1# yaml-language-server: $schema=values.schema.json
2# Default values for prometheus.
3# This is a YAML-formatted file.
4# Declare variables to be passed into your templates.
9# - name: "image-pull-secret"
11## Define serviceAccount names for components. Defaults to component's fully qualified name.
18 ## Opt out of automounting Kubernetes API credentials.
19 ## It will be overriden by server.automountServiceAccountToken value, if set.
20 # automountServiceAccountToken: false
21## Additional labels to attach to all resources
23## Monitors ConfigMap changes and POSTs to a URL
24## Ref: https://github.com/prometheus-operator/prometheus-operator/tree/main/cmd/prometheus-config-reloader
27 ## URL for configmap-reload to use for reloads
30 ## env sets environment variables to pass to the container. Can be set as name/value pairs,
31 ## read from secrets or configmaps.
43 ## If false, the configmap-reload container will not be deployed
46 ## configmap-reload container name
48 name: configmap-reload
49 ## configmap-reload container image
52 repository: cgr.dev/chainguard-private/prometheus-config-reloader
54 # When digest is set to a non-empty value, images will be pulled by digest (regardless of tag value).
55 digest: sha256:eb239dcc1286fd751acd05884b68fff08c35ee95451eb7ba028e2bbacdd22530
56 pullPolicy: IfNotPresent
57 ## config-reloader's container port and port name for probes and metrics
59 containerPortName: metrics
60 ## Additional configmap-reload container arguments
61 ## Set to null for argumentless flags
64 ## Additional configmap-reload volume directories
67 ## Additional configmap-reload volume mounts
70 ## Additional configmap-reload mounts
72 extraConfigmapMounts: []
73 # - name: prometheus-alerts
74 # mountPath: /etc/alerts.d
76 # configMap: prometheus-alerts
79 ## Security context to be added to configmap-reload container
80 containerSecurityContext: {}
81 ## Settings for Prometheus reloader's readiness, liveness and startup probes
82 ## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/
90 initialDelaySeconds: 2
104 ## configmap-reload resource requests and limits
105 ## Ref: http://kubernetes.io/docs/user-guide/compute-resources/
109 ## Prometheus server container name
112 ## Opt out of automounting Kubernetes API credentials.
113 ## If set it will override serviceAccounts.server.automountServiceAccountToken value for ServiceAccount.
114 # automountServiceAccountToken: false
116 ## If set it will override prometheus.server.fullname value for ClusterRole and ClusterRoleBinding
118 clusterRoleNameOverride: ""
119 ## Name of an existing cluster role to use in a role binding in namespaces set in
120 ## namespaces and releaseNamespace for namespaced discovery.
122 useExistingClusterRoleName: ""
123 ## releaseNamespace to enable only the release namespace for service discovery.
124 ## By default all namespaces are included in service discovery.
125 ## If releaseNamespace and namespaces are both set, a merged list will be created.
126 ## Note that kubernetes_sd_configs.namespaces in scrape configs must be specified
127 ## if namespaced service discovery is desired. Setting useExistingClusterRoleName is required.
129 releaseNamespace: false
130 ## namespaces to include in service discovery instead of clusterwide discovery. Needed if you want to run
131 ## Prometheus without cluster-admin privileges (namespaced configuration). See also releaseNamespace.
132 ## Setting useExistingClusterRoleName is required.
137 # sidecarContainers - add more containers to prometheus server
138 # Key/Value where Key is the sidecar `- name: <Key>`
143 # OR for adding OAuth authentication to Prometheus
146 # image: quay.io/oauth2-proxy/oauth2-proxy
148 # - --upstream=http://127.0.0.1:9090
149 # - --http-address=0.0.0.0:8081
152 # - containerPort: 8081
156 sidecarContainers: {}
157 # sidecarTemplateValues - context to be used in template for sidecarContainers
159 # sidecarTemplateValues: *your-custom-globals
162 # {{ include "webserver-container-template" . }}
163 # Template for `webserver-container-template` might looks like this:
164 # image: "{{ .Values.server.sidecarTemplateValues.repository }}:{{ .Values.server.sidecarTemplateValues.tag }}"
167 sidecarTemplateValues: {}
168 ## Prometheus server container image
171 repository: cgr.dev/chainguard-private/prometheus
172 # If not set appVersion field from Chart.yaml is used. Supports templating.
