# Default values for k8s-prometheus-adapter.. global: cattle: systemDefaultRegistry: "" affinity: {} image: repository: rancher/mirrored-directxman12-k8s-prometheus-adapter tag: v0.8.4 pullPolicy: IfNotPresent logLevel: 4 metricsRelistInterval: 1m listenPort: 6443 nodeSelector: {} priorityClassName: "" # Url to access prometheus prometheus: # Value is templated url: http://prometheus.default.svc port: 9090 path: "" replicas: 1 rbac: # Specifies whether RBAC resources should be created create: true psp: # Specifies whether PSP resources should be created create: false serviceAccount: # Specifies whether a service account should be created create: true # The name of the service account to use. # If not set and create is true, a name is generated using the fullname template name: # ServiceAccount annotations. # Use case: AWS EKS IAM roles for service accounts # ref: https://docs.aws.amazon.com/eks/latest/userguide/specify-service-account-role.html annotations: {} # Custom DNS configuration to be added to prometheus-adapter pods dnsConfig: {} # nameservers: # - 1.2.3.4 # searches: # - ns1.svc.cluster-domain.example # - my.dns.search.suffix # options: # - name: ndots # value: "2" # - name: edns0 resources: {} # requests: # cpu: 100m # memory: 128Mi # limits: # cpu: 100m # memory: 128Mi rules: default: true custom: [] # - seriesQuery: '{__name__=~"^some_metric_count$"}' # resources: # template: <<.Resource>> # name: # matches: "" # as: "my_custom_metric" # metricsQuery: sum(<<.Series>>{<<.LabelMatchers>>}) by (<<.GroupBy>>) # Mounts a configMap with pre-generated rules for use. Overrides the # default, custom, external and resource entries existing: external: [] # - seriesQuery: '{__name__=~"^some_metric_count$"}' # resources: # template: <<.Resource>> # name: # matches: "" # as: "my_external_metric" # metricsQuery: sum(<<.Series>>{<<.LabelMatchers>>}) by (<<.GroupBy>>) resource: {} # cpu: # containerQuery: sum(rate(container_cpu_usage_seconds_total{<<.LabelMatchers>>, container!=""}[3m])) by (<<.GroupBy>>) # nodeQuery: sum(rate(container_cpu_usage_seconds_total{<<.LabelMatchers>>, id='/'}[3m])) by (<<.GroupBy>>) # resources: # overrides: # instance: # resource: node # namespace: # resource: namespace # pod: # resource: pod # containerLabel: container # memory: # containerQuery: sum(container_memory_working_set_bytes{<<.LabelMatchers>>, container!=""}) by (<<.GroupBy>>) # nodeQuery: sum(container_memory_working_set_bytes{<<.LabelMatchers>>,id='/'}) by (<<.GroupBy>>) # resources: # overrides: # instance: # resource: node # namespace: # resource: namespace # pod: # resource: pod # containerLabel: container # window: 3m service: annotations: {} port: 443 type: ClusterIP tls: enable: false ca: |- # Public CA file that signed the APIService key: |- # Private key of the APIService certificate: |- # Public key of the APIService # Any extra arguments extraArguments: [] # - --tls-private-key-file=/etc/tls/tls.key # - --tls-cert-file=/etc/tls/tls.crt # Any extra volumes extraVolumes: [] # - name: example-name # hostPath: # path: /path/on/host # type: DirectoryOrCreate # - name: ssl-certs # hostPath: # path: /etc/ssl/certs/ca-bundle.crt # type: File # Any extra volume mounts extraVolumeMounts: [] # - name: example-name # mountPath: /path/in/container # - name: ssl-certs # mountPath: /etc/ssl/certs/ca-certificates.crt # readOnly: true tolerations: [] # Labels added to the pod podLabels: {} # Annotations added to the pod podAnnotations: {} hostNetwork: # Specifies if prometheus-adapter should be started in hostNetwork mode. # # You would require this enabled if you use alternate overlay networking for pods and # API server unable to communicate with metrics-server. As an example, this is required # if you use Weave network on EKS. See also dnsPolicy enabled: false # When hostNetwork is enabled, you probably want to set this to ClusterFirstWithHostNet # dnsPolicy: ClusterFirstWithHostNet podDisruptionBudget: # Specifies if PodDisruptionBudget should be enabled # When enabled, minAvailable or maxUnavailable should also be defined. enabled: false minAvailable: maxUnavailable: 1 certManager: enabled: false caCertDuration: 43800h certDuration: 8760h