promenade/charts
Rick Bartra 0ffde4162e Run etcd with shareProcessNamespace: true to reap zombie processes
The kubernetes-etcd pods are leaving behind zombie processes and
setting 'shareProcessNamespace: true' eliminates that problem.

When you enable process namespace sharing for a Pod, Kubernetes uses a
single process namespace for all the containers in that Pod. The
Kubernetes Pod infrastructure container becomes PID 1 and automatically
reaps orphaned processes. [0]

[0]https://cloud.google.com/solutions/best-practices-for-building-containers#solution_2_enable_process_namespace_sharing_in_kubernetes


Change-Id: I61566fb71258baafa709b0e5367c71f13e980f6f
2020-07-24 17:40:31 +00:00
..
apiserver Add apparmor profile to promenade tpl files 2020-07-20 15:23:08 -05:00
apiserver-webhook Implement helm-toolkit snippet to apiserver and webhook pods/containers 2020-07-02 14:52:19 +00:00
controller_manager Add apparmor profile to promenade tpl files 2020-07-20 15:23:08 -05:00
coredns Add pod/container security context to promenade charts 2020-06-29 17:06:02 -05:00
etcd Run etcd with shareProcessNamespace: true to reap zombie processes 2020-07-24 17:40:31 +00:00
haproxy Add apparmor profile to promenade tpl files 2020-07-20 15:23:08 -05:00
promenade Implement helm-toolkit snippet to promenade test pods/containers 2020-07-02 09:56:38 -05:00
proxy Merge "kube-proxy: use HTTP probes instead of exec" 2020-05-28 00:46:35 +00:00
scheduler Add apparmor profile to promenade tpl files 2020-07-20 15:23:08 -05:00
.gitignore Add initial Makefile 2017-10-31 12:46:23 -05:00