Skip to content

Commit 7222549

Browse files
committed
[release]: bump version to 0.6.2 and appVersion to 0.4.5; add dnsConfig options for improved DNS resolution
1 parent da00103 commit 7222549

3 files changed

Lines changed: 24 additions & 2 deletions

File tree

deploy/helm/sandbox-env/Chart.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ description: |
99
releases coexist in the shared `agent-sandbox-system` namespace.
1010
Requires the sandbox-operator chart to already be installed.
1111
type: application
12-
version: 0.6.1
12+
version: 0.6.2
1313
# appVersion tracks the studio-sandbox image version (image.tag default).
14-
appVersion: "0.3.0"
14+
appVersion: "0.4.5"
1515
kubeVersion: ">=1.30.0-0"

deploy/helm/sandbox-env/templates/sandbox-template.yaml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,10 @@ spec:
6464
topologySpreadConstraints:
6565
{{- toYaml . | nindent 8 }}
6666
{{- end }}
67+
{{- with .Values.dnsConfig }}
68+
dnsConfig:
69+
{{- toYaml . | nindent 8 }}
70+
{{- end }}
6771
{{- if not .Values.hostUsers }}
6872
# User namespace remap: UID 1000 inside the pod maps to a high
6973
# subordinate UID on the node, so a container escape lands as a

deploy/helm/sandbox-env/values.yaml

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -131,6 +131,24 @@ affinity: {}
131131
# app.kubernetes.io/name: studio-sandbox-<envName>
132132
topologySpreadConstraints: []
133133

134+
# DNS resolver options for sandbox pods. The Kubernetes default (ndots:5)
135+
# causes every external lookup to generate up to 8 queries (4 search-domain
136+
# expansions × A+AAAA) before reaching the absolute form. On EKS this burns
137+
# into the 1024 pps/ENI AWS VPC DNS rate limit and causes intermittent git
138+
# clone / npm install failures under load. Set ndots:1 to send external
139+
# hostnames (github.com, registry.npmjs.org, …) directly to the absolute
140+
# form. Safe for sandbox pods: the NetworkPolicy blocks all in-cluster egress
141+
# except port 53 to CoreDNS, so search-domain expansions that resolve to
142+
# private IPs would be unreachable regardless.
143+
#
144+
# Recommended for production:
145+
#
146+
# dnsConfig:
147+
# options:
148+
# - name: ndots
149+
# value: "1"
150+
dnsConfig: {}
151+
134152
# ── sandbox-pod hardening ──────────────────────────────────────────────
135153
# User namespace remap (`spec.hostUsers: false`): UID 1000 inside the pod
136154
# maps to a high, unprivileged subordinate UID on the node, so a

0 commit comments

Comments
 (0)