Horizontally scalable, highly available, multi-tenant, long term Prometheus.
Homepage: https://cortexmetrics.io/
Name | Url | |
---|---|---|
Cortex Maintainers | [email protected] |
Cortex requires an externally provided key-value store, such as etcd or Consul.
Both services can be installed alongside Cortex, for example using helm charts available here and here.
Cortex requires a storage backend to store metrics and indexes. See cortex documentation for details on storage types and documentation
Helm must be installed to use the charts. Please refer to Helm's documentation to get started.
Once Helm is set up properly, add the repo as follows:
helm repo add cortex-helm https://cortexproject.github.io/cortex-helm-chart
Cortex can now be installed with the following command:
helm install cortex --namespace cortex cortex-helm/cortex
If you have custom options or values you want to override:
helm install cortex --namespace cortex -f my-cortex-values.yaml cortex-helm/cortex
Specific versions of the chart can be installed using the --version
option, with the default being the latest release.
What versions are available for installation can be listed with the following command:
helm search repo cortex-helm
As part of this chart many different pods and services are installed which all have varying resource requirements. Please make sure that you have sufficient resources (CPU/memory) available in your cluster before installing Cortex Helm chart.
To upgrade Cortex use the following command:
helm upgrade cortex -f my-cortex-values.yaml cortex-helm/cortex
Note that it might be necessary to use --reset-values
since some default values in the values.yaml might have changed or were removed.
Source code can be found here
Cortex can be configured to use a sidecar container in the Ruler and AlertManager to dynamically discover rules and AlertManager config/templates that are declared as ConfigMaps to allow easy and extensible configuration that avoids having to store state in the Cortex system itself (via config service, etc). Put ConfigMaps into the specified namespace, and they are automatically detected and added as files to the Ruler and/or AlertManager containers, both of which are polling for changes on the filesystem and will make the new configurations go live dynamically. This feature is disabled by default. Here is a simple example:
ruler:
sidecar:
enabled: true
searchNamespace: cortex-rules
alertmanager:
sidecar:
enabled: true
searchNamespace: cortex-alertmanager
And here are the related configuration values in AlertManager and Ruler:
config:
alertmanager:
data_dir: /data/
storage:
type : local
local:
path: /data
ruler:
rule_path: /data/rules
storage:
type : local
local:
directory: /tmp/rules
In AlertManager, the data_dir and local storage directory should be the same. In the Ruler, there needs to be two separate volumes. One is read-only and serves as the location shared with the sidecar that contains all of the rules that were derived from configmaps (/tmp/rules). The other is read-write and used by the Ruler itself for its own management of rules, etc (/data). Example ConfigMap containing a rule:
kind: ConfigMap
metadata:
annotations:
k8s-sidecar-target-directory: /tmp/rules/fake
labels:
# Label cortex_rules must exist unless overridden by ruler.sidecar.label
cortex_rules: "1"
name: rules-cortex-9f99md47tc
namespace: cortex-rules
apiVersion: v1
data:
fake.yaml: |-
groups:
- name: fake-system-metrics
rules:
- alert: HighCPUusage
expr: avg(100 - rate(node_cpu_seconds_total{instance=~"qag1ge1l.+",mode="idle"}[5m]) * 100) by (instance) > 100
for: 3m
labels:
severity: warning
annotations:
description: Metrics from {{ $labels.job }} on {{ $labels.instance }} show CPU > 90% for 3m.
