values.yaml 43 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243
  1. rbac:
  2. create: true
  3. podSecurityPolicy:
  4. enabled: false
  5. imagePullSecrets: []
  6. # - name: "image-pull-secret"
  7. ## Define serviceAccount names for components. Defaults to component's fully qualified name.
  8. ##
  9. serviceAccounts:
  10. server:
  11. create: true
  12. name: ""
  13. annotations: {}
  14. ## Monitors ConfigMap changes and POSTs to a URL
  15. ## Ref: https://github.com/prometheus-operator/prometheus-operator/tree/main/cmd/prometheus-config-reloader
  16. ##
  17. configmapReload:
  18. prometheus:
  19. ## If false, the configmap-reload container will not be deployed
  20. ##
  21. enabled: true
  22. ## configmap-reload container name
  23. ##
  24. name: configmap-reload
  25. ## configmap-reload container image
  26. ##
  27. image:
  28. repository: quay.io/prometheus-operator/prometheus-config-reloader
  29. tag: v0.63.0
  30. # When digest is set to a non-empty value, images will be pulled by digest (regardless of tag value).
  31. digest: ""
  32. pullPolicy: IfNotPresent
  33. # containerPort: 9533
  34. ## Additional configmap-reload container arguments
  35. ##
  36. extraArgs: {}
  37. ## Additional configmap-reload volume directories
  38. ##
  39. extraVolumeDirs: []
  40. ## Additional configmap-reload mounts
  41. ##
  42. extraConfigmapMounts: []
  43. # - name: prometheus-alerts
  44. # mountPath: /etc/alerts.d
  45. # subPath: ""
  46. # configMap: prometheus-alerts
  47. # readOnly: true
  48. ## Security context to be added to configmap-reload container
  49. containerSecurityContext: {}
  50. ## configmap-reload resource requests and limits
  51. ## Ref: http://kubernetes.io/docs/user-guide/compute-resources/
  52. ##
  53. resources:
  54. limits:
  55. cpu: 4
  56. memory: 8Gi
  57. server:
  58. ## Prometheus server container name
  59. ##
  60. name: server
  61. ## Use a ClusterRole (and ClusterRoleBinding)
  62. ## - If set to false - we define a RoleBinding in the defined namespaces ONLY
  63. ##
  64. ## NB: because we need a Role with nonResourceURL's ("/metrics") - you must get someone with Cluster-admin privileges to define this role for you, before running with this setting enabled.
  65. ## This makes prometheus work - for users who do not have ClusterAdmin privs, but wants prometheus to operate on their own namespaces, instead of clusterwide.
  66. ##
  67. ## You MUST also set namespaces to the ones you have access to and want monitored by Prometheus.
  68. ##
  69. # useExistingClusterRoleName: nameofclusterrole
  70. ## namespaces to monitor (instead of monitoring all - clusterwide). Needed if you want to run without Cluster-admin privileges.
  71. # namespaces:
  72. # - yournamespace
  73. # sidecarContainers - add more containers to prometheus server
  74. # Key/Value where Key is the sidecar `- name: <Key>`
  75. # Example:
  76. # sidecarContainers:
  77. # webserver:
  78. # image: nginx
  79. sidecarContainers: {}
  80. # sidecarTemplateValues - context to be used in template for sidecarContainers
  81. # Example:
  82. # sidecarTemplateValues: *your-custom-globals
  83. # sidecarContainers:
  84. # webserver: |-
  85. # {{ include "webserver-container-template" . }}
  86. # Template for `webserver-container-template` might looks like this:
  87. # image: "{{ .Values.server.sidecarTemplateValues.repository }}:{{ .Values.server.sidecarTemplateValues.tag }}"
  88. # ...
  89. #
  90. sidecarTemplateValues: {}
  91. ## Prometheus server container image
  92. ##
  93. image:
  94. repository: quay.io/prometheus/prometheus
  95. # if not set appVersion field from Chart.yaml is used
  96. tag: ""
  97. # When digest is set to a non-empty value, images will be pulled by digest (regardless of tag value).
  98. digest: ""
  99. pullPolicy: IfNotPresent
  100. ## prometheus server priorityClassName
  101. ##
  102. priorityClassName: ""
  103. ## EnableServiceLinks indicates whether information about services should be injected
  104. ## into pod's environment variables, matching the syntax of Docker links.
  105. ## WARNING: the field is unsupported and will be skipped in K8s prior to v1.13.0.
  106. ##
  107. enableServiceLinks: true
  108. ## The URL prefix at which the container can be accessed. Useful in the case the '-web.external-url' includes a slug
  109. ## so that the various internal URLs are still able to access as they are in the default case.
  110. ## (Optional)
  111. prefixURL: ""
  112. ## External URL which can access prometheus
  113. ## Maybe same with Ingress host name
  114. baseURL: ""
  115. ## Additional server container environment variables
  116. ##
  117. ## You specify this manually like you would a raw deployment manifest.
  118. ## This means you can bind in environment variables from secrets.
  119. ##
  120. ## e.g. static environment variable:
  121. ## - name: DEMO_GREETING
  122. ## value: "Hello from the environment"
  123. ##
  124. ## e.g. secret environment variable:
  125. ## - name: USERNAME
  126. ## valueFrom:
  127. ## secretKeyRef:
  128. ## name: mysecret
  129. ## key: username
  130. env: []
  131. # List of flags to override default parameters, e.g:
  132. # - --enable-feature=agent
  133. # - --storage.agent.retention.max-time=30m
  134. defaultFlagsOverride: []
  135. extraFlags:
  136. - web.enable-lifecycle
  137. - web.enable-remote-write-receiver
  138. ## web.enable-admin-api flag controls access to the administrative HTTP API which includes functionality such as
  139. ## deleting time series. This is disabled by default.
