kubeasz/roles/cluster-addon/templates/prometheus/values.yaml.j2

129 lines
2.8 KiB
Plaintext
Raw Normal View History

2021-01-11 11:12:14 +08:00
## Provide a k8s version to auto dashboard import script example: kubeTargetVersionOverride: 1.16.6
kubeTargetVersionOverride: "{{ K8S_VER.stdout }}"
## Configuration for alertmanager
alertmanager:
enabled: true
config:
route:
receiver: 'null'
routes:
2022-06-05 15:49:48 +08:00
- receiver: 'null'
matchers:
- alertname =~ "InfoInhibitor|Watchdog"
2021-01-11 11:12:14 +08:00
receivers:
- name: 'null'
## Configuration for Alertmanager service
service:
2021-01-12 17:17:27 +08:00
nodePort: 30902
2021-01-11 11:12:14 +08:00
type: NodePort
## Using default values from https://github.com/grafana/helm-charts/blob/main/charts/grafana/values.yaml
grafana:
enabled: true
adminPassword: Admin1234!
service:
2021-01-12 17:17:27 +08:00
nodePort: 30903
2021-01-11 11:12:14 +08:00
type: NodePort
## Component scraping the kube api server
kubeApiServer:
enabled: true
## Component scraping the kubelet and kubelet-hosted cAdvisor
kubelet:
enabled: true
## Component scraping the kube controller manager
kubeControllerManager:
enabled: true
endpoints:
{% for h in groups['kube_master'] %}
2021-01-11 11:12:14 +08:00
- {{ h }}
{% endfor %}
## Component scraping coreDns. Use either this or kubeDns
coreDns:
enabled: true
## Component scraping etcd
kubeEtcd:
enabled: true
endpoints:
{% for h in groups['etcd'] %}
- {{ h }}
{% endfor %}
## Configure secure access to the etcd cluster by loading a secret into prometheus and
## specifying security configuration below. For example, with a secret named etcd-client-cert
serviceMonitor:
scheme: https
insecureSkipVerify: true
serverName: localhost
caFile: /etc/prometheus/secrets/etcd-client-cert/etcd-ca
certFile: /etc/prometheus/secrets/etcd-client-cert/etcd-client
keyFile: /etc/prometheus/secrets/etcd-client-cert/etcd-client-key
## Component scraping kube scheduler
kubeScheduler:
enabled: true
endpoints:
{% for h in groups['kube_master'] %}
2021-01-11 11:12:14 +08:00
- {{ h }}
{% endfor %}
## Component scraping kube proxy
kubeProxy:
enabled: true
endpoints:
{% for h in groups['kube_master'] %}
2021-01-11 11:12:14 +08:00
- {{ h }}
{% endfor %}
{% for h in groups['kube_node'] %}
{% if h not in groups['kube_master'] %}
2021-01-11 11:12:14 +08:00
- {{ h }}
{% endif %}
{% endfor %}
## Manages Prometheus and Alertmanager components
prometheusOperator:
enabled: true
service:
2021-01-12 17:17:27 +08:00
nodePort: 30899
nodePortTls: 30900
2021-01-11 11:12:14 +08:00
type: NodePort
## Deploy a Prometheus instance
prometheus:
enabled: true
## Configuration for Prometheus service
service:
2021-01-12 17:17:27 +08:00
nodePort: 30901
2021-01-11 11:12:14 +08:00
type: NodePort
prometheusSpec:
replicas: 1
secrets:
- etcd-client-cert
storageSpec: {}
## Using PersistentVolumeClaim
##
# volumeClaimTemplate:
# spec:
# storageClassName: gluster
# accessModes: ["ReadWriteOnce"]
# resources:
# requests:
# storage: 50Gi
# selector: {}
## Using tmpfs volume
##
# emptyDir:
# medium: Memory