title: Node {{ $labels.instance }} has high CPU usage
Example ConfigMap containing an alertmanager-config:
apiVersion: v1
kind: ConfigMap
metadata:
annotations:
k8s-sidecar-target-directory: /data/fake
labels:
cortex_alertmanager: "1"
name: alertmanager-example-config
data:
fake.yaml: |-
global:
resolve_timeout: 5m
http_config: {}
smtp_hello: localhost
smtp_require_tls: true
route:
receiver: team-X-mails
group_by:
- alertname
routes:
- receiver: "null"
match:
alertname: Watchdog
group_wait: 30s
group_interval: 5m
repeat_interval: 12h
receivers:
- name: 'team-X-mails'
email_configs:
- to: '[email protected]'
Kubernetes: ^1.19.0-0
Repository | Name | Version |
---|---|---|
https://charts.bitnami.com/bitnami | memcached(memcached) | 5.13.0 |
https://charts.bitnami.com/bitnami | memcached-index-read(memcached) | 5.13.0 |
https://charts.bitnami.com/bitnami | memcached-index-write(memcached) | 5.13.0 |
https://charts.bitnami.com/bitnami | memcached-frontend(memcached) | 5.13.0 |
https://charts.bitnami.com/bitnami | memcached-blocks-index(memcached) | 5.13.0 |
https://charts.bitnami.com/bitnami | memcached-blocks(memcached) | 5.13.0 |
https://charts.bitnami.com/bitnami | memcached-blocks-metadata(memcached) | 5.13.0 |
Key | Type | Default | Description |
---|---|---|---|
alertmanager.affinity | object | {} |
|
alertmanager.annotations | object | {} |
|
alertmanager.containerSecurityContext.enabled | bool | true |
|
alertmanager.containerSecurityContext.readOnlyRootFilesystem | bool | true |
|
alertmanager.enabled | bool | true |
|
alertmanager.env | list | [] |
|
alertmanager.extraArgs | object | {} |
|
alertmanager.extraContainers | list | [] |
|
alertmanager.extraPorts | list | [] |
|
alertmanager.extraVolumeMounts | list | [] |
|
alertmanager.extraVolumes | list | [] |
|
alertmanager.initContainers | list | [] |
|
alertmanager.livenessProbe.httpGet.path | string | "/ready" |
|
alertmanager.livenessProbe.httpGet.port | string | "http-metrics" |
|
alertmanager.nodeSelector | object | {} |
|
alertmanager.persistence.subPath | string | nil |
|
alertmanager.persistentVolume.accessModes[0] | string | "ReadWriteOnce" |
|
alertmanager.persistentVolume.annotations | object | {} |
|
alertmanager.persistentVolume.enabled | bool | true |
|
alertmanager.persistentVolume.size | string | "2Gi" |
|
alertmanager.persistentVolume.subPath | string | "" |
|
alertmanager.podAnnotations."prometheus.io/port" | string | "http-metrics" |
|
alertmanager.podAnnotations."prometheus.io/scrape" | string | "true" |
|
alertmanager.podDisruptionBudget.maxUnavailable | int | 1 |
|
alertmanager.podLabels | object | {} |
|
alertmanager.readinessProbe.httpGet.path | string | "/ready" |
|
alertmanager.readinessProbe.httpGet.port | string | "http-metrics" |
|
alertmanager.replicas | int | 1 |
|
alertmanager.resources | object | {} |
|
alertmanager.securityContext | object | {} |
|
alertmanager.service.annotations | object | {} |
|
alertmanager.service.labels | object | {} |
|
alertmanager.serviceMonitor.additionalLabels | object | {} |
|
alertmanager.serviceMonitor.enabled | bool | false |
|
alertmanager.serviceMonitor.metricRelabelings | list | [] |
|
alertmanager.serviceMonitor.relabelings | list | [] |
|
alertmanager.sidecar.defaultFolderName | string | nil |
|
alertmanager.sidecar.enableUniqueFilenames | bool | false |
|
alertmanager.sidecar.enabled | bool | false |
|
alertmanager.sidecar.folder | string | "/data" |
|
alertmanager.sidecar.folderAnnotation | string | nil |
|
alertmanager.sidecar.image.repository | string | "quay.io/kiwigrid/k8s-sidecar" |
|
alertmanager.sidecar.image.sha | string | "" |
|
alertmanager.sidecar.image.tag | string | "1.10.7" |
|
alertmanager.sidecar.imagePullPolicy | string | "IfNotPresent" |
|
alertmanager.sidecar.label | string | "cortex_alertmanager" |
|
alertmanager.sidecar.labelValue | string | nil |
|
alertmanager.sidecar.resources | object | {} |
|
alertmanager.sidecar.searchNamespace | string | nil |