  140. # - web.enable-admin-api
  141. ##
  142. ## storage.tsdb.no-lockfile flag controls BD locking
  143. # - storage.tsdb.no-lockfile
  144. ##
  145. ## storage.tsdb.wal-compression flag enables compression of the write-ahead log (WAL)
  146. # - storage.tsdb.wal-compression
  147. ## Path to a configuration file on prometheus server container FS
  148. configPath: /etc/config/prometheus.yml
  149. ### The data directory used by prometheus to set --storage.tsdb.path
  150. ### When empty server.persistentVolume.mountPath is used instead
  151. storagePath: ""
  152. global:
  153. ## How frequently to scrape targets by default
  154. ##
  155. scrape_interval: 30s
  156. ## How long until a scrape request times out
  157. ##
  158. scrape_timeout: 10s
  159. ## How frequently to evaluate rules
  160. ##
  161. evaluation_interval: 1m
  162. ## https://prometheus.io/docs/prometheus/latest/configuration/configuration/#remote_write
  163. ##
  164. remoteWrite: []
  165. ## https://prometheus.io/docs/prometheus/latest/configuration/configuration/#remote_read
  166. ##
  167. remoteRead: []
  168. ## Custom HTTP headers for Liveness/Readiness/Startup Probe
  169. ##
  170. ## Useful for providing HTTP Basic Auth to healthchecks
  171. probeHeaders: []
  172. # - name: "Authorization"
  173. # value: "Bearer ABCDEabcde12345"
  174. ## Additional Prometheus server container arguments
  175. ##
  176. extraArgs: {}
  177. ## Additional InitContainers to initialize the pod
  178. ##
  179. extraInitContainers: []
  180. ## Additional Prometheus server Volume mounts
  181. ##
  182. extraVolumeMounts: []
  183. ## Additional Prometheus server Volumes
  184. ##
  185. extraVolumes: []
  186. ## Additional Prometheus server hostPath mounts
  187. ##
  188. extraHostPathMounts: []
  189. # - name: certs-dir
  190. # mountPath: /etc/kubernetes/certs
  191. # subPath: ""
  192. # hostPath: /etc/kubernetes/certs
  193. # readOnly: true
  194. extraConfigmapMounts: []
  195. # - name: certs-configmap
  196. # mountPath: /prometheus
  197. # subPath: ""
  198. # configMap: certs-configmap
  199. # readOnly: true
  200. ## Additional Prometheus server Secret mounts
  201. # Defines additional mounts with secrets. Secrets must be manually created in the namespace.
  202. extraSecretMounts: []
  203. # - name: secret-files
  204. # mountPath: /etc/secrets
  205. # subPath: ""
  206. # secretName: prom-secret-files
  207. # readOnly: true
  208. ## ConfigMap override where fullname is {{.Release.Name}}-{{.Values.server.configMapOverrideName}}
  209. ## Defining configMapOverrideName will cause templates/server-configmap.yaml
  210. ## to NOT generate a ConfigMap resource
  211. ##
  212. configMapOverrideName: ""
  213. ## Extra labels for Prometheus server ConfigMap (ConfigMap that holds serverFiles)
  214. extraConfigmapLabels: {}
  215. ingress:
  216. ## If true, Prometheus server Ingress will be created
  217. ##
  218. enabled: true
  219. # For Kubernetes >= 1.18 you should specify the ingress-controller via the field ingressClassName
  220. # See https://kubernetes.io/blog/2020/04/02/improvements-to-the-ingress-api-in-kubernetes-1.18/#specifying-the-class-of-an-ingress
  221. ingressClassName: nginx
  222. ## Prometheus server Ingress annotations
  223. ##
  224. annotations: {}
  225. # kubernetes.io/ingress.class: nginx
  226. # kubernetes.io/tls-acme: 'true'
  227. ## Prometheus server Ingress additional labels
  228. ##
  229. extraLabels: {}
  230. ## Prometheus server Ingress hostnames with optional path
  231. ## Must be provided if Ingress is enabled
  232. ##
  233. hosts:
  234. - prometheus.cestong.com.cn
  235. # - domain.com/prometheus
  236. path: /
  237. # pathType is only for k8s >= 1.18
  238. pathType: Prefix
  239. ## Extra paths to prepend to every host configuration. This is useful when working with annotation based services.
  240. extraPaths: []
  241. # - path: /*
  242. # backend:
  243. # serviceName: ssl-redirect
  244. # servicePort: use-annotation
  245. ## Prometheus server Ingress TLS configuration
  246. ## Secrets must be manually created in the namespace
  247. ##
  248. tls: []
  249. # - secretName: prometheus-server-tls
  250. # hosts:
  251. # - prometheus.domain.com
  252. ## Server Deployment Strategy type
  253. strategy:
  254. type: Recreate
  255. ## hostAliases allows adding entries to /etc/hosts inside the containers
  256. hostAliases: []
  257. # - ip: "127.0.0.1"
  258. # hostnames:
  259. # - "example.com"
  260. ## Node tolerations for server scheduling to nodes with taints
  261. ## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/
  262. ##
  263. tolerations: []
  264. # - key: "key"
  265. # operator: "Equal|Exists"
  266. # value: "value"
  267. # effect: "NoSchedule|PreferNoSchedule|NoExecute(1.6 only)"
  268. ## Node labels for Prometheus server pod assignment
  269. ## Ref: https://kubernetes.io/docs/user-guide/node-selection/
  270. ##
  271. nodeSelector: {}
  272. ## Pod affinity
  273. ##
  274. affinity: {}
  275. ## PodDisruptionBudget settings
  276. ## ref: https://kubernetes.io/docs/concepts/workloads/pods/disruptions/
  277. ##
  278. podDisruptionBudget:
  279. enabled: false
  280. maxUnavailable: 1
  281. ## Use an alternate scheduler, e.g. "stork".
