Newer
Older

Kevin Scheunemann
committed
# Settings for the k8s-monitoring chart for gathering, scraping, and forwarding Kubernetes telemetry data to a Grafana Stack .
# -- See https://github.com/grafana/k8s-monitoring-helm/blob/main/charts/k8s-monitoring-v1/values.yaml for available values.

Kevin Scheunemann
committed
# @default -- Our overrides are defined in charts/values.yaml file.

Kevin Scheunemann
committed
k8s-monitoring:

Kevin Scheunemann
committed
cluster:
name: bigbang

Kevin Scheunemann
committed
global:
image:
registry: "registry1.dso.mil"
pullSecrets:
- name: private-registry
podSecurityContext:
runAsUser: 473
runAsGroup: 473
fsGroup: 473
runAsNonRoot: true
seccompProfile:
type: RuntimeDefault

Kevin Scheunemann
committed
externalServices:
prometheus:

Zach Callahan
committed
host: http://monitoring-monitoring-kube-prometheus.monitoring.svc.cluster.local:9090

Kevin Scheunemann
committed
authMode: none

Zach Callahan
committed
writeEndpoint: /api/v1/write

Kevin Scheunemann
committed
loki:
host: logging-loki.logging.svc.cluster.local:3100
authMode: none
tempo:
host: tempo-tempo.tempo.svc.cluster.local:4317
authMode: none
tls:
insecure: true
alloy:
image:
repository: "ironbank/opensource/grafana/alloy"

Kevin Scheunemann
committed
configReloader:
image:
repository: "ironbank/opensource/jimmidyson/configmap-reload"
securityContext:
capabilities:
drop:
- ALL
alloy:
securityContext:
capabilities:
drop:
- ALL
controller:
securityContext:
capabilities:
drop:
- ALL
alloy-logs:
image:
repository: "ironbank/opensource/grafana/alloy"
configReloader:
image:
repository: "ironbank/opensource/jimmidyson/configmap-reload"
securityContext:
capabilities:
drop:
- ALL
alloy:
securityContext:
capabilities:
drop:
- ALL
controller:
securityContext:
capabilities:
drop:
- ALL
alloy-events:
image:
repository: "ironbank/opensource/grafana/alloy"
configReloader:
image:
repository: "ironbank/opensource/jimmidyson/configmap-reload"
securityContext:
capabilities:
drop:
- ALL
alloy:
securityContext:
capabilities:
drop:
- ALL
controller:
securityContext:
capabilities:
drop:
- ALL

Kevin Scheunemann
committed
traces:
enabled: true
logs:
cluster_events:
enabled: false
pod_logs:
enabled: false
metrics:
enabled: true

Zach Callahan
committed
# disable scraping serviceMonitors until we disable prometheus-operator

Kevin Scheunemann
committed
serviceMonitors:
enabled: false
prometheus-operator-crds:

Kevin Scheunemann
committed
kube-state-metrics:

Kevin Scheunemann
committed
prometheus-node-exporter:
enabled: false

Kevin Scheunemann
committed
opencost:
enabled: false
configAnalysis:
enabled: false
test:
enabled: false
networkPolicies:
# -- Toggle networkPolicies
enabled: false
# -- Control Plane CIDR, defaults to 0.0.0.0/0, use `kubectl get endpoints -n default kubernetes` to get the CIDR range needed for your cluster
# Must be an IP CIDR range (x.x.x.x/x - ideally with /32 for the specific IP of a single endpoint, broader range for multiple masters/endpoints)
# Used by package NetworkPolicies to allow Kube API access
controlPlaneCidr: 0.0.0.0/0
additionalPolicies: []

Zach Callahan
committed
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
# -- NetworkPolicy selectors and ports for
# egress to downstream telemetry ingestion services.
# These should be uncommented and overridden if any
# of these values deviate from the Big Bang defaults.
egress: {}
#
# prometheus:
# ports:
# - 9090
# namespaceSelector:
# matchLabels:
# app.kubernetes.io/name: monitoring
# podSelector:
# matchLabels:
# app.kubernetes.io/name: prometheus
# loki:
# ports:
# - 3100
# namespaceSelector:
# matchLabels:
# app.kubernetes.io/name: logging
# podSelector:
# matchLabels:
# app.kubernetes.io/name: loki-logging
# tempo:
# ports:
# - 4317
# namespaceSelector:
# matchLabels:
# app.kubernetes.io/name: tempo
# podSelector:
# matchLabels:
# app.kubernetes.io/name: tempo

Kevin Scheunemann
committed
# -- Toggle istio configuration
enabled: false
# -- Default peer authentication values
hardened:
enabled: false

Kevin Scheunemann
committed
outboundTrafficPolicyMode: "REGISTRY_ONLY"
customServiceEntries: []
# - name: "allow-google"
# enabled: true
# spec:
# hosts:
# - google.com
# location: MESH_EXTERNAL
# ports:
# - number: 443
# protocol: TLS
# name: https
# resolution: DNS
mtls:
# -- STRICT = Allow only mutual TLS traffic,
# PERMISSIVE = Allow both plain text and mutual TLS traffic

Kevin Scheunemann
committed
mode: STRICT