Skip to content

Grafana Tempo is an open source, easy-to-use, and high-scale distributed tracing backend. Tempo is cost-efficient, requiring only object storage to operate, and is deeply integrated with Grafana, Prometheus, and Loki. Tempo can ingest common open sou

License

Notifications You must be signed in to change notification settings

DoD-Platform-One/Tempo

Repository files navigation

tempo

Version: 1.18.1-bb.1 Type: application AppVersion: 2.7.0 Maintenance Track: bb_integrated

Grafana Tempo Single Binary Mode

Upstream References

Upstream Release Notes

Learn More

Pre-Requisites

  • Kubernetes Cluster deployed
  • Kubernetes config installed in ~/.kube/config
  • Helm installed

Install Helm

https://helm.sh/docs/intro/install/

Deployment

  • Clone down the repository
  • cd into directory
helm install tempo chart/

Values

Key Type Default Description
global.commonLabels object {} Common labels for all object directly managed by this chart.
nameOverride string "" Overrides the chart's name
fullnameOverride string "" Overrides the chart's computed fullname
replicas int 1 Define the amount of instances
labels object {} labels for tempo
annotations object {} Annotations for the StatefulSet
tempo.repository string "registry1.dso.mil/ironbank/opensource/grafana/tempo" Docker image repository
tempo.tag string "2.7.0" Docker image tag
tempo.pullPolicy string "IfNotPresent" Docker image pull policy
tempo.updateStrategy string "RollingUpdate"
tempo.resources.limits.cpu string "500m"
tempo.resources.limits.memory string "4Gi"
tempo.resources.requests.cpu string "500m"
tempo.resources.requests.memory string "4Gi"
tempo.memBallastSizeMbs int 1024
tempo.multitenancyEnabled bool false
tempo.reportingEnabled bool false If true, Tempo will report anonymous usage data about the shape of a deployment to Grafana Labs
tempo.metricsGenerator.enabled bool false If true, enables Tempo's metrics generator (https://grafana.com/docs/tempo/next/metrics-generator/)
tempo.metricsGenerator.remoteWriteUrl string "http://prometheus.monitoring:9090/api/v1/write"
tempo.ingester object {"max_block_bytes":1000000,"max_block_duration":"5m","trace_idle_period":"10s"} Configuration options for the ingester
tempo.querier object {} Configuration options for the querier
tempo.queryFrontend object {} Configuration options for the query-fronted. Refers to: https://grafana.com/docs/tempo/latest/configuration/#query-frontend
tempo.retention string "336h"
tempo.global_overrides.per_tenant_override_config string "/conf/overrides.yaml"
tempo.overrides object {}
tempo.server.http_listen_port int 3100 HTTP server listen port
tempo.livenessProbe.httpGet.path string "/ready"
tempo.livenessProbe.httpGet.port int 3100
tempo.livenessProbe.initialDelaySeconds int 30
tempo.livenessProbe.periodSeconds int 10
tempo.livenessProbe.timeoutSeconds int 5
tempo.livenessProbe.failureThreshold int 3
tempo.livenessProbe.successThreshold int 1
tempo.readinessProbe.httpGet.path string "/ready"
tempo.readinessProbe.httpGet.port int 3100
tempo.readinessProbe.initialDelaySeconds int 20
tempo.readinessProbe.periodSeconds int 10
tempo.readinessProbe.timeoutSeconds int 5
tempo.readinessProbe.failureThreshold int 3
tempo.readinessProbe.successThreshold int 1
tempo.storage.trace.backend string "local"
tempo.storage.trace.local.path string "/var/tempo/traces"
tempo.storage.trace.wal.path string "/var/tempo/wal"
tempo.receivers.jaeger.protocols.grpc.endpoint string "0.0.0.0:14250"
tempo.receivers.jaeger.protocols.thrift_binary.endpoint string "0.0.0.0:6832"
tempo.receivers.jaeger.protocols.thrift_compact.endpoint string "0.0.0.0:6831"
tempo.receivers.jaeger.protocols.thrift_http.endpoint string "0.0.0.0:14268"
