kube-prometheus-stack collects Kubernetes manifests, Grafana dashboards, and Prometheus rules combined with documentation and scripts to provide easy to operate end-to-end Kubernetes cluster monitoring with Prometheus using the Prometheus Operator.
- https://github.com/prometheus-operator/kube-prometheus
- https://github.com/prometheus-community/helm-charts
- https://github.com/prometheus-operator/kube-prometheus
- Kubernetes Cluster deployed
- Kubernetes config installed in
~/.kube/config
- Helm installed
Kubernetes: >=1.19.0-0
Install Helm
https://helm.sh/docs/intro/install/
- Clone down the repository
- cd into directory
helm install monitoring chart/
Key | Type | Default | Description |
---|---|---|---|
domain | string | "dev.bigbang.mil" |
|
flux.enabled | bool | false |
|
flux.namespace | string | "flux-system" |
|
networkPolicies.enabled | bool | false |
|
networkPolicies.controlPlaneCidr | string | "0.0.0.0/0" |
|
networkPolicies.ingressLabels.app | string | "istio-ingressgateway" |
|
networkPolicies.ingressLabels.istio | string | "ingressgateway" |
|
networkPolicies.alertmanager | object | {"enableEgress":false} |
This toggle enables a NetworkPolicy that will allow external egress providing the ability to send alerts to external resources like MM/Slack/etc. |
networkPolicies.additionalPolicies | list | [] |
|
openshift | bool | false |
|
bbtests.enabled | bool | false |
|
bbtests.cypress.artifacts | bool | true |
|
bbtests.cypress.envs.cypress_prometheus_url | string | "http://monitoring-kube-prometheus-prometheus:9090" |
|
bbtests.cypress.envs.cypress_alertmanager_url | string | "http://monitoring-kube-prometheus-alertmanager:9093" |
|
istio.enabled | bool | false |
|
istio.hardened.enabled | bool | false |
|
istio.hardened.outboundTrafficPolicyMode | string | "REGISTRY_ONLY" |
|
istio.hardened.customServiceEntries | list | [] |
|
istio.hardened.customAuthorizationPolicies | list | [] |
|
istio.hardened.clusterWideHardenedEnabled | bool | false |
|
istio.hardened.tempo.enabled | bool | false |
|
istio.hardened.tempo.namespaces[0] | string | "tempo" |
|
istio.hardened.tempo.principals[0] | string | "cluster.local/ns/tempo/sa/tempo-tempo" |
|
istio.hardened.loki.enabled | bool | false |
|
istio.hardened.loki.namespaces[0] | string | "logging" |
|
istio.hardened.loki.principals[0] | string | "cluster.local/ns/logging/sa/logging-loki" |
|
istio.hardened.alloy.enabled | bool | false |
|
istio.hardened.alloy.namespaces[0] | string | "alloy" |
|
istio.hardened.alloy.principals[0] | string | "cluster.local/ns/alloy/sa/alloy-alloy-metrics" |
|
istio.namespace | string | "istio-system" |
|
istio.prometheus.enabled | bool | true |
|
istio.prometheus.annotations | object | {} |
|
istio.prometheus.labels | object | {} |
|
istio.prometheus.gateways[0] | string | "istio-system/main" |
|
istio.prometheus.hosts[0] | string | "prometheus.{{ .Values.domain }}" |
|
istio.prometheus.service | string | "" |
|
istio.prometheus.port | string | "" |
|
istio.prometheus.namespace | string | "" |
|
istio.prometheusRule.IstioSidecarMemModerate | bool | true |
|
istio.prometheusRule.IstioSidecarMemHigh | bool | true |
|
istio.prometheusRule.IstioConfigValidationFailed | bool | true |
|
istio.prometheusRule.Istio5XXResponseCode | bool | true |
|
istio.prometheusRule.IstioSidecarEndpointError | bool | true |
|
istio.prometheusRule.IstioSidecarListenerConflict | bool | true |
|
istio.alertmanager.enabled | bool | true |
|
istio.alertmanager.annotations | object | {} |
|
istio.alertmanager.labels | object | {} |
|
istio.alertmanager.gateways[0] | string | "istio-system/main" |
|
istio.alertmanager.hosts[0] | string | "alertmanager.{{ .Values.domain }}" |
|
istio.alertmanager.service | string | "" |
|
istio.alertmanager.port | string | "" |
|
istio.alertmanager.namespace | string | "" |
|
istio.injection | string | "disabled" |
|
istio.mtls.mode | string | "STRICT" |
|
istio.console.enabled | bool | false |
|
sso.enabled | bool | false |
|
sso.selector.key | string | "protect" |
|
sso.selector.value | string | "keycloak" |
|
tempo.enabled | bool | false |
|
cleanUpgrade.enabled | bool | false |
|
cleanUpgrade.image.registry | string | "registry1.dso.mil" |
|
cleanUpgrade.image.repository | string | "ironbank/big-bang/base" |
|
cleanUpgrade.image.tag | string | "2.1.0" |
|
cleanUpgrade.image.sha | string | "" |
|
cleanUpgrade.image.imagePullSecrets[0].name | string | "private-registry" |
|
cleanUpgrade.resources.requests.memory | string | "256Mi" |
|
cleanUpgrade.resources.requests.cpu | string | "100m" |
|
cleanUpgrade.resources.limits.memory | string | "256Mi" |
|
cleanUpgrade.resources.limits.cpu | string | "100m" |
|
cleanUpgrade.securityContext.runAsUser | int | 1000 |
|
cleanUpgrade.securityContext.runAsGroup | int | 1000 |
|
cleanUpgrade.securityContext.runAsNonRoot | bool | true |
|
cleanUpgrade.securityContext.allowPrivilegeEscalation | bool | false |
|
cleanUpgrade.securityContext.readOnlyRootFilesystem | bool | true |
|
cleanUpgrade.securityContext.capabilities.drop[0] | string | "ALL" |
|
nameOverride | string | "kube-prometheus-stack" |
|
namespaceOverride | string | "" |
|
kubeTargetVersionOverride | string | "" |
|
kubeVersionOverride | string | "" |
|
fullnameOverride | string | "" |
|
commonLabels | object | {} |
|
crds.enabled | bool | false |
|
crds.upgradeJob.enabled | bool | false |
|
crds.upgradeJob.forceConflicts | bool | false |
|
crds.upgradeJob.image.busybox.registry | string | "docker.io" |
|
crds.upgradeJob.image.busybox.repository | string | "busybox" |
|
crds.upgradeJob.image.busybox.tag | string | "latest" |
|
crds.upgradeJob.image.busybox.sha | string | "" |
|
crds.upgradeJob.image.busybox.pullPolicy | string | "IfNotPresent" |
|
crds.upgradeJob.image.kubectl.registry | string | "registry.k8s.io" |
|
crds.upgradeJob.image.kubectl.repository | string | "kubectl" |
|
crds.upgradeJob.image.kubectl.tag | string | "" |
|
crds.upgradeJob.image.kubectl.sha | string | "" |
|
crds.upgradeJob.image.kubectl.pullPolicy | string | "IfNotPresent" |
|
crds.upgradeJob.env | object | {} |
|
crds.upgradeJob.resources | object | {} |
|
crds.upgradeJob.extraVolumes | list | [] |
|
crds.upgradeJob.extraVolumeMounts | list | [] |
|
crds.upgradeJob.nodeSelector | object | {} |
|
crds.upgradeJob.affinity | object | {} |
|
crds.upgradeJob.tolerations | list | [] |
|
crds.upgradeJob.topologySpreadConstraints | list | [] |
|
crds.upgradeJob.labels | object | {} |
|
crds.upgradeJob.annotations | object | {} |
|
crds.upgradeJob.podLabels | object | {} |
|
crds.upgradeJob.podAnnotations | object | {} |
|
crds.upgradeJob.serviceAccount.create | bool | true |
|
crds.upgradeJob.serviceAccount.name | string | "" |
|
crds.upgradeJob.serviceAccount.annotations | object | {} |
|
crds.upgradeJob.serviceAccount.labels | object | {} |
|
crds.upgradeJob.serviceAccount.automountServiceAccountToken | bool | true |
|
crds.upgradeJob.containerSecurityContext.allowPrivilegeEscalation | bool | false |
|
crds.upgradeJob.containerSecurityContext.readOnlyRootFilesystem | bool | true |
|
crds.upgradeJob.containerSecurityContext.capabilities.drop[0] | string | "ALL" |
|
crds.upgradeJob.podSecurityContext.fsGroup | int | 65534 |
|
crds.upgradeJob.podSecurityContext.runAsGroup | int | 65534 |
|
crds.upgradeJob.podSecurityContext.runAsNonRoot | bool | true |
|
crds.upgradeJob.podSecurityContext.runAsUser | int | 65534 |
|
crds.upgradeJob.podSecurityContext.seccompProfile.type | string | "RuntimeDefault" |
|
customRules | object | {} |
|
defaultRules.create | bool | true |
|
defaultRules.rules.alertmanager | bool | true |
|
defaultRules.rules.etcd | bool | true |
|
defaultRules.rules.configReloaders | bool | true |
|
defaultRules.rules.general | bool | true |
|
defaultRules.rules.k8sContainerCpuUsageSecondsTotal | bool | true |
|
defaultRules.rules.k8sContainerMemoryCache | bool | true |
|
defaultRules.rules.k8sContainerMemoryRss | bool | true |
|
defaultRules.rules.k8sContainerMemorySwap | bool | true |
|
defaultRules.rules.k8sContainerResource | bool | true |
|
defaultRules.rules.k8sContainerMemoryWorkingSetBytes | bool | true |
|
defaultRules.rules.k8sPodOwner | bool | true |
|
defaultRules.rules.kubeApiserverAvailability | bool | true |
|
defaultRules.rules.kubeApiserverBurnrate | bool | true |
|
defaultRules.rules.kubeApiserverHistogram | bool | true |
|
defaultRules.rules.kubeApiserverSlos | bool | true |
|
defaultRules.rules.kubeControllerManager | bool | true |
|
defaultRules.rules.kubelet | bool | true |
|
defaultRules.rules.kubeProxy | bool | true |
|
defaultRules.rules.kubePrometheusGeneral | bool | true |
|
defaultRules.rules.kubePrometheusNodeRecording | bool | true |
|
defaultRules.rules.kubernetesApps | bool | true |
|
defaultRules.rules.kubernetesResources | bool | true |
|
defaultRules.rules.kubernetesStorage | bool | true |
|
defaultRules.rules.kubernetesSystem | bool | true |
|
defaultRules.rules.kubeSchedulerAlerting | bool | true |
|
defaultRules.rules.kubeSchedulerRecording | bool | true |
|
defaultRules.rules.kubeStateMetrics | bool | true |
|
defaultRules.rules.network | bool | true |
|
defaultRules.rules.node | bool | true |
|
defaultRules.rules.nodeExporterAlerting | bool | true |
|
defaultRules.rules.nodeExporterRecording | bool | true |
|
defaultRules.rules.prometheus | bool | true |
|
defaultRules.rules.prometheusOperator | bool | true |
|
defaultRules.rules.windows | bool | true |
|
defaultRules.appNamespacesOperator | string | "=~" |
|
defaultRules.appNamespacesTarget | string | ".*" |
|
defaultRules.keepFiringFor | string | "" |
|
defaultRules.labels | object | {} |
|
defaultRules.annotations | object | {} |
|
defaultRules.additionalRuleLabels | object | {} |
|
defaultRules.additionalRuleAnnotations | object | {} |
|
defaultRules.additionalRuleGroupLabels.alertmanager | object | {} |
|
defaultRules.additionalRuleGroupLabels.etcd | object | {} |
|
defaultRules.additionalRuleGroupLabels.configReloaders | object | {} |
|
defaultRules.additionalRuleGroupLabels.general | object | {} |
|
defaultRules.additionalRuleGroupLabels.k8sContainerCpuUsageSecondsTotal | object | {} |
|
defaultRules.additionalRuleGroupLabels.k8sContainerMemoryCache | object | {} |
|
defaultRules.additionalRuleGroupLabels.k8sContainerMemoryRss | object | {} |
|
defaultRules.additionalRuleGroupLabels.k8sContainerMemorySwap | object | {} |
|
defaultRules.additionalRuleGroupLabels.k8sContainerResource | object | {} |
|
defaultRules.additionalRuleGroupLabels.k8sPodOwner | object | {} |
|
defaultRules.additionalRuleGroupLabels.kubeApiserverAvailability | object | {} |
|
defaultRules.additionalRuleGroupLabels.kubeApiserverBurnrate | object | {} |
|
defaultRules.additionalRuleGroupLabels.kubeApiserverHistogram | object | {} |
|
defaultRules.additionalRuleGroupLabels.kubeApiserverSlos | object | {} |
|
defaultRules.additionalRuleGroupLabels.kubeControllerManager | object | {} |
|
defaultRules.additionalRuleGroupLabels.kubelet | object | {} |
|
defaultRules.additionalRuleGroupLabels.kubeProxy | object | {} |
|
defaultRules.additionalRuleGroupLabels.kubePrometheusGeneral | object | {} |
|
defaultRules.additionalRuleGroupLabels.kubePrometheusNodeRecording | object | {} |
|
defaultRules.additionalRuleGroupLabels.kubernetesApps | object | {} |
|
defaultRules.additionalRuleGroupLabels.kubernetesResources | object | {} |
|
defaultRules.additionalRuleGroupLabels.kubernetesStorage | object | {} |
|
defaultRules.additionalRuleGroupLabels.kubernetesSystem | object | {} |
|
defaultRules.additionalRuleGroupLabels.kubeSchedulerAlerting | object | {} |
|
defaultRules.additionalRuleGroupLabels.kubeSchedulerRecording | object | {} |
|
defaultRules.additionalRuleGroupLabels.kubeStateMetrics | object | {} |
|
defaultRules.additionalRuleGroupLabels.network | object | {} |
|
defaultRules.additionalRuleGroupLabels.node | object | {} |
|
defaultRules.additionalRuleGroupLabels.nodeExporterAlerting | object | {} |
|
defaultRules.additionalRuleGroupLabels.nodeExporterRecording | object | {} |
|
defaultRules.additionalRuleGroupLabels.prometheus | object | {} |
|
defaultRules.additionalRuleGroupLabels.prometheusOperator | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.alertmanager | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.etcd | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.configReloaders | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.general | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.k8sContainerCpuUsageSecondsTotal | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.k8sContainerMemoryCache | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.k8sContainerMemoryRss | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.k8sContainerMemorySwap | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.k8sContainerResource | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.k8sPodOwner | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.kubeApiserverAvailability | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.kubeApiserverBurnrate | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.kubeApiserverHistogram | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.kubeApiserverSlos | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.kubeControllerManager | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.kubelet | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.kubeProxy | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.kubePrometheusGeneral | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.kubePrometheusNodeRecording | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.kubernetesApps | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.kubernetesResources | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.kubernetesStorage | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.kubernetesSystem | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.kubeSchedulerAlerting | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.kubeSchedulerRecording | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.kubeStateMetrics | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.network | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.node | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.nodeExporterAlerting | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.nodeExporterRecording | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.prometheus | object | {} |
|
defaultRules.additionalRuleGroupAnnotations.prometheusOperator | object | {} |
