2 ## Global image registry to use if it needs to be overriden for some specific use cases (e.g local registries, custom images, ...)
7## Override the namespace
10# Override Kubernetes version if your distribution does not follow semver v2
11kubeVersionOverride: ""
12## set to true to add the release label so scraping of the servicemonitor with kube-prometheus-stack works out of the box
14podDisruptionBudget: {}
17## Allow automount the serviceaccount token for sidecar container (eg: oauthproxy)
18automountServiceAccountToken: false
19## Additional blackbox-exporter container environment variables
27# value: "http://superproxy.com:3128"
29## Additional blackbox-exporter container environment variables for secret or configMap
39# - name: secret-blackbox-oauth-htpasswd
42# secretName: blackbox-oauth-htpasswd
43# - name: storage-volume
44# persistentVolumeClaim:
47## Additional volumes that will be attached to the blackbox-exporter container
50# mountPath: /etc/ssl/certs/ca-certificates.crt
52## Additional InitContainers to initialize the pod
53## This supports either a structured array or a templatable string
54extraInitContainers: []
55## This supports either a structured array or a templatable string
61# - -https-address=:9116
62# - -upstream=http://localhost:9115
63# - -skip-auth-regex=^/metrics
64# - -openshift-delegate-urls={"/":{"group":"monitoring.coreos.com","resource":"prometheuses","verb":"get"}}
65# image: openshift/oauth-proxy:v1.1.0
67# - containerPort: 9116
76# - mountPath: /etc/prometheus/secrets/blackbox-tls
77# name: secret-blackbox-tls
79## Number of replicasets to retain ##
80## default value is 10, 0 will not retain any replicasets and make rollbacks impossible ##
81revisionHistoryLimit: 10
86# - -https-address=:9116
87# - -upstream=http://localhost:9115
88# - -skip-auth-regex=^/metrics
89# - -openshift-delegate-urls={"/":{"group":"monitoring.coreos.com","resource":"prometheuses","verb":"get"}}
90# image: {{ .Values.global.imageRegistry }}/openshift/oauth-proxy:v1.1.0
99 repository: chainguard-private/prometheus-blackbox-exporter
100 # Overrides the image tag whose default is {{ printf "v%s" .Chart.AppVersion }}
102 pullPolicy: IfNotPresent
103 digest: sha256:5dfac82736c04251d4683e81059ef68e1e1553d6eaeecdd49af82c48e12b7eb9
104 ## Optionally specify an array of imagePullSecrets.
105 ## Secrets must be manually created in the namespace.
106 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
109 # - myRegistrKeySecretName
110podSecurityContext: {}
113## User and Group to run blackbox-exporter container as
117 readOnlyRootFilesystem: true
119 allowPrivilegeEscalation: false
122# Add NET_RAW to enable ICMP
137## Topology spread constraints rely on node labels to identify the topology domain(s) that each Node is in.
138## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
139topologySpreadConstraints: []
141# topologyKey: failure-domain.beta.kubernetes.io/zone
142# whenUnsatisfiable: DoNotSchedule
145# app.kubernetes.io/instance: jiralert
147# if the configuration is managed as secret outside the chart, using SealedSecret for example,
148# provide the name of the secret here. If secretConfig is set to true, configExistingSecretName will be ignored
149# in favor of the config value.
150configExistingSecretName: ""
151# Store the configuration as a `Secret` instead of a `ConfigMap`, useful in case it contains sensitive data
159 valid_http_versions: ["HTTP/1.1", "HTTP/2.0"]
160 follow_redirects: true
161 preferred_ip_protocol: "ip4"
162# Set custom config path, other than default /config/blackbox.yaml. If let empty, path will be "/config/blackbox.yaml"
163# configPath: "/foo/bar"
164extraConfigmapMounts: []
165# - name: certs-configmap
166# mountPath: /etc/secrets/ssl/
167# subPath: certificates.crt # (optional)
168# configMap: certs-configmap
172## Additional secret mounts
173# Defines additional mounts with secrets. Secrets must be manually created in the namespace.
175# - name: secret-files
176# mountPath: /etc/secrets
177# secretName: blackbox-secret-files
195 ipFamilies: ["IPv6", "IPv4"]
196 ipFamilyPolicy: "PreferDualStack"
197# Only changes container port. Application port can be changed with extraArgs (--web.listen-address=:9115)
198# https://github.com/prometheus/blackbox_exporter/blob/998037b5b40c1de5fee348ffdea8820509d85171/main.go#L55
200# Number of port to expose on the host. If specified, this must be a valid port number, 0 < x < 65536. If zero, no port is exposed.
201# This is useful for communicating with Daemon Pods when kind is DaemonSet.
204 # Specifies whether a ServiceAccount should be created
206 # The name of the ServiceAccount to use.
207 # If not set and create is true, a name is generated using the fullname template
210## An Ingress resource can provide name-based virtual hosting and TLS
211## termination among other things for CouchDB deployments which are accessed
212## from outside the Kubernetes cluster.
213## ref: https://kubernetes.io/docs/concepts/services-networking/ingress/
219 # kubernetes.io/tls-acme: "true"
221 ## The host property on hosts and tls is passed through helm tpl function.
222 ## ref: https://helm.sh/docs/developing_charts/#using-the-tpl-function
223 - host: chart-example.local
226 pathType: ImplementationSpecific
228 # - secretName: chart-example-tls
230 # - chart-example.local
232# Annotations for the Deployment
233deploymentAnnotations: {}
234# Annotations for the Secret
236# Hostaliases allow to add additional DNS entries to be injected directly into pods.
237# This will take precedence over your implemented DNS solution
242# - another.example.net
247# - --history.limit=1000
251 ## If true, a ServiceMonitor CRD is created for a prometheus operator
252 ## https://github.com/coreos/prometheus-operator for blackbox-exporter itself
256 additionalMetricsRelabels: {}
257 additionalRelabeling: []
264 ## Port can be defined by assigning a value for the port key below
266 ## If true, a ServiceMonitor CRD is created for a prometheus operator
267 ## https://github.com/coreos/prometheus-operator for each target
270 # Default values that will be used for all ServiceMonitors created by `targets`
272 additionalMetricsRelabels: {}
273 additionalRelabeling: []
277 honorTimestamps: true
279 ## scheme: HTTP scheme to use for scraping. Can be used with `tlsConfig` for example if using istio mTLS.
281 ## path: HTTP path. Needs to be adjusted, if web.route-prefix is set
283 ## tlsConfig: TLS configuration to use when scraping the endpoint. For example if using istio mTLS.
284 ## Of type: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#tlsconfig
288# - name: example # Human readable URL that will appear in Prometheus / AlertManager
289# url: http://example.com/healthz # The URL that blackbox will scrape
290# hostname: example.com # HTTP probes can accept an additional `hostname` parameter that will set `Host` header and TLS SNI
291# labels: {} # Map of labels for ServiceMonitor. Overrides value set in `defaults`
292# interval: 60s # Scraping interval. Overrides value set in `defaults`
293# scrapeTimeout: 60s # Scrape timeout. Overrides value set in `defaults`
294# module: http_2xx # Module used for scraping. Overrides value set in `defaults`
295# additionalMetricsRelabels: {} # Map of metric labels and values to add
296# additionalRelabeling: [] # List of metric relabeling actions to run
298## Custom PrometheusRules to be defined
299## ref: https://github.com/coreos/prometheus-operator#customresourcedefinitions
306 ## If true, a PodMonitoring CR is created for google managed prometheus
307 ## https://cloud.google.com/stackdriver/docs/managed-prometheus/setup-managed#gmp-pod-monitoring for blackbox-exporter itself
311 additionalMetricsRelabels: {}
316 ## If true, a PodMonitoring CR is created for a google managed prometheus
317 ## https://cloud.google.com/stackdriver/docs/managed-prometheus/setup-managed#gmp-pod-monitoring for each target
320 ## Default values that will be used for all PodMonitoring created by `targets`
321 ## Following PodMonitoring API specs https://github.com/GoogleCloudPlatform/prometheus-engine/blob/main/doc/api.md#scrapeendpoint
323 additionalMetricsRelabels: {}
328 ## scheme: Protocol scheme to use to scrape.
330 ## path: HTTP path. Needs to be adjusted, if web.route-prefix is set
332 ## tlsConfig: TLS configuration to use when scraping the endpoint. For example if using istio mTLS.
333 ## Of type: https://github.com/coreos/prometheus-operator/blob/master/Documentation/api.md#tlsconfig
336# - name: example # Human readable URL that will appear in Google Managed Prometheus / AlertManager
337# url: http://example.com/healthz # The URL that blackbox will scrape
338# hostname: example.com # HTTP probes can accept an additional `hostname` parameter that will set `Host` header and TLS SNI
339# labels: {} # Map of labels for PodMonitoring. Overrides value set in `defaults`
340# interval: 60s # Scraping interval. Overrides value set in `defaults`
341# scrapeTimeout: 60s # Scrape timeout. Overrides value set in `defaults`
342# module: http_2xx # Module used for scraping. Overrides value set in `defaults`
343# additionalMetricsRelabels: {} # Map of metric labels and values to add
345## Network policy for chart
347 # Enable network policy and allow access from anywhere
349 # Limit access only from monitoring namespace
350 # Before setting this value to true, you must add the name=monitoring label to the monitoring namespace. Name can be rewritten by monitoringNamespaceName
351 # Network Policy uses label filtering
352 allowMonitoringNamespace: false
353 # Rewrite monitoring namespace in network policy (default value monitoring)
354 monitoringNamespaceName: "monitoring"
355## dnsPolicy and dnsConfig for Deployments and Daemonsets if you want non-default settings.
356## These will be passed directly to the PodSpec of same.
359# Extra manifests to deploy as an array
365# name: prometheus-extra
369# global common labels, applied to all ressources
371# Enable vertical pod autoscaler support for prometheus-blackbox-exporter
372verticalPodAutoscaler:
374 # Recommender responsible for generating recommendation for the object.
375 # List should be empty (then the default recommender will generate the recommendation)
376 # or contain exactly one recommender.
378 # - name: custom-recommender-performance
380 # List of resources that the vertical pod autoscaler can control. Defaults to cpu and memory
381 controlledResources: []
382 # Specifies which resource values should be controlled: RequestsOnly or RequestsAndLimits.
383 # controlledValues: RequestsAndLimits
385 # Define the max allowed resources for the pod
389 # Define the min allowed resources for the pod
395 # Specifies minimal number of replicas which need to be alive for VPA Updater to attempt pod eviction
397 # Specifies whether recommended updates are applied when a Pod is started and whether recommended updates
398 # are applied during the life of a Pod. Possible values are "Off", "Initial", "Recreate", and "Auto".
409 repository: chainguard-private/prometheus-config-reloader
411 pullPolicy: IfNotPresent
412 digest: sha256:eb239dcc1286fd751acd05884b68fff08c35ee95451eb7ba028e2bbacdd22530
416 readOnlyRootFilesystem: true
418 allowPrivilegeEscalation: false
441 additionalMetricsRelabels: {}
442 additionalRelabeling: []