19 KiB
19 KiB
kubezero-metrics
KubeZero Umbrella Chart for Prometheus, Grafana and Alertmanager as well as all Kubernetes integrations.
Homepage: https://kubezero.com
Maintainers
Name | Url | |
---|---|---|
Stefan Reimer | stefan@zero-downtime.net |
Requirements
Kubernetes: >= 1.26.0
Repository | Name | Version |
---|---|---|
https://cdn.zero-downtime.net/charts/ | kubezero-lib | >= 0.1.6 |
https://prometheus-community.github.io/helm-charts | kube-prometheus-stack | 61.3.2 |
https://prometheus-community.github.io/helm-charts | prometheus-adapter | 4.10.0 |
https://prometheus-community.github.io/helm-charts | prometheus-pushgateway | 2.14.0 |
Values
Key | Type | Default | Description |
---|---|---|---|
istio.alertmanager.destination | string | "metrics-kube-prometheus-st-alertmanager" |
|
istio.alertmanager.enabled | bool | false |
|
istio.alertmanager.gateway | string | "istio-ingress/ingressgateway" |
|
istio.alertmanager.ipBlocks | list | [] |
|
istio.alertmanager.port | int | 9093 |
|
istio.alertmanager.url | string | "" |
|
istio.grafana.destination | string | "metrics-grafana" |
|
istio.grafana.enabled | bool | false |
|
istio.grafana.gateway | string | "istio-ingress/ingressgateway" |
|
istio.grafana.ipBlocks | list | [] |
|
istio.grafana.port | int | 80 |
|
istio.grafana.url | string | "" |
|
istio.prometheus.destination | string | "metrics-kube-prometheus-st-prometheus" |
|
istio.prometheus.enabled | bool | false |
|
istio.prometheus.gateway | string | "istio-ingress/ingressgateway" |
|
istio.prometheus.ipBlocks | list | [] |
|
istio.prometheus.port | int | 9090 |
|
istio.prometheus.url | string | "" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].env[0].name | string | "SNS_FORWARDER_ARN_PREFIX" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].env[0].valueFrom.fieldRef.fieldPath | string | "metadata.annotations['kubezero.com/sns_forwarder_ARN_PREFIX']" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].env[1].name | string | "AWS_ROLE_ARN" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].env[1].valueFrom.fieldRef.fieldPath | string | "metadata.annotations['kubezero.com/sns_forwarder_AWS_ROLE_ARN']" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].env[2].name | string | "AWS_WEB_IDENTITY_TOKEN_FILE" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].env[2].value | string | "/var/run/secrets/sts.amazonaws.com/serviceaccount/token" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].env[3].name | string | "AWS_STS_REGIONAL_ENDPOINTS" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].env[3].value | string | "regional" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].image | string | "datareply/alertmanager-sns-forwarder:latest" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].imagePullPolicy | string | "Always" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].livenessProbe.httpGet.path | string | "/health" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].livenessProbe.httpGet.port | string | "webhook-port" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].livenessProbe.initialDelaySeconds | int | 30 |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].livenessProbe.timeoutSeconds | int | 10 |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].name | string | "alertmanager-sns-forwarder" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].ports[0].containerPort | int | 9087 |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].ports[0].name | string | "webhook-port" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].readinessProbe.httpGet.path | string | "/health" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].readinessProbe.httpGet.port | string | "webhook-port" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].readinessProbe.initialDelaySeconds | int | 10 |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].readinessProbe.timeoutSeconds | int | 10 |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].resources.limits.cpu | string | "100m" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].resources.limits.memory | string | "64Mi" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].resources.requests.cpu | string | "25m" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].resources.requests.memory | string | "32Mi" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].volumeMounts[0].mountPath | string | "/var/run/secrets/sts.amazonaws.com/serviceaccount/" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].volumeMounts[0].name | string | "aws-token" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.containers[0].volumeMounts[0].readOnly | bool | true |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.logFormat | string | "json" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.volumes[0].name | string | "aws-token" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.volumes[0].projected.sources[0].serviceAccountToken.audience | string | "sts.amazonaws.com" |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.volumes[0].projected.sources[0].serviceAccountToken.expirationSeconds | int | 86400 |
|
kube-prometheus-stack.alertmanager.alertmanagerSpec.volumes[0].projected.sources[0].serviceAccountToken.path | string | "token" |
|
kube-prometheus-stack.alertmanager.config.global.resolve_timeout | string | "5m" |
|
kube-prometheus-stack.alertmanager.config.inhibit_rules[0].equal[0] | string | "namespace" |
|
kube-prometheus-stack.alertmanager.config.inhibit_rules[0].equal[1] | string | "alertname" |
|
kube-prometheus-stack.alertmanager.config.inhibit_rules[0].source_matchers[0] | string | "severity = critical" |
|
kube-prometheus-stack.alertmanager.config.inhibit_rules[0].target_matchers[0] | string | `"severity =~ warning | info"` |
kube-prometheus-stack.alertmanager.config.inhibit_rules[1].equal[0] | string | "namespace" |
|
kube-prometheus-stack.alertmanager.config.inhibit_rules[1].equal[1] | string | "alertname" |
|
kube-prometheus-stack.alertmanager.config.inhibit_rules[1].source_matchers[0] | string | "severity = warning" |
|
kube-prometheus-stack.alertmanager.config.inhibit_rules[1].target_matchers[0] | string | "severity = info" |
|
kube-prometheus-stack.alertmanager.config.inhibit_rules[2].equal[0] | string | "namespace" |
|
kube-prometheus-stack.alertmanager.config.inhibit_rules[2].source_matchers[0] | string | "alertname = InfoInhibitor" |
|
kube-prometheus-stack.alertmanager.config.inhibit_rules[2].target_matchers[0] | string | "severity = info" |
|
kube-prometheus-stack.alertmanager.config.inhibit_rules[3].source_matchers[0] | string | "alertname = ClusterAutoscalerNodeGroupsEnabled" |
|
kube-prometheus-stack.alertmanager.config.inhibit_rules[3].target_matchers[0] | string | `"alertname =~ "KubeCPUOvercommit | KubeMemoryOvercommit""` |
kube-prometheus-stack.alertmanager.config.route.group_by[0] | string | "severity" |
|
kube-prometheus-stack.alertmanager.config.route.group_by[1] | string | "clusterName" |
|
kube-prometheus-stack.alertmanager.config.route.group_interval | string | "5m" |
|
kube-prometheus-stack.alertmanager.config.route.group_wait | string | "10s" |
|
kube-prometheus-stack.alertmanager.config.route.repeat_interval | string | "4h" |
|
kube-prometheus-stack.alertmanager.config.route.routes[0].matchers[0] | string | "severity = none" |
|
kube-prometheus-stack.alertmanager.config.route.routes[0].receiver | string | "null" |
|
kube-prometheus-stack.alertmanager.enabled | bool | false |
|
kube-prometheus-stack.coreDns.enabled | bool | true |
|
kube-prometheus-stack.defaultRules.create | bool | false |
|
kube-prometheus-stack.grafana."grafana.ini"."auth.anonymous".enabled | bool | true |
|
kube-prometheus-stack.grafana."grafana.ini"."log.console".format | string | "json" |
|
kube-prometheus-stack.grafana."grafana.ini".alerting.enabled | bool | false |
|
kube-prometheus-stack.grafana."grafana.ini".analytics.check_for_plugin_updates | bool | false |
|
kube-prometheus-stack.grafana."grafana.ini".analytics.check_for_updates | bool | false |
|
kube-prometheus-stack.grafana."grafana.ini".dashboards.default_home_dashboard_path | string | "/tmp/dashboards/KubeZero/home.json" |
|
kube-prometheus-stack.grafana."grafana.ini".dashboards.min_refresh_interval | string | "30s" |
|
kube-prometheus-stack.grafana."grafana.ini".date_formats.default_timezone | string | "UTC" |
|
kube-prometheus-stack.grafana."grafana.ini".security.cookie_secure | bool | true |
|
kube-prometheus-stack.grafana."grafana.ini".security.disable_gravatar | bool | true |
|
kube-prometheus-stack.grafana."grafana.ini".security.strict_transport_security | bool | true |