|
defaultRules.additionalAggregationLabels | list | [] |
|
defaultRules.runbookUrl | string | "https://runbooks.prometheus-operator.dev/runbooks" |
|
defaultRules.node.fsSelector | string | "fstype!=\"\"" |
|
defaultRules.disabled | object | {} |
|
additionalPrometheusRulesMap | object | {} |
|
global.rbac.create | bool | true |
|
global.rbac.createAggregateClusterRoles | bool | false |
|
global.imageRegistry | string | "" |
|
global.imagePullSecrets[0].name | string | "private-registry" |
|
windowsMonitoring.enabled | bool | false |
|
prometheus-windows-exporter.prometheus.monitor.enabled | bool | true |
|
prometheus-windows-exporter.prometheus.monitor.jobLabel | string | "jobLabel" |
|
prometheus-windows-exporter.releaseLabel | bool | true |
|
prometheus-windows-exporter.podLabels.jobLabel | string | "windows-exporter" |
|
prometheus-windows-exporter.config | string | "collectors:\n enabled: '[defaults],memory,container'" |
|
alertmanager.enabled | bool | true |
|
alertmanager.namespaceOverride | string | "" |
|
alertmanager.annotations | object | {} |
|
alertmanager.additionalLabels | object | {} |
|
alertmanager.apiVersion | string | "v2" |
|
alertmanager.enableFeatures | list | [] |
|
alertmanager.forceDeployDashboards | bool | false |
|
alertmanager.networkPolicy.enabled | bool | false |
Enable network policy for Alertmanager |
alertmanager.networkPolicy.policyTypes | list | ["Ingress"] |
Define policy types. If egress is enabled, both Ingress and Egress will be used Valid values are ["Ingress"] or ["Ingress", "Egress"] # |
alertmanager.networkPolicy.gateway | object | {"namespace":"","podLabels":{}} |
Gateway (formerly ingress controller) configuration # |
alertmanager.networkPolicy.gateway.namespace | string | "" |
Gateway namespace # |
alertmanager.networkPolicy.gateway.podLabels | object | {} |
Gateway pod labels # |
alertmanager.networkPolicy.additionalIngress | list | [] |
Additional custom ingress rules # |
alertmanager.networkPolicy.egress | object | {"enabled":false,"rules":[]} |
Configure egress rules # |
alertmanager.networkPolicy.egress.enabled | bool | false |
Enable egress rules. When enabled, policyTypes will include Egress # |
alertmanager.networkPolicy.egress.rules | list | [] |
Custom egress rules # |
alertmanager.networkPolicy.enableClusterRules | bool | true |
Enable rules for alertmanager cluster traffic # |
alertmanager.networkPolicy.monitoringRules | object | {"configReloader":true,"prometheus":true} |
Configure monitoring component rules # |
alertmanager.networkPolicy.monitoringRules.prometheus | bool | true |
Enable ingress from Prometheus # |
alertmanager.networkPolicy.monitoringRules.configReloader | bool | true |
Enable ingress for config reloader metrics # |
alertmanager.serviceAccount.create | bool | true |
|
alertmanager.serviceAccount.name | string | "" |
|
alertmanager.serviceAccount.annotations | object | {} |
|
alertmanager.serviceAccount.automountServiceAccountToken | bool | false |
|
alertmanager.podDisruptionBudget.enabled | bool | false |
|
alertmanager.podDisruptionBudget.minAvailable | int | 1 |
|
alertmanager.podDisruptionBudget.unhealthyPodEvictionPolicy | string | "AlwaysAllow" |
|
alertmanager.config.global.resolve_timeout | string | "5m" |
|
alertmanager.config.inhibit_rules[0].source_matchers[0] | string | "severity = critical" |
|
alertmanager.config.inhibit_rules[0].target_matchers[0] | string | "severity =~ warning|info" |
|
alertmanager.config.inhibit_rules[0].equal[0] | string | "namespace" |
|
alertmanager.config.inhibit_rules[0].equal[1] | string | "alertname" |
|
alertmanager.config.inhibit_rules[1].source_matchers[0] | string | "severity = warning" |
|
alertmanager.config.inhibit_rules[1].target_matchers[0] | string | "severity = info" |
|
alertmanager.config.inhibit_rules[1].equal[0] | string | "namespace" |
|
alertmanager.config.inhibit_rules[1].equal[1] | string | "alertname" |
|
alertmanager.config.inhibit_rules[2].source_matchers[0] | string | "alertname = InfoInhibitor" |
|
alertmanager.config.inhibit_rules[2].target_matchers[0] | string | "severity = info" |
|
alertmanager.config.inhibit_rules[2].equal[0] | string | "namespace" |
|
alertmanager.config.inhibit_rules[3].target_matchers[0] | string | "alertname = InfoInhibitor" |
|
alertmanager.config.route.group_by[0] | string | "namespace" |
|
alertmanager.config.route.group_wait | string | "30s" |
|
alertmanager.config.route.group_interval | string | "5m" |
|
alertmanager.config.route.repeat_interval | string | "12h" |
|
alertmanager.config.route.receiver | string | "null" |
|
alertmanager.config.route.routes[0].receiver | string | "null" |
|
alertmanager.config.route.routes[0].matchers[0] | string | "alertname = \"Watchdog\"" |
|
alertmanager.config.receivers[0].name | string | "null" |
|
alertmanager.config.templates[0] | string | "/etc/alertmanager/config/*.tmpl" |
|
alertmanager.stringConfig | string | "" |
|
alertmanager.tplConfig | bool | false |
|
alertmanager.templateFiles | object | {} |
|
alertmanager.ingress.enabled | bool | false |
|
alertmanager.ingress.ingressClassName | string | "" |
|
alertmanager.ingress.annotations | object | {} |
|
alertmanager.ingress.labels | object | {} |
|
alertmanager.ingress.hosts | list | [] |
|
alertmanager.ingress.paths | list | [] |
|
alertmanager.ingress.tls | list | [] |
|
alertmanager.route | object | {"main":{"additionalRules":[],"annotations":{},"apiVersion":"gateway.networking.k8s.io/v1","enabled":false,"filters":[],"hostnames":[],"httpsRedirect":false,"kind":"HTTPRoute","labels":{},"matches":[{"path":{"type":"PathPrefix","value":"/"}}],"parentRefs":[]}} |
BETA: Configure the gateway routes for the chart here. More routes can be added by adding a dictionary key like the 'main' route. Be aware that this is an early beta of this feature, kube-prometheus-stack does not guarantee this works and is subject to change. Being BETA this can/will change in the future without notice, do not use unless you want to take that risk [ref] |
alertmanager.route.main.enabled | bool | false |
Enables or disables the route |
alertmanager.route.main.apiVersion | string | "gateway.networking.k8s.io/v1" |
Set the route apiVersion, e.g. gateway.networking.k8s.io/v1 or gateway.networking.k8s.io/v1alpha2 |
alertmanager.route.main.kind | string | "HTTPRoute" |
Set the route kind Valid options are GRPCRoute, HTTPRoute, TCPRoute, TLSRoute, UDPRoute |
alertmanager.route.main.httpsRedirect | bool | false |
create http route for redirect (https://gateway-api.sigs.k8s.io/guides/http-redirect-rewrite/#http-to-https-redirects) # Take care that you only enable this on the http listener of the gateway to avoid an infinite redirect. # matches, filters and additionalRules will be ignored if this is set to true. Be are |
alertmanager.secret.annotations | object | {} |
|
alertmanager.ingressPerReplica.enabled | bool | false |
|
alertmanager.ingressPerReplica.ingressClassName | string | "" |
|
alertmanager.ingressPerReplica.annotations | object | {} |
|
alertmanager.ingressPerReplica.labels | object | {} |
|
alertmanager.ingressPerReplica.hostPrefix | string | "" |
|
alertmanager.ingressPerReplica.hostDomain | string | "" |
|
alertmanager.ingressPerReplica.paths | list | [] |
|
alertmanager.ingressPerReplica.tlsSecretName | string | "" |
|
alertmanager.ingressPerReplica.tlsSecretPerReplica.enabled | bool | false |
|
alertmanager.ingressPerReplica.tlsSecretPerReplica.prefix | string | "alertmanager" |
|
alertmanager.service.enabled | bool | true |
|
alertmanager.service.annotations | object | {} |
|
alertmanager.service.labels | object | {} |
|
alertmanager.service.clusterIP | string | "" |
|
alertmanager.service.ipDualStack.enabled | bool | false |
|
alertmanager.service.ipDualStack.ipFamilies[0] | string | "IPv6" |
|
alertmanager.service.ipDualStack.ipFamilies[1] | string | "IPv4" |
|
alertmanager.service.ipDualStack.ipFamilyPolicy | string | "PreferDualStack" |
|
alertmanager.service.port | int | 9093 |
|
alertmanager.service.targetPort | int | 9093 |
|
alertmanager.service.nodePort | int | 30903 |
|
alertmanager.service.additionalPorts | list | [] |
|
alertmanager.service.externalIPs | list | [] |
|
alertmanager.service.loadBalancerIP | string | "" |
|
alertmanager.service.loadBalancerSourceRanges | list | [] |
|
alertmanager.service.externalTrafficPolicy | string | "Cluster" |
|
alertmanager.service.sessionAffinity | string | "None" |
|
alertmanager.service.sessionAffinityConfig.clientIP.timeoutSeconds | int | 10800 |
|
alertmanager.service.type | string | "ClusterIP" |
|
alertmanager.servicePerReplica.enabled | bool | false |
|
alertmanager.servicePerReplica.annotations | object | {} |
|
alertmanager.servicePerReplica.port | int | 9093 |
|
alertmanager.servicePerReplica.targetPort | int | 9093 |
|
alertmanager.servicePerReplica.nodePort | int | 30904 |
|
alertmanager.servicePerReplica.loadBalancerSourceRanges | list | [] |
|
alertmanager.servicePerReplica.externalTrafficPolicy | string | "Cluster" |
|
alertmanager.servicePerReplica.type | string | "ClusterIP" |
|
alertmanager.serviceMonitor.selfMonitor | bool | true |
|
alertmanager.serviceMonitor.interval | string | "" |
|
alertmanager.serviceMonitor.additionalLabels | object | {} |
|
alertmanager.serviceMonitor.sampleLimit | int | 0 |
|
alertmanager.serviceMonitor.targetLimit | int | 0 |
|
alertmanager.serviceMonitor.labelLimit | int | 0 |
|
alertmanager.serviceMonitor.labelNameLengthLimit | int | 0 |
|
alertmanager.serviceMonitor.labelValueLengthLimit | int | 0 |
|
alertmanager.serviceMonitor.proxyUrl | string | "" |
|
alertmanager.serviceMonitor.scheme | string | "" |
|
alertmanager.serviceMonitor.enableHttp2 | bool | true |
|
alertmanager.serviceMonitor.tlsConfig | object | {} |
|
alertmanager.serviceMonitor.bearerTokenFile | string | nil |
|
alertmanager.serviceMonitor.metricRelabelings | list | [] |
|
alertmanager.serviceMonitor.relabelings | list | [] |
|
alertmanager.serviceMonitor.additionalEndpoints | list | [] |
|
alertmanager.alertmanagerSpec.persistentVolumeClaimRetentionPolicy | object | {} |
|
alertmanager.alertmanagerSpec.podMetadata | object | {} |
|
alertmanager.alertmanagerSpec.serviceName | string | nil |
|
alertmanager.alertmanagerSpec.image.registry | string | "registry1.dso.mil" |
|
alertmanager.alertmanagerSpec.image.repository | string | "ironbank/opensource/prometheus/alertmanager" |
|
alertmanager.alertmanagerSpec.image.tag | string | "v0.28.1" |
|
alertmanager.alertmanagerSpec.image.sha | string | "" |
|
alertmanager.alertmanagerSpec.image.imagePullSecrets[0].name | string | "private-registry" |
|
alertmanager.alertmanagerSpec.useExistingSecret | bool | false |
|
alertmanager.alertmanagerSpec.secrets | list | [] |
|
alertmanager.alertmanagerSpec.automountServiceAccountToken | bool | true |
|
alertmanager.alertmanagerSpec.configMaps | list | [] |
|
alertmanager.alertmanagerSpec.web | object | {} |
|
alertmanager.alertmanagerSpec.alertmanagerConfigSelector | object | {} |
|
alertmanager.alertmanagerSpec.alertmanagerConfigNamespaceSelector | object | {} |
|
alertmanager.alertmanagerSpec.alertmanagerConfiguration | object | {} |
|
alertmanager.alertmanagerSpec.alertmanagerConfigMatcherStrategy | object | {} |
|
alertmanager.alertmanagerSpec.additionalArgs | list | [] |
|
alertmanager.alertmanagerSpec.logFormat | string | "logfmt" |
|
alertmanager.alertmanagerSpec.logLevel | string | "info" |
|
alertmanager.alertmanagerSpec.replicas | int | 1 |
|
alertmanager.alertmanagerSpec.retention | string | "120h" |
|
alertmanager.alertmanagerSpec.storage | object | {} |
|
alertmanager.alertmanagerSpec.externalUrl | string | "https://alertmanager.{{ .Values.domain }}" |
|
alertmanager.alertmanagerSpec.routePrefix | string | "/" |
|
alertmanager.alertmanagerSpec.scheme | string | "" |
|
alertmanager.alertmanagerSpec.tlsConfig | object | {} |
|
alertmanager.alertmanagerSpec.paused | bool | false |
|
alertmanager.alertmanagerSpec.nodeSelector | object | {} |
|
alertmanager.alertmanagerSpec.resources.limits.cpu | string | "100m" |
|
alertmanager.alertmanagerSpec.resources.limits.memory | string | "100Mi" |
|
alertmanager.alertmanagerSpec.resources.requests.cpu | string | "100m" |
|
alertmanager.alertmanagerSpec.resources.requests.memory | string | "100Mi" |
|
alertmanager.alertmanagerSpec.podAntiAffinity | string | "soft" |
|
alertmanager.alertmanagerSpec.podAntiAffinityTopologyKey | string | "kubernetes.io/hostname" |
|
alertmanager.alertmanagerSpec.affinity | object | {} |
|
alertmanager.alertmanagerSpec.tolerations | list | [] |
|
alertmanager.alertmanagerSpec.topologySpreadConstraints | list | [] |
|
alertmanager.alertmanagerSpec.securityContext.runAsGroup | int | 2000 |
|
alertmanager.alertmanagerSpec.securityContext.runAsNonRoot | bool | true |
|
alertmanager.alertmanagerSpec.securityContext.runAsUser | int | 1000 |
|
alertmanager.alertmanagerSpec.securityContext.fsGroup | int | 2000 |
|
alertmanager.alertmanagerSpec.securityContext.seccompProfile.type | string | "RuntimeDefault" |
|
alertmanager.alertmanagerSpec.listenLocal | bool | false |
|
alertmanager.alertmanagerSpec.containers | list | [] |
|
alertmanager.alertmanagerSpec.volumes | list | [] |
|
alertmanager.alertmanagerSpec.volumeMounts | list | [] |
|
alertmanager.alertmanagerSpec.initContainers | list | [] |
|
alertmanager.alertmanagerSpec.priorityClassName | string | "" |
|
alertmanager.alertmanagerSpec.additionalPeers | list | [] |
|
alertmanager.alertmanagerSpec.portName | string | "http-web" |
|
alertmanager.alertmanagerSpec.clusterAdvertiseAddress | bool | false |
|
alertmanager.alertmanagerSpec.clusterGossipInterval | string | "" |
|
alertmanager.alertmanagerSpec.clusterPeerTimeout | string | "" |
|
alertmanager.alertmanagerSpec.clusterPushpullInterval | string | "" |
|
alertmanager.alertmanagerSpec.clusterLabel | string | "" |
|
alertmanager.alertmanagerSpec.forceEnableClusterMode | bool | false |
|
alertmanager.alertmanagerSpec.minReadySeconds | int | 0 |
|
alertmanager.alertmanagerSpec.additionalConfig | object | {} |
|
alertmanager.alertmanagerSpec.additionalConfigString | string | "" |
|
alertmanager.extraSecret.annotations | object | {} |
|
alertmanager.extraSecret.data | object | {} |
|
grafana.enabled | bool | false |
|
grafana.namespaceOverride | string | "" |
|
grafana.image.registry | string | "registry1.dso.mil" |
|
grafana.image.repository | string | "ironbank/big-bang/grafana/grafana-plugins" |
|
grafana.image.tag | string | "12.0.2" |
|
