# By default, proxyUrl and params._scheme will be overridden based on other values
endpoints:
- port:metrics
# Configure Service that grabs scrape targets
service:
# The selector that is used to populate the Service's Endpoints object.
# The chart will error out on rendering templating if .Values.clients.enabled is set alongside this field,
# since it is expected that this service should point to the PushProx Clients Daemonset / Deployment
selector:{}
clients:
enabled:true
# The port which the PushProx client will post PushProx metrics to
port:9369
# If unset, this will default to the URL for the proxy service: http://pushprox-{{component}}-proxy.{{namepsace}}.svc.cluster.local:{{proxy.port}}
# Should be modified if the clients are being deployed outside the cluster where the proxy rests, otherwise leave it null
proxyUrl:""
# If set to true, the client will forward any requests from the host IP to 127.0.0.1
# It will only allow proxy requests to the metricsPort specified
useLocalhost:false
# Configuration for accessing metrics via HTTPS
https:
# Does the client require https to access the metrics?
enabled:false
# If set to true, the client will create a service account with adequate permissions and set a flag
# on the client to use the service account token provided by it to make authorized scrape requests
useServiceAccountCredentials:false
# If set to true, the client will disable SSL security checks
insecureSkipVerify:false
# Directory on host where necessary TLS cert and key to scrape metrics can be found
certDir:""
# Filenames for files located in .Values.clients.https.certDir that correspond to TLS settings
certFile:""
keyFile:""
caCertFile:""
# seLinuxOptions to be passed into the container that copies certs. Should define a container with permissions to read the files in the certDir provided on the host.
# Required and only used if `clients.https.enabled` is set and `clients.https.certDir` is provided.
seLinuxOptions:{}
metrics:
# Whether the client should publish PushProx client-specific metrics to .Values.clients.port
enabled:false
rbac:
# Additional permissions to provide to the ServiceAccount bound to the client
# This can be used to provide additional permissions for the client to scrape metrics from the k8s API
# Only enabled if clients.https.enabled and clients.https.useServiceAccountCredentials are true
additionalRules:[]
# Resource limits
resources:{}
# Options to select all nodes to deploy client DaemonSet on
nodeSelector:{}
tolerations:[]
affinity:{}
image:
repository:rancher/pushprox-client
tag:v0.1.0-rancher2-client
command:["pushprox-client"]
copyCertsImage:
repository:rancher/mirrored-library-busybox
tag:1.31.1
# The default intention of rancher-pushprox clients is to scrape hostNetwork metrics across all nodes.
# This can be used to scrape internal Kubernetes components or DaemonSets of hostNetwork Pods in
# situations where a cloud provider firewall prevents Pod-To-Host communication but not Pod-To-Pod.
# However, if the underlying hostNetwork Pod that is being scraped is managed by a Deployment,
# this advanced option enables users to deploy the client as a Deployment instead of a DaemonSet.
# If a user deploys this feature and the underlying Deployment's number of replicas changes, the user will
# be responsible for upgrading this chart accordingly to the right number of replicas.
deployment:
enabled:false
replicas:0
proxy:
enabled:true
# The port through which PushProx clients will communicate to the proxy
port:8080
# Resource limits
resources:{}
# Options to select a node to run a single proxy deployment on