|
alertmanager.sidecar.securityContext.runAsUser | int | 0 |
|
alertmanager.sidecar.watchMethod | string | nil |
|
alertmanager.startupProbe.failureThreshold | int | 10 |
|
alertmanager.startupProbe.httpGet.path | string | "/ready" |
|
alertmanager.startupProbe.httpGet.port | string | "http-metrics" |
|
alertmanager.statefulSet.enabled | bool | false |
|
alertmanager.statefulStrategy.type | string | "RollingUpdate" |
|
alertmanager.strategy.rollingUpdate.maxSurge | int | 0 |
|
alertmanager.strategy.rollingUpdate.maxUnavailable | int | 1 |
|
alertmanager.strategy.type | string | "RollingUpdate" |
|
alertmanager.terminationGracePeriodSeconds | int | 60 |
|
alertmanager.tolerations | list | [] |
|
clusterDomain | string | "cluster.local" |
|
compactor.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].key | string | "app.kubernetes.io/component" |
|
compactor.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].operator | string | "In" |
|
compactor.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].values[0] | string | "compactor" |
|
compactor.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.topologyKey | string | "kubernetes.io/hostname" |
|
compactor.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].weight | int | 100 |
|
compactor.annotations | object | {} |
|
compactor.containerSecurityContext.enabled | bool | true |
|
compactor.containerSecurityContext.readOnlyRootFilesystem | bool | true |
|
compactor.enabled | bool | true |
|
compactor.env | list | [] |
|
compactor.extraArgs | object | {} |
|
compactor.extraContainers | list | [] |
|
compactor.extraPorts | list | [] |
|
compactor.extraVolumeMounts | list | [] |
|
compactor.extraVolumes | list | [] |
|
compactor.initContainers | list | [] |
|
compactor.livenessProbe.httpGet.path | string | "/ready" |
|
compactor.livenessProbe.httpGet.port | string | "http-metrics" |
|
compactor.livenessProbe.httpGet.scheme | string | "HTTP" |
|
compactor.nodeSelector | object | {} |
|
compactor.persistentVolume.accessModes[0] | string | "ReadWriteOnce" |
|
compactor.persistentVolume.annotations | object | {} |
|
compactor.persistentVolume.enabled | bool | true |
|
compactor.persistentVolume.size | string | "2Gi" |
|
compactor.persistentVolume.subPath | string | "" |
|
compactor.podAnnotations."prometheus.io/port" | string | "http-metrics" |
|
compactor.podAnnotations."prometheus.io/scrape" | string | "true" |
|
compactor.podDisruptionBudget.maxUnavailable | int | 1 |
|
compactor.podLabels | object | {} |
|
compactor.readinessProbe.httpGet.path | string | "/ready" |
|
compactor.readinessProbe.httpGet.port | string | "http-metrics" |
|
compactor.replicas | int | 1 |
|
compactor.resources | object | {} |
|
compactor.securityContext | object | {} |
|
compactor.service.annotations | object | {} |
|
compactor.service.labels | object | {} |
|
compactor.serviceMonitor.additionalLabels | object | {} |
|
compactor.serviceMonitor.enabled | bool | false |
|
compactor.serviceMonitor.metricRelabelings | list | [] |
|
compactor.serviceMonitor.relabelings | list | [] |
|
compactor.startupProbe.failureThreshold | int | 60 |
|
compactor.startupProbe.httpGet.path | string | "/ready" |
|
compactor.startupProbe.httpGet.port | string | "http-metrics" |
|
compactor.startupProbe.httpGet.scheme | string | "HTTP" |
|
compactor.startupProbe.initialDelaySeconds | int | 120 |
|
compactor.startupProbe.periodSeconds | int | 30 |
|
compactor.strategy.type | string | "RollingUpdate" |
|
compactor.terminationGracePeriodSeconds | int | 240 |
|
compactor.tolerations | list | [] |
|
config.alertmanager.enable_api | bool | false |
Enable the experimental alertmanager config api. |
config.alertmanager.external_url | string | "/api/prom/alertmanager" |
|
config.alertmanager.storage | object | {} |
Type of backend to use to store alertmanager configs. Supported values are: "configdb", "gcs", "s3", "local". refer to: https://cortexmetrics.io/docs/configuration/configuration-file/#alertmanager_config |