grafana.image.pullSecrets[0] | string | "private-registry" |
|
grafana.containerSecurityContext.capabilities.drop[0] | string | "ALL" |
|
grafana.resources.limits.cpu | string | "100m" |
|
grafana.resources.limits.memory | string | "256Mi" |
|
grafana.resources.requests.cpu | string | "100m" |
|
grafana.resources.requests.memory | string | "256Mi" |
|
grafana.testFramework.registry | string | "registry1.dso.mil" |
|
grafana.testFramework.repository | string | "ironbank/opensource/bats/bats" |
|
grafana.testFramework.tag | string | "v1.11.0" |
|
grafana.testFramework.pullSecrets[0] | string | "private-registry" |
|
grafana.testFramework.imagePullPolicy | string | "IfNotPresent" |
|
grafana.testFramework.securityContext.capabilites.drop[0] | string | "ALL" |
|
grafana.forceDeployDatasources | bool | false |
|
grafana.forceDeployDashboards | bool | false |
|
grafana.defaultDashboardsEnabled | bool | true |
|
grafana.operator.dashboardsConfigMapRefEnabled | bool | false |
|
grafana.operator.annotations | object | {} |
|
grafana.operator.matchLabels | object | {} |
|
grafana.operator.resyncPeriod | string | "10m" |
|
grafana.operator.folder | string | "General" |
|
grafana.defaultDashboardsTimezone | string | "utc" |
|
grafana.defaultDashboardsEditable | bool | true |
|
grafana.defaultDashboardsInterval | string | "1m" |
|
grafana.adminUser | string | "admin" |
|
grafana.adminPassword | string | "prom-operator" |
|
grafana."grafana.ini"."auth.generic_oauth".enabled | bool | false |
|
grafana."grafana.ini"."auth.generic_oauth".client_id | string | "grafana" |
|
grafana."grafana.ini"."auth.generic_oauth".client_secret | string | "secret" |
|
grafana."grafana.ini"."auth.generic_oauth".scopes | string | "Grafana" |
|
grafana."grafana.ini"."auth.generic_oauth".auth_url | string | "https://login.dso.mil/auth/realms/baby-yoda/protocol/openid-connect/auth" |
|
grafana."grafana.ini"."auth.generic_oauth".token_url | string | "https://login.dso.mil/auth/realms/baby-yoda/protocol/openid-connect/token" |
|
grafana."grafana.ini"."auth.generic_oauth".api_url | string | "https://login.dso.mil/auth/realms/baby-yoda/protocol/openid-connect/userinfo" |
|
grafana."grafana.ini"."auth.generic_oauth".allow_sign_up | bool | true |
|
grafana."grafana.ini"."auth.generic_oauth".role_attribute_path | string | "Viewer" |
|
grafana."grafana.ini"."plugin.grafana-piechart-panel".path | string | "/var/lib/bb-plugins/piechart-panel" |
|
grafana."grafana.ini"."plugin.grafana-polystat-panel".path | string | "/var/lib/bb-plugins/polystat-panel" |
|
grafana."grafana.ini"."plugin.redis-datasource".path | string | "/var/lib/bb-plugins/redis-datasource" |
|
grafana.rbac.pspEnabled | bool | false |
|
grafana.ingress.enabled | bool | false |
|
grafana.ingress.annotations | object | {} |
|
grafana.ingress.labels | object | {} |
|
grafana.ingress.hosts | list | [] |
|
grafana.ingress.path | string | "/" |
|
grafana.ingress.tls | list | [] |
|
grafana.serviceAccount.create | bool | true |
|
grafana.serviceAccount.autoMount | bool | true |
|
grafana.sidecar.image.registry | string | "registry1.dso.mil" |
|
grafana.sidecar.image.repository | string | "ironbank/kiwigrid/k8s-sidecar" |
|
grafana.sidecar.image.tag | string | "1.30.5" |
|
grafana.sidecar.image.imagePullSecrets[0].name | string | "private-registry" |
|
grafana.sidecar.resources.limits.cpu | string | "100m" |
|
grafana.sidecar.resources.limits.memory | string | "100Mi" |
|
grafana.sidecar.resources.requests.cpu | string | "100m" |
|
grafana.sidecar.resources.requests.memory | string | "100Mi" |
|
grafana.sidecar.securityContext.capabilities.drop[0] | string | "ALL" |
|
grafana.sidecar.dashboards.enabled | bool | true |
|
grafana.sidecar.dashboards.label | string | "grafana_dashboard" |
|
grafana.sidecar.dashboards.labelValue | string | "1" |
|
grafana.sidecar.dashboards.searchNamespace | string | "ALL" |
|
grafana.sidecar.dashboards.enableNewTablePanelSyntax | bool | false |
|
grafana.sidecar.dashboards.annotations | object | {} |
|
grafana.sidecar.dashboards.multicluster.global.enabled | bool | false |
|
grafana.sidecar.dashboards.multicluster.etcd.enabled | bool | false |
|
grafana.sidecar.dashboards.provider.allowUiUpdates | bool | false |
|
grafana.sidecar.datasources.enabled | bool | true |
|
grafana.sidecar.datasources.defaultDatasourceEnabled | bool | true |
|
grafana.sidecar.datasources.isDefaultDatasource | bool | true |
|
grafana.sidecar.datasources.name | string | "Prometheus" |
|
grafana.sidecar.datasources.uid | string | "prometheus" |
|
grafana.sidecar.datasources.annotations | object | {} |
|
grafana.sidecar.datasources.httpMethod | string | "POST" |
|
grafana.sidecar.datasources.createPrometheusReplicasDatasources | bool | false |
|
grafana.sidecar.datasources.prometheusServiceName | string | "prometheus-operated" |
|
grafana.sidecar.datasources.label | string | "grafana_datasource" |
|
grafana.sidecar.datasources.labelValue | string | "1" |
|
grafana.sidecar.datasources.exemplarTraceIdDestinations | object | {} |
|
grafana.sidecar.datasources.alertmanager.enabled | bool | true |
|
grafana.sidecar.datasources.alertmanager.name | string | "Alertmanager" |
|
grafana.sidecar.datasources.alertmanager.uid | string | "alertmanager" |
|
grafana.sidecar.datasources.alertmanager.handleGrafanaManagedAlerts | bool | false |
|
grafana.sidecar.datasources.alertmanager.implementation | string | "prometheus" |
|
grafana.dashboardProviders | object | {} |
|
grafana.downloadDashboardsImage.registry | string | "registry1.dso.mil" |
|
grafana.downloadDashboardsImage.repository | string | "ironbank/big-bang/base" |
|
grafana.downloadDashboardsImage.tag | string | "2.1.0" |
|
grafana.downloadDashboards.resources.limits.cpu | string | "20m" |
|
grafana.downloadDashboards.resources.limits.memory | string | "20Mi" |
|
grafana.downloadDashboards.resources.requests.cpu | string | "20m" |
|
grafana.downloadDashboards.resources.requests.memory | string | "20Mi" |
|
grafana.dashboards | object | {} |
|
grafana.extraConfigmapMounts | list | [] |
|
grafana.extraSecretMounts | list | [] |
|
grafana.deleteDatasources | list | [] |
|
grafana.additionalDataSources | list | [] |
|
grafana.prune | bool | false |
|
grafana.service.portName | string | "http-web" |
|
grafana.service.ipFamilies | list | [] |
|
grafana.service.ipFamilyPolicy | string | "" |
|
grafana.serviceMonitor.enabled | bool | true |
|
grafana.serviceMonitor.path | string | "/metrics" |
|
grafana.serviceMonitor.labels | object | {} |
|
grafana.serviceMonitor.interval | string | "" |
|
grafana.serviceMonitor.scheme | string | "http" |
|
grafana.serviceMonitor.tlsConfig | object | {} |
|
grafana.serviceMonitor.scrapeTimeout | string | "30s" |
|
grafana.serviceMonitor.relabelings | list | [] |
|
grafana.persistence.type | string | "pvc" |
|
grafana.persistence.enabled | bool | false |
|
grafana.persistence.accessModes[0] | string | "ReadWriteOnce" |
|
grafana.persistence.size | string | "10Gi" |
|
grafana.initChownData.enabled | bool | false |
|
grafana.initChownData.image.registry | string | "registry1.dso.mil" |
|
grafana.initChownData.image.repository | string | "ironbank/redhat/ubi/ubi9-minimal" |
|
grafana.initChownData.image.tag | string | "9.6" |
|
grafana.initChownData.image.sha | string | "" |
|
grafana.initChownData.image.pullPolicy | string | "IfNotPresent" |
|
grafana.initChownData.image.imagePullSecrets[0].name | string | "private-registry" |
|
grafana.initChownData.resources.limits.cpu | string | "100m" |
|
grafana.initChownData.resources.limits.memory | string | "128Mi" |
|
grafana.initChownData.resources.requests.cpu | string | "100m" |
|
grafana.initChownData.resources.requests.memory | string | "128Mi" |
|
kiali.enabled | bool | false |
|
kubernetesServiceMonitors.enabled | bool | true |
|
kubeApiServer.enabled | bool | true |
|
kubeApiServer.tlsConfig.serverName | string | "kubernetes" |
|
kubeApiServer.tlsConfig.insecureSkipVerify | bool | false |
|
kubeApiServer.serviceMonitor.enabled | bool | true |
|
kubeApiServer.serviceMonitor.interval | string | "" |
|
kubeApiServer.serviceMonitor.sampleLimit | int | 0 |
|
kubeApiServer.serviceMonitor.targetLimit | int | 0 |
|
kubeApiServer.serviceMonitor.labelLimit | int | 0 |
|
kubeApiServer.serviceMonitor.labelNameLengthLimit | int | 0 |
|
kubeApiServer.serviceMonitor.labelValueLengthLimit | int | 0 |
|
kubeApiServer.serviceMonitor.proxyUrl | string | "" |
|
kubeApiServer.serviceMonitor.jobLabel | string | "component" |
|
kubeApiServer.serviceMonitor.selector.matchLabels.component | string | "apiserver" |
|
kubeApiServer.serviceMonitor.selector.matchLabels.provider | string | "kubernetes" |
|
kubeApiServer.serviceMonitor.metricRelabelings[0].action | string | "drop" |
|
kubeApiServer.serviceMonitor.metricRelabelings[0].regex | string | "(etcd_request|apiserver_request_slo|apiserver_request_sli|apiserver_request)_duration_seconds_bucket;(0\\.15|0\\.2|0\\.3|0\\.35|0\\.4|0\\.45|0\\.6|0\\.7|0\\.8|0\\.9|1\\.25|1\\.5|1\\.75|2|3|3\\.5|4|4\\.5|6|7|8|9|15|20|40|45|50)(\\.0)?" |
|
kubeApiServer.serviceMonitor.metricRelabelings[0].sourceLabels[0] | string | "__name__" |
|
kubeApiServer.serviceMonitor.metricRelabelings[0].sourceLabels[1] | string | "le" |
|
kubeApiServer.serviceMonitor.relabelings | list | [] |
|
kubeApiServer.serviceMonitor.additionalLabels | object | {} |
|
kubeApiServer.serviceMonitor.targetLabels | list | [] |
|
kubelet.enabled | bool | true |
|
kubelet.namespace | string | "kube-system" |
|
kubelet.serviceMonitor.enabled | bool | true |
|
kubelet.serviceMonitor.kubelet | bool | true |
|
kubelet.serviceMonitor.attachMetadata.node | bool | false |
|
kubelet.serviceMonitor.interval | string | "" |
|
kubelet.serviceMonitor.honorLabels | bool | true |
|
kubelet.serviceMonitor.honorTimestamps | bool | true |
|
kubelet.serviceMonitor.trackTimestampsStaleness | bool | true |
|
kubelet.serviceMonitor.sampleLimit | int | 0 |
|
kubelet.serviceMonitor.targetLimit | int | 0 |
|
kubelet.serviceMonitor.labelLimit | int | 0 |
|
kubelet.serviceMonitor.labelNameLengthLimit | int | 0 |
|
kubelet.serviceMonitor.labelValueLengthLimit | int | 0 |
|
kubelet.serviceMonitor.proxyUrl | string | "" |
|
kubelet.serviceMonitor.https | bool | true |
|
kubelet.serviceMonitor.insecureSkipVerify | bool | true |
|
kubelet.serviceMonitor.probes | bool | true |
|
kubelet.serviceMonitor.resource | bool | false |
|
kubelet.serviceMonitor.resourcePath | string | "/metrics/resource/v1alpha1" |
|
kubelet.serviceMonitor.resourceInterval | string | "10s" |
|
kubelet.serviceMonitor.cAdvisor | bool | true |
|
kubelet.serviceMonitor.cAdvisorInterval | string | "10s" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[0].sourceLabels[0] | string | "__name__" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[0].action | string | "drop" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[0].regex | string | "container_cpu_(cfs_throttled_seconds_total|load_average_10s|system_seconds_total|user_seconds_total)" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[1].sourceLabels[0] | string | "__name__" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[1].action | string | "drop" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[1].regex | string | "container_fs_(io_current|io_time_seconds_total|io_time_weighted_seconds_total|reads_merged_total|sector_reads_total|sector_writes_total|writes_merged_total)" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[2].sourceLabels[0] | string | "__name__" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[2].action | string | "drop" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[2].regex | string | "container_memory_(mapped_file|swap)" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[3].sourceLabels[0] | string | "__name__" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[3].action | string | "drop" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[3].regex | string | "container_(file_descriptors|tasks_state|threads_max)" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[4].sourceLabels[0] | string | "__name__" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[4].sourceLabels[1] | string | "scope" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[4].action | string | "drop" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[4].regex | string | "container_memory_failures_total;hierarchy" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[5].sourceLabels[0] | string | "__name__" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[5].sourceLabels[1] | string | "interface" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[5].action | string | "drop" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[5].regex | string | "container_network_.*;(cali|cilium|cni|lxc|nodelocaldns|tunl).*" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[6].sourceLabels[0] | string | "__name__" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[6].action | string | "drop" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[6].regex | string | "container_spec.*" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[7].sourceLabels[0] | string | "id" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[7].sourceLabels[1] | string | "pod" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[7].action | string | "drop" |
|
kubelet.serviceMonitor.cAdvisorMetricRelabelings[7].regex | string | ".+;" |
|
kubelet.serviceMonitor.probesMetricRelabelings | list | [] |
|
kubelet.serviceMonitor.cAdvisorRelabelings[0].action | string | "replace" |
|
kubelet.serviceMonitor.cAdvisorRelabelings[0].sourceLabels[0] | string | "__metrics_path__" |
|
kubelet.serviceMonitor.cAdvisorRelabelings[0].targetLabel | string | "metrics_path" |
|
kubelet.serviceMonitor.probesRelabelings[0].action | string | "replace" |
|
kubelet.serviceMonitor.probesRelabelings[0].sourceLabels[0] | string | "__metrics_path__" |
|
kubelet.serviceMonitor.probesRelabelings[0].targetLabel | string | "metrics_path" |
|
kubelet.serviceMonitor.resourceRelabelings[0].action | string | "replace" |
|
kubelet.serviceMonitor.resourceRelabelings[0].sourceLabels[0] | string | "__metrics_path__" |
|
kubelet.serviceMonitor.resourceRelabelings[0].targetLabel | string | "metrics_path" |
|
kubelet.serviceMonitor.metricRelabelings[0].action | string | "drop" |
|
kubelet.serviceMonitor.metricRelabelings[0].sourceLabels[0] | string | "__name__" |
|
kubelet.serviceMonitor.metricRelabelings[0].sourceLabels[1] | string | "le" |
|
