File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -9,7 +9,7 @@ description: |
99 releases coexist in the shared `agent-sandbox-system` namespace.
1010 Requires the sandbox-operator chart to already be installed.
1111type : application
12- version : 0.6.1
12+ version : 0.6.2
1313# appVersion tracks the studio-sandbox image version (image.tag default).
14- appVersion : " 0.3.0 "
14+ appVersion : " 0.4.5 "
1515kubeVersion : " >=1.30.0-0"
Original file line number Diff line number Diff line change 6464 topologySpreadConstraints :
6565 {{- toYaml . | nindent 8 }}
6666 {{- end }}
67+ {{- with .Values.dnsConfig }}
68+ dnsConfig :
69+ {{- toYaml . | nindent 8 }}
70+ {{- end }}
6771 {{- if not .Values.hostUsers }}
6872 # User namespace remap: UID 1000 inside the pod maps to a high
6973 # subordinate UID on the node, so a container escape lands as a
Original file line number Diff line number Diff line change @@ -131,6 +131,24 @@ affinity: {}
131131# app.kubernetes.io/name: studio-sandbox-<envName>
132132topologySpreadConstraints : []
133133
134+ # DNS resolver options for sandbox pods. The Kubernetes default (ndots:5)
135+ # causes every external lookup to generate up to 8 queries (4 search-domain
136+ # expansions × A+AAAA) before reaching the absolute form. On EKS this burns
137+ # into the 1024 pps/ENI AWS VPC DNS rate limit and causes intermittent git
138+ # clone / npm install failures under load. Set ndots:1 to send external
139+ # hostnames (github.com, registry.npmjs.org, …) directly to the absolute
140+ # form. Safe for sandbox pods: the NetworkPolicy blocks all in-cluster egress
141+ # except port 53 to CoreDNS, so search-domain expansions that resolve to
142+ # private IPs would be unreachable regardless.
143+ #
144+ # Recommended for production:
145+ #
146+ # dnsConfig:
147+ # options:
148+ # - name: ndots
149+ # value: "1"
150+ dnsConfig : {}
151+
134152# ── sandbox-pod hardening ──────────────────────────────────────────────
135153# User namespace remap (`spec.hostUsers: false`): UID 1000 inside the pod
136154# maps to a high, unprivileged subordinate UID on the node, so a
You can’t perform that action at this time.
0 commit comments