config.api.prometheus_http_prefix | string | "/prometheus" |
|
config.api.response_compression_enabled | bool | true |
|
config.auth_enabled | bool | false |
|
config.chunk_store.chunk_cache_config.memcached.expiration | string | "1h" |
|
config.chunk_store.chunk_cache_config.memcached_client.timeout | string | "1s" |
|
config.distributor.pool.health_check_ingesters | bool | true |
|
config.distributor.shard_by_all_labels | bool | true |
|
config.frontend.log_queries_longer_than | string | "10s" |
|
config.ingester.lifecycler.final_sleep | string | "0s" |
|
config.ingester.lifecycler.join_after | string | "0s" |
|
config.ingester.lifecycler.num_tokens | int | 512 |
|
config.ingester.lifecycler.ring.kvstore.consul.consistent_reads | bool | true |
|
config.ingester.lifecycler.ring.kvstore.consul.host | string | "consul:8500" |
|
config.ingester.lifecycler.ring.kvstore.consul.http_client_timeout | string | "20s" |
|
config.ingester.lifecycler.ring.kvstore.prefix | string | "collectors/" |
|
config.ingester.lifecycler.ring.kvstore.store | string | "consul" |
|
config.ingester.lifecycler.ring.replication_factor | int | 3 |
|
config.ingester.max_transfer_retries | int | 0 |
|
config.ingester_client.grpc_client_config.max_recv_msg_size | int | 104857600 |
|
config.ingester_client.grpc_client_config.max_send_msg_size | int | 104857600 |
|
config.limits.enforce_metric_name | bool | false |
|
config.limits.max_query_lookback | string | "0s" |
|
config.limits.reject_old_samples | bool | true |
|
config.limits.reject_old_samples_max_age | string | "168h" |
|
config.memberlist.bind_port | int | 7946 |
|
config.memberlist.join_members | list | [] |
the service name of the memberlist if using memberlist discovery |
config.querier.active_query_tracker_dir | string | "/data/cortex/querier" |
|
config.querier.query_ingesters_within | string | "12h" |
|
config.query_range.align_queries_with_step | bool | true |
|
config.query_range.cache_results | bool | true |
|
config.query_range.results_cache.cache.memcached.expiration | string | "1h" |
|
config.query_range.results_cache.cache.memcached_client.timeout | string | "1s" |
|
config.query_range.split_queries_by_interval | string | "24h" |
|
config.ruler.enable_alertmanager_discovery | bool | false |
|
config.ruler.enable_api | bool | false |
Enable the experimental ruler config api. |
config.ruler.storage | object | {} |
Method to use for backend rule storage (configdb, azure, gcs, s3, swift, local) refer to https://cortexmetrics.io/docs/configuration/configuration-file/#ruler_config |
config.schema.configs[0].chunks.period | string | "168h" |
|
config.schema.configs[0].chunks.prefix | string | "chunks_" |
|
config.schema.configs[0].from | string | "2020-11-01" |
|
config.schema.configs[0].index.period | string | "168h" |
|
config.schema.configs[0].index.prefix | string | "index_" |
|
config.schema.configs[0].object_store | string | "cassandra" |
|
config.schema.configs[0].schema | string | "v10" |
|
config.schema.configs[0].store | string | "cassandra" |
|
config.server.grpc_listen_port | int | 9095 |
|
config.server.grpc_server_max_concurrent_streams | int | 1000 |
|
config.server.grpc_server_max_recv_msg_size | int | 104857600 |
|
config.server.grpc_server_max_send_msg_size | int | 104857600 |
|
config.server.http_listen_port | int | 8080 |
|
config.storage.azure.account_key | string | nil |
|
config.storage.azure.account_name | string | nil |
|
config.storage.azure.container_name | string | nil |
|
config.storage.cassandra.addresses | string | nil |
|
config.storage.cassandra.auth | bool | true |
|
config.storage.cassandra.keyspace | string | "cortex" |
|
config.storage.cassandra.password | string | nil |
|
config.storage.cassandra.username | string | nil |
|
config.storage.engine | string | "chunks" |
|
config.storage.index_queries_cache_config.memcached.expiration | string | "1h" |