kubelet.serviceMonitor.metricRelabelings[0].regex | string | "(csi_operations|storage_operation_duration)_seconds_bucket;(0.25|2.5|15|25|120|600)(\\.0)?" |
|
kubelet.serviceMonitor.relabelings[0].action | string | "replace" |
|
kubelet.serviceMonitor.relabelings[0].sourceLabels[0] | string | "__metrics_path__" |
|
kubelet.serviceMonitor.relabelings[0].targetLabel | string | "metrics_path" |
|
kubelet.serviceMonitor.additionalLabels | object | {} |
|
kubelet.serviceMonitor.targetLabels | list | [] |
|
kubeControllerManager.enabled | bool | true |
|
kubeControllerManager.endpoints | list | [] |
|
kubeControllerManager.service.enabled | bool | true |
|
kubeControllerManager.service.port | string | nil |
|
kubeControllerManager.service.targetPort | string | nil |
|
kubeControllerManager.service.ipDualStack.enabled | bool | false |
|
kubeControllerManager.service.ipDualStack.ipFamilies[0] | string | "IPv6" |
|
kubeControllerManager.service.ipDualStack.ipFamilies[1] | string | "IPv4" |
|
kubeControllerManager.service.ipDualStack.ipFamilyPolicy | string | "PreferDualStack" |
|
kubeControllerManager.serviceMonitor.enabled | bool | true |
|
kubeControllerManager.serviceMonitor.interval | string | "" |
|
kubeControllerManager.serviceMonitor.sampleLimit | int | 0 |
|
kubeControllerManager.serviceMonitor.targetLimit | int | 0 |
|
kubeControllerManager.serviceMonitor.labelLimit | int | 0 |
|
kubeControllerManager.serviceMonitor.labelNameLengthLimit | int | 0 |
|
kubeControllerManager.serviceMonitor.labelValueLengthLimit | int | 0 |
|
kubeControllerManager.serviceMonitor.proxyUrl | string | "" |
|
kubeControllerManager.serviceMonitor.port | string | "http-metrics" |
|
kubeControllerManager.serviceMonitor.jobLabel | string | "jobLabel" |
|
kubeControllerManager.serviceMonitor.selector | object | {} |
|
kubeControllerManager.serviceMonitor.https | string | nil |
|
kubeControllerManager.serviceMonitor.insecureSkipVerify | string | nil |
|
kubeControllerManager.serviceMonitor.serverName | string | nil |
|
kubeControllerManager.serviceMonitor.metricRelabelings | list | [] |
|
kubeControllerManager.serviceMonitor.relabelings | list | [] |
|
kubeControllerManager.serviceMonitor.additionalLabels | object | {} |
|
kubeControllerManager.serviceMonitor.targetLabels | list | [] |
|
coreDns.enabled | bool | true |
|
coreDns.service.enabled | bool | true |
|
coreDns.service.port | int | 9153 |
|
coreDns.service.targetPort | int | 9153 |
|
coreDns.service.ipDualStack.enabled | bool | false |
|
coreDns.service.ipDualStack.ipFamilies[0] | string | "IPv6" |
|
coreDns.service.ipDualStack.ipFamilies[1] | string | "IPv4" |
|
coreDns.service.ipDualStack.ipFamilyPolicy | string | "PreferDualStack" |
|
coreDns.serviceMonitor.enabled | bool | true |
|
coreDns.serviceMonitor.interval | string | "" |
|
coreDns.serviceMonitor.sampleLimit | int | 0 |
|
coreDns.serviceMonitor.targetLimit | int | 0 |
|
coreDns.serviceMonitor.labelLimit | int | 0 |
|
coreDns.serviceMonitor.labelNameLengthLimit | int | 0 |
|
coreDns.serviceMonitor.labelValueLengthLimit | int | 0 |
|
coreDns.serviceMonitor.proxyUrl | string | "" |
|
coreDns.serviceMonitor.port | string | "http-metrics" |
|
coreDns.serviceMonitor.jobLabel | string | "jobLabel" |
|
coreDns.serviceMonitor.selector | object | {} |
|
coreDns.serviceMonitor.metricRelabelings | list | [] |
|
coreDns.serviceMonitor.relabelings | list | [] |
|
coreDns.serviceMonitor.additionalLabels | object | {} |
|
coreDns.serviceMonitor.targetLabels | list | [] |
|
kubeDns.enabled | bool | false |
|
kubeDns.service.dnsmasq.port | int | 10054 |
|
kubeDns.service.dnsmasq.targetPort | int | 10054 |
|
kubeDns.service.skydns.port | int | 10055 |
|
kubeDns.service.skydns.targetPort | int | 10055 |
|
kubeDns.service.ipDualStack.enabled | bool | false |
|
kubeDns.service.ipDualStack.ipFamilies[0] | string | "IPv6" |
|
kubeDns.service.ipDualStack.ipFamilies[1] | string | "IPv4" |
|
kubeDns.service.ipDualStack.ipFamilyPolicy | string | "PreferDualStack" |
|
kubeDns.serviceMonitor.interval | string | "" |
|
kubeDns.serviceMonitor.sampleLimit | int | 0 |
|
kubeDns.serviceMonitor.targetLimit | int | 0 |
|
kubeDns.serviceMonitor.labelLimit | int | 0 |
|
kubeDns.serviceMonitor.labelNameLengthLimit | int | 0 |
|
kubeDns.serviceMonitor.labelValueLengthLimit | int | 0 |
|
kubeDns.serviceMonitor.proxyUrl | string | "" |
|
kubeDns.serviceMonitor.jobLabel | string | "jobLabel" |
|
kubeDns.serviceMonitor.selector | object | {} |
|
kubeDns.serviceMonitor.metricRelabelings | list | [] |
|
kubeDns.serviceMonitor.relabelings | list | [] |
|
kubeDns.serviceMonitor.dnsmasqMetricRelabelings | list | [] |
|
kubeDns.serviceMonitor.dnsmasqRelabelings | list | [] |
|
kubeDns.serviceMonitor.additionalLabels | object | {} |
|
kubeDns.serviceMonitor.targetLabels | list | [] |
|
kubeEtcd.enabled | bool | true |
|
kubeEtcd.endpoints | list | [] |
|
kubeEtcd.service.enabled | bool | true |
|
kubeEtcd.service.port | int | 2381 |
|
kubeEtcd.service.targetPort | int | 2381 |
|
kubeEtcd.service.ipDualStack.enabled | bool | false |
|
kubeEtcd.service.ipDualStack.ipFamilies[0] | string | "IPv6" |
|
kubeEtcd.service.ipDualStack.ipFamilies[1] | string | "IPv4" |
|
kubeEtcd.service.ipDualStack.ipFamilyPolicy | string | "PreferDualStack" |
|
kubeEtcd.serviceMonitor.enabled | bool | true |
|
kubeEtcd.serviceMonitor.interval | string | "" |
|
kubeEtcd.serviceMonitor.sampleLimit | int | 0 |
|
kubeEtcd.serviceMonitor.targetLimit | int | 0 |
|
kubeEtcd.serviceMonitor.labelLimit | int | 0 |
|
kubeEtcd.serviceMonitor.labelNameLengthLimit | int | 0 |
|
kubeEtcd.serviceMonitor.labelValueLengthLimit | int | 0 |
|
kubeEtcd.serviceMonitor.proxyUrl | string | "" |
|
kubeEtcd.serviceMonitor.scheme | string | "http" |
|
kubeEtcd.serviceMonitor.insecureSkipVerify | bool | false |
|
kubeEtcd.serviceMonitor.serverName | string | "" |
|
kubeEtcd.serviceMonitor.caFile | string | "" |
|
kubeEtcd.serviceMonitor.certFile | string | "" |
|
kubeEtcd.serviceMonitor.keyFile | string | "" |
|
kubeEtcd.serviceMonitor.port | string | "http-metrics" |
|
kubeEtcd.serviceMonitor.jobLabel | string | "jobLabel" |
|
kubeEtcd.serviceMonitor.selector | object | {} |
|
kubeEtcd.serviceMonitor.metricRelabelings | list | [] |
|
kubeEtcd.serviceMonitor.relabelings | list | [] |
|
kubeEtcd.serviceMonitor.additionalLabels | object | {} |
|
kubeEtcd.serviceMonitor.targetLabels | list | [] |
|
kubeScheduler.enabled | bool | true |
|
kubeScheduler.endpoints | list | [] |
|
kubeScheduler.service.enabled | bool | true |
|
kubeScheduler.service.port | string | nil |
|
kubeScheduler.service.targetPort | string | nil |
|
kubeScheduler.service.ipDualStack.enabled | bool | false |
|
kubeScheduler.service.ipDualStack.ipFamilies[0] | string | "IPv6" |
|
kubeScheduler.service.ipDualStack.ipFamilies[1] | string | "IPv4" |
|
kubeScheduler.service.ipDualStack.ipFamilyPolicy | string | "PreferDualStack" |
|
kubeScheduler.serviceMonitor.enabled | bool | true |
|
kubeScheduler.serviceMonitor.interval | string | "" |
|
kubeScheduler.serviceMonitor.sampleLimit | int | 0 |
|
kubeScheduler.serviceMonitor.targetLimit | int | 0 |
|
kubeScheduler.serviceMonitor.labelLimit | int | 0 |
|
kubeScheduler.serviceMonitor.labelNameLengthLimit | int | 0 |
|
kubeScheduler.serviceMonitor.labelValueLengthLimit | int | 0 |
|
kubeScheduler.serviceMonitor.proxyUrl | string | "" |
|
kubeScheduler.serviceMonitor.https | string | nil |
|
kubeScheduler.serviceMonitor.port | string | "http-metrics" |
|
kubeScheduler.serviceMonitor.jobLabel | string | "jobLabel" |
|
kubeScheduler.serviceMonitor.selector | object | {} |
|
kubeScheduler.serviceMonitor.insecureSkipVerify | string | nil |
|
kubeScheduler.serviceMonitor.serverName | string | nil |
|
kubeScheduler.serviceMonitor.metricRelabelings | list | [] |
|
kubeScheduler.serviceMonitor.relabelings | list | [] |
|
kubeScheduler.serviceMonitor.additionalLabels | object | {} |
|
kubeScheduler.serviceMonitor.targetLabels | list | [] |
|
kubeProxy.enabled | bool | true |
|
kubeProxy.endpoints | list | [] |
|
kubeProxy.service.enabled | bool | true |
|
kubeProxy.service.port | int | 10249 |
|
kubeProxy.service.targetPort | int | 10249 |
|
kubeProxy.service.ipDualStack.enabled | bool | false |
|
kubeProxy.service.ipDualStack.ipFamilies[0] | string | "IPv6" |
|
kubeProxy.service.ipDualStack.ipFamilies[1] | string | "IPv4" |
|
kubeProxy.service.ipDualStack.ipFamilyPolicy | string | "PreferDualStack" |
|
kubeProxy.serviceMonitor.enabled | bool | true |
|
kubeProxy.serviceMonitor.interval | string | "" |
|
kubeProxy.serviceMonitor.sampleLimit | int | 0 |
|
kubeProxy.serviceMonitor.targetLimit | int | 0 |
|
kubeProxy.serviceMonitor.labelLimit | int | 0 |
|
kubeProxy.serviceMonitor.labelNameLengthLimit | int | 0 |
|
kubeProxy.serviceMonitor.labelValueLengthLimit | int | 0 |
|
kubeProxy.serviceMonitor.proxyUrl | string | "" |
|
kubeProxy.serviceMonitor.port | string | "http-metrics" |
|
kubeProxy.serviceMonitor.jobLabel | string | "jobLabel" |
|
kubeProxy.serviceMonitor.selector | object | {} |
|
kubeProxy.serviceMonitor.https | bool | false |
|
kubeProxy.serviceMonitor.metricRelabelings | list | [] |
|
kubeProxy.serviceMonitor.relabelings | list | [] |
|
kubeProxy.serviceMonitor.additionalLabels | object | {} |
|
kubeProxy.serviceMonitor.targetLabels | list | [] |
|
kubeStateMetrics.enabled | bool | true |
|
kube-state-metrics.image.registry | string | "registry1.dso.mil" |
|
kube-state-metrics.image.repository | string | "ironbank/opensource/kubernetes/kube-state-metrics" |
|
kube-state-metrics.image.tag | string | "v2.16.0" |
|
kube-state-metrics.image.imagePullSecrets[0].name | string | "private-registry" |
|
kube-state-metrics.resources.limits.cpu | string | "100m" |
|
kube-state-metrics.resources.limits.memory | string | "256Mi" |
|
kube-state-metrics.resources.requests.cpu | string | "100m" |
|
kube-state-metrics.resources.requests.memory | string | "256Mi" |
|
kube-state-metrics.namespaceOverride | string | "" |
|
kube-state-metrics.rbac.create | bool | true |
|
kube-state-metrics.podSecurityPolicy.enabled | bool | false |
|
kube-state-metrics.securityContext.runAsGroup | int | 65532 |
|
kube-state-metrics.securityContext.runAsUser | int | 65532 |
|
kube-state-metrics.securityContext.fsGroup | int | 65532 |
|
kube-state-metrics.containerSecurityContext.capabilities.drop[0] | string | "ALL" |
|
kube-state-metrics.releaseLabel | bool | true |
|
kube-state-metrics.prometheusScrape | bool | false |
|
kube-state-metrics.prometheus.monitor.enabled | bool | true |
|
kube-state-metrics.prometheus.monitor.interval | string | "" |
|
kube-state-metrics.prometheus.monitor.sampleLimit | int | 0 |
|
kube-state-metrics.prometheus.monitor.targetLimit | int | 0 |
|
kube-state-metrics.prometheus.monitor.labelLimit | int | 0 |
|
kube-state-metrics.prometheus.monitor.labelNameLengthLimit | int | 0 |
|
kube-state-metrics.prometheus.monitor.labelValueLengthLimit | int | 0 |
|
kube-state-metrics.prometheus.monitor.scrapeTimeout | string | "" |
|
kube-state-metrics.prometheus.monitor.proxyUrl | string | "" |
|
kube-state-metrics.prometheus.monitor.honorLabels | bool | true |
|
kube-state-metrics.prometheus.monitor.metricRelabelings | list | [] |
|
kube-state-metrics.prometheus.monitor.relabelings | list | [] |
|
kube-state-metrics.selfMonitor.enabled | bool | false |
|
nodeExporter.enabled | bool | true |
|
nodeExporter.operatingSystems.linux.enabled | bool | true |
|
nodeExporter.operatingSystems.aix.enabled | bool | true |
|
nodeExporter.operatingSystems.darwin.enabled | bool | true |
|
nodeExporter.serviceMonitor.interval | string | "" |
|
nodeExporter.jobLabel | string | "jobLabel" |
|
nodeExporter.forceDeployDashboards | bool | false |
|
prometheus-node-exporter.serviceMonitor.attachMetadata | object | {} |
|
prometheus-node-exporter.containerSecurityContext.capabilities.drop[0] | string | "ALL" |
|
prometheus-node-exporter.image.registry | string | "registry1.dso.mil" |
|
prometheus-node-exporter.image.repository | string | "ironbank/opensource/prometheus/node-exporter" |
|
prometheus-node-exporter.image.tag | string | "v1.9.1" |
|
prometheus-node-exporter.image.imagePullSecrets[0].name | string | "private-registry" |
|
prometheus-node-exporter.resources.limits.cpu | string | "200m" |
|
prometheus-node-exporter.resources.limits.memory | string | "250Mi" |
|
prometheus-node-exporter.resources.requests.cpu | string | "200m" |
|
prometheus-node-exporter.resources.requests.memory | string | "250Mi" |
|
prometheus-node-exporter.hostNetwork | bool | false |
|
prometheus-node-exporter.hostPID | bool | false |
|
prometheus-node-exporter.namespaceOverride | string | "" |
|
prometheus-node-exporter.podLabels.jobLabel | string | "node-exporter" |
|
prometheus-node-exporter.releaseLabel | bool | true |
|
prometheus-node-exporter.extraArgs[0] | string | "--collector.filesystem.mount-points-exclude=^/(dev|proc|sys|var/lib/docker/.+|var/lib/kubelet/.+)($|/)" |
|
prometheus-node-exporter.extraArgs[1] | string | "--collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs|erofs)$" |
|
prometheus-node-exporter.service.portName | string | "http-metrics" |
|
prometheus-node-exporter.service.ipDualStack.enabled | bool | false |
|
prometheus-node-exporter.service.ipDualStack.ipFamilies[0] | string | "IPv6" |
|
prometheus-node-exporter.service.ipDualStack.ipFamilies[1] | string | "IPv4" |
|
prometheus-node-exporter.service.ipDualStack.ipFamilyPolicy | string | "PreferDualStack" |
|
prometheus-node-exporter.service.labels.jobLabel | string | "node-exporter" |
|
prometheus-node-exporter.prometheus.monitor.enabled | bool | true |
|
prometheus-node-exporter.prometheus.monitor.jobLabel | string | "jobLabel" |
|
prometheus-node-exporter.prometheus.monitor.interval | string | "" |
|
prometheus-node-exporter.prometheus.monitor.sampleLimit | int | 0 |
|
prometheus-node-exporter.prometheus.monitor.targetLimit | int | 0 |
|
prometheus-node-exporter.prometheus.monitor.labelLimit | int | 0 |
|
prometheus-node-exporter.prometheus.monitor.labelNameLengthLimit | int | 0 |
|
prometheus-node-exporter.prometheus.monitor.labelValueLengthLimit | int | 0 |
|
prometheus-node-exporter.prometheus.monitor.scrapeTimeout | string | "" |
|
prometheus-node-exporter.prometheus.monitor.proxyUrl | string | "" |
|
prometheus-node-exporter.prometheus.monitor.metricRelabelings | list | [] |
|
prometheus-node-exporter.prometheus.monitor.relabelings | list | [] |
|
prometheus-node-exporter.rbac.pspEnabled | bool | false |
|
snmpExporter.enabled | bool | false |
|