  282. ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
  283. ##
  284. # schedulerName:
  285. persistentVolume:
  286. ## If true, Prometheus server will create/use a Persistent Volume Claim
  287. ## If false, use emptyDir
  288. ##
  289. enabled: true
  290. ## Prometheus server data Persistent Volume access modes
  291. ## Must match those of existing PV or dynamic provisioner
  292. ## Ref: http://kubernetes.io/docs/user-guide/persistent-volumes/
  293. ##
  294. accessModes:
  295. - ReadWriteOnce
  296. ## Prometheus server data Persistent Volume labels
  297. ##
  298. labels: {}
  299. ## Prometheus server data Persistent Volume annotations
  300. ##
  301. annotations: {}
  302. ## Prometheus server data Persistent Volume existing claim name
  303. ## Requires server.persistentVolume.enabled: true
  304. ## If defined, PVC must be created manually before volume will be bound
  305. existingClaim: ""
  306. ## Prometheus server data Persistent Volume mount root path
  307. ##
  308. mountPath: /data
  309. ## Prometheus server data Persistent Volume size
  310. ##
  311. size: 8Gi
  312. ## Prometheus server data Persistent Volume Storage Class
  313. ## If defined, storageClassName: <storageClass>
  314. ## If set to "-", storageClassName: "", which disables dynamic provisioning
  315. ## If undefined (the default) or set to null, no storageClassName spec is
  316. ## set, choosing the default provisioner. (gp2 on AWS, standard on
  317. ## GKE, AWS & OpenStack)
  318. ##
  319. storageClass: "openebs-hostpath"
  320. ## Prometheus server data Persistent Volume Binding Mode
  321. ## If defined, volumeBindingMode: <volumeBindingMode>
  322. ## If undefined (the default) or set to null, no volumeBindingMode spec is
  323. ## set, choosing the default mode.
  324. ##
  325. # volumeBindingMode: ""
  326. ## Subdirectory of Prometheus server data Persistent Volume to mount
  327. ## Useful if the volume's root directory is not empty
  328. ##
  329. subPath: ""
  330. ## Persistent Volume Claim Selector
  331. ## Useful if Persistent Volumes have been provisioned in advance
  332. ## Ref: https://kubernetes.io/docs/concepts/storage/persistent-volumes/#selector
  333. ##
  334. # selector:
  335. # matchLabels:
  336. # release: "stable"
  337. # matchExpressions:
  338. # - { key: environment, operator: In, values: [ dev ] }
  339. ## Persistent Volume Name
  340. ## Useful if Persistent Volumes have been provisioned in advance and you want to use a specific one
  341. ##
  342. # volumeName: ""
  343. emptyDir:
  344. ## Prometheus server emptyDir volume size limit
  345. ##
  346. sizeLimit: ""
  347. ## Annotations to be added to Prometheus server pods
  348. ##
  349. podAnnotations: {}
  350. # iam.amazonaws.com/role: prometheus
  351. ## Labels to be added to Prometheus server pods
  352. ##
  353. podLabels: {}
  354. ## Prometheus AlertManager configuration
  355. ##
  356. alertmanagers:
  357. - static_configs:
  358. - targets: ['prometheus-alertmanager:9093']
  359. ## Specify if a Pod Security Policy for node-exporter must be created
  360. ## Ref: https://kubernetes.io/docs/concepts/policy/pod-security-policy/
  361. ##
  362. podSecurityPolicy:
  363. annotations: {}
  364. ## Specify pod annotations
  365. ## Ref: https://kubernetes.io/docs/concepts/policy/pod-security-policy/#apparmor
  366. ## Ref: https://kubernetes.io/docs/concepts/policy/pod-security-policy/#seccomp
  367. ## Ref: https://kubernetes.io/docs/concepts/policy/pod-security-policy/#sysctl
  368. ##
  369. # seccomp.security.alpha.kubernetes.io/allowedProfileNames: '*'
  370. # seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default'
  371. # apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default'
  372. ## Use a StatefulSet if replicaCount needs to be greater than 1 (see below)
  373. ##
  374. replicaCount: 1
  375. ## Annotations to be added to deployment
  376. ##
  377. deploymentAnnotations: {}
  378. statefulSet:
  379. ## If true, use a statefulset instead of a deployment for pod management.
