feat(must-gather): add new Chart for the RHDH Must-Gather tool [RHIDP-12626]#326
Conversation
PR Reviewer Guide 🔍(Review updated until commit 3751e9e)Here are some key observations to aid the review process:
|
PR Type(Describe updated until commit 0669dbe)Enhancement, Tests, Documentation Description
|
| Relevant files | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Configuration changes | 4 files
| ||||||||||||||
| Documentation | 3 files
| ||||||||||||||
| Tests | 7 files
| ||||||||||||||
| Enhancement | 7 files
|
PR Code Suggestions ✨Explore these optional code suggestions:
|
|||||||||||||||||
799f3ab to
8b06a13
Compare
The Security issues reported by SonarCloud are related to the |
PR Reviewer Guide 🔍Here are some key observations to aid the review process:
|
PR Code Suggestions ✨Explore these optional code suggestions:
|
|||||||||||||||||||
|
/agentic_review |
Code Review by Qodo
1. Existing SA cannot be used
|
6e01b02 to
22ae5bc
Compare
92338db to
c856e27
Compare
…ion is enabled This is needed because 'helm list' uses a Secret storage backend by default, so it is needed to identify such Helm releases
…lt values enforced in values.yaml and the JSON schema file
Kubernetes requires the installing user to already hold any permission they grant via a Role or ClusterRole. When deploying with namespace- scoped RBAC on a cluster where CRDs like backstages or sonataflows are not installed, the role creation fails because those permissions cannot be escalated. Rather than a single opaque toggle, expose per-API-group booleans under rbac.rules so users can precisely disable only the rules they cannot grant, while keeping the corresponding gather.with* collection flags enabled — the gather script already handles missing permissions gracefully at runtime. Also removes a duplicate config.openshift.io/clusterversions rule from the ClusterRole template. Assisted-by: Cursor Made-with: Cursor
58ebf1a to
0175764
Compare
…-helm-chart-for-rhdh-must-gather-for-easier-consumption-against-supported-non-ocp-platforms
…-gather-for-easier-consumption-against-supported-non-ocp-platforms
|
/agentic_review |
|
|
Persistent review updated to latest commit 5274454 |
Fortune-Ndlovu
left a comment
There was a problem hiding this comment.
Thanks for creating the PR @rm3l , looks good so far I have a quick question do we intend must-gather (this chart + image) to meet a single “K8s + OCP” support bar, or should we assume parity with every RHDH install target (AKS/EKS/GKE/OSD/air-gapped) until we add platform-specific CI?
Same for Helm vs Kustomize: is Helm the supported path for non-OCP and Kustomize best-effort, or both first-class ?
|
@Fortune-Ndlovu Thanks for the review.
The must-gather image itself should definitely run on all our supported platforms. As for the chart, I initially wanted this to be only for non-OCP clusters, but after a few changes to the chart and image, I actually noticed that it runs just fine on OCP as well.
I'm planning to remove the Kustomize method to reduce the maintenance overhead, once this PR is merged. We can always use the chart to test out things in non-OCP clusters. |
The SonarCloud hotspots here are related to the |
|
/override "SonarCloud Code Analysis" See justification above: #326 (comment) |
|
@rm3l: Overrode contexts on behalf of rm3l: SonarCloud Code Analysis DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
05afc24
into
redhat-developer:main


Description of the change
This is to allow for easier consumption against supported non-OCP platforms, as we are preparing the tool for TP.
Which issue(s) does this PR fix or relate to
How to test changes / Special notes to the reviewer
Just deploy this chart using helm:
Checklist
Chart.yamlaccording to Semantic Versioning.values.yamland added to the corresponding README.md. The pre-commit utility can be used to generate the necessary content. Runpre-commit run --all-filesto run the hooks and then push any resulting changes. The pre-commit Workflow will enforce this and warn you if needed.pre-commithook.ct lintcommand.