snmpExporter.image.repository | string | "registry1.dso.mil/ironbank/opensource/prometheus/snmp_exporter" |
|
snmpExporter.image.tag | string | "v0.29.0" |
|
snmpExporter.image.imagePullSecrets[0].name | string | "private-registry" |
|
snmpExporter.configmapReload.image.repository | string | "registry1.dso.mil/ironbank/opensource/prometheus-operator/prometheus-config-reloader" |
|
snmpExporter.configmapReload.image.tag | string | "v0.83.0" |
|
snmpExporter.configmapReload.image.imagePullSecrets[0].name | string | "private-registry" |
|
snmpExporter.securityContext.runAsNonRoot | bool | true |
|
snmpExporter.securityContext.runAsUser | int | 1001 |
|
snmpExporter.securityContext.runAsGroup | int | 1001 |
|
snmpExporter.securityContext.fsGroup | int | 1001 |
|
snmpExporter.containerSecurityContext.runAsGroup | int | 1001 |
|
snmpExporter.containerSecurityContext.runAsNonRoot | bool | true |
|
snmpExporter.containerSecurityContext.runAsUser | int | 1001 |
|
snmpExporter.containerSecurityContext.capabilities.drop[0] | string | "ALL" |
|
snmpExporter.serviceMonitor.enabled | bool | true |
|
blackboxExporter.enabled | bool | false |
|
blackboxExporter.nameOverride | string | "prometheus-blackbox-exporter" |
|
blackboxExporter.global.imageRegistry | string | "registry1.dso.mil" |
|
blackboxExporter.restartPolicy | string | "Always" |
|
blackboxExporter.kind | string | "Deployment" |
|
blackboxExporter.namespaceOverride | string | "" |
|
blackboxExporter.kubeVersionOverride | string | "" |
|
blackboxExporter.releaseLabel | bool | false |
|
blackboxExporter.podDisruptionBudget | object | {} |
|
blackboxExporter.automountServiceAccountToken | bool | false |
|
blackboxExporter.extraEnv | object | {} |
|
blackboxExporter.extraEnvFromSecret | string | "" |
|
blackboxExporter.extraVolumes | list | [] |
|
blackboxExporter.extraVolumeMounts | string | nil |
|
blackboxExporter.extraInitContainers | list | [] |
|
blackboxExporter.extraContainers | list | [] |
|
blackboxExporter.revisionHistoryLimit | int | 10 |
|
blackboxExporter.hostNetwork | bool | false |
|
blackboxExporter.strategy.rollingUpdate.maxSurge | int | 1 |
|
blackboxExporter.strategy.rollingUpdate.maxUnavailable | int | 0 |
|
blackboxExporter.strategy.type | string | "RollingUpdate" |
|
blackboxExporter.image.registry | string | "registry1.dso.mil" |
|
blackboxExporter.image.repository | string | "ironbank/opensource/prometheus/blackbox_exporter" |
|
blackboxExporter.image.tag | string | "v0.26.0" |
|
blackboxExporter.image.pullSecrets[0] | string | "private-registry" |
|
blackboxExporter.podSecurityContext | object | {} |
|
blackboxExporter.securityContext.runAsUser | int | 1000 |
|
blackboxExporter.securityContext.runAsGroup | int | 1000 |
|
blackboxExporter.securityContext.readOnlyRootFilesystem | bool | true |
|
blackboxExporter.securityContext.runAsNonRoot | bool | true |
|
blackboxExporter.securityContext.allowPrivilegeEscalation | bool | false |
|
blackboxExporter.securityContext.capabilities.drop[0] | string | "ALL" |
|
blackboxExporter.livenessProbe.httpGet.path | string | "/-/healthy" |
|
blackboxExporter.livenessProbe.httpGet.port | string | "http" |
|
blackboxExporter.livenessProbe.failureThreshold | int | 3 |
|
blackboxExporter.readinessProbe.httpGet.path | string | "/-/healthy" |
|
blackboxExporter.readinessProbe.httpGet.port | string | "http" |
|
blackboxExporter.nodeSelector | object | {} |
|
blackboxExporter.tolerations | list | [] |
|
blackboxExporter.affinity | object | {} |
|
blackboxExporter.topologySpreadConstraints | list | [] |
|
blackboxExporter.configExistingSecretName | string | "" |
|
blackboxExporter.secretConfig | bool | false |
|
blackboxExporter.config.modules.http_2xx.prober | string | "http" |
|
blackboxExporter.config.modules.http_2xx.timeout | string | "5s" |
|
blackboxExporter.config.modules.http_2xx.http.valid_http_versions[0] | string | "HTTP/1.1" |
|
blackboxExporter.config.modules.http_2xx.http.valid_http_versions[1] | string | "HTTP/2.0" |
|
blackboxExporter.config.modules.http_2xx.http.follow_redirects | bool | true |
|
blackboxExporter.config.modules.http_2xx.http.preferred_ip_protocol | string | "ip4" |
|
blackboxExporter.extraConfigmapMounts | list | [] |
|
blackboxExporter.extraSecretMounts | list | [] |
|
blackboxExporter.resources | object | {} |
|
blackboxExporter.priorityClassName | string | "" |
|
blackboxExporter.service.annotations | object | {} |
|
blackboxExporter.service.labels | object | {} |
|
blackboxExporter.service.type | string | "ClusterIP" |
|
blackboxExporter.service.port | int | 9115 |
|
blackboxExporter.service.ipDualStack.enabled | bool | false |
|
blackboxExporter.service.ipDualStack.ipFamilies[0] | string | "IPv6" |
|
blackboxExporter.service.ipDualStack.ipFamilies[1] | string | "IPv4" |
|
blackboxExporter.service.ipDualStack.ipFamilyPolicy | string | "PreferDualStack" |
|
blackboxExporter.containerPort | int | 9115 |
|
blackboxExporter.hostPort | int | 0 |
|
blackboxExporter.serviceAccount.create | bool | true |
|
blackboxExporter.serviceAccount.name | string | nil |
|
blackboxExporter.serviceAccount.annotations | object | {} |
|
blackboxExporter.ingress.enabled | bool | false |
|
blackboxExporter.ingress.className | string | "" |
|
blackboxExporter.ingress.labels | object | {} |
|
blackboxExporter.ingress.annotations | object | {} |
|
blackboxExporter.ingress.hosts[0].host | string | "chart-example.local" |
|
blackboxExporter.ingress.hosts[0].paths[0].path | string | "/" |
|
blackboxExporter.ingress.hosts[0].paths[0].pathType | string | "ImplementationSpecific" |
|
blackboxExporter.ingress.tls | list | [] |
|
blackboxExporter.podAnnotations | object | {} |
|
blackboxExporter.deploymentAnnotations | object | {} |
|
blackboxExporter.secretAnnotations | object | {} |
|
blackboxExporter.hostAliases | list | [] |
|
blackboxExporter.pod.labels | object | {} |
|
blackboxExporter.extraArgs | list | [] |
|
blackboxExporter.replicas | int | 1 |
|
blackboxExporter.serviceMonitor.selfMonitor.enabled | bool | false |
|
blackboxExporter.serviceMonitor.selfMonitor.additionalMetricsRelabels | object | {} |
|
blackboxExporter.serviceMonitor.selfMonitor.additionalRelabeling | list | [] |
|
blackboxExporter.serviceMonitor.selfMonitor.labels | object | {} |
|
blackboxExporter.serviceMonitor.selfMonitor.path | string | "/metrics" |
|
blackboxExporter.serviceMonitor.selfMonitor.scheme | string | "http" |
|
blackboxExporter.serviceMonitor.selfMonitor.tlsConfig | object | {} |
|
blackboxExporter.serviceMonitor.selfMonitor.interval | string | "30s" |
|
blackboxExporter.serviceMonitor.selfMonitor.scrapeTimeout | string | "30s" |
|
blackboxExporter.serviceMonitor.enabled | bool | false |
|
blackboxExporter.serviceMonitor.defaults.additionalMetricsRelabels | object | {} |
|
blackboxExporter.serviceMonitor.defaults.additionalRelabeling | list | [] |
|
blackboxExporter.serviceMonitor.defaults.labels | object | {} |
|
blackboxExporter.serviceMonitor.defaults.interval | string | "30s" |
|
blackboxExporter.serviceMonitor.defaults.scrapeTimeout | string | "30s" |
|
blackboxExporter.serviceMonitor.defaults.honorTimestamps | bool | true |
|
blackboxExporter.serviceMonitor.defaults.module | string | "http_2xx" |
|
blackboxExporter.serviceMonitor.scheme | string | "http" |
|
blackboxExporter.serviceMonitor.path | string | "/probe" |
|
blackboxExporter.serviceMonitor.tlsConfig | object | {} |
|
blackboxExporter.serviceMonitor.bearerTokenFile | string | nil |
|
blackboxExporter.serviceMonitor.targets | string | nil |
|
blackboxExporter.prometheusRule.enabled | bool | false |
|
blackboxExporter.prometheusRule.additionalLabels | object | {} |
|
blackboxExporter.prometheusRule.namespace | string | "" |
|
blackboxExporter.prometheusRule.rules | list | [] |
|
blackboxExporter.podMonitoring.selfMonitor.enabled | bool | false |
|
blackboxExporter.podMonitoring.selfMonitor.additionalMetricsRelabels | object | {} |
|
blackboxExporter.podMonitoring.selfMonitor.labels | object | {} |
|
blackboxExporter.podMonitoring.selfMonitor.path | string | "/metrics" |
|
blackboxExporter.podMonitoring.selfMonitor.interval | string | "30s" |
|
blackboxExporter.podMonitoring.selfMonitor.scrapeTimeout | string | "30s" |
|
blackboxExporter.podMonitoring.enabled | bool | false |
|
blackboxExporter.podMonitoring.defaults.additionalMetricsRelabels | object | {} |
|
blackboxExporter.podMonitoring.defaults.labels | object | {} |
|
blackboxExporter.podMonitoring.defaults.interval | string | "30s" |
|
blackboxExporter.podMonitoring.defaults.scrapeTimeout | string | "30s" |
|
blackboxExporter.podMonitoring.defaults.module | string | "http_2xx" |
|
blackboxExporter.podMonitoring.scheme | string | "http" |
|
blackboxExporter.podMonitoring.path | string | "/probe" |
|
blackboxExporter.podMonitoring.tlsConfig | object | {} |
|
blackboxExporter.podMonitoring.targets | string | nil |
|
blackboxExporter.networkPolicy.enabled | bool | false |
|
blackboxExporter.networkPolicy.allowMonitoringNamespace | bool | false |
|
blackboxExporter.dnsPolicy | string | nil |
|
blackboxExporter.dnsConfig | string | nil |
|
blackboxExporter.extraManifests | list | [] |
|
blackboxExporter.commonLabels | object | {} |
|
blackboxExporter.verticalPodAutoscaler.enabled | bool | false |
|
blackboxExporter.verticalPodAutoscaler.controlledResources | list | [] |
|
blackboxExporter.verticalPodAutoscaler.maxAllowed | object | {} |
|
blackboxExporter.verticalPodAutoscaler.minAllowed | object | {} |
|
blackboxExporter.verticalPodAutoscaler.updatePolicy.updateMode | string | "Auto" |
|
blackboxExporter.configReloader.enabled | bool | false |
|
blackboxExporter.configReloader.containerPort | int | 8080 |
|
blackboxExporter.configReloader.config.logFormat | string | "logfmt" |
|
blackboxExporter.configReloader.config.logLevel | string | "info" |
|
blackboxExporter.configReloader.config.watchInterval | string | "1m" |
|
blackboxExporter.configReloader.image.registry | string | "registry1.dso.mil" |
|
blackboxExporter.configReloader.image.repository | string | "ironbank/opensource/prometheus-operator/prometheus-config-reloader" |
|
blackboxExporter.configReloader.image.tag | string | "v0.83.0" |
|
blackboxExporter.configReloader.image.pullPolicy | string | "IfNotPresent" |
|
blackboxExporter.configReloader.image.digest | string | "" |
|
blackboxExporter.configReloader.image.imagePullSecrets[0].name | string | "private-registry" |
|
blackboxExporter.configReloader.securityContext.runAsUser | int | 1000 |
|
blackboxExporter.configReloader.securityContext.runAsGroup | int | 1000 |
|
blackboxExporter.configReloader.securityContext.readOnlyRootFilesystem | bool | true |
|
blackboxExporter.configReloader.securityContext.runAsNonRoot | bool | true |
|
blackboxExporter.configReloader.securityContext.allowPrivilegeEscalation | bool | false |
|
blackboxExporter.configReloader.securityContext.capabilities.drop[0] | string | "ALL" |
|
blackboxExporter.configReloader.resources.limits.memory | string | "50Mi" |
|
blackboxExporter.configReloader.resources.requests.cpu | string | "10m" |
|
blackboxExporter.configReloader.resources.requests.memory | string | "20Mi" |
|
blackboxExporter.configReloader.livenessProbe.httpGet.path | string | "/healthz" |
|
blackboxExporter.configReloader.livenessProbe.httpGet.port | string | "reloader-web" |
|
blackboxExporter.configReloader.livenessProbe.httpGet.scheme | string | "HTTP" |
|
blackboxExporter.configReloader.readinessProbe.httpGet.path | string | "/healthz" |
|
blackboxExporter.configReloader.readinessProbe.httpGet.port | string | "reloader-web" |
|
blackboxExporter.configReloader.readinessProbe.httpGet.scheme | string | "HTTP" |
|
blackboxExporter.configReloader.service.port | int | 8080 |
|
blackboxExporter.configReloader.serviceMonitor.selfMonitor.additionalMetricsRelabels | object | {} |
|
blackboxExporter.configReloader.serviceMonitor.selfMonitor.additionalRelabeling | list | [] |
|
blackboxExporter.configReloader.serviceMonitor.selfMonitor.path | string | "/metrics" |
|
blackboxExporter.configReloader.serviceMonitor.selfMonitor.scheme | string | "http" |
|
blackboxExporter.configReloader.serviceMonitor.selfMonitor.tlsConfig | object | {} |
|
blackboxExporter.configReloader.serviceMonitor.selfMonitor.interval | string | "30s" |
|
blackboxExporter.configReloader.serviceMonitor.selfMonitor.scrapeTimeout | string | "30s" |
|
prometheusOperator.enabled | bool | true |
|
prometheusOperator.revisionHistoryLimit | int | 10 |
|
prometheusOperator.strategy | object | {} |
|
prometheusOperator.tls.enabled | bool | true |
|
prometheusOperator.tls.tlsMinVersion | string | "VersionTLS13" |
|
prometheusOperator.tls.internalPort | int | 10250 |
|
prometheusOperator.livenessProbe.enabled | bool | true |
|
prometheusOperator.livenessProbe.failureThreshold | int | 3 |
|
prometheusOperator.livenessProbe.initialDelaySeconds | int | 0 |
|
prometheusOperator.livenessProbe.periodSeconds | int | 10 |
|
prometheusOperator.livenessProbe.successThreshold | int | 1 |
|
prometheusOperator.livenessProbe.timeoutSeconds | int | 1 |
|
prometheusOperator.readinessProbe.enabled | bool | true |
|
prometheusOperator.readinessProbe.failureThreshold | int | 3 |
|
prometheusOperator.readinessProbe.initialDelaySeconds | int | 0 |
|
prometheusOperator.readinessProbe.periodSeconds | int | 10 |
|
prometheusOperator.readinessProbe.successThreshold | int | 1 |
|
prometheusOperator.readinessProbe.timeoutSeconds | int | 1 |
|
prometheusOperator.admissionWebhooks.failurePolicy | string | "" |
|
prometheusOperator.admissionWebhooks.timeoutSeconds | int | 10 |
|
prometheusOperator.admissionWebhooks.enabled | bool | true |
|
prometheusOperator.admissionWebhooks.caBundle | string | "" |
|
prometheusOperator.admissionWebhooks.containerSecurityContext.capabilities.drop[0] | string | "ALL" |
|
prometheusOperator.admissionWebhooks.annotations | object | {} |
|
prometheusOperator.admissionWebhooks.namespaceSelector | object | {} |
|
prometheusOperator.admissionWebhooks.objectSelector | object | {} |
|
prometheusOperator.admissionWebhooks.matchConditions | object | {} |
|
prometheusOperator.admissionWebhooks.mutatingWebhookConfiguration.annotations | object | {} |
|
prometheusOperator.admissionWebhooks.validatingWebhookConfiguration.annotations | object | {} |
|
prometheusOperator.admissionWebhooks.deployment.enabled | bool | false |
|
prometheusOperator.admissionWebhooks.deployment.replicas | int | 1 |
|
prometheusOperator.admissionWebhooks.deployment.strategy | object | {} |
|