  380. ## This allows to scale replicas to more than 1 pod
  381. ##
  382. enabled: false
  383. annotations: {}
  384. labels: {}
  385. podManagementPolicy: OrderedReady
  386. ## Alertmanager headless service to use for the statefulset
  387. ##
  388. headless:
  389. annotations: {}
  390. labels: {}
  391. servicePort: 80
  392. ## Enable gRPC port on service to allow auto discovery with thanos-querier
  393. gRPC:
  394. enabled: false
  395. servicePort: 10901
  396. # nodePort: 10901
  397. ## Prometheus server readiness and liveness probe initial delay and timeout
  398. ## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/
  399. ##
  400. tcpSocketProbeEnabled: false
  401. probeScheme: HTTP
  402. readinessProbeInitialDelay: 30
  403. readinessProbePeriodSeconds: 5
  404. readinessProbeTimeout: 4
  405. readinessProbeFailureThreshold: 3
  406. readinessProbeSuccessThreshold: 1
  407. livenessProbeInitialDelay: 30
  408. livenessProbePeriodSeconds: 15
  409. livenessProbeTimeout: 10
  410. livenessProbeFailureThreshold: 3
  411. livenessProbeSuccessThreshold: 1
  412. startupProbe:
  413. enabled: false
  414. periodSeconds: 5
  415. failureThreshold: 30
  416. timeoutSeconds: 10
  417. ## Prometheus server resource requests and limits
  418. ## Ref: http://kubernetes.io/docs/user-guide/compute-resources/
  419. ##
  420. resources:
  421. limits:
  422. cpu: 1
  423. memory: 4Gi
  424. requests:
  425. cpu: 500m
  426. memory: 2Gi
  427. # Required for use in managed kubernetes clusters (such as AWS EKS) with custom CNI (such as calico),
  428. # because control-plane managed by AWS cannot communicate with pods' IP CIDR and admission webhooks are not working
  429. ##
  430. hostNetwork: false
  431. # When hostNetwork is enabled, this will set to ClusterFirstWithHostNet automatically
  432. dnsPolicy: ClusterFirst
  433. # Use hostPort
  434. # hostPort: 9090
  435. ## Vertical Pod Autoscaler config
  436. ## Ref: https://github.com/kubernetes/autoscaler/tree/master/vertical-pod-autoscaler
  437. verticalAutoscaler:
  438. ## If true a VPA object will be created for the controller (either StatefulSet or Deployemnt, based on above configs)
  439. enabled: false
  440. # updateMode: "Auto"
  441. # containerPolicies:
  442. # - containerName: 'prometheus-server'
  443. # Custom DNS configuration to be added to prometheus server pods
  444. dnsConfig: {}
  445. # nameservers:
  446. # - 1.2.3.4
  447. # searches:
  448. # - ns1.svc.cluster-domain.example
  449. # - my.dns.search.suffix
  450. # options:
  451. # - name: ndots
  452. # value: "2"
  453. # - name: edns0
  454. ## Security context to be added to server pods
  455. ##
  456. securityContext:
  457. runAsUser: 65534
  458. runAsNonRoot: true
  459. runAsGroup: 65534
  460. fsGroup: 65534
  461. ## Security context to be added to server container
  462. ##
  463. containerSecurityContext: {}
  464. service:
  465. ## If false, no Service will be created for the Prometheus server
  466. ##
  467. enabled: true
  468. annotations: {}
  469. labels: {}
  470. clusterIP: ""
  471. ## List of IP addresses at which the Prometheus server service is available
  472. ## Ref: https://kubernetes.io/docs/user-guide/services/#external-ips
  473. ##
  474. externalIPs: []
  475. loadBalancerIP: ""
  476. loadBalancerSourceRanges: []
  477. servicePort: 80
  478. sessionAffinity: None
  479. type: ClusterIP
  480. ## Enable gRPC port on service to allow auto discovery with thanos-querier
  481. gRPC:
  482. enabled: false
  483. servicePort: 10901
  484. # nodePort: 10901
  485. ## If using a statefulSet (statefulSet.enabled=true), configure the
  486. ## service to connect to a specific replica to have a consistent view
  487. ## of the data.
  488. statefulsetReplica:
  489. enabled: false
  490. replica: 0
  491. ## Prometheus server pod termination grace period
  492. ##
  493. terminationGracePeriodSeconds: 300
  494. ## Prometheus data retention period (default if not specified is 15 days)
  495. ##
  496. retention: "365d"
  497. ## Prometheus server ConfigMap entries for rule files (allow prometheus labels interpolation)
  498. ruleFiles: {}
  499. ## Prometheus server ConfigMap entries
  500. ##
  501. serverFiles:
  502. ## Alerts configuration
  503. ## Ref: https://prometheus.io/docs/prometheus/latest/configuration/alerting_rules/
  504. alerting_rules.yml:
  505. groups:
  506. - name: 主机状态报警
  507. rules:
  508. - alert: 主机cpu使用报警
  509. expr: sum(avg without (cpu)(irate(node_cpu_seconds_total{mode!='idle'}[5m]))) by (instance) > 0.85
  510. for: 1m
  511. labels:
  512. severity: page
  513. annotations:
  514. summary: "Instance {{ $labels.instance }} CPU usgae high"
  515. description: "{{ $labels.instance }} CPU usage above 85% (current value: {{ $value }})"
  516. - alert: 主机内存使用报警
  517. expr: (node_memory_MemTotal_bytes - node_memory_MemAvailable_bytes)/node_memory_MemTotal_bytes > 0.85
  518. for: 1m
  519. labels:
  520. severity: page
  521. annotations:
  522. summary: "Instance {{ $labels.instance }} MEM usgae high"
  523. description: "{{ $labels.instance }} MEM usage above 85% (current value: {{ $value }})"
  524. # groups:
  525. # - name: Instances
  526. # rules:
  527. # - alert: InstanceDown
  528. # expr: up == 0
  529. # for: 5m
  530. # labels:
  531. # severity: page
  532. # annotations:
  533. # description: '{{ $labels.instance }} of job {{ $labels.job }} has been down for more than 5 minutes.'
  534. # summary: 'Instance {{ $labels.instance }} down'
  535. ## DEPRECATED DEFAULT VALUE, unless explicitly naming your files, please use alerting_rules.yml
  536. alerts: {}
  537. ## Records configuration
  538. ## Ref: https://prometheus.io/docs/prometheus/latest/configuration/recording_rules/
  539. recording_rules.yml: {}
  540. ## DEPRECATED DEFAULT VALUE, unless explicitly naming your files, please use recording_rules.yml
  541. rules: {}
  542. prometheus.yml:
  543. rule_files:
  544. - /etc/config/recording_rules.yml
  545. - /etc/config/alerting_rules.yml
  546. ## Below two files are DEPRECATED will be removed from this default values file
  547. - /etc/config/rules
  548. - /etc/config/alerts
  549. scrape_configs:
  550. - job_name: prometheus
  551. static_configs:
  552. - targets:
  553. - "localhost:9090"
  554. # A scrape configuration for running Prometheus on a Kubernetes cluster.