174 # When digest is set to a non-empty value, images will be pulled by digest (regardless of tag value).
175 digest: sha256:81fd441d0ba09d8c83dd0b3b0f8a3bc8773412fed8f9586295b04365a73eb2e5
176 # Use the distroless image variant.
178 pullPolicy: IfNotPresent
179 ## Prometheus server command
182 ## prometheus server priorityClassName
184 priorityClassName: ""
185 ## prometheus server runtimeClassName
188 ## EnableServiceLinks indicates whether information about services should be injected
189 ## into pod's environment variables, matching the syntax of Docker links.
190 ## WARNING: the field is unsupported and will be skipped in K8s prior to v1.13.0.
192 enableServiceLinks: true
193 ## The URL prefix at which the container can be accessed. Useful in the case the '-web.external-url' includes a slug
194 ## so that the various internal URLs are still able to access as they are in the default case.
197 ## External URL which can access prometheus
198 ## Maybe same with Ingress host name
200 ## Additional server container environment variables
202 ## You specify this manually like you would a raw deployment manifest.
203 ## This means you can bind in environment variables from secrets.
205 ## e.g. static environment variable:
206 ## - name: DEMO_GREETING
207 ## value: "Hello from the environment"
209 ## e.g. secret environment variable:
216 # List of flags to override default parameters, e.g:
217 # - --enable-feature=agent
218 # - --storage.agent.retention.max-time=30m
219 # - --config.file=/etc/config/prometheus.yml
220 defaultFlagsOverride: []
222 - web.enable-lifecycle
223 ## web.enable-admin-api flag controls access to the administrative HTTP API which includes functionality such as
224 ## deleting time series. This is disabled by default.
225 # - web.enable-admin-api
227 ## storage.tsdb.no-lockfile flag controls BD locking
228 # - storage.tsdb.no-lockfile
230 ## storage.tsdb.wal-compression flag enables compression of the write-ahead log (WAL)
231 # - storage.tsdb.wal-compression
232 ## Path to a configuration file on prometheus server container FS
233 configPath: /etc/config/prometheus.yml
234 ### The data directory used by prometheus to set --storage.tsdb.path
235 ### When empty server.persistentVolume.mountPath is used instead
238 ## How frequently to scrape targets by default
241 ## How long until a scrape request times out
244 ## How frequently to evaluate rules
246 evaluation_interval: 1m
247 ## https://prometheus.io/docs/prometheus/latest/configuration/configuration/#remote_write
250 ## https://prometheus.io/docs/prometheus/latest/configuration/configuration/#remote_read
253 ## https://prometheus.io/docs/prometheus/latest/configuration/configuration/#tsdb
256 # out_of_order_time_window: 0s
258 ## https://prometheus.io/docs/guides/opentelemetry
261 # promote_resource_attributes: []
262 # keep_identifying_resource_attributes: false
263 # translation_strategy: NoUTF8EscapingWithSuffixes
265 ## https://prometheus.io/docs/prometheus/latest/configuration/configuration/#exemplars
266 ## Must be enabled via --enable-feature=exemplar-storage
269 # max_exemplars: 100000
271 ## Custom HTTP headers for Liveness/Readiness/Startup Probe
273 ## Useful for providing HTTP Basic Auth to healthchecks
275 # - name: "Authorization"
276 # value: "Bearer ABCDEabcde12345"
278 ## Additional Prometheus server container arguments
279 ## Set to null for argumentless flags
282 # web.enable-remote-write-receiver: null
284 ## Additional InitContainers to initialize the pod
286 extraInitContainers: []
287 ## Additional Prometheus server Volume mounts
289 extraVolumeMounts: []
290 ## Additional Prometheus server Volumes
293 ## Additional Prometheus server hostPath mounts
295 extraHostPathMounts: []
297 # mountPath: /etc/kubernetes/certs
299 # hostPath: /etc/kubernetes/certs
302 extraConfigmapMounts: []
303 # - name: certs-configmap
304 # mountPath: /prometheus
306 # configMap: certs-configmap
309 ## Additional Prometheus server Secret mounts
310 # Defines additional mounts with secrets. Secrets must be manually created in the namespace.