prometheusOperator.admissionWebhooks.deployment.podDisruptionBudget.enabled | bool | false |
|
prometheusOperator.admissionWebhooks.deployment.podDisruptionBudget.minAvailable | int | 1 |
|
prometheusOperator.admissionWebhooks.deployment.podDisruptionBudget.unhealthyPodEvictionPolicy | string | "AlwaysAllow" |
|
prometheusOperator.admissionWebhooks.deployment.revisionHistoryLimit | int | 10 |
|
prometheusOperator.admissionWebhooks.deployment.tls.enabled | bool | true |
|
prometheusOperator.admissionWebhooks.deployment.tls.tlsMinVersion | string | "VersionTLS13" |
|
prometheusOperator.admissionWebhooks.deployment.tls.internalPort | int | 10250 |
|
prometheusOperator.admissionWebhooks.deployment.serviceAccount.annotations | object | {} |
|
prometheusOperator.admissionWebhooks.deployment.serviceAccount.automountServiceAccountToken | bool | false |
|
prometheusOperator.admissionWebhooks.deployment.serviceAccount.create | bool | true |
|
prometheusOperator.admissionWebhooks.deployment.serviceAccount.name | string | "" |
|
prometheusOperator.admissionWebhooks.deployment.service.annotations | object | {} |
|
prometheusOperator.admissionWebhooks.deployment.service.labels | object | {} |
|
prometheusOperator.admissionWebhooks.deployment.service.clusterIP | string | "" |
|
prometheusOperator.admissionWebhooks.deployment.service.ipDualStack.enabled | bool | false |
|
prometheusOperator.admissionWebhooks.deployment.service.ipDualStack.ipFamilies[0] | string | "IPv6" |
|
prometheusOperator.admissionWebhooks.deployment.service.ipDualStack.ipFamilies[1] | string | "IPv4" |
|
prometheusOperator.admissionWebhooks.deployment.service.ipDualStack.ipFamilyPolicy | string | "PreferDualStack" |
|
prometheusOperator.admissionWebhooks.deployment.service.nodePort | int | 31080 |
|
prometheusOperator.admissionWebhooks.deployment.service.nodePortTls | int | 31443 |
|
prometheusOperator.admissionWebhooks.deployment.service.additionalPorts | list | [] |
|
prometheusOperator.admissionWebhooks.deployment.service.loadBalancerIP | string | "" |
|
prometheusOperator.admissionWebhooks.deployment.service.loadBalancerSourceRanges | list | [] |
|
prometheusOperator.admissionWebhooks.deployment.service.externalTrafficPolicy | string | "Cluster" |
|
prometheusOperator.admissionWebhooks.deployment.service.type | string | "ClusterIP" |
|
prometheusOperator.admissionWebhooks.deployment.service.externalIPs | list | [] |
|
prometheusOperator.admissionWebhooks.deployment.labels | object | {} |
|
prometheusOperator.admissionWebhooks.deployment.annotations | object | {} |
|
prometheusOperator.admissionWebhooks.deployment.podLabels | object | {} |
|
prometheusOperator.admissionWebhooks.deployment.podAnnotations | object | {} |
|
prometheusOperator.admissionWebhooks.deployment.image.registry | string | "quay.io" |
|
prometheusOperator.admissionWebhooks.deployment.image.repository | string | "prometheus-operator/admission-webhook" |
|
prometheusOperator.admissionWebhooks.deployment.image.tag | string | "" |
|
prometheusOperator.admissionWebhooks.deployment.image.sha | string | "" |
|
prometheusOperator.admissionWebhooks.deployment.image.pullPolicy | string | "IfNotPresent" |
|
prometheusOperator.admissionWebhooks.deployment.livenessProbe.enabled | bool | true |
|
prometheusOperator.admissionWebhooks.deployment.livenessProbe.failureThreshold | int | 3 |
|
prometheusOperator.admissionWebhooks.deployment.livenessProbe.initialDelaySeconds | int | 30 |
|
prometheusOperator.admissionWebhooks.deployment.livenessProbe.periodSeconds | int | 10 |
|
prometheusOperator.admissionWebhooks.deployment.livenessProbe.successThreshold | int | 1 |
|
prometheusOperator.admissionWebhooks.deployment.livenessProbe.timeoutSeconds | int | 1 |
|
prometheusOperator.admissionWebhooks.deployment.readinessProbe.enabled | bool | true |
|
prometheusOperator.admissionWebhooks.deployment.readinessProbe.failureThreshold | int | 3 |
|
prometheusOperator.admissionWebhooks.deployment.readinessProbe.initialDelaySeconds | int | 5 |
|
prometheusOperator.admissionWebhooks.deployment.readinessProbe.periodSeconds | int | 10 |
|
prometheusOperator.admissionWebhooks.deployment.readinessProbe.successThreshold | int | 1 |
|
prometheusOperator.admissionWebhooks.deployment.readinessProbe.timeoutSeconds | int | 1 |
|
prometheusOperator.admissionWebhooks.deployment.resources | object | {} |
|
prometheusOperator.admissionWebhooks.deployment.hostNetwork | bool | false |
|
prometheusOperator.admissionWebhooks.deployment.nodeSelector | object | {} |
|
prometheusOperator.admissionWebhooks.deployment.tolerations | list | [] |
|
prometheusOperator.admissionWebhooks.deployment.affinity | object | {} |
|
prometheusOperator.admissionWebhooks.deployment.dnsConfig | object | {} |
|
prometheusOperator.admissionWebhooks.deployment.securityContext.fsGroup | int | 65534 |
|
prometheusOperator.admissionWebhooks.deployment.securityContext.runAsGroup | int | 65534 |
|
prometheusOperator.admissionWebhooks.deployment.securityContext.runAsNonRoot | bool | true |
|
prometheusOperator.admissionWebhooks.deployment.securityContext.runAsUser | int | 65534 |
|
prometheusOperator.admissionWebhooks.deployment.securityContext.seccompProfile.type | string | "RuntimeDefault" |
|
prometheusOperator.admissionWebhooks.deployment.containerSecurityContext.allowPrivilegeEscalation | bool | false |
|
prometheusOperator.admissionWebhooks.deployment.containerSecurityContext.readOnlyRootFilesystem | bool | true |
|
prometheusOperator.admissionWebhooks.deployment.containerSecurityContext.capabilities.drop[0] | string | "ALL" |
|
prometheusOperator.admissionWebhooks.deployment.automountServiceAccountToken | bool | true |
|
prometheusOperator.admissionWebhooks.patch.enabled | bool | true |
|
prometheusOperator.admissionWebhooks.patch.image.registry | string | "registry1.dso.mil" |
|
prometheusOperator.admissionWebhooks.patch.image.repository | string | "ironbank/opensource/ingress-nginx/kube-webhook-certgen" |
|
prometheusOperator.admissionWebhooks.patch.image.tag | string | "v1.5.4" |
|
prometheusOperator.admissionWebhooks.patch.image.sha | string | "" |
|
prometheusOperator.admissionWebhooks.patch.image.pullPolicy | string | "IfNotPresent" |
|
prometheusOperator.admissionWebhooks.patch.image.imagePullSecrets[0].name | string | "private-registry" |
|
prometheusOperator.admissionWebhooks.patch.resources.limits.cpu | string | "50m" |
|
prometheusOperator.admissionWebhooks.patch.resources.limits.memory | string | "50Mi" |
|
prometheusOperator.admissionWebhooks.patch.resources.requests.cpu | string | "50m" |
|
prometheusOperator.admissionWebhooks.patch.resources.requests.memory | string | "50Mi" |
|
prometheusOperator.admissionWebhooks.patch.containerSecurityContext.capabilities.drop[0] | string | "ALL" |
|
prometheusOperator.admissionWebhooks.patch.securityContext.runAsNonRoot | bool | true |
|
prometheusOperator.admissionWebhooks.patch.securityContext.runAsUser | int | 65532 |
|
prometheusOperator.admissionWebhooks.patch.securityContext.runAsGroup | int | 65532 |
|
prometheusOperator.admissionWebhooks.patch.priorityClassName | string | "" |
|
prometheusOperator.admissionWebhooks.patch.ttlSecondsAfterFinished | int | 60 |
|
prometheusOperator.admissionWebhooks.patch.annotations | object | {} |
|
prometheusOperator.admissionWebhooks.patch.podAnnotations | object | {} |
|
prometheusOperator.admissionWebhooks.patch.nodeSelector | object | {} |
|
prometheusOperator.admissionWebhooks.patch.affinity | object | {} |
|
prometheusOperator.admissionWebhooks.patch.tolerations | list | [] |
|
prometheusOperator.admissionWebhooks.patch.serviceAccount.create | bool | true |
|
prometheusOperator.admissionWebhooks.patch.serviceAccount.automountServiceAccountToken | bool | true |
|
prometheusOperator.admissionWebhooks.cleanupProxy.image.registry | string | "registry1.dso.mil" |
|
prometheusOperator.admissionWebhooks.cleanupProxy.image.repository | string | "ironbank/big-bang/base" |
|
prometheusOperator.admissionWebhooks.cleanupProxy.image.tag | string | "2.1.0" |
|
prometheusOperator.admissionWebhooks.cleanupProxy.image.sha | string | "" |
|
prometheusOperator.admissionWebhooks.cleanupProxy.image.pullPolicy | string | "IfNotPresent" |
|
prometheusOperator.admissionWebhooks.cleanupProxy.image.imagePullSecrets[0].name | string | "private-registry" |
|
prometheusOperator.admissionWebhooks.cleanupProxy.resources.limits.cpu | string | "50m" |
|
prometheusOperator.admissionWebhooks.cleanupProxy.resources.limits.memory | string | "50Mi" |
|
prometheusOperator.admissionWebhooks.cleanupProxy.resources.requests.cpu | string | "50m" |
|
prometheusOperator.admissionWebhooks.cleanupProxy.resources.requests.memory | string | "50Mi" |
|
prometheusOperator.admissionWebhooks.cleanupProxy.priorityClassName | string | "" |
|
prometheusOperator.admissionWebhooks.cleanupProxy.ttlSecondsAfterFinished | int | 60 |
|
prometheusOperator.admissionWebhooks.cleanupProxy.annotations | object | {} |
|
prometheusOperator.admissionWebhooks.cleanupProxy.podAnnotations | object | {} |
|
prometheusOperator.admissionWebhooks.cleanupProxy.nodeSelector | object | {} |
|
prometheusOperator.admissionWebhooks.cleanupProxy.affinity | object | {} |
|
prometheusOperator.admissionWebhooks.cleanupProxy.tolerations | list | [] |
|
prometheusOperator.admissionWebhooks.cleanupProxy.securityContext.runAsGroup | int | 2000 |
|
prometheusOperator.admissionWebhooks.cleanupProxy.securityContext.runAsNonRoot | bool | true |
|
prometheusOperator.admissionWebhooks.cleanupProxy.securityContext.runAsUser | int | 2000 |
|
prometheusOperator.admissionWebhooks.cleanupProxy.securityContext.seccompProfile.type | string | "RuntimeDefault" |
|
prometheusOperator.admissionWebhooks.cleanupProxy.serviceAccount.create | bool | true |
|
prometheusOperator.admissionWebhooks.cleanupProxy.serviceAccount.annotations | object | {} |
|
prometheusOperator.admissionWebhooks.cleanupProxy.serviceAccount.automountServiceAccountToken | bool | true |
|
prometheusOperator.admissionWebhooks.createSecretJob.securityContext.allowPrivilegeEscalation | bool | false |
|
prometheusOperator.admissionWebhooks.createSecretJob.securityContext.readOnlyRootFilesystem | bool | true |
|
prometheusOperator.admissionWebhooks.createSecretJob.securityContext.capabilities.drop[0] | string | "ALL" |
|
prometheusOperator.admissionWebhooks.patchWebhookJob.securityContext.allowPrivilegeEscalation | bool | false |
|
prometheusOperator.admissionWebhooks.patchWebhookJob.securityContext.readOnlyRootFilesystem | bool | true |
|
prometheusOperator.admissionWebhooks.patchWebhookJob.securityContext.capabilities.drop[0] | string | "ALL" |
|
prometheusOperator.admissionWebhooks.certManager.enabled | bool | false |
|
prometheusOperator.admissionWebhooks.certManager.rootCert.duration | string | "" |
|
prometheusOperator.admissionWebhooks.certManager.rootCert.revisionHistoryLimit | string | nil |
Set the revisionHistoryLimit on the Certificate. See https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec Defaults to nil. |
prometheusOperator.admissionWebhooks.certManager.admissionCert.duration | string | "" |
|
prometheusOperator.admissionWebhooks.certManager.admissionCert.revisionHistoryLimit | string | nil |
Set the revisionHistoryLimit on the Certificate. See https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec Defaults to nil. |
prometheusOperator.namespaces | object | {} |
|
prometheusOperator.denyNamespaces | list | [] |
|
prometheusOperator.alertmanagerInstanceNamespaces | list | [] |
|
prometheusOperator.alertmanagerConfigNamespaces | list | [] |
|
prometheusOperator.prometheusInstanceNamespaces | list | [] |
|
prometheusOperator.thanosRulerInstanceNamespaces | list | [] |
|
prometheusOperator.clusterDomain | string | "cluster.local" |
|
prometheusOperator.networkPolicy.enabled | bool | false |
|
prometheusOperator.networkPolicy.flavor | string | "kubernetes" |
|
prometheusOperator.serviceAccount.create | bool | true |
|
prometheusOperator.serviceAccount.name | string | "" |
|
prometheusOperator.serviceAccount.automountServiceAccountToken | bool | true |
|
prometheusOperator.serviceAccount.annotations | object | {} |
|
prometheusOperator.terminationGracePeriodSeconds | int | 30 |
terminationGracePeriodSeconds for container lifecycle hook |
prometheusOperator.lifecycle | object | {} |
Specify lifecycle hooks for the controller |
prometheusOperator.service.annotations | object | {} |
|
prometheusOperator.service.labels | object | {} |
|
prometheusOperator.service.clusterIP | string | "" |
|
prometheusOperator.service.ipDualStack.enabled | bool | false |
|
prometheusOperator.service.ipDualStack.ipFamilies[0] | string | "IPv6" |
|
prometheusOperator.service.ipDualStack.ipFamilies[1] | string | "IPv4" |
|
prometheusOperator.service.ipDualStack.ipFamilyPolicy | string | "PreferDualStack" |
|
prometheusOperator.service.nodePort | int | 30080 |
|
prometheusOperator.service.nodePortTls | int | 30443 |
|
prometheusOperator.service.additionalPorts | list | [] |
|
prometheusOperator.service.loadBalancerIP | string | "" |
|
prometheusOperator.service.loadBalancerSourceRanges | list | [] |
|
prometheusOperator.service.externalTrafficPolicy | string | "Cluster" |
|
prometheusOperator.service.type | string | "ClusterIP" |
|
prometheusOperator.service.externalIPs | list | [] |
|
prometheusOperator.labels | object | {} |
|
prometheusOperator.annotations | object | {} |
|
prometheusOperator.podLabels | object | {} |
|
prometheusOperator.podAnnotations | object | {} |
|
prometheusOperator.podDisruptionBudget.enabled | bool | false |
|
prometheusOperator.podDisruptionBudget.minAvailable | int | 1 |
|
prometheusOperator.podDisruptionBudget.unhealthyPodEvictionPolicy | string | "AlwaysAllow" |
|
prometheusOperator.kubeletService.enabled | bool | true |
|
prometheusOperator.kubeletService.namespace | string | "kube-system" |
|
prometheusOperator.kubeletService.selector | string | "" |
|
prometheusOperator.kubeletService.name | string | "" |
|
prometheusOperator.kubeletEndpointsEnabled | bool | true |
|
prometheusOperator.kubeletEndpointSliceEnabled | bool | false |
|
prometheusOperator.extraArgs | list | [] |
|
prometheusOperator.serviceMonitor.selfMonitor | bool | true |
|
prometheusOperator.serviceMonitor.additionalLabels | object | {} |
|
prometheusOperator.serviceMonitor.interval | string | "" |
|
prometheusOperator.serviceMonitor.sampleLimit | int | 0 |
|
prometheusOperator.serviceMonitor.targetLimit | int | 0 |
|
prometheusOperator.serviceMonitor.labelLimit | int | 0 |