  555. # This uses separate scrape configs for cluster components (i.e. API server, node)
  556. # and services to allow each to use different authentication configs.
  557. #
  558. # Kubernetes labels will be added as Prometheus labels on metrics via the
  559. # `labelmap` relabeling action.
  560. # Scrape config for API servers.
  561. #
  562. # Kubernetes exposes API servers as endpoints to the default/kubernetes
  563. # service so this uses `endpoints` role and uses relabelling to only keep
  564. # the endpoints associated with the default/kubernetes service using the
  565. # default named port `https`. This works for single API server deployments as
  566. # well as HA API server deployments.
  567. - job_name: 'kubernetes-apiservers'
  568. kubernetes_sd_configs:
  569. - role: endpoints
  570. # Default to scraping over https. If required, just disable this or change to
  571. # `http`.
  572. scheme: https
  573. # This TLS & bearer token file config is used to connect to the actual scrape
  574. # endpoints for cluster components. This is separate to discovery auth
  575. # configuration because discovery & scraping are two separate concerns in
  576. # Prometheus. The discovery auth config is automatic if Prometheus runs inside
  577. # the cluster. Otherwise, more config options have to be provided within the
  578. # <kubernetes_sd_config>.
  579. tls_config:
  580. ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
  581. # If your node certificates are self-signed or use a different CA to the
  582. # master CA, then disable certificate verification below. Note that
  583. # certificate verification is an integral part of a secure infrastructure
  584. # so this should only be disabled in a controlled environment. You can
  585. # disable certificate verification by uncommenting the line below.
  586. #
  587. insecure_skip_verify: true
  588. bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
  589. # Keep only the default/kubernetes service endpoints for the https port. This
  590. # will add targets for each API server which Kubernetes adds an endpoint to
  591. # the default/kubernetes service.
  592. relabel_configs:
  593. - source_labels: [__meta_kubernetes_namespace, __meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name]
  594. action: keep
  595. regex: default;kubernetes;https
  596. - job_name: 'kubernetes-nodes'
  597. # Default to scraping over https. If required, just disable this or change to
  598. # `http`.
  599. scheme: https
  600. # This TLS & bearer token file config is used to connect to the actual scrape
  601. # endpoints for cluster components. This is separate to discovery auth
  602. # configuration because discovery & scraping are two separate concerns in
  603. # Prometheus. The discovery auth config is automatic if Prometheus runs inside
  604. # the cluster. Otherwise, more config options have to be provided within the
  605. # <kubernetes_sd_config>.
  606. tls_config:
  607. ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
  608. # If your node certificates are self-signed or use a different CA to the
  609. # master CA, then disable certificate verification below. Note that
  610. # certificate verification is an integral part of a secure infrastructure
  611. # so this should only be disabled in a controlled environment. You can
  612. # disable certificate verification by uncommenting the line below.
  613. #
  614. insecure_skip_verify: true
  615. bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
  616. kubernetes_sd_configs:
  617. - role: node
  618. relabel_configs:
  619. - action: labelmap
  620. regex: __meta_kubernetes_node_label_(.+)
  621. - target_label: __address__
  622. replacement: kubernetes.default.svc:443
  623. - source_labels: [__meta_kubernetes_node_name]
  624. regex: (.+)
  625. target_label: __metrics_path__
  626. replacement: /api/v1/nodes/$1/proxy/metrics
  627. - job_name: 'kubernetes-nodes-cadvisor'
  628. # Default to scraping over https. If required, just disable this or change to
  629. # `http`.
  630. scheme: https
  631. # This TLS & bearer token file config is used to connect to the actual scrape
  632. # endpoints for cluster components. This is separate to discovery auth
  633. # configuration because discovery & scraping are two separate concerns in
  634. # Prometheus. The discovery auth config is automatic if Prometheus runs inside
  635. # the cluster. Otherwise, more config options have to be provided within the
  636. # <kubernetes_sd_config>.
  637. tls_config:
  638. ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
  639. # If your node certificates are self-signed or use a different CA to the
  640. # master CA, then disable certificate verification below. Note that
  641. # certificate verification is an integral part of a secure infrastructure
  642. # so this should only be disabled in a controlled environment. You can
  643. # disable certificate verification by uncommenting the line below.
  644. #
  645. insecure_skip_verify: true
  646. bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
  647. kubernetes_sd_configs:
  648. - role: node
  649. # This configuration will work only on kubelet 1.7.3+
  650. # As the scrape endpoints for cAdvisor have changed
  651. # if you are using older version you need to change the replacement to
  652. # replacement: /api/v1/nodes/$1:4194/proxy/metrics
  653. # more info here https://github.com/coreos/prometheus-operator/issues/633
  654. relabel_configs:
  655. - action: labelmap
  656. regex: __meta_kubernetes_node_label_(.+)
  657. - target_label: __address__
  658. replacement: kubernetes.default.svc:443
  659. - source_labels: [__meta_kubernetes_node_name]
  660. regex: (.+)
  661. target_label: __metrics_path__
  662. replacement: /api/v1/nodes/$1/proxy/metrics/cadvisor
  663. # Metric relabel configs to apply to samples before ingestion.
  664. # [Metric Relabeling](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#metric_relabel_configs)
  665. # metric_relabel_configs:
  666. # - action: labeldrop
  667. # regex: (kubernetes_io_hostname|failure_domain_beta_kubernetes_io_region|beta_kubernetes_io_os|beta_kubernetes_io_arch|beta_kubernetes_io_instance_type|failure_domain_beta_kubernetes_io_zone)
  668. # Scrape config for service endpoints.