|
kube-prometheus-stack.grafana."grafana.ini".server.enable_gzip | bool | true |
|
kube-prometheus-stack.grafana.defaultDashboardsEnabled | bool | false |
|
kube-prometheus-stack.grafana.enabled | bool | true |
|
kube-prometheus-stack.grafana.extraContainerVolumes[0].configMap.defaultMode | int | 511 |
|
kube-prometheus-stack.grafana.extraContainerVolumes[0].configMap.name | string | "script-configmap" |
|
kube-prometheus-stack.grafana.extraContainerVolumes[0].name | string | "script-volume" |
|
kube-prometheus-stack.grafana.initChownData.enabled | bool | false |
|
kube-prometheus-stack.grafana.plugins[0] | string | "grafana-piechart-panel" |
|
kube-prometheus-stack.grafana.service.portName | string | "http-grafana" |
|
kube-prometheus-stack.grafana.sidecar.dashboards.extraMounts[0].mountPath | string | "/opt/script.sh" |
|
kube-prometheus-stack.grafana.sidecar.dashboards.extraMounts[0].name | string | "script-volume" |
|
kube-prometheus-stack.grafana.sidecar.dashboards.extraMounts[0].subPath | string | "script.sh" |
|
kube-prometheus-stack.grafana.sidecar.dashboards.provider.foldersFromFilesStructure | bool | true |
|
kube-prometheus-stack.grafana.sidecar.dashboards.script | string | "/opt/script.sh" |
|
kube-prometheus-stack.grafana.sidecar.dashboards.searchNamespace | string | "ALL" |
|
kube-prometheus-stack.grafana.testFramework.enabled | bool | false |
|
kube-prometheus-stack.kube-state-metrics.nodeSelector."node-role.kubernetes.io/control-plane" | string | "" |
|
kube-prometheus-stack.kube-state-metrics.tolerations[0].effect | string | "NoSchedule" |
|
kube-prometheus-stack.kube-state-metrics.tolerations[0].key | string | "node-role.kubernetes.io/control-plane" |
|
kube-prometheus-stack.kubeApiServer.enabled | bool | true |
|
kube-prometheus-stack.kubeControllerManager.enabled | bool | true |
|
kube-prometheus-stack.kubeControllerManager.service.port | int | 10257 |
|
kube-prometheus-stack.kubeControllerManager.service.targetPort | int | 10257 |
|
kube-prometheus-stack.kubeControllerManager.serviceMonitor.https | bool | true |
|
kube-prometheus-stack.kubeControllerManager.serviceMonitor.insecureSkipVerify | bool | true |
|
kube-prometheus-stack.kubeDns.enabled | bool | false |
|
kube-prometheus-stack.kubeEtcd.enabled | bool | true |
|
kube-prometheus-stack.kubeEtcd.service.port | int | 2381 |
|
kube-prometheus-stack.kubeEtcd.service.targetPort | int | 2381 |
|
kube-prometheus-stack.kubeProxy.enabled | bool | true |
|
kube-prometheus-stack.kubeScheduler.enabled | bool | true |
|
kube-prometheus-stack.kubeScheduler.service.port | int | 10259 |
|
kube-prometheus-stack.kubeScheduler.service.targetPort | int | 10259 |
|
kube-prometheus-stack.kubeScheduler.serviceMonitor.https | bool | true |
|
kube-prometheus-stack.kubeScheduler.serviceMonitor.insecureSkipVerify | bool | true |
|
kube-prometheus-stack.kubeStateMetrics.enabled | bool | true |
|
kube-prometheus-stack.kubelet.enabled | bool | true |
|
kube-prometheus-stack.kubelet.serviceMonitor.cAdvisor | bool | true |
|
kube-prometheus-stack.nodeExporter.enabled | bool | true |
|
kube-prometheus-stack.prometheus-node-exporter.hostRootFsMount.enabled | bool | false |
|
kube-prometheus-stack.prometheus-node-exporter.prometheus.monitor.relabelings[0].action | string | "replace" |
|
kube-prometheus-stack.prometheus-node-exporter.prometheus.monitor.relabelings[0].regex | string | "^(.*)$" |
|
kube-prometheus-stack.prometheus-node-exporter.prometheus.monitor.relabelings[0].replacement | string | "$1" |
|
kube-prometheus-stack.prometheus-node-exporter.prometheus.monitor.relabelings[0].separator | string | ";" |
|
kube-prometheus-stack.prometheus-node-exporter.prometheus.monitor.relabelings[0].sourceLabels[0] | string | "__meta_kubernetes_pod_node_name" |
|
kube-prometheus-stack.prometheus-node-exporter.prometheus.monitor.relabelings[0].targetLabel | string | "instance" |
|
kube-prometheus-stack.prometheus-node-exporter.resources.requests.cpu | string | "20m" |
|
kube-prometheus-stack.prometheus-node-exporter.resources.requests.memory | string | "16Mi" |
|
kube-prometheus-stack.prometheus.enabled | bool | true |
|
kube-prometheus-stack.prometheus.prometheusSpec.logFormat | string | "json" |
|
kube-prometheus-stack.prometheus.prometheusSpec.podMonitorSelectorNilUsesHelmValues | bool | false |
