-
Notifications
You must be signed in to change notification settings - Fork 829
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
6 changed files
with
395 additions
and
3 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,200 @@ | ||
# Default values for k8s-prometheus-adapter.. | ||
affinity: {} | ||
|
||
image: | ||
repository: k8s.gcr.io/prometheus-adapter/prometheus-adapter | ||
tag: v0.9.0 | ||
pullPolicy: IfNotPresent | ||
|
||
logLevel: 4 | ||
|
||
metricsRelistInterval: 1m | ||
|
||
listenPort: 6443 | ||
|
||
nodeSelector: {} | ||
|
||
priorityClassName: "" | ||
|
||
# Url to access prometheus | ||
prometheus: | ||
# Value is templated | ||
url: http://prometheus-server.default.svc.cluster.local | ||
port: 80 | ||
path: "" | ||
|
||
replicas: 1 | ||
|
||
# k8s 1.21 needs fsGroup to be set for non root deployments | ||
# ref: https://github.com/kubernetes/kubernetes/issues/70679 | ||
podSecurityContext: | ||
fsGroup: 10001 | ||
|
||
rbac: | ||
# Specifies whether RBAC resources should be created | ||
create: true | ||
|
||
psp: | ||
# Specifies whether PSP resources should be created | ||
create: false | ||
|
||
serviceAccount: | ||
# Specifies whether a service account should be created | ||
create: true | ||
# The name of the service account to use. | ||
# If not set and create is true, a name is generated using the fullname template | ||
name: | ||
# ServiceAccount annotations. | ||
# Use case: AWS EKS IAM roles for service accounts | ||
# ref: https://docs.aws.amazon.com/eks/latest/userguide/specify-service-account-role.html | ||
annotations: {} | ||
|
||
# Custom DNS configuration to be added to prometheus-adapter pods | ||
dnsConfig: {} | ||
# nameservers: | ||
# - 1.2.3.4 | ||
# searches: | ||
# - ns1.svc.cluster-domain.example | ||
# - my.dns.search.suffix | ||
# options: | ||
# - name: ndots | ||
# value: "2" | ||
# - name: edns0 | ||
resources: {} | ||
# requests: | ||
# cpu: 100m | ||
# memory: 128Mi | ||
# limits: | ||
# cpu: 100m | ||
# memory: 128Mi | ||
|
||
rules: | ||
default: true | ||
custom: [] | ||
# - seriesQuery: '{__name__=~"^some_metric_count$"}' | ||
# resources: | ||
# template: <<.Resource>> | ||
# name: | ||
# matches: "" | ||
# as: "my_custom_metric" | ||
# metricsQuery: sum(<<.Series>>{<<.LabelMatchers>>}) by (<<.GroupBy>>) | ||
# Mounts a configMap with pre-generated rules for use. Overrides the | ||
# default, custom, external and resource entries | ||
existing: | ||
external: | ||
- seriesQuery: '{__name__=~"^ts_queue_latency_microseconds"}' | ||
resources: | ||
overrides: | ||
namespace: | ||
resource: namespace | ||
service: | ||
resource: service | ||
pod: | ||
resource: pod | ||
name: | ||
matches: "^(.*)_microseconds" | ||
as: "ts_queue_latency_microseconds" | ||
metricsQuery: ts_queue_latency_microseconds | ||
resource: {} | ||
# cpu: | ||
# containerQuery: sum(rate(container_cpu_usage_seconds_total{<<.LabelMatchers>>, container!=""}[3m])) by (<<.GroupBy>>) | ||
# nodeQuery: sum(rate(container_cpu_usage_seconds_total{<<.LabelMatchers>>, id='/'}[3m])) by (<<.GroupBy>>) | ||
# resources: | ||
# overrides: | ||
# node: | ||
# resource: node | ||
# namespace: | ||
# resource: namespace | ||
# pod: | ||
# resource: pod | ||
# containerLabel: container | ||
# memory: | ||
# containerQuery: sum(container_memory_working_set_bytes{<<.LabelMatchers>>, container!=""}) by (<<.GroupBy>>) | ||
# nodeQuery: sum(container_memory_working_set_bytes{<<.LabelMatchers>>,id='/'}) by (<<.GroupBy>>) | ||
# resources: | ||
# overrides: | ||
# node: | ||
# resource: node | ||
# namespace: | ||
# resource: namespace | ||
# pod: | ||
# resource: pod | ||
# containerLabel: container | ||
# window: 3m | ||
|
||
service: | ||
annotations: {} | ||
port: 443 | ||
type: ClusterIP | ||
# clusterIP: 1.2.3.4 | ||
|
||
tls: | ||
enable: false | ||
ca: |- | ||
# Public CA file that signed the APIService | ||
key: |- | ||
# Private key of the APIService | ||
certificate: |- | ||
# Public key of the APIService | ||
# Any extra arguments | ||
extraArguments: [] | ||
# - --tls-private-key-file=/etc/tls/tls.key | ||
# - --tls-cert-file=/etc/tls/tls.crt | ||
|
||
# Any extra volumes | ||
extraVolumes: [] | ||
# - name: example-name | ||
# hostPath: | ||
# path: /path/on/host | ||
# type: DirectoryOrCreate | ||
# - name: ssl-certs | ||
# hostPath: | ||
# path: /etc/ssl/certs/ca-bundle.crt | ||
# type: File | ||
|
||
# Any extra volume mounts | ||
extraVolumeMounts: [] | ||
# - name: example-name | ||
# mountPath: /path/in/container | ||
# - name: ssl-certs | ||
# mountPath: /etc/ssl/certs/ca-certificates.crt | ||
# readOnly: true | ||
|
||
tolerations: [] | ||
|
||
# Labels added to the pod | ||
podLabels: {} | ||
|
||
# Annotations added to the pod | ||
podAnnotations: {} | ||
|
||
hostNetwork: | ||
# Specifies if prometheus-adapter should be started in hostNetwork mode. | ||
# | ||
# You would require this enabled if you use alternate overlay networking for pods and | ||
# API server unable to communicate with metrics-server. As an example, this is required | ||
# if you use Weave network on EKS. See also dnsPolicy | ||
enabled: false | ||
|
||
# When hostNetwork is enabled, you probably want to set this to ClusterFirstWithHostNet | ||
# dnsPolicy: ClusterFirstWithHostNet | ||
|
||
# Deployment strategy type | ||
strategy: | ||
type: RollingUpdate | ||
rollingUpdate: | ||
maxUnavailable: 25% | ||
maxSurge: 25% | ||
|
||
podDisruptionBudget: | ||
# Specifies if PodDisruptionBudget should be enabled | ||
# When enabled, minAvailable or maxUnavailable should also be defined. | ||
enabled: false | ||
minAvailable: | ||
maxUnavailable: 1 | ||
|
||
certManager: | ||
enabled: false | ||
caCertDuration: 43800h | ||
certDuration: 8760h |
Oops, something went wrong.