  669. #
  670. # The relabeling allows the actual service scrape endpoint to be configured
  671. # via the following annotations:
  672. #
  673. # * `prometheus.io/scrape`: Only scrape services that have a value of
  674. # `true`, except if `prometheus.io/scrape-slow` is set to `true` as well.
  675. # * `prometheus.io/scheme`: If the metrics endpoint is secured then you will need
  676. # to set this to `https` & most likely set the `tls_config` of the scrape config.
  677. # * `prometheus.io/path`: If the metrics path is not `/metrics` override this.
  678. # * `prometheus.io/port`: If the metrics are exposed on a different port to the
  679. # service then set this appropriately.
  680. # * `prometheus.io/param_<parameter>`: If the metrics endpoint uses parameters
  681. # then you can set any parameter
  682. - job_name: 'kubernetes-service-endpoints'
  683. honor_labels: true
  684. kubernetes_sd_configs:
  685. - role: endpoints
  686. relabel_configs:
  687. - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scrape]
  688. action: keep
  689. regex: true
  690. - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scrape_slow]
  691. action: drop
  692. regex: true
  693. - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scheme]
  694. action: replace
  695. target_label: __scheme__
  696. regex: (https?)
  697. - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_path]
  698. action: replace
  699. target_label: __metrics_path__
  700. regex: (.+)
  701. - source_labels: [__address__, __meta_kubernetes_service_annotation_prometheus_io_port]
  702. action: replace
  703. target_label: __address__
  704. regex: (.+?)(?::\d+)?;(\d+)
  705. replacement: $1:$2
  706. - action: labelmap
  707. regex: __meta_kubernetes_service_annotation_prometheus_io_param_(.+)
  708. replacement: __param_$1
  709. - action: labelmap
  710. regex: __meta_kubernetes_service_label_(.+)
  711. - source_labels: [__meta_kubernetes_namespace]
  712. action: replace
  713. target_label: namespace
  714. - source_labels: [__meta_kubernetes_service_name]
  715. action: replace
  716. target_label: service
  717. - source_labels: [__meta_kubernetes_pod_node_name]
  718. action: replace
  719. target_label: node
  720. # Scrape config for slow service endpoints; same as above, but with a larger
  721. # timeout and a larger interval
  722. #
  723. # The relabeling allows the actual service scrape endpoint to be configured
  724. # via the following annotations:
  725. #
  726. # * `prometheus.io/scrape-slow`: Only scrape services that have a value of `true`
  727. # * `prometheus.io/scheme`: If the metrics endpoint is secured then you will need
  728. # to set this to `https` & most likely set the `tls_config` of the scrape config.
  729. # * `prometheus.io/path`: If the metrics path is not `/metrics` override this.
  730. # * `prometheus.io/port`: If the metrics are exposed on a different port to the
  731. # service then set this appropriately.
  732. # * `prometheus.io/param_<parameter>`: If the metrics endpoint uses parameters
  733. # then you can set any parameter
  734. - job_name: 'kubernetes-service-endpoints-slow'
  735. honor_labels: true
  736. scrape_interval: 5m
  737. scrape_timeout: 30s
  738. kubernetes_sd_configs:
  739. - role: endpoints
  740. relabel_configs:
  741. - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scrape_slow]
  742. action: keep
  743. regex: true
  744. - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scheme]
  745. action: replace
  746. target_label: __scheme__
  747. regex: (https?)
  748. - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_path]
  749. action: replace
  750. target_label: __metrics_path__
  751. regex: (.+)
  752. - source_labels: [__address__, __meta_kubernetes_service_annotation_prometheus_io_port]
  753. action: replace
  754. target_label: __address__
  755. regex: (.+?)(?::\d+)?;(\d+)
  756. replacement: $1:$2
  757. - action: labelmap
  758. regex: __meta_kubernetes_service_annotation_prometheus_io_param_(.+)
  759. replacement: __param_$1
  760. - action: labelmap
  761. regex: __meta_kubernetes_service_label_(.+)
  762. - source_labels: [__meta_kubernetes_namespace]
  763. action: replace
  764. target_label: namespace
  765. - source_labels: [__meta_kubernetes_service_name]
  766. action: replace
  767. target_label: service
  768. - source_labels: [__meta_kubernetes_pod_node_name]
  769. action: replace
  770. target_label: node
  771. - job_name: 'prometheus-pushgateway'
  772. honor_labels: true
  773. kubernetes_sd_configs:
  774. - role: service
  775. relabel_configs:
  776. - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_probe]
  777. action: keep
  778. regex: pushgateway
  779. # Example scrape config for probing services via the Blackbox Exporter.
  780. #
  781. # The relabeling allows the actual service scrape endpoint to be configured
  782. # via the following annotations:
  783. #
  784. # * `prometheus.io/probe`: Only probe services that have a value of `true`
  785. - job_name: 'kubernetes-services'
  786. honor_labels: true
  787. metrics_path: /probe
  788. params:
  789. module: [http_2xx]
  790. kubernetes_sd_configs:
  791. - role: service
  792. relabel_configs:
  793. - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_probe]
  794. action: keep
  795. regex: true
  796. - source_labels: [__address__]
  797. target_label: __param_target
  798. - target_label: __address__
  799. replacement: blackbox
  800. - source_labels: [__param_target]
  801. target_label: instance
  802. - action: labelmap
  803. regex: __meta_kubernetes_service_label_(.+)
  804. - source_labels: [__meta_kubernetes_namespace]
  805. target_label: namespace
  806. - source_labels: [__meta_kubernetes_service_name]
  807. target_label: service
  808. # Example scrape config for pods
  809. #
  810. # The relabeling allows the actual pod scrape endpoint to be configured via the
  811. # following annotations:
  812. #
  813. # * `prometheus.io/scrape`: Only scrape pods that have a value of `true`,
  814. # except if `prometheus.io/scrape-slow` is set to `true` as well.