tempo.receivers.zipkin.endpoint string "0.0.0.0:9411"
tempo.receivers.opencensus string nil
tempo.receivers.otlp.protocols.grpc.endpoint string "0.0.0.0:4317"
tempo.receivers.otlp.protocols.http.endpoint string "0.0.0.0:4318"
tempo.securityContext.capabilities.drop[0] string "ALL"
tempo.extraArgs object {}
tempo.extraEnv list [] Environment variables to add
tempo.extraEnvFrom list [] Environment variables from secrets or configmaps to add to the ingester pods
tempo.extraVolumeMounts list [] Volume mounts to add
config string Dynamically generated tempo configmap Tempo configuration file contents
tempoQuery.repository string "registry1.dso.mil/ironbank/opensource/grafana/tempo-query" Docker image repository
tempoQuery.tag string "2.7.0" Docker image tag
tempoQuery.pullPolicy string "IfNotPresent" Docker image pull policy
tempoQuery.enabled bool false if False the tempo-query container is not deployed
tempoQuery.service.port int 16686
tempoQuery.ingress.enabled bool false
tempoQuery.ingress.annotations object {}
tempoQuery.ingress.labels object {}
tempoQuery.ingress.path string "/"
tempoQuery.ingress.pathType string "Prefix"
tempoQuery.ingress.hosts[0] string "query.tempo.example.com"
tempoQuery.ingress.extraPaths list []
tempoQuery.ingress.tls list []
tempoQuery.resources object {"limits":{"cpu":"300m","memory":"256Mi"},"requests":{"cpu":"300m","memory":"256Mi"}} Resource for query container
tempoQuery.extraArgs object {}
tempoQuery.extraEnv list [] Environment variables to add
tempoQuery.extraVolumeMounts list [] Volume mounts to add
tempoQuery.securityContext.capabilities.drop[0] string "ALL"
securityContext object {"fsGroup":1001,"runAsGroup":1001,"runAsNonRoot":true,"runAsUser":1001} securityContext for container
serviceAccount.create bool true Specifies whether a ServiceAccount should be created
serviceAccount.name string nil The name of the ServiceAccount to use. If not set and create is true, a name is generated using the fullname template
serviceAccount.imagePullSecrets list [{"name":"private-registry"}] Image pull secrets for the service account
serviceAccount.annotations object {} Annotations for the service account
serviceAccount.labels object {} Labels for the service account
serviceAccount.automountServiceAccountToken bool false
service.type string "ClusterIP"
service.clusterIP string ""
service.loadBalancerIP string nil IP address, in case of 'type: LoadBalancer'
service.protocol string "TCP" If service type is LoadBalancer, the exposed protocol can either be "UDP", "TCP" or "UDP,TCP"
service.annotations object {}
service.labels object {}
service.targetPort string ""
serviceMonitor.enabled bool false
serviceMonitor.interval string ""
serviceMonitor.additionalLabels object {}
serviceMonitor.annotations object {}
serviceMonitor.scheme string ""
serviceMonitor.tlsConfig object {}
persistence.enabled bool true
persistence.enableStatefulSetAutoDeletePVC bool true Enable StatefulSetAutoDeletePVC feature
persistence.accessModes[0] string "ReadWriteOnce"
persistence.size string "15Gi"
podAnnotations object {"traffic.sidecar.istio.io/includeInboundPorts":"3100,4317,4318"} Pod Annotations
podLabels object {} Pod (extra) Labels
extraLabels object {}
extraVolumes list [] Volumes to add
nodeSelector object {} Node labels for pod assignment. See: https://kubernetes.io/docs/user-guide/node-selection/
tolerations list [] Tolerations for pod assignment. See: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
affinity object {} Affinity for pod assignment. See: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
priorityClassName string nil The name of the PriorityClass
hostAliases list [] hostAliases to add