|
prometheusOperator.serviceMonitor.labelNameLengthLimit | int | 0 |
|
prometheusOperator.serviceMonitor.labelValueLengthLimit | int | 0 |
|
prometheusOperator.serviceMonitor.scrapeTimeout | string | "" |
|
prometheusOperator.serviceMonitor.metricRelabelings | list | [] |
|
prometheusOperator.serviceMonitor.relabelings | list | [] |
|
prometheusOperator.resources.limits.cpu | string | "200m" |
|
prometheusOperator.resources.limits.memory | string | "512Mi" |
|
prometheusOperator.resources.requests.cpu | string | "200m" |
|
prometheusOperator.resources.requests.memory | string | "512Mi" |
|
prometheusOperator.env.GOGC | string | "30" |
|
prometheusOperator.hostNetwork | bool | false |
|
prometheusOperator.nodeSelector | object | {} |
|
prometheusOperator.tolerations | list | [] |
|
prometheusOperator.affinity | object | {} |
|
prometheusOperator.dnsConfig | object | {} |
|
prometheusOperator.securityContext.fsGroup | int | 65534 |
|
prometheusOperator.securityContext.runAsGroup | int | 65534 |
|
prometheusOperator.securityContext.runAsNonRoot | bool | true |
|
prometheusOperator.securityContext.runAsUser | int | 65534 |
|
prometheusOperator.securityContext.seccompProfile.type | string | "RuntimeDefault" |
|
prometheusOperator.containerSecurityContext.allowPrivilegeEscalation | bool | false |
|
prometheusOperator.containerSecurityContext.readOnlyRootFilesystem | bool | true |
|
prometheusOperator.containerSecurityContext.capabilities.drop[0] | string | "ALL" |
|
prometheusOperator.verticalPodAutoscaler.enabled | bool | false |
|
prometheusOperator.verticalPodAutoscaler.controlledResources | list | [] |
|
prometheusOperator.verticalPodAutoscaler.maxAllowed | object | {} |
|
prometheusOperator.verticalPodAutoscaler.minAllowed | object | {} |
|
prometheusOperator.verticalPodAutoscaler.updatePolicy.updateMode | string | "Auto" |
|
prometheusOperator.image.registry | string | "registry1.dso.mil" |
|
prometheusOperator.image.repository | string | "ironbank/opensource/prometheus-operator/prometheus-operator" |
|
prometheusOperator.image.tag | string | "v0.83.0" |
|
prometheusOperator.image.sha | string | "" |
|
prometheusOperator.image.pullPolicy | string | "IfNotPresent" |
|
prometheusOperator.image.imagePullSecrets[0].name | string | "private-registry" |
|
prometheusOperator.prometheusConfigReloader.image.registry | string | "registry1.dso.mil" |
|
prometheusOperator.prometheusConfigReloader.image.repository | string | "ironbank/opensource/prometheus-operator/prometheus-config-reloader" |
|
prometheusOperator.prometheusConfigReloader.image.tag | string | "v0.83.0" |
|
prometheusOperator.prometheusConfigReloader.image.sha | string | "" |
|
prometheusOperator.prometheusConfigReloader.image.imagePullSecrets[0].name | string | "private-registry" |
|
prometheusOperator.prometheusConfigReloader.enableProbe | bool | false |
|
prometheusOperator.prometheusConfigReloader.resources | object | {} |
|
prometheusOperator.thanosImage.registry | string | "registry1.dso.mil" |
|
prometheusOperator.thanosImage.repository | string | "ironbank/opensource/thanos/thanos" |
|
prometheusOperator.thanosImage.tag | string | "v0.39.0" |
|
prometheusOperator.thanosImage.sha | string | "" |
|
prometheusOperator.prometheusInstanceSelector | string | "" |
|
prometheusOperator.alertmanagerInstanceSelector | string | "" |
|
prometheusOperator.thanosRulerInstanceSelector | string | "" |
|
prometheusOperator.secretFieldSelector | string | "type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1" |
|
prometheusOperator.kubectlImage.registry | string | "registry1.dso.mil" |
|
prometheusOperator.kubectlImage.repository | string | "ironbank/opensource/kubernetes/kubectl" |
|
prometheusOperator.kubectlImage.tag | string | "v1.32.6" |
|
prometheusOperator.kubectlImage.sha | string | "" |
|
prometheusOperator.kubectlImage.pullPolicy | string | "IfNotPresent" |
|
prometheusOperator.automountServiceAccountToken | bool | true |
|
prometheusOperator.extraVolumes | list | [] |
|
prometheusOperator.extraVolumeMounts | list | [] |
|
prometheus.enabled | bool | true |
|
prometheus.agentMode | bool | false |
|
prometheus.annotations | object | {} |
|
prometheus.additionalLabels | object | {} |
|
prometheus.networkPolicy.enabled | bool | false |
|
prometheus.networkPolicy.flavor | string | "kubernetes" |
|
prometheus.serviceAccount.create | bool | true |
|
prometheus.serviceAccount.name | string | "" |
|
prometheus.serviceAccount.annotations | object | {} |
|
prometheus.serviceAccount.automountServiceAccountToken | bool | true |
|
prometheus.thanosService.enabled | bool | false |
|
prometheus.thanosService.annotations | object | {} |
|
prometheus.thanosService.labels | object | {} |
|
prometheus.thanosService.externalTrafficPolicy | string | "Cluster" |
|
prometheus.thanosService.type | string | "ClusterIP" |
|
prometheus.thanosService.ipDualStack.enabled | bool | false |
|
prometheus.thanosService.ipDualStack.ipFamilies[0] | string | "IPv6" |
|
prometheus.thanosService.ipDualStack.ipFamilies[1] | string | "IPv4" |
|
prometheus.thanosService.ipDualStack.ipFamilyPolicy | string | "PreferDualStack" |
|
prometheus.thanosService.portName | string | "grpc" |
|
prometheus.thanosService.port | int | 10901 |
|
prometheus.thanosService.targetPort | string | "grpc" |
|
prometheus.thanosService.httpPortName | string | "http" |
|
prometheus.thanosService.httpPort | int | 10902 |
|
prometheus.thanosService.targetHttpPort | string | "http" |
|
prometheus.thanosService.clusterIP | string | "None" |
|
prometheus.thanosService.nodePort | int | 30901 |
|
prometheus.thanosService.httpNodePort | int | 30902 |
|
prometheus.thanosServiceMonitor.enabled | bool | false |
|
prometheus.thanosServiceMonitor.interval | string | "" |
|
prometheus.thanosServiceMonitor.additionalLabels | object | {} |
|
prometheus.thanosServiceMonitor.scheme | string | "" |
|
prometheus.thanosServiceMonitor.tlsConfig | object | {} |
|
prometheus.thanosServiceMonitor.bearerTokenFile | string | nil |
|
prometheus.thanosServiceMonitor.metricRelabelings | list | [] |
|
prometheus.thanosServiceMonitor.relabelings | list | [] |
|
prometheus.thanosServiceExternal.enabled | bool | false |
|
prometheus.thanosServiceExternal.annotations | object | {} |
|
prometheus.thanosServiceExternal.labels | object | {} |
|
prometheus.thanosServiceExternal.loadBalancerIP | string | "" |
|
prometheus.thanosServiceExternal.loadBalancerSourceRanges | list | [] |
|
prometheus.thanosServiceExternal.portName | string | "grpc" |
|
prometheus.thanosServiceExternal.port | int | 10901 |
|
prometheus.thanosServiceExternal.targetPort | string | "grpc" |
|
prometheus.thanosServiceExternal.httpPortName | string | "http" |
|
prometheus.thanosServiceExternal.httpPort | int | 10902 |
|
prometheus.thanosServiceExternal.targetHttpPort | string | "http" |
|
prometheus.thanosServiceExternal.externalTrafficPolicy | string | "Cluster" |
|
prometheus.thanosServiceExternal.type | string | "LoadBalancer" |
|
prometheus.thanosServiceExternal.nodePort | int | 30901 |
|
prometheus.thanosServiceExternal.httpNodePort | int | 30902 |
|
prometheus.service.enabled | bool | true |
|
prometheus.service.annotations | object | {} |
|
prometheus.service.labels | object | {} |
|
prometheus.service.clusterIP | string | "" |
|
prometheus.service.ipDualStack.enabled | bool | false |
|
prometheus.service.ipDualStack.ipFamilies[0] | string | "IPv6" |
|
prometheus.service.ipDualStack.ipFamilies[1] | string | "IPv4" |
|
prometheus.service.ipDualStack.ipFamilyPolicy | string | "PreferDualStack" |
|
prometheus.service.port | int | 9090 |
|
prometheus.service.targetPort | int | 9090 |
|
prometheus.service.reloaderWebPort | int | 8080 |
|
prometheus.service.externalIPs | list | [] |
|
prometheus.service.nodePort | int | 30090 |
|
prometheus.service.loadBalancerIP | string | "" |
|
prometheus.service.loadBalancerSourceRanges | list | [] |
|
prometheus.service.externalTrafficPolicy | string | "Cluster" |
|
prometheus.service.type | string | "ClusterIP" |
|
prometheus.service.additionalPorts | list | [] |
|
prometheus.service.publishNotReadyAddresses | bool | false |
|
prometheus.service.sessionAffinity | string | "None" |
|
prometheus.service.sessionAffinityConfig.clientIP.timeoutSeconds | int | 10800 |
|
prometheus.servicePerReplica.enabled | bool | false |
|
prometheus.servicePerReplica.annotations | object | {} |
|
prometheus.servicePerReplica.port | int | 9090 |
|
prometheus.servicePerReplica.targetPort | int | 9090 |
|
prometheus.servicePerReplica.nodePort | int | 30091 |
|
prometheus.servicePerReplica.loadBalancerSourceRanges | list | [] |
|
prometheus.servicePerReplica.externalTrafficPolicy | string | "Cluster" |
|
prometheus.servicePerReplica.type | string | "ClusterIP" |
|
prometheus.servicePerReplica.ipDualStack.enabled | bool | false |
|
prometheus.servicePerReplica.ipDualStack.ipFamilies[0] | string | "IPv6" |
|
prometheus.servicePerReplica.ipDualStack.ipFamilies[1] | string | "IPv4" |
|
prometheus.servicePerReplica.ipDualStack.ipFamilyPolicy | string | "PreferDualStack" |
|
prometheus.podDisruptionBudget.enabled | bool | false |
|
prometheus.podDisruptionBudget.minAvailable | int | 1 |
|
prometheus.podDisruptionBudget.unhealthyPodEvictionPolicy | string | "AlwaysAllow" |
|
prometheus.thanosIngress.enabled | bool | false |
|
prometheus.thanosIngress.ingressClassName | string | "" |
|
prometheus.thanosIngress.annotations | object | {} |
|
prometheus.thanosIngress.labels | object | {} |
|
prometheus.thanosIngress.servicePort | int | 10901 |
|
prometheus.thanosIngress.nodePort | int | 30901 |
|
prometheus.thanosIngress.hosts | list | [] |
|
prometheus.thanosIngress.paths | list | [] |
|
prometheus.thanosIngress.tls | list | [] |
|
prometheus.extraSecret.annotations | object | {} |
|
prometheus.extraSecret.data | object | {} |
|
prometheus.ingress.enabled | bool | false |
|
prometheus.ingress.ingressClassName | string | "" |
|
prometheus.ingress.annotations | object | {} |
|
prometheus.ingress.labels | object | {} |
|
prometheus.ingress.hosts | list | [] |
|
prometheus.ingress.paths | list | [] |
|
prometheus.ingress.tls | list | [] |
|
prometheus.route | object | {"main":{"additionalRules":[],"annotations":{},"apiVersion":"gateway.networking.k8s.io/v1","enabled":false,"filters":[],"hostnames":[],"httpsRedirect":false,"kind":"HTTPRoute","labels":{},"matches":[{"path":{"type":"PathPrefix","value":"/"}}],"parentRefs":[]}} |
BETA: Configure the gateway routes for the chart here. More routes can be added by adding a dictionary key like the 'main' route. Be aware that this is an early beta of this feature, kube-prometheus-stack does not guarantee this works and is subject to change. Being BETA this can/will change in the future without notice, do not use unless you want to take that risk [ref] |
prometheus.route.main.enabled | bool | false |
Enables or disables the route |
prometheus.route.main.apiVersion | string | "gateway.networking.k8s.io/v1" |
Set the route apiVersion, e.g. gateway.networking.k8s.io/v1 or gateway.networking.k8s.io/v1alpha2 |
prometheus.route.main.kind | string | "HTTPRoute" |
Set the route kind Valid options are GRPCRoute, HTTPRoute, TCPRoute, TLSRoute, UDPRoute |
prometheus.route.main.httpsRedirect | bool | false |
create http route for redirect (https://gateway-api.sigs.k8s.io/guides/http-redirect-rewrite/#http-to-https-redirects) # Take care that you only enable this on the http listener of the gateway to avoid an infinite redirect. # matches, filters and additionalRules will be ignored if this is set to true. Be are |
prometheus.ingressPerReplica.enabled | bool | false |
|
prometheus.ingressPerReplica.ingressClassName | string | "" |
|
prometheus.ingressPerReplica.annotations | object | {} |
|
prometheus.ingressPerReplica.labels | object | {} |
|
prometheus.ingressPerReplica.hostPrefix | string | "" |
|
prometheus.ingressPerReplica.hostDomain | string | "" |
|
prometheus.ingressPerReplica.paths | list | [] |
|
prometheus.ingressPerReplica.tlsSecretName | string | "" |
|
prometheus.ingressPerReplica.tlsSecretPerReplica.enabled | bool | false |
|
prometheus.ingressPerReplica.tlsSecretPerReplica.prefix | string | "prometheus" |
|
prometheus.serviceMonitor.selfMonitor | bool | true |
|
prometheus.serviceMonitor.interval | string | "" |
|
prometheus.serviceMonitor.additionalLabels | object | {} |
|
prometheus.serviceMonitor.sampleLimit | int | 0 |
|
prometheus.serviceMonitor.targetLimit | int | 0 |
|
prometheus.serviceMonitor.labelLimit | int | 0 |
|
prometheus.serviceMonitor.labelNameLengthLimit | int | 0 |
|
prometheus.serviceMonitor.labelValueLengthLimit | int | 0 |
|
prometheus.serviceMonitor.scheme | string | "" |
|
prometheus.serviceMonitor.tlsConfig | object | {} |
|
prometheus.serviceMonitor.bearerTokenFile | string | nil |
|
prometheus.serviceMonitor.metricRelabelings | list | [] |
|
prometheus.serviceMonitor.relabelings | list | [] |
|
prometheus.serviceMonitor.additionalEndpoints | list | [] |
|
prometheus.prometheusSpec.persistentVolumeClaimRetentionPolicy | object | {} |
|
prometheus.prometheusSpec.disableCompaction | bool | false |
|
prometheus.prometheusSpec.automountServiceAccountToken | bool | true |
|
prometheus.prometheusSpec.apiserverConfig | object | {} |
|
prometheus.prometheusSpec.additionalArgs | list | [] |
|
prometheus.prometheusSpec.scrapeFailureLogFile | string | "" |
|
prometheus.prometheusSpec.scrapeInterval | string | "" |
|
prometheus.prometheusSpec.scrapeTimeout | string | "" |
|
prometheus.prometheusSpec.scrapeClasses | list | [] |
|
prometheus.prometheusSpec.podTargetLabels | list | [] |
|
prometheus.prometheusSpec.evaluationInterval | string | "" |
|
prometheus.prometheusSpec.listenLocal | bool | false |
|
prometheus.prometheusSpec.enableOTLPReceiver | bool | false |
|
prometheus.prometheusSpec.enableAdminAPI | bool | false |
|
prometheus.prometheusSpec.version | string | "" |
|
prometheus.prometheusSpec.web | object | {} |
|
prometheus.prometheusSpec.exemplars | object | {} |
|
prometheus.prometheusSpec.enableFeatures | list | [] |
|
prometheus.prometheusSpec.otlp | object | {} |
|
prometheus.prometheusSpec.serviceName | string | nil |
|
prometheus.prometheusSpec.image.registry | string | "registry1.dso.mil" |
|
prometheus.prometheusSpec.image.repository | string | "ironbank/opensource/prometheus/prometheus" |
|
prometheus.prometheusSpec.image.tag | string | "v3.4.2" |
|
prometheus.prometheusSpec.image.sha | string | "" |
|
