clusters/core/addons/prometheus-operator/values.yaml (113 lines of code) (raw):
kube-prometheus-stack:
fullnameOverride: "prom"
nameOverride: "prom"
defaultRules:
rules:
etcd: false
kubeControllerManager:
enabled: false
kubeEtcd:
enabled: false
kubeScheduler:
enabled: false
prometheusOperator:
resources:
limits:
memory: "256Mi"
requests:
cpu: "100m"
memory: "128Mi"
prometheus:
# # https://docs.kuberocketci.io/docs/operator-guide/ci/tekton-monitoring
# prometheusSpec:
# additionalScrapeConfigsSecret:
# enabled: true
# name: additional-scrape-configs
# key: prometheus-additional-job.yaml
ingress:
enabled: false
hosts:
- prometheus.example.com
additionalServiceMonitors: []
alertmanager:
enabled: false
config:
route:
receiver: 'msteams'
group_by: ['alertname']
group_wait: 30s
group_interval: 5m
repeat_interval: 12h
routes:
- receiver: 'msteams'
- match:
alertname: Watchdog
receiver: 'null'
inhibit_rules:
- target_match_re:
alertname: '.+Overcommit'
source_match:
alertname: 'Watchdog'
equal: ['prometheus']
receivers:
- name: 'null'
- name: 'msteams'
webhook_configs:
- url: "http://prometheus-msteams:2000/alert-sandbox"
ingress:
enabled: true
hosts:
- alertmanager.example.com
alertmanagerSpec:
resources:
limits:
memory: "300Mi"
requests:
cpu: "10m"
memory: "200Mi"
grafana:
fullnameOverride: grafana
# should be enabled for OIDC integration, secret field should be GF_AUTH_GENERIC_OAUTH_CLIENT_SECRET
envFromSecret: keycloak-client-grafana-secret
grafana.ini:
server:
root_url: https://grafana.example.com
analytics:
check_for_updates: false
auth:
oauth_auto_login: true
disable_signout_menu: true
auth.generic_oauth:
enabled: true
client_id: grafana
allow_sign_up: true
scopes: openid profile email roles
auth_url: "https://keycloak.example.com/auth/realms/shared/protocol/openid-connect/auth"
token_url: "https://keycloak.example.com/auth/realms/shared/protocol/openid-connect/token"
api_url: "https://keycloak.example.com/auth/realms/shared/protocol/openid-connect/userinfo"
role_attribute_path: contains(roles[*], 'administrator') && 'Admin' || contains(roles[*], 'developer') && 'Editor' || 'Viewer'
# created with expternal secret operator
admin:
existingSecret: grafana-admin-creds
userKey: username
passwordKey: password
ingress:
enabled: true
hosts:
- grafana.example.com
paths:
- /
pathType: ImplementationSpecific
resources:
limits:
memory: "128Mi"
requests:
cpu: "25m"
memory: "72Mi"
persistence:
enabled: true
storageClassName: "ebs-sc"
size: 1Gi
# This section enables configuration for using External Secrets Operator (ESO) as the secret manager.
# Prerequisite: Ensure that ESO is installed in the cluster.
# Refer to the EDP cluster add-on for ESO installation and setup:
# https://github.com/epam/edp-cluster-add-ons/tree/main/clusters/core/addons/external-secrets
#
# Ensure that you have created the necessary roles for ESO integration.
# Follow the detailed instructions here:
# https://docs.kuberocketci.io/docs/operator-guide/secrets-management/external-secrets-operator-integration#aws-parameter-store-scenario-in-kuberocketci
eso:
# -- Install components of the ESO.
enabled: true
# -- Defines provider type. One of `aws` or `generic`.
type: "aws"
# -- Defines Secret Store name.
secretStoreName: "aws-parameterstore"
# -- Value name in AWS ParameterStore, AWS SecretsManager or other Secret Store.
secretName: "/infra/core/addons/prometheus-operator"
# -- Role ARN for the ExternalSecretOperator to assume.
roleArn: arn:aws:iam::012345678910:role/AWSIRSA_Shared_ExternalSecretOperatorAccess
# Defines Secret Store configuration. Used when eso.type is set to "generic".
generic:
secretStore:
# -- Defines SecretStore provider configuration.
providerConfig: {}
# gcpsm:
# projectID: "alphabet-123"
# Configuration for setting up resources in Keycloak to enable OIDC authentication.
# Prerequisite: Ensure that the Keycloak Operator is installed and integrated with Keycloak.
# Refer to the installation guide for the Keycloak Operator:
# https://github.com/epam/edp-cluster-add-ons/tree/main/clusters/core/addons/keycloak-operator
#
# Additionally, necessary Keycloak resources such as realms, roles, and groups must be created
# to support component functionality. This can be done using the provided add-ons or manually:
# https://github.com/epam/edp-cluster-add-ons/tree/main/clusters/core/addons/kuberocketci-rbac
oidc:
enabled: false