networkPolicy.enabled bool false
networkPolicy.ingress bool true
networkPolicy.allowExternal bool true
networkPolicy.explicitNamespacesSelector object {}
networkPolicy.egress.enabled bool false
networkPolicy.egress.blockDNSResolution bool false
networkPolicy.egress.ports list []
networkPolicy.egress.to list []
domain string "dev.bigbang.mil" Domain used for BigBang created exposed services
istio object {"enabled":false,"hardened":{"customAuthorizationPolicies":[],"customServiceEntries":[],"enabled":false,"outboundTrafficPolicyMode":"REGISTRY_ONLY"},"mtls":{"mode":"STRICT"}} Toggle istio integration. Intended to be controlled via BigBang passthrough of istio package status
istio.hardened object {"customAuthorizationPolicies":[],"customServiceEntries":[],"enabled":false,"outboundTrafficPolicyMode":"REGISTRY_ONLY"} Default peer authentication values
istio.mtls.mode string "STRICT" STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic
objectStorage.access_key_id string "" AWS access_key_id for External ObjectStorage configuration
objectStorage.secret_access_key string "" AWS secret_access_key for External ObjectStorage configuration
networkPolicies object {"additionalPolicies":[],"controlPlaneCidr":"0.0.0.0/0","enabled":false,"ingressLabels":{"app":"istio-ingressgateway","istio":"ingressgateway"}} Toggle for BigBang specific NetworkPolicies. If disabled no NetworkPolicies will be installed with package ref: https://kubernetes.io/docs/concepts/services-networking/network-policies/
networkPolicies.ingressLabels object {"app":"istio-ingressgateway","istio":"ingressgateway"} Istio IngressGateway labels for VirtualService external routing to app UI
networkPolicies.controlPlaneCidr string "0.0.0.0/0" Use kubectl cluster-info and then resolve to IP for kube-api. Review value description in BigBang README.md
monitoring object {"enabled":false} Toggle monitoring integration. Intended to be controlled via BigBang passthrough of monitoring package status
sso object {"enabled":false} SSO toggle. Intended to be controlled via BigBang passthrough, only affects network/auth policies.
bbtests.enabled bool false
bbtests.cypress.artifacts bool true
bbtests.cypress.envs.cypress_url string "http://{{ template \"tempo.fullname\" . }}.{{ .Release.Namespace }}.svc.cluster.local:16686"
bbtests.cypress.envs.cypress_tempo_datasource string "http://{{ template \"tempo.fullname\" . }}.{{ .Release.Namespace }}.svc:3100"
bbtests.cypress.envs.cypress_check_datasource string "false"
bbtests.cypress.envs.cypress_grafana_url string "http://monitoring-grafana.monitoring.svc.cluster.local"
bbtests.cypress.resources.requests.cpu string "1"
bbtests.cypress.resources.requests.memory string "1Gi"
bbtests.cypress.resources.limits.cpu string "2"
bbtests.cypress.resources.limits.memory string "2Gi"
bbtests.scripts.enabled bool true
bbtests.scripts.image string "registry1.dso.mil/ironbank/big-bang/base:2.1.0"
bbtests.scripts.envs.TEMPO_METRICS_URL string "http://{{ template \"tempo.fullname\" . }}.{{ .Release.Namespace }}.svc:3100"
openshift bool false Toggle or openshift specific config

Contributing

Please see the contributing guide if you are interested in contributing.


This file is programatically generated using helm-docs and some BigBang-specific templates. The gluon repository has instructions for regenerating package READMEs.

About

Grafana Tempo is an open source, easy-to-use, and high-scale distributed tracing backend. Tempo is cost-efficient, requiring only object storage to operate, and is deeply integrated with Grafana, Prometheus, and Loki. Tempo can ingest common open sou

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published