|
config.storage.index_queries_cache_config.memcached_client.timeout | string | "1s" |
|
config.table_manager.retention_deletes_enabled | bool | false |
|
config.table_manager.retention_period | string | "0s" |
|
configs.affinity | object | {} |
|
configs.annotations | object | {} |
|
configs.containerSecurityContext.enabled | bool | true |
|
configs.containerSecurityContext.readOnlyRootFilesystem | bool | true |
|
configs.enabled | bool | false |
|
configs.env | list | [] |
|
configs.extraArgs | object | {} |
|
configs.extraContainers | list | [] |
|
configs.extraPorts | list | [] |
|
configs.extraVolumeMounts | list | [] |
|
configs.extraVolumes | list | [] |
|
configs.initContainers | list | [] |
|
configs.livenessProbe.httpGet.path | string | "/ready" |
|
configs.livenessProbe.httpGet.port | string | "http-metrics" |
|
configs.nodeSelector | object | {} |
|
configs.persistence.subPath | string | nil |
|
configs.podAnnotations."prometheus.io/port" | string | "http-metrics" |
|
configs.podAnnotations."prometheus.io/scrape" | string | "true" |
|
configs.podDisruptionBudget.maxUnavailable | int | 1 |
|
configs.podLabels | object | {} |
|
configs.readinessProbe.httpGet.path | string | "/ready" |
|
configs.readinessProbe.httpGet.port | string | "http-metrics" |
|
configs.replicas | int | 1 |
|
configs.resources | object | {} |
|
configs.securityContext | object | {} |
|
configs.service.annotations | object | {} |
|
configs.service.labels | object | {} |
|
configs.serviceMonitor.additionalLabels | object | {} |
|
configs.serviceMonitor.enabled | bool | false |
|
configs.serviceMonitor.metricRelabelings | list | [] |
|
configs.serviceMonitor.relabelings | list | [] |
|
configs.startupProbe.failureThreshold | int | 10 |
|
configs.startupProbe.httpGet.path | string | "/ready" |
|
configs.startupProbe.httpGet.port | string | "http-metrics" |
|
configs.strategy.rollingUpdate.maxSurge | int | 0 |
|
configs.strategy.rollingUpdate.maxUnavailable | int | 1 |
|
configs.strategy.type | string | "RollingUpdate" |
|
configs.terminationGracePeriodSeconds | int | 180 |
|
configs.tolerations | list | [] |
|
configsdb_postgresql.auth.existing_secret.key | string | nil |
|
configsdb_postgresql.auth.existing_secret.name | string | nil |
|
configsdb_postgresql.auth.password | string | nil |
|
configsdb_postgresql.enabled | bool | false |
|
configsdb_postgresql.uri | string | nil |
|
distributor.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].key | string | "app.kubernetes.io/component" |
|
distributor.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].operator | string | "In" |
|
distributor.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].values[0] | string | "distributor" |
|
distributor.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.topologyKey | string | "kubernetes.io/hostname" |
|
distributor.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].weight | int | 100 |
|
distributor.annotations | object | {} |
|
distributor.autoscaling.behavior | object | {} |
Ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/#support-for-configurable-scaling-behavior |
distributor.autoscaling.enabled | bool | false |
Creates a HorizontalPodAutoscaler for the distributor pods. |
distributor.autoscaling.maxReplicas | int | 30 |
|
distributor.autoscaling.minReplicas | int | 2 |
|
distributor.autoscaling.targetCPUUtilizationPercentage | int | 80 |
|
distributor.autoscaling.targetMemoryUtilizationPercentage | int | 0 |
|
distributor.containerSecurityContext.enabled | bool | true |
|
distributor.containerSecurityContext.readOnlyRootFilesystem | bool | true |
|
distributor.env | list | [] |
|
distributor.extraArgs | object | {} |
|
distributor.extraContainers | list | [] |
|
distributor.extraPorts | list | [] |
|
distributor.extraVolumeMounts | list | [] |
|
distributor.extraVolumes | list | [] |
|
distributor.initContainers | list | [] |
|
distributor.livenessProbe.httpGet.path | string | "