namespace: default @@ -452,7 +452,7 @@ port: 80 targetPort: 8080 selector: - app.kubeshark.co/app: hub + app.kubehq.com/app: hub type: ClusterIP --- # Source: kubeshark/templates/07-front-service.yaml @@ -460,10 +460,10 @@ kind: Service metadata: labels: - helm.sh/chart: kubeshark-52.9.0 + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm name: kubeshark-front namespace: default @@ -473,7 +473,7 @@ port: 80 targetPort: 8080 selector: - app.kubeshark.co/app: front + app.kubehq.com/app: front type: ClusterIP --- # Source: kubeshark/templates/15-worker-service-metrics.yaml @@ -481,10 +481,10 @@ apiVersion: v1 metadata: labels: - helm.sh/chart: kubeshark-52.9.0 + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm annotations: prometheus.io/scrape: 'true' @@ -493,11 +493,11 @@ namespace: default spec: selector: - app.kubeshark.co/app: worker - helm.sh/chart: kubeshark-52.9.0 + app.kubehq.com/app: worker + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm ports: - name: metrics @@ -510,10 +510,10 @@ apiVersion: v1 metadata: labels: - helm.sh/chart: kubeshark-52.9.0 + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm annotations: prometheus.io/scrape: 'true' @@ -522,11 +522,11 @@ namespace: default spec: selector: - app.kubeshark.co/app: hub - helm.sh/chart: kubeshark-52.9.0 + app.kubehq.com/app: hub + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm ports: - name: metrics @@ -539,29 +539,29 @@ kind: DaemonSet metadata: labels: - app.kubeshark.co/app: worker + app.kubehq.com/app: worker sidecar.istio.io/inject: "false" - helm.sh/chart: kubeshark-52.9.0 + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm name: kubeshark-worker-daemon-set namespace: default spec: selector: matchLabels: - app.kubeshark.co/app: worker + app.kubehq.com/app: worker app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark template: metadata: labels: - app.kubeshark.co/app: worker - helm.sh/chart: kubeshark-52.9.0 + app.kubehq.com/app: worker + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm name: kubeshark-worker-daemon-set namespace: kubeshark @@ -571,7 +571,7 @@ - /bin/sh - -c - mkdir -p /sys/fs/bpf && mount | grep -q '/sys/fs/bpf' || mount -t bpf bpf /sys/fs/bpf - image: 'docker.io/kubeshark/worker:v52.9' + image: 'docker.io/kubeshark/worker:v52.10' imagePullPolicy: Always name: mount-bpf securityContext: @@ -603,8 +603,8 @@ - -storage-size - '5Gi' - -capture-db-max-size - - '' - image: 'docker.io/kubeshark/worker:v52.9' + - '500Mi' + image: 'docker.io/kubeshark/worker:v52.10' imagePullPolicy: Always name: sniffer ports: @@ -625,7 +625,7 @@ - name: TCP_STREAM_CHANNEL_TIMEOUT_SHOW value: 'false' - name: KUBESHARK_CLOUD_API_URL - value: 'https://api.kubeshark.co' + value: 'https://api.kubehq.com' - name: PROFILING_ENABLED value: 'false' - name: SENTRY_ENABLED @@ -678,7 +678,7 @@ - -disable-tls-log - -loglevel - 'warning' - image: 'docker.io/kubeshark/worker:v52.9' + image: 'docker.io/kubeshark/worker:v52.10' imagePullPolicy: Always name: tracer env: @@ -769,11 +769,11 @@ kind: Deployment metadata: labels: - app.kubeshark.co/app: hub - helm.sh/chart: kubeshark-52.9.0 + app.kubehq.com/app: hub + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm name: kubeshark-hub namespace: default @@ -781,17 +781,17 @@ replicas: 1 # Set the desired number of replicas selector: matchLabels: - app.kubeshark.co/app: hub + app.kubehq.com/app: hub app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark template: metadata: labels: - app.kubeshark.co/app: hub - helm.sh/chart: kubeshark-52.9.0 + app.kubehq.com/app: hub + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm spec: dnsPolicy: ClusterFirstWithHostNet @@ -806,6 +806,8 @@ - 'warning' - -capture-stop-after - "5m" + - -snapshot-size-limit + - '1Gi' env: - name: POD_NAME valueFrom: @@ -820,10 +822,10 @@ - name: SENTRY_ENVIRONMENT value: 'production' - name: KUBESHARK_CLOUD_API_URL - value: 'https://api.kubeshark.co' + value: 'https://api.kubehq.com' - name: PROFILING_ENABLED value: 'false' - image: 'docker.io/kubeshark/hub:v52.9' + image: 'docker.io/kubeshark/hub:v52.10' imagePullPolicy: Always readinessProbe: periodSeconds: 5 @@ -856,6 +858,8 @@ - name: saml-x509-volume mountPath: "/etc/saml/x509" readOnly: true + - name: snapshots-volume + mountPath: "/app/data/snapshots" affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: @@ -879,17 +883,20 @@ items: - key: AUTH_SAML_X509_KEY path: kubeshark.key + - name: snapshots-volume + emptyDir: + sizeLimit: 1Gi --- # Source: kubeshark/templates/06-front-deployment.yaml apiVersion: apps/v1 kind: Deployment metadata: labels: - app.kubeshark.co/app: front - helm.sh/chart: kubeshark-52.9.0 + app.kubehq.com/app: front + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm name: kubeshark-front namespace: default @@ -897,17 +904,17 @@ replicas: 1 # Set the desired number of replicas selector: matchLabels: - app.kubeshark.co/app: front + app.kubehq.com/app: front app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark template: metadata: labels: - app.kubeshark.co/app: front - helm.sh/chart: kubeshark-52.9.0 + app.kubehq.com/app: front + helm.sh/chart: kubeshark-52.10.0 app.kubernetes.io/name: kubeshark app.kubernetes.io/instance: kubeshark - app.kubernetes.io/version: "52.9.0" + app.kubernetes.io/version: "52.10.0" app.kubernetes.io/managed-by: Helm spec: containers: @@ -950,7 +957,7 @@ value: 'false' - name: REACT_APP_SENTRY_ENVIRONMENT value: 'production' - image: 'docker.io/kubeshark/front:v52.9' + image: 'docker.io/kubeshark/front:v52.10' imagePullPolicy: Always name: kubeshark-front livenessProbe: diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/manifests/tls/cluster-issuer.yaml new/kubeshark-cli-52.10.0/manifests/tls/cluster-issuer.yaml --- old/kubeshark-cli-52.9.0/manifests/tls/cluster-issuer.yaml 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/manifests/tls/cluster-issuer.yaml 2025-11-25 20:49:50.000000000 +0100 @@ -5,7 +5,7 @@ spec: acme: server: https://acme-v02.api.letsencrypt.org/directory - email: [email protected] + email: [email protected] privateKeySecretRef: name: letsencrypt-prod-key solvers: diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeshark-cli-52.9.0/misc/consts.go new/kubeshark-cli-52.10.0/misc/consts.go --- old/kubeshark-cli-52.9.0/misc/consts.go 2025-10-03 16:30:55.000000000 +0200 +++ new/kubeshark-cli-52.10.0/misc/consts.go 2025-11-25 20:49:50.000000000 +0100 @@ -10,8 +10,8 @@ Software = "Kubeshark" Program = "kubeshark" Description = "The API Traffic Analyzer for Kubernetes" - Website = "https://kubeshark.co" - Email = "[email protected]" + Website = "https://kubehq.com" + Email = "[email protected]" Ver = "0.0.0" Branch = "master" GitCommitHash = "" // this var is overridden using ldflags in makefile when building ++++++ kubeshark-cli.obsinfo ++++++ --- /var/tmp/diff_new_pack.EJFsJ0/_old 2025-11-26 17:18:40.534387807 +0100 +++ /var/tmp/diff_new_pack.EJFsJ0/_new 2025-11-26 17:18:40.546388313 +0100 @@ -1,5 +1,5 @@ name: kubeshark-cli -version: 52.9.0 -mtime: 1759501855 -commit: d640128e85f69a10fdb1b28cad3e9870c1b1f8dc +version: 52.10.0 +mtime: 1764100190 +commit: 03a53ad6d5ce6861fe500cd5cd0d8a08f3db5492 ++++++ vendor.tar.gz ++++++ /work/SRC/openSUSE:Factory/kubeshark-cli/vendor.tar.gz /work/SRC/openSUSE:Factory/.kubeshark-cli.new.14147/vendor.tar.gz differ: char 13, line 1