prometheus.prometheusSpec.image.imagePullSecrets[0].name | string | "private-registry" |
|
prometheus.prometheusSpec.tolerations | list | [] |
|
prometheus.prometheusSpec.topologySpreadConstraints | list | [] |
|
prometheus.prometheusSpec.alertingEndpoints | list | [] |
|
prometheus.prometheusSpec.externalLabels | object | {} |
|
prometheus.prometheusSpec.enableRemoteWriteReceiver | bool | false |
|
prometheus.prometheusSpec.replicaExternalLabelName | string | "" |
|
prometheus.prometheusSpec.replicaExternalLabelNameClear | bool | false |
|
prometheus.prometheusSpec.prometheusExternalLabelName | string | "" |
|
prometheus.prometheusSpec.prometheusExternalLabelNameClear | bool | false |
|
prometheus.prometheusSpec.externalUrl | string | "https://prometheus.{{ .Values.domain }}" |
|
prometheus.prometheusSpec.nodeSelector | object | {} |
|
prometheus.prometheusSpec.secrets | list | [] |
|
prometheus.prometheusSpec.configMaps | list | [] |
|
prometheus.prometheusSpec.query | object | {} |
|
prometheus.prometheusSpec.ruleNamespaceSelector | object | {} |
|
prometheus.prometheusSpec.ruleSelectorNilUsesHelmValues | bool | false |
|
prometheus.prometheusSpec.ruleSelector | object | {} |
|
prometheus.prometheusSpec.serviceMonitorSelectorNilUsesHelmValues | bool | false |
|
prometheus.prometheusSpec.serviceMonitorSelector | object | {} |
|
prometheus.prometheusSpec.serviceMonitorNamespaceSelector | object | {} |
|
prometheus.prometheusSpec.podMonitorSelectorNilUsesHelmValues | bool | false |
|
prometheus.prometheusSpec.podMonitorSelector | object | {} |
|
prometheus.prometheusSpec.podMonitorNamespaceSelector | object | {} |
|
prometheus.prometheusSpec.probeSelectorNilUsesHelmValues | bool | false |
|
prometheus.prometheusSpec.probeSelector | object | {} |
|
prometheus.prometheusSpec.probeNamespaceSelector | object | {} |
|
prometheus.prometheusSpec.scrapeConfigSelectorNilUsesHelmValues | bool | true |
|
prometheus.prometheusSpec.scrapeConfigSelector | object | {} |
|
prometheus.prometheusSpec.scrapeConfigNamespaceSelector | object | {} |
|
prometheus.prometheusSpec.retention | string | "10d" |
|
prometheus.prometheusSpec.retentionSize | string | "" |
|
prometheus.prometheusSpec.tsdb.outOfOrderTimeWindow | string | "0s" |
|
prometheus.prometheusSpec.walCompression | bool | true |
|
prometheus.prometheusSpec.paused | bool | false |
|
prometheus.prometheusSpec.replicas | int | 1 |
|
prometheus.prometheusSpec.shards | int | 1 |
|
prometheus.prometheusSpec.logLevel | string | "info" |
|
prometheus.prometheusSpec.logFormat | string | "logfmt" |
|
prometheus.prometheusSpec.routePrefix | string | "/" |
|
prometheus.prometheusSpec.podMetadata.labels.app | string | "prometheus" |
|
prometheus.prometheusSpec.podAntiAffinity | string | "soft" |
|
prometheus.prometheusSpec.podAntiAffinityTopologyKey | string | "kubernetes.io/hostname" |
|
prometheus.prometheusSpec.affinity | object | {} |
|
prometheus.prometheusSpec.remoteRead | list | [] |
|
prometheus.prometheusSpec.additionalRemoteRead | list | [] |
|
prometheus.prometheusSpec.remoteWrite | list | [] |
|
prometheus.prometheusSpec.additionalRemoteWrite | list | [] |
|
prometheus.prometheusSpec.remoteWriteDashboards | bool | false |
|
prometheus.prometheusSpec.resources.limits.cpu | string | "300m" |
|
prometheus.prometheusSpec.resources.limits.memory | string | "5Gi" |
|
prometheus.prometheusSpec.resources.requests.cpu | string | "300m" |
|
prometheus.prometheusSpec.resources.requests.memory | string | "5Gi" |
|
prometheus.prometheusSpec.storageSpec | object | {} |
|
prometheus.prometheusSpec.volumes | list | [] |
|
prometheus.prometheusSpec.volumeMounts | list | [] |
|
prometheus.prometheusSpec.additionalScrapeConfigs | list | [] |
|
prometheus.prometheusSpec.additionalScrapeConfigsSecret | object | {} |
|
prometheus.prometheusSpec.additionalPrometheusSecretsAnnotations | object | {} |
|
prometheus.prometheusSpec.additionalAlertManagerConfigs | list | [] |
|
prometheus.prometheusSpec.additionalAlertManagerConfigsSecret | object | {} |
|
prometheus.prometheusSpec.additionalAlertRelabelConfigs | list | [] |
|
prometheus.prometheusSpec.additionalAlertRelabelConfigsSecret | object | {} |
|
prometheus.prometheusSpec.securityContext.runAsGroup | int | 2000 |
|
prometheus.prometheusSpec.securityContext.runAsNonRoot | bool | true |
|
prometheus.prometheusSpec.securityContext.runAsUser | int | 1000 |
|
prometheus.prometheusSpec.securityContext.fsGroup | int | 2000 |
|
prometheus.prometheusSpec.securityContext.seccompProfile.type | string | "RuntimeDefault" |
|
prometheus.prometheusSpec.priorityClassName | string | "" |
|
prometheus.prometheusSpec.thanos | object | {} |
|
prometheus.prometheusSpec.containers | list | [] |
|
prometheus.prometheusSpec.initContainers | list | [] |
|
prometheus.prometheusSpec.portName | string | "http-web" |
|
prometheus.prometheusSpec.arbitraryFSAccessThroughSMs | bool | false |
|
prometheus.prometheusSpec.overrideHonorLabels | bool | false |
|
prometheus.prometheusSpec.overrideHonorTimestamps | bool | false |
|
prometheus.prometheusSpec.ignoreNamespaceSelectors | bool | false |
|
prometheus.prometheusSpec.enforcedNamespaceLabel | string | "" |
|
prometheus.prometheusSpec.prometheusRulesExcludedFromEnforce | list | [] |
|
prometheus.prometheusSpec.excludedFromEnforcement | list | [] |
|
prometheus.prometheusSpec.queryLogFile | bool | false |
|
prometheus.prometheusSpec.sampleLimit | bool | false |
|
prometheus.prometheusSpec.enforcedKeepDroppedTargets | int | 0 |
|
prometheus.prometheusSpec.enforcedSampleLimit | bool | false |
|
prometheus.prometheusSpec.enforcedTargetLimit | bool | false |
|
prometheus.prometheusSpec.enforcedLabelLimit | bool | false |
|
prometheus.prometheusSpec.enforcedLabelNameLengthLimit | bool | false |
|
prometheus.prometheusSpec.enforcedLabelValueLengthLimit | bool | false |
|
prometheus.prometheusSpec.allowOverlappingBlocks | bool | false |
|
prometheus.prometheusSpec.nameValidationScheme | string | "" |
|
prometheus.prometheusSpec.minReadySeconds | int | 0 |
|
prometheus.prometheusSpec.hostNetwork | bool | false |
|
prometheus.prometheusSpec.hostAliases | list | [] |
|
prometheus.prometheusSpec.tracingConfig | object | {} |
|
prometheus.prometheusSpec.serviceDiscoveryRole | string | "" |
|
prometheus.prometheusSpec.additionalConfig | object | {} |
|
prometheus.prometheusSpec.additionalConfigString | string | "" |
|
prometheus.prometheusSpec.maximumStartupDurationSeconds | int | 0 |
|
prometheus.prometheusSpec.scrapeProtocols | list | [] |
|
prometheus.additionalRulesForClusterRole | list | [] |
|
prometheus.additionalServiceMonitors | list | [] |
|
prometheus.additionalPodMonitors | list | [] |
|
thanosRuler.enabled | bool | false |
|
thanosRuler.annotations | object | {} |
|
thanosRuler.serviceAccount.create | bool | true |
|
thanosRuler.serviceAccount.name | string | "" |
|
thanosRuler.serviceAccount.annotations | object | {} |
|
thanosRuler.podDisruptionBudget.enabled | bool | false |
|
thanosRuler.podDisruptionBudget.minAvailable | int | 1 |
|
thanosRuler.podDisruptionBudget.unhealthyPodEvictionPolicy | string | "AlwaysAllow" |
|
thanosRuler.ingress.enabled | bool | false |
|
thanosRuler.ingress.ingressClassName | string | "" |
|
thanosRuler.ingress.annotations | object | {} |
|
thanosRuler.ingress.labels | object | {} |
|
thanosRuler.ingress.hosts | list | [] |
|
thanosRuler.ingress.paths | list | [] |
|
thanosRuler.ingress.tls | list | [] |
|
thanosRuler.route | object | {"main":{"additionalRules":[],"annotations":{},"apiVersion":"gateway.networking.k8s.io/v1","enabled":false,"filters":[],"hostnames":[],"httpsRedirect":false,"kind":"HTTPRoute","labels":{},"matches":[{"path":{"type":"PathPrefix","value":"/"}}],"parentRefs":[]}} |
BETA: Configure the gateway routes for the chart here. More routes can be added by adding a dictionary key like the 'main' route. Be aware that this is an early beta of this feature, kube-prometheus-stack does not guarantee this works and is subject to change. Being BETA this can/will change in the future without notice, do not use unless you want to take that risk [ref] |
thanosRuler.route.main.enabled | bool | false |
Enables or disables the route |
thanosRuler.route.main.apiVersion | string | "gateway.networking.k8s.io/v1" |
Set the route apiVersion, e.g. gateway.networking.k8s.io/v1 or gateway.networking.k8s.io/v1alpha2 |
thanosRuler.route.main.kind | string | "HTTPRoute" |
Set the route kind Valid options are GRPCRoute, HTTPRoute, TCPRoute, TLSRoute, UDPRoute |
thanosRuler.route.main.httpsRedirect | bool | false |
create http route for redirect (https://gateway-api.sigs.k8s.io/guides/http-redirect-rewrite/#http-to-https-redirects) # Take care that you only enable this on the http listener of the gateway to avoid an infinite redirect. # matches, filters and additionalRules will be ignored if this is set to true. Be are |
thanosRuler.service.enabled | bool | true |
|
thanosRuler.service.annotations | object | {} |
|
thanosRuler.service.labels | object | {} |
|
thanosRuler.service.clusterIP | string | "" |
|
thanosRuler.service.ipDualStack.enabled | bool | false |
|
thanosRuler.service.ipDualStack.ipFamilies[0] | string | "IPv6" |
|
thanosRuler.service.ipDualStack.ipFamilies[1] | string | "IPv4" |
|
thanosRuler.service.ipDualStack.ipFamilyPolicy | string | "PreferDualStack" |
|
thanosRuler.service.port | int | 10902 |
|
thanosRuler.service.targetPort | int | 10902 |
|
thanosRuler.service.nodePort | int | 30905 |
|
thanosRuler.service.additionalPorts | list | [] |
|
thanosRuler.service.externalIPs | list | [] |
|
thanosRuler.service.loadBalancerIP | string | "" |
|
thanosRuler.service.loadBalancerSourceRanges | list | [] |
|
thanosRuler.service.externalTrafficPolicy | string | "Cluster" |
|
thanosRuler.service.type | string | "ClusterIP" |
|
thanosRuler.serviceMonitor.selfMonitor | bool | true |
|
thanosRuler.serviceMonitor.interval | string | "" |
|
thanosRuler.serviceMonitor.additionalLabels | object | {} |
|
thanosRuler.serviceMonitor.sampleLimit | int | 0 |
|
thanosRuler.serviceMonitor.targetLimit | int | 0 |
|
thanosRuler.serviceMonitor.labelLimit | int | 0 |
|
thanosRuler.serviceMonitor.labelNameLengthLimit | int | 0 |
|
thanosRuler.serviceMonitor.labelValueLengthLimit | int | 0 |
|
thanosRuler.serviceMonitor.proxyUrl | string | "" |
|
thanosRuler.serviceMonitor.scheme | string | "" |
|
thanosRuler.serviceMonitor.tlsConfig | object | {} |
|
thanosRuler.serviceMonitor.bearerTokenFile | string | nil |
|
thanosRuler.serviceMonitor.metricRelabelings | list | [] |
|
thanosRuler.serviceMonitor.relabelings | list | [] |
|
thanosRuler.serviceMonitor.additionalEndpoints | list | [] |
|
thanosRuler.thanosRulerSpec.podMetadata | object | {} |
|
thanosRuler.thanosRulerSpec.serviceName | string | nil |
|
thanosRuler.thanosRulerSpec.image.registry | string | "registry1.dso.mil" |
|
thanosRuler.thanosRulerSpec.image.repository | string | "ironbank/opensource/thanos/thanos" |
|
thanosRuler.thanosRulerSpec.image.tag | string | "v0.39.0" |
|
thanosRuler.thanosRulerSpec.image.sha | string | "" |
|
thanosRuler.thanosRulerSpec.image.imagePullSecrets[0].name | string | "private-registry" |
|
thanosRuler.thanosRulerSpec.ruleNamespaceSelector | object | {} |
|
thanosRuler.thanosRulerSpec.ruleSelectorNilUsesHelmValues | bool | true |
|
thanosRuler.thanosRulerSpec.ruleSelector | object | {} |
|
thanosRuler.thanosRulerSpec.logFormat | string | "logfmt" |
|
thanosRuler.thanosRulerSpec.logLevel | string | "info" |
|
thanosRuler.thanosRulerSpec.replicas | int | 1 |
|
thanosRuler.thanosRulerSpec.retention | string | "24h" |
|
thanosRuler.thanosRulerSpec.evaluationInterval | string | "" |
|
thanosRuler.thanosRulerSpec.storage | object | {} |
|
thanosRuler.thanosRulerSpec.alertmanagersConfig.existingSecret | object | {} |
|
thanosRuler.thanosRulerSpec.alertmanagersConfig.secret | object | {} |
|
thanosRuler.thanosRulerSpec.externalPrefix | string | nil |
|
thanosRuler.thanosRulerSpec.externalPrefixNilUsesHelmValues | bool | true |
|
thanosRuler.thanosRulerSpec.routePrefix | string | "/" |
|
thanosRuler.thanosRulerSpec.objectStorageConfig.existingSecret | object | {} |
|
thanosRuler.thanosRulerSpec.objectStorageConfig.secret | object | {} |
|
thanosRuler.thanosRulerSpec.alertDropLabels | list | [] |
|
thanosRuler.thanosRulerSpec.queryEndpoints | list | [] |
|
thanosRuler.thanosRulerSpec.queryConfig.existingSecret | object | {} |
|
thanosRuler.thanosRulerSpec.queryConfig.secret | object | {} |
|
thanosRuler.thanosRulerSpec.labels | object | {} |
|
thanosRuler.thanosRulerSpec.paused | bool | false |
|
thanosRuler.thanosRulerSpec.additionalArgs | list | [] |
|
thanosRuler.thanosRulerSpec.nodeSelector | object | {} |
|
thanosRuler.thanosRulerSpec.resources | object | {} |
|
thanosRuler.thanosRulerSpec.podAntiAffinity | string | "soft" |
|
thanosRuler.thanosRulerSpec.podAntiAffinityTopologyKey | string | "kubernetes.io/hostname" |
|
thanosRuler.thanosRulerSpec.affinity | object | {} |
|
thanosRuler.thanosRulerSpec.tolerations | list | [] |
|
thanosRuler.thanosRulerSpec.topologySpreadConstraints | list | [] |
|
thanosRuler.thanosRulerSpec.securityContext.runAsGroup | int | 2000 |
|
thanosRuler.thanosRulerSpec.securityContext.runAsNonRoot | bool | true |
|
thanosRuler.thanosRulerSpec.securityContext.runAsUser | int | 1000 |
|
thanosRuler.thanosRulerSpec.securityContext.fsGroup | int | 2000 |
|
thanosRuler.thanosRulerSpec.securityContext.seccompProfile.type | string | "RuntimeDefault" |
|
thanosRuler.thanosRulerSpec.listenLocal | bool | false |
|
thanosRuler.thanosRulerSpec.containers | list | [] |
|
thanosRuler.thanosRulerSpec.volumes | list | [] |
|
thanosRuler.thanosRulerSpec.volumeMounts | list | [] |
|
thanosRuler.thanosRulerSpec.initContainers | list | [] |
|
thanosRuler.thanosRulerSpec.priorityClassName | string | "" |
|
thanosRuler.thanosRulerSpec.portName | string | "web" |
|
thanosRuler.thanosRulerSpec.web | object | {} |
|
thanosRuler.thanosRulerSpec.additionalConfig | object | {} |
|
thanosRuler.thanosRulerSpec.additionalConfigString | string | "" |
|
thanosRuler.extraSecret.annotations | object | {} |
|
thanosRuler.extraSecret.data | object | {} |
|
cleanPrometheusOperatorObjectNames | bool | false |
|
extraManifests | string | nil |
Please see the contributing guide if you are interested in contributing.
This file is programatically generated using helm-docs
and some BigBang-specific templates. The gluon
repository has instructions for regenerating package READMEs.