  815. # * `prometheus.io/scheme`: If the metrics endpoint is secured then you will need
  816. # to set this to `https` & most likely set the `tls_config` of the scrape config.
  817. # * `prometheus.io/path`: If the metrics path is not `/metrics` override this.
  818. # * `prometheus.io/port`: Scrape the pod on the indicated port instead of the default of `9102`.
  819. - job_name: 'kubernetes-pods'
  820. honor_labels: true
  821. kubernetes_sd_configs:
  822. - role: pod
  823. relabel_configs:
  824. - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape]
  825. action: keep
  826. regex: true
  827. - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape_slow]
  828. action: drop
  829. regex: true
  830. - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scheme]
  831. action: replace
  832. regex: (https?)
  833. target_label: __scheme__
  834. - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path]
  835. action: replace
  836. target_label: __metrics_path__
  837. regex: (.+)
  838. - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_port, __meta_kubernetes_pod_ip]
  839. action: replace
  840. regex: (\d+);(([A-Fa-f0-9]{1,4}::?){1,7}[A-Fa-f0-9]{1,4})
  841. replacement: '[$2]:$1'
  842. target_label: __address__
  843. - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_port, __meta_kubernetes_pod_ip]
  844. action: replace
  845. regex: (\d+);((([0-9]+?)(\.|$)){4})
  846. replacement: $2:$1
  847. target_label: __address__
  848. - action: labelmap
  849. regex: __meta_kubernetes_pod_annotation_prometheus_io_param_(.+)
  850. replacement: __param_$1
  851. - action: labelmap
  852. regex: __meta_kubernetes_pod_label_(.+)
  853. - source_labels: [__meta_kubernetes_namespace]
  854. action: replace
  855. target_label: namespace
  856. - source_labels: [__meta_kubernetes_pod_name]
  857. action: replace
  858. target_label: pod
  859. - source_labels: [__meta_kubernetes_pod_phase]
  860. regex: Pending|Succeeded|Failed|Completed
  861. action: drop
  862. # Example Scrape config for pods which should be scraped slower. An useful example
  863. # would be stackriver-exporter which queries an API on every scrape of the pod
  864. #
  865. # The relabeling allows the actual pod scrape endpoint to be configured via the
  866. # following annotations:
  867. #
  868. # * `prometheus.io/scrape-slow`: Only scrape pods that have a value of `true`
  869. # * `prometheus.io/scheme`: If the metrics endpoint is secured then you will need
  870. # to set this to `https` & most likely set the `tls_config` of the scrape config.
  871. # * `prometheus.io/path`: If the metrics path is not `/metrics` override this.
  872. # * `prometheus.io/port`: Scrape the pod on the indicated port instead of the default of `9102`.
  873. - job_name: 'kubernetes-pods-slow'
  874. honor_labels: true
  875. scrape_interval: 5m
  876. scrape_timeout: 30s
  877. # kubernetes_sd_configs:
  878. # - role: pod
  879. relabel_configs:
  880. - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape_slow]
  881. action: keep
  882. regex: true
  883. - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scheme]
  884. action: replace
  885. regex: (https?)
  886. target_label: __scheme__
  887. - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path]
  888. action: replace
  889. target_label: __metrics_path__
  890. regex: (.+)
  891. - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_port, __meta_kubernetes_pod_ip]
  892. action: replace
  893. regex: (\d+);(([A-Fa-f0-9]{1,4}::?){1,7}[A-Fa-f0-9]{1,4})
  894. replacement: '[$2]:$1'
  895. target_label: __address__
  896. - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_port, __meta_kubernetes_pod_ip]
  897. action: replace
  898. regex: (\d+);((([0-9]+?)(\.|$)){4})
  899. replacement: $2:$1
  900. target_label: __address__
  901. - action: labelmap
  902. regex: __meta_kubernetes_pod_annotation_prometheus_io_param_(.+)
  903. replacement: __param_$1
  904. - action: labelmap
  905. regex: __meta_kubernetes_pod_label_(.+)
  906. - source_labels: [__meta_kubernetes_namespace]
  907. action: replace
  908. target_label: namespace
  909. - source_labels: [__meta_kubernetes_pod_name]
  910. action: replace
  911. target_label: pod
  912. - source_labels: [__meta_kubernetes_pod_phase]
  913. regex: Pending|Succeeded|Failed|Completed
  914. action: drop
  915. - job_name: 'mysql'
  916. static_configs:
  917. - targets:
  918. - 'mysql-metrics.observe.svc.cluster.local:9104'
  919. - job_name: 'clickhouse'
  920. static_configs:
  921. - targets:
  922. - 'clickhouse.observe.svc.cluster.local:8001'
  923. - job_name: 'otel-collector'
  924. static_configs:
  925. - targets:
  926. - 'otel-collector-opentelemetry-collector:8889'
  927. # 20240924 ADD ob-event metric
  928. - job_name: 'ob-event'
  929. static_configs:
  930. - targets:
  931. - 'ob-event.observe.svc.cluster.local'
  932. # adds additional scrape configs to prometheus.yml
  933. # must be a string so you have to add a | after extraScrapeConfigs:
  934. # example adds prometheus-blackbox-exporter scrape config
  935. #extraScrapeConfigs: ""
  936. #extraScrapeConfigs: |
  937. # - job_name: 'otel-collector'
  938. # honor_labels: true # 添加这个job后, 会向匹配到的数据添加job=otel-collector标签, 设置为true则不覆盖原来的标签, 否则原来的job将会被改成exported_job
  939. # static_configs:
  940. # - targets:
  941. # - 'otel-collector-opentelemetry-collector:8889'
  942. # relabel_configs:
  943. # - regex: (app_kubernetes_io_instance|app_kubernetes_io_name|component|controller_revision_hash|pod|pod_template_generation)
  944. # action: labeldrop
  945. # - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape_slow]
  946. # action: keep
  947. # regex: true
  948. # - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scheme]
  949. # action: replace
  950. # regex: (https?)
