This repository has been archived by the owner on Mar 17, 2024. It is now read-only.
-
-
Notifications
You must be signed in to change notification settings - Fork 188
/
values.yaml
259 lines (241 loc) · 7.96 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
## Statically define one or more cluster
clusters: {}
## Ex)
#clusters:
# - name: "default"
# bootstrapBrokers: "simple-strimzi-kafka-bootstrap.strimzi.svc.cluster.local:9092"
# topicWhitelist:
# - "^xyz-corp-topics\..+"
# topicBlacklist:
# - "^unmonitored-topics-.+"
# groupWhitelist:
# - "^analytics-app-.+"
# groupBlacklist:
# - "^unmonitored-groups-.+"
# # Properties defined by org.apache.kafka.clients.consumer.ConsumerConfig
# # can be defined in this configuration section.
# # https://kafka.apache.org/documentation/#consumerconfigs
# consumerProperties:
# security.protocol: SSL
# ssl.truststore.location: /path/to/my.truststore.jks
# consumerPropertiesNoQuotes:
# ssl.truststore.password: mypwd
# # https://kafka.apache.org/documentation/#adminclientconfigs
# adminClientProperties:
# security.protocol: SSL
# ssl.truststore.location: /path/to/my.truststore.jks
# adminClientPropertiesNoQuotes:
# ssl.truststore.password: mypwd
# labels:
# location: ny
# zone: "us-east"
# Lookup Table
lookup:
memory:
## Size of the sliding window of offsets to keep in each partition's lookup table
size: 60
redis:
enabled: false
# host: localhost
# database: 0
# port: 6379
# timeout: 60
# prefix: kafka-lag-exporter
# separator: ":"
# retention: 1 day
# expiration: 7 days
## The interval between refreshing metrics
pollIntervalSeconds: 30
## The Consumer Group `group.id` to use when connecting to Kafka
clientGroupId: "kafkalagexporter"
## The timeout when communicating with Kafka clusters
kafkaClientTimeoutSeconds: 10
## The number of retry when getting the consumer groups
kafkaRetries: 2
## Reporters will send metrics to time series databases
reporters:
prometheus:
## Flag to enable the Prometheus metrics reporter
enabled: true
## The port to run the Prometheus endpoint on
port: 8000
graphite:
## Flag to enable the graphite metrics reporter
enabled: false
## The graphite host to send metrics to
host: "http://graphite"
## The graphite port to send metrics to
port: 2003
## The graphite metric prefix
prefix: ""
influxdb:
## Flag to enable the influxdb metrics reporter
enabled: false
## The influxdb host to send metrics to
endpoint: "http://influxdb"
## The influxdb port to send metrics to
port: 8086
## The influxdb database to send metrics to
database: "kafka_lag_exporter"
## The influxdb username to connect
username: ""
## The influxdb password to connect
password: ""
## Flag to enable influxdb async non-blocking write mode to send metrics
async: true
## Watchers will automatically discover and forget Kafka clusters
watchers:
## The Strimzi Cluster Watcher automatically watches for `kafka.strimzi.io` group, `Kafka` kind resources and will
## configure the Kafka Lag Exporter appropriately.
strimzi: false
## Applicable only in non-Strimzi installation. If true, a service account will be created and bind to the deployment.
## Otherwise, the default service account for the namespace will be used.
serviceAccount:
create: false
## The name of the service account will be generated based on the release name, use nameOverride to override
## with a static name.
# nameOverride: my-serviceaccount
## Annotations to add to the service account (e.g., add IAM role to the service)
# annotations:
# iam.gke.io/gcp-service-account: gke-workload@my-gcp-project.iam.gserviceaccount.com
## You can use regex to control the metrics exposed by Prometheus endpoint.
## Any metric that matches one of the regex in the whitelist will be exposed.
## For example, if you only wish to expose the max lag metrics, use either:
## metricWhitelist:
## - ^kafka_consumergroup_group_max_lag.*
##
## Or
##
## metricWhitelist:
## - kafka_consumergroup_group_max_lag
## - kafka_consumergroup_group_max_lag_seconds
metricWhitelist:
- .*
## The log level of the ROOT logger
rootLogLevel: INFO
## The log level of Kafka Lag Exporter
kafkaLagExporterLogLevel: INFO
## The log level of `org.apache.kafka` logger
kafkaLogLevel: INFO
## The log level of Akka
akkaLogLevel: DEBUG
## Additional labels to add to all resources
additionalLabels: #{}
app: kafka-lag-exporter
## You probably won't need to change anything below this line.
image:
repository: seglo/kafka-lag-exporter
tag: 0.8.3-SNAPSHOT
# If digest is set it will be used instead of tag to specify the image
# digest: sha256:0f6387aa011e6eb7952ea211ac139bf8613ad3ef6954a1a5d910676d293bd610
pullPolicy: Always
pullSecrets: []
securityContext: {}
# allowPrivilegeEscalation: false
# runAsUser: 1001
# runAsNonRoot: true
# capabilities:
# drop: ["all"]
initContainers: []
## Init containers to be added to the pod.
# - name: my-init-container
# image: busybox:latest
# command: ['sh', '-c', 'echo hello']
service:
type: ClusterIP
port: 8000
additionalLabels: {}
resources: {}
# limits:
# cpu: 100m
# memory: 128Mi
# requests:
# cpu: 100m
# memory: 128Mi
nodeSelector: {}
tolerations: []
affinity: {}
extraConfigmapMounts: []
# - name: cacerts
# configMap: cacerts-configmap
# mountPath: /etc/pki/ca-trust/extracted/java/cacerts
# subPath: ca-bundle.jks
# readOnly: true
extraMounts: []
# - name: my-secrets
# mount:
# emptyDir:
# medium: Memory
# mountPath: /var/run/my-secrets
# Define secrets that are mounted at /opt/docker/secrets/ to be used elsewhere, for example in clusters for keystores
secrets: {}
# name: secret-name
# data:
# - name: my-keystore-file.p12
# value: base64-encoded-string
secretAnnotations: {}
# foo: bar
hostAliases: {}
# - ip: "192.168.99.100"
# hostnames:
# - "platform.local"
# - "myotherhost.dev"
env: {}
# - name: JAVA_OPTS
# value: "-Djava.security.auth.login.config=/var/run/my-secrets/jaasConfig"
# Define references to configmaps or secrets to be populated as environment variables
envFromConfigMapRefs: []
# - 'configmap-a'
envFromSecretRefs: []
# - 'secret-a'
podAnnotations: {}
# foo: bar
## Extra labels for the pod
## Ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/
podExtraLabels: {}
# foo: bar
## Extra labels for the deployment
## Ref: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/
deploymentExtraLabels: {}
# foo: bar
## Readiness and liveness probe initial delay and timeout
## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/
readinessProbeInitialDelay: 30
readinessProbePeriodSeconds: 5
readinessProbeTimeout: 30
readinessProbeFailureThreshold: 3
readinessProbeSuccessThreshold: 1
livenessProbeInitialDelay: 30
livenessProbePeriodSeconds: 15
livenessProbeTimeout: 30
livenessProbeFailureThreshold: 3
livenessProbeSuccessThreshold: 1
prometheus:
serviceMonitor:
enabled: false
interval: "30s"
# metricRelabelings:
# - sourceLabels: [__name__]
# regex: ^(process_|jvm_).*$
# action: drop
# relabelings: []
# service monitor label selectors: https://github.com/helm/charts/blob/f5a751f174263971fafd21eee4e35416d6612a3d/stable/prometheus-operator/templates/prometheus/prometheus.yaml#L74
# additionalLabels:
# prometheus: k8s
# additionalConfig:
# targetLabels:
# - prometheus
# - app.kubernetes.io/name
# Allow alert rules to be configured for Prometheus Alertmanager
prometheusRule:
enabled: false
# List of rules that can be used in Prometheus Alertmanager
rules: []
# - alert: ConsumerGroupLagHigh
# annotations:
# message: '{{ $labels.group }} on cluster {{ $labels.cluster_name }} is lagging on topic {{ $labels.topic }}'
# expr: 'max by (cluster_name, group, topic) (kafka_consumergroup_group_lag_seconds{cluster_name=~"my-cluster", group=~"consumergroup.A"} ) < Inf > 180'
# for: 5m
# labels:
# severity: medium
logPattern: "%date{ISO8601} %-5level %logger{36} %X{akkaSource} - %msg %ex%n"