311 extraSecretMounts: []
312 # - name: secret-files
313 # mountPath: /etc/secrets
315 # secretName: prom-secret-files
318 ## Prometheus server configuration from a secret
319 ## Do not set both `configMapOverrideName` and `configFromSecret` simultaneously.
320 ## Use either `configMapOverrideName` or `configFromSecret`.
321 ## If `configFromSecret` is defined, a ConfigMap resource will NOT be generated.
323 ## ConfigMap override where fullname is {{.Release.Name}}-{{.Values.server.configMapOverrideName}}
324 ## Defining configMapOverrideName will cause templates/server-configmap.yaml
325 ## to NOT generate a ConfigMap resource
327 configMapOverrideName: ""
328 ## Extra labels for Prometheus server ConfigMap (ConfigMap that holds serverFiles)
329 extraConfigmapLabels: {}
330 ## Override the prometheus.server.fullname for all objects related to the Prometheus server
333 ## If true, Prometheus server Ingress will be created
337 ## Prometheus server Ingress annotations
340 # kubernetes.io/ingress.class: nginx
341 # kubernetes.io/tls-acme: 'true'
343 ## Prometheus server Ingress additional labels
346 ## Redirect ingress to an additional defined port on the service
349 ## Prometheus server Ingress hostnames with optional path (passed through tpl)
350 ## Must be provided if Ingress is enabled
353 # - prometheus.domain.com
354 # - domain.com/prometheus
357 # pathType determines the interpretation of the path matching
359 ## Extra paths to prepend to every host configuration. This is useful when working with annotation based services. (passed through tpl)
363 # serviceName: ssl-redirect
364 # servicePort: use-annotation
366 ## Prometheus server Ingress TLS configuration (hosts passed through tpl)
367 ## Secrets must be manually created in the namespace
370 # - secretName: prometheus-server-tls
372 # - prometheus.domain.com
373 ## route (map) allows configuration of HTTPRoute resources
374 ## Requires Gateway API resources and suitable controller installed within the cluster
375 ## Ref. https://gateway-api.sigs.k8s.io/guides/http-routing/
380 ## ApiVersion set by default to "gateway.networking.k8s.io/v1"
382 ## kind set by default to HTTPRoute
384 ## Annotations to attach to the HTTPRoute resource
386 ## Labels to attach to the HTTPRoute resource
388 ## ParentRefs refers to resources this HTTPRoute is to be attached to (Gateways)
393 ## Hostnames (templated) defines a set of hostnames that should match against the HTTP Host
394 ## header to select a HTTPRoute used to process the request
398 ## additionalRules (templated) allows adding custom rules to the route
400 ## Filters define the filters that are applied to requests that match
403 ## Matches define conditions used for matching the rule against incoming
409 ## httpsRedirect adds a filter for redirecting to https (HTTP 301 Moved Permanently).
410 ## To redirect HTTP traffic to HTTPS, you need to have a Gateway with both HTTP and HTTPS listeners.
411 ## Matches and filters do not take effect if enabled.
412 ## Ref. https://gateway-api.sigs.k8s.io/guides/http-redirect-rewrite/
414 ## Server Deployment Strategy type
417 ## hostAliases allows adding entries to /etc/hosts inside the containers
423 ## Node tolerations for server scheduling to nodes with taints
424 ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/
428 # operator: "Equal|Exists"
430 # effect: "NoSchedule|PreferNoSchedule|NoExecute(1.6 only)"
432 ## Node labels for Prometheus server pod assignment
433 ## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
439 ## Pod anti-affinity can prevent the scheduler from placing Prometheus server replicas on the same node.
440 ## The value "soft" means that the scheduler should *prefer* to not schedule two replica pods onto the same node but no guarantee is provided.
441 ## The value "hard" means that the scheduler is *required* to not schedule two replica pods onto the same node.
442 ## The default value "" will disable pod anti-affinity so that no anti-affinity rules will be configured (unless set in `server.affinity`).
445 ## If anti-affinity is enabled sets the topologyKey to use for anti-affinity.