|
kube-prometheus-stack.prometheus.prometheusSpec.portName | string | "http-prometheus" |
|
kube-prometheus-stack.prometheus.prometheusSpec.resources.limits.memory | string | "4Gi" |
|
kube-prometheus-stack.prometheus.prometheusSpec.resources.requests.cpu | string | "500m" |
|
kube-prometheus-stack.prometheus.prometheusSpec.resources.requests.memory | string | "2Gi" |
|
kube-prometheus-stack.prometheus.prometheusSpec.retention | string | "8d" |
|
kube-prometheus-stack.prometheus.prometheusSpec.ruleSelectorNilUsesHelmValues | bool | false |
|
kube-prometheus-stack.prometheus.prometheusSpec.serviceMonitorSelectorNilUsesHelmValues | bool | false |
|
kube-prometheus-stack.prometheus.prometheusSpec.storageSpec.volumeClaimTemplate.spec.accessModes[0] | string | "ReadWriteOnce" |
|
kube-prometheus-stack.prometheus.prometheusSpec.storageSpec.volumeClaimTemplate.spec.resources.requests.storage | string | "16Gi" |
|
kube-prometheus-stack.prometheusOperator.admissionWebhooks.patch.nodeSelector."node-role.kubernetes.io/control-plane" | string | "" |
|
kube-prometheus-stack.prometheusOperator.admissionWebhooks.patch.tolerations[0].effect | string | "NoSchedule" |
|
kube-prometheus-stack.prometheusOperator.admissionWebhooks.patch.tolerations[0].key | string | "node-role.kubernetes.io/control-plane" |
|
kube-prometheus-stack.prometheusOperator.enabled | bool | true |
|
kube-prometheus-stack.prometheusOperator.logFormat | string | "json" |
|
kube-prometheus-stack.prometheusOperator.nodeSelector."node-role.kubernetes.io/control-plane" | string | "" |
|
kube-prometheus-stack.prometheusOperator.resources.limits.memory | string | "128Mi" |
|
kube-prometheus-stack.prometheusOperator.resources.requests.cpu | string | "10m" |
|
kube-prometheus-stack.prometheusOperator.resources.requests.memory | string | "64Mi" |
|
kube-prometheus-stack.prometheusOperator.tolerations[0].effect | string | "NoSchedule" |
|
kube-prometheus-stack.prometheusOperator.tolerations[0].key | string | "node-role.kubernetes.io/control-plane" |
|
prometheus-adapter.enabled | bool | true |
|
prometheus-adapter.logLevel | int | 1 |
|
prometheus-adapter.metricsRelistInterval | string | "3m" |
|
prometheus-adapter.nodeSelector."node-role.kubernetes.io/control-plane" | string | "" |
|
prometheus-adapter.prometheus.url | string | "http://metrics-kube-prometheus-st-prometheus" |
|
prometheus-adapter.rules.default | bool | false |
|
prometheus-adapter.rules.resource.cpu.containerLabel | string | "container" |
|
prometheus-adapter.rules.resource.cpu.containerQuery | string | "sum by (<<.GroupBy>>) (\n irate (\n container_cpu_usage_seconds_total{<<.LabelMatchers>>,container!=\"\",pod!=\"\"}[120s]\n )\n)\n" |
|
prometheus-adapter.rules.resource.cpu.nodeQuery | string | "sum(1 - irate(node_cpu_seconds_total{<<.LabelMatchers>>, mode=\"idle\"}[120s])) by (<<.GroupBy>>)\n" |
|
prometheus-adapter.rules.resource.cpu.resources.overrides.instance.resource | string | "node" |
|
prometheus-adapter.rules.resource.cpu.resources.overrides.namespace.resource | string | "namespace" |
|
prometheus-adapter.rules.resource.cpu.resources.overrides.pod.resource | string | "pod" |
|
prometheus-adapter.rules.resource.memory.containerLabel | string | "container" |
|
prometheus-adapter.rules.resource.memory.containerQuery | string | "sum by (<<.GroupBy>>) (\n container_memory_working_set_bytes{<<.LabelMatchers>>,container!=\"\",pod!=\"\",container!=\"POD\"}\n)\n" |
|
prometheus-adapter.rules.resource.memory.nodeQuery | string | "sum(node_memory_MemTotal_bytes{<<.LabelMatchers>>} - node_memory_MemAvailable_bytes{<<.LabelMatchers>>}) by (<<.GroupBy>>)\n" |
|
prometheus-adapter.rules.resource.memory.resources.overrides.instance.resource | string | "node" |
|
prometheus-adapter.rules.resource.memory.resources.overrides.namespace.resource | string | "namespace" |
|
prometheus-adapter.rules.resource.memory.resources.overrides.pod.resource | string | "pod" |
|
prometheus-adapter.rules.resource.window | string | "2m" |
|
prometheus-adapter.tolerations[0].effect | string | "NoSchedule" |
|
prometheus-adapter.tolerations[0].key | string | "node-role.kubernetes.io/control-plane" |
|
prometheus-pushgateway.enabled | bool | false |
|
prometheus-pushgateway.serviceMonitor.enabled | bool | true |