  951. # target_label: __scheme__
  952. # - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path]
  953. # action: replace
  954. # target_label: __metrics_path__
  955. # regex: (.+)
  956. # - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_port, __meta_kubernetes_pod_ip]
  957. # action: replace
  958. # regex: (\d+);(([A-Fa-f0-9]{1,4}::?){1,7}[A-Fa-f0-9]{1,4})
  959. # replacement: '[$2]:$1'
  960. # target_label: __address__
  961. # - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_port, __meta_kubernetes_pod_ip]
  962. # action: replace
  963. # regex: (\d+);((([0-9]+?)(\.|$)){4})
  964. # replacement: $2:$1
  965. # target_label: __address__
  966. # - action: labelmap
  967. # regex: __meta_kubernetes_pod_annotation_prometheus_io_param_(.+)
  968. # replacement: __param_$1
  969. # - action: labelmap
  970. # regex: __meta_kubernetes_pod_label_(.+)
  971. # - source_labels: [__meta_kubernetes_namespace]
  972. # action: replace
  973. # target_label: namespace
  974. # - source_labels: [__meta_kubernetes_pod_name]
  975. # action: replace
  976. # target_label: pod
  977. # - source_labels: [__meta_kubernetes_pod_phase]
  978. # regex: Pending|Succeeded|Failed|Completed
  979. # action: drop
  980. # - job_name: 'prometheus-blackbox-exporter'
  981. # metrics_path: /probe
  982. # params:
  983. # module: [http_2xx]
  984. # static_configs:
  985. # - targets:
  986. # - https://example.com
  987. # relabel_configs:
  988. # - source_labels: [__address__]
  989. # target_label: __param_target
  990. # - source_labels: [__param_target]
  991. # target_label: instance
  992. # - target_label: __address__
  993. # replacement: prometheus-blackbox-exporter:9115
  994. # Adds option to add alert_relabel_configs to avoid duplicate alerts in alertmanager
  995. # useful in H/A prometheus with different external labels but the same alerts
  996. alertRelabelConfigs: {}
  997. # alert_relabel_configs:
  998. # - source_labels: [dc]
  999. # regex: (.+)\d+
  1000. # target_label: dc
  1001. networkPolicy:
  1002. ## Enable creation of NetworkPolicy resources.
  1003. ##
  1004. enabled: false
  1005. # Force namespace of namespaced resources
  1006. forceNamespace: ""
  1007. # Extra manifests to deploy as an array
  1008. extraManifests: []
  1009. # - apiVersion: v1
  1010. # kind: ConfigMap
  1011. # metadata:
  1012. # labels:
  1013. # name: prometheus-extra
  1014. # data:
  1015. # extra-data: "value"
  1016. # Configuration of subcharts defined in Chart.yaml
  1017. ## alertmanager sub-chart configurable values
  1018. ## Please see https://github.com/prometheus-community/helm-charts/tree/main/charts/alertmanager
  1019. ##
  1020. alertmanager:
  1021. ## If false, alertmanager will not be installed
  1022. ##
  1023. enabled: true
  1024. persistence:
  1025. size: 2Gi
  1026. podSecurityContext:
  1027. runAsUser: 65534
  1028. runAsNonRoot: true
  1029. runAsGroup: 65534
  1030. fsGroup: 65534
  1031. resources:
  1032. limits:
  1033. cpu: 100m
  1034. memory: 256Mi
  1035. requests:
  1036. cpu: 100m
  1037. memory: 128Mi
  1038. ## kube-state-metrics sub-chart configurable values
  1039. ## Please see https://github.com/prometheus-community/helm-charts/tree/main/charts/kube-state-metrics
  1040. ##
  1041. kube-state-metrics:
  1042. ## If false, kube-state-metrics sub-chart will not be installed
  1043. ##
  1044. enabled: true
  1045. resources:
  1046. limits:
  1047. cpu: 100m
  1048. memory: 256Mi
  1049. requests:
  1050. cpu: 100m
  1051. memory: 128Mi
  1052. ## promtheus-node-exporter sub-chart configurable values
  1053. ## Please see https://github.com/prometheus-community/helm-charts/tree/main/charts/prometheus-node-exporter
  1054. ##
  1055. prometheus-node-exporter:
  1056. ## If false, node-exporter will not be installed
  1057. ##
  1058. enabled: false
  1059. rbac:
  1060. pspEnabled: false
  1061. containerSecurityContext:
  1062. allowPrivilegeEscalation: false
  1063. resources:
  1064. limits:
  1065. cpu: 100m
  1066. memory: 1024Mi
  1067. requests:
  1068. cpu: 100m
  1069. memory: 256Mi
  1070. ## pprometheus-pushgateway sub-chart configurable values
  1071. ## Please see https://github.com/prometheus-community/helm-charts/tree/main/charts/prometheus-pushgateway
  1072. ##
  1073. prometheus-pushgateway:
  1074. ## If false, pushgateway will not be installed
  1075. ##
  1076. enabled: true
  1077. # Optional service annotations
  1078. serviceAnnotations:
  1079. prometheus.io/probe: pushgateway
  1080. resources:
  1081. limits:
  1082. cpu: 100m
  1083. memory: 256Mi
  1084. requests:
  1085. cpu: 100m
  1086. memory: 128Mi