446 ## This can be changed to, for example, failure-domain.beta.kubernetes.io/zone
448 podAntiAffinityTopologyKey: kubernetes.io/hostname
449 ## Pod topology spread constraints
450 ## ref. https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/
451 topologySpreadConstraints: []
452 ## PodDisruptionBudget settings
453 ## ref: https://kubernetes.io/docs/concepts/workloads/pods/disruptions/
459 ## unhealthyPodEvictionPolicy is available since 1.27.0 (beta)
460 ## https://kubernetes.io/docs/tasks/run-application/configure-pdb/#unhealthy-pod-eviction-policy
461 # unhealthyPodEvictionPolicy: IfHealthyBudget
462 ## Use an alternate scheduler, e.g. "stork".
463 ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
467 ## If true, Prometheus server will create/use a Persistent Volume Claim
468 ## If false, use emptyDir
471 ## If set it will override the name of the created persistent volume claim
472 ## generated by the stateful set.
474 statefulSetNameOverride: ""
475 ## Prometheus server data Persistent Volume access modes
476 ## Must match those of existing PV or dynamic provisioner
477 ## Ref: http://kubernetes.io/docs/user-guide/persistent-volumes/
481 ## Prometheus server data Persistent Volume labels
484 ## Prometheus server data Persistent Volume annotations
487 ## Prometheus server data Persistent Volume existing claim name
488 ## Requires server.persistentVolume.enabled: true
489 ## If defined, PVC must be created manually before volume will be bound
491 ## Prometheus server data Persistent Volume mount root path
494 ## Prometheus server data Persistent Volume size
497 ## Prometheus server data Persistent Volume Storage Class
498 ## If defined, storageClassName: <storageClass>
499 ## If set to "-", storageClassName: "", which disables dynamic provisioning
500 ## If undefined (the default) or set to null, no storageClassName spec is
501 ## set, choosing the default provisioner. (gp2 on AWS, standard on
502 ## GKE, AWS & OpenStack)
506 ## Subdirectory of Prometheus server data Persistent Volume to mount
507 ## Useful if the volume's root directory is not empty
510 ## Persistent Volume Claim Selector
511 ## Useful if Persistent Volumes have been provisioned in advance
512 ## Ref: https://kubernetes.io/docs/concepts/storage/persistent-volumes/#selector
518 # - { key: environment, operator: In, values: [ dev ] }
520 ## Persistent Volume Name
521 ## Useful if Persistent Volumes have been provisioned in advance and you want to use a specific one
525 ## Prometheus server emptyDir volume
526 ## Configure size limit and medium
530 ## Annotations to be added to Prometheus server pods
533 # iam.amazonaws.com/role: prometheus
535 ## Labels to be added to Prometheus server pods
538 ## Prometheus AlertManager configuration
541 ## Use a StatefulSet if replicaCount needs to be greater than 1 (see below)
544 ## Number of old history to retain to allow rollback
545 ## Default Kubernetes value is set to 10
547 revisionHistoryLimit: 10
548 ## Annotations to be added to ConfigMap
550 configMapAnnotations: {}
551 ## Annotations to be added to deployment
553 deploymentAnnotations: {}
555 ## If true, use a statefulset instead of a deployment for pod management.
556 ## This allows to scale replicas to more than 1 pod
561 podManagementPolicy: OrderedReady
562 ## Alertmanager headless service to use for the statefulset
568 ## Enable gRPC port on service to allow auto discovery with thanos-querier
573 ## Statefulset's persistent volume claim retention policy
574 ## pvcDeleteOnStsDelete and pvcDeleteOnStsScale determine whether
575 ## statefulset's PVCs are deleted (true) or retained (false) on scaling down
576 ## and deleting statefulset, respectively. Requires 1.27.0+.
577 ## Ref: https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#persistentvolumeclaim-retention
579 pvcDeleteOnStsDelete: false
580 pvcDeleteOnStsScale: false
582 ## If true, use a daemonset instead of a deployment for pod management.
583 ## This allows to run prometheus agent on every node in the cluster.
588 ## Prometheus server readiness and liveness probe initial delay and timeout
589 ## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/
591 tcpSocketProbeEnabled: false
593 readinessProbeInitialDelay: 30
594 readinessProbePeriodSeconds: 5
595 readinessProbeTimeout: 4
596 readinessProbeFailureThreshold: 3
597 readinessProbeSuccessThreshold: 1
598 livenessProbeInitialDelay: 30
599 livenessProbePeriodSeconds: 15
600 livenessProbeTimeout: 10
601 livenessProbeFailureThreshold: 3
602 livenessProbeSuccessThreshold: 1
608 ## Prometheus server resource requests and limits
609 ## Ref: http://kubernetes.io/docs/user-guide/compute-resources/
619 # Required for use in managed kubernetes clusters (such as AWS EKS) with custom CNI (such as calico),
620 # because control-plane managed by AWS cannot communicate with pods' IP CIDR and admission webhooks are not working
623 # When hostNetwork is enabled, this will set to ClusterFirstWithHostNet automatically
624 dnsPolicy: ClusterFirst
630 ## Vertical Pod Autoscaler config
631 ## Ref: https://github.com/kubernetes/autoscaler/tree/master/vertical-pod-autoscaler
633 ## If true a VPA object will be created for the controller (either StatefulSet or Deployemnt, based on above configs)
637 # - containerName: 'prometheus-server'
638 # Custom DNS configuration to be added to prometheus server pods
643 # - ns1.svc.cluster-domain.example
644 # - my.dns.search.suffix
650 ## Security context to be added to server pods
657 ## Security context to be added to server container
659 containerSecurityContext: {}
661 ## If false, no Service will be created for the Prometheus server
667 ## List of IP addresses at which the Prometheus server service is available
668 ## Ref: https://kubernetes.io/docs/concepts/services-networking/service/#external-ips
672 loadBalancerSourceRanges: []
673 loadBalancerClass: ""
675 sessionAffinity: None
677 ## externalTrafficPolicy is applicable to service with externally-facing addresses (NodePorts, ExternalIPs, and LoadBalancer IPs)
678 externalTrafficPolicy: ""
679 ## Enable gRPC port on service to allow auto discovery with thanos-querier
684 ## If using a statefulSet (statefulSet.enabled=true), configure the
685 ## service to connect to a specific replica to have a consistent view
690 ## Additional port to define in the Service
693 # - name: authenticated
696 ## Prometheus server pod termination grace period
698 terminationGracePeriodSeconds: 300
699 ## Prometheus data retention period (default if not specified is 15 days)
702 ## Prometheus' data retention size. Supported units: B, KB, MB, GB, TB, PB, EB.
705## scrapeConfigs (map) defines Prometheus' default scrape_configs.
706## Each can be disabled by setting "enabled" to "false" or leaving it empty. The key sets the default "job_name".
707## Further scrapeConfigs can be added as new keys, these are then enabled by default.
708## ref. https://prometheus.io/docs/prometheus/latest/configuration/configuration/#scrape_config
716 kubernetes-api-servers:
719 kubernetes_sd_configs:
723 ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
724 bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
727 - __meta_kubernetes_namespace
728 - __meta_kubernetes_service_name
729 - __meta_kubernetes_endpoint_port_name
731 regex: default;kubernetes;https
737 ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
738 insecure_skip_verify: true
739 bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
740 kubernetes_sd_configs:
744 regex: __meta_kubernetes_node_label_(.+)
745 kubernetes-nodes-cadvisor:
750 ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
751 insecure_skip_verify: true
752 bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
753 metrics_path: /metrics/cadvisor
754 kubernetes_sd_configs:
758 regex: __meta_kubernetes_node_label_(.+)
759 - source_labels: [__metrics_path__]
760 target_label: metrics_path
761 kubernetes-service-endpoints:
765 kubernetes_sd_configs:
768 - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scrape]
771 - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scrape_slow]
774 - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scheme]
776 target_label: __scheme__
778 - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_path]
780 target_label: __metrics_path__
784 - __meta_kubernetes_service_annotation_prometheus_io_port
786 target_label: __address__
787 regex: (.+?)(?::\d+)?;(\d+)
790 regex: __meta_kubernetes_service_annotation_prometheus_io_param_(.+)
791 replacement: __param_$1
793 regex: __meta_kubernetes_service_label_(.+)
794 - source_labels: [__meta_kubernetes_namespace]
796 target_label: namespace
797 - source_labels: [__meta_kubernetes_service_name]
799 target_label: service
800 - source_labels: [__meta_kubernetes_pod_node_name]
803 kubernetes-service-endpoints-slow:
809 kubernetes_sd_configs:
812 - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scrape_slow]
815 - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scheme]
817 target_label: __scheme__
819 - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_path]
821 target_label: __metrics_path__
825 - __meta_kubernetes_service_annotation_prometheus_io_port
827 target_label: __address__
828 regex: (.+?)(?::\d+)?;(\d+)
831 regex: __meta_kubernetes_service_annotation_prometheus_io_param_(.+)
832 replacement: __param_$1
834 regex: __meta_kubernetes_service_label_(.+)
835 - source_labels: [__meta_kubernetes_namespace]
837 target_label: namespace
838 - source_labels: [__meta_kubernetes_service_name]
840 target_label: service
841 - source_labels: [__meta_kubernetes_pod_node_name]
844 prometheus-pushgateway:
848 kubernetes_sd_configs:
851 - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_probe]
861 kubernetes_sd_configs:
864 - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_probe]
867 - source_labels: [__address__]
868 target_label: __param_target
869 - target_label: __address__
870 replacement: blackbox
871 - source_labels: [__param_target]
872 target_label: instance
874 regex: __meta_kubernetes_service_label_(.+)
875 - source_labels: [__meta_kubernetes_namespace]
876 target_label: namespace
877 - source_labels: [__meta_kubernetes_service_name]
878 target_label: service
883 kubernetes_sd_configs:
886 - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape]
889 - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape_slow]
892 - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scheme]
895 target_label: __scheme__
896 - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path]
898 target_label: __metrics_path__
901 - __meta_kubernetes_pod_annotation_prometheus_io_port
902 - __meta_kubernetes_pod_ip
904 regex: (\d+);(([A-Fa-f0-9]{1,4}::?){1,7}[A-Fa-f0-9]{1,4})
905 replacement: '[$2]:$1'
906 target_label: __address__
908 - __meta_kubernetes_pod_annotation_prometheus_io_port
909 - __meta_kubernetes_pod_ip
911 regex: (\d+);((([0-9]+?)(\.|$)){4})
913 target_label: __address__
915 regex: __meta_kubernetes_pod_annotation_prometheus_io_param_(.+)
916 replacement: __param_$1
918 regex: __meta_kubernetes_pod_label_(.+)
919 - source_labels: [__meta_kubernetes_namespace]
921 target_label: namespace
922 - source_labels: [__meta_kubernetes_pod_name]
925 - source_labels: [__meta_kubernetes_pod_phase]
926 regex: Pending|Succeeded|Failed|Completed
928 - source_labels: [__meta_kubernetes_pod_node_name]
931 kubernetes-pods-slow:
937 kubernetes_sd_configs:
940 - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape_slow]
943 - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scheme]
946 target_label: __scheme__
947 - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path]
949 target_label: __metrics_path__
952 - __meta_kubernetes_pod_annotation_prometheus_io_port
953 - __meta_kubernetes_pod_ip
955 regex: (\d+);(([A-Fa-f0-9]{1,4}::?){1,7}[A-Fa-f0-9]{1,4})
956 replacement: '[$2]:$1'
957 target_label: __address__
959 - __meta_kubernetes_pod_annotation_prometheus_io_port
960 - __meta_kubernetes_pod_ip
962 regex: (\d+);((([0-9]+?)(\.|$)){4})
964 target_label: __address__
966 regex: __meta_kubernetes_pod_annotation_prometheus_io_param_(.+)
967 replacement: __param_$1
969 regex: __meta_kubernetes_pod_label_(.+)
970 - source_labels: [__meta_kubernetes_namespace]
972 target_label: namespace
973 - source_labels: [__meta_kubernetes_pod_name]
976 - source_labels: [__meta_kubernetes_pod_phase]
977 regex: Pending|Succeeded|Failed|Completed
979 - source_labels: [__meta_kubernetes_pod_node_name]
982# extraScrapeConfigs adds additional scrape configs to prometheus.yml
983# must be a string so you have to add a | after extraScrapeConfigs:
984# example adds prometheus-blackbox-exporter scrape config
985extraScrapeConfigs: ""
986# - job_name: 'prometheus-blackbox-exporter'
987# metrics_path: /probe
992# - https://example.com
994# - source_labels: [__address__]
995# target_label: __param_target
996# - source_labels: [__param_target]
997# target_label: instance
998# - target_label: __address__
999# replacement: prometheus-blackbox-exporter:9115
1001## Prometheus server ConfigMap entries for rule files (allow prometheus labels interpolation)
1003## Prometheus server ConfigMap entries for scrape_config_files
1004## (allows scrape configs defined in additional files)
1006scrapeConfigFiles: []
1007## Prometheus server ConfigMap entries
1010 ## Alerts configuration
1011 ## Ref: https://prometheus.io/docs/prometheus/latest/configuration/alerting_rules/
1012 alerting_rules.yml: {}
1016 # - alert: InstanceDown
1022 # description: '{{ $labels.instance }} of job {{ $labels.job }} has been down for more than 5 minutes.'
1023 # summary: 'Instance {{ $labels.instance }} down'
1024 ## DEPRECATED DEFAULT VALUE, unless explicitly naming your files, please use alerting_rules.yml
1026 ## Records configuration
1027 ## Ref: https://prometheus.io/docs/prometheus/latest/configuration/recording_rules/
1028 recording_rules.yml: {}
1029 ## DEPRECATED DEFAULT VALUE, unless explicitly naming your files, please use recording_rules.yml
1033 - /etc/config/recording_rules.yml
1034 - /etc/config/alerting_rules.yml
1035 ## Below two files are DEPRECATED will be removed from this default values file
1037 - /etc/config/alerts
1038# Adds option to add alert_relabel_configs to avoid duplicate alerts in alertmanager
1039# useful in H/A prometheus with different external labels but the same alerts
1040alertRelabelConfigs: {}
1041# alert_relabel_configs:
1042# - source_labels: [dc]
1047 ## Enable creation of NetworkPolicy resources.
1050# Force namespace of namespaced resources
1052# Extra manifests to deploy as an array
1059# name: prometheus-extra
1061# extra-data: "value"
1063# Configuration of subcharts defined in Chart.yaml
1065## alertmanager sub-chart configurable values
1066## Please see https://github.com/prometheus-community/helm-charts/tree/main/charts/alertmanager
1069 ## If false, alertmanager will not be installed
1073 ## If true, storage will create or use Persistence Volume
1074 ## If false, storage will use emptyDir
1077 ## Custom annotations for the PVC created by the alertmanager StatefulSet.
1078 ## Useful for configuring storage provider options such as disk type, KMS encryption keys, or custom volume name prefixes.
1080 ## Custom labels for the PVC created by the alertmanager StatefulSet.
1081 ## Useful for selecting, grouping, and organizing so that they can be queried or targeted in deployments, policies, etc.
1083 ## Persistent Volume Storage Class
1084 ## If defined, storageClassName: <storageClass>
1085 ## If set to "-", storageClassName: "", which disables dynamic provisioning
1086 ## If undefined (the default) or set to null, no storageClassName spec is
1087 ## set, choosing the default provisioner.
1093 ## Configure emptyDir volume
1101## kube-state-metrics sub-chart configurable values
1102## Please see https://github.com/prometheus-community/helm-charts/tree/main/charts/kube-state-metrics
1105 ## If false, kube-state-metrics sub-chart will not be installed
1108## prometheus-node-exporter sub-chart configurable values
1109## Please see https://github.com/prometheus-community/helm-charts/tree/main/charts/prometheus-node-exporter
1111prometheus-node-exporter:
1112 ## If false, node-exporter will not be installed
1117 containerSecurityContext:
1118 allowPrivilegeEscalation: false
1119## prometheus-pushgateway sub-chart configurable values
1120## Please see https://github.com/prometheus-community/helm-charts/tree/main/charts/prometheus-pushgateway
1122prometheus-pushgateway:
1123 ## If false, pushgateway will not be installed
1126 # Optional service annotations
1128 prometheus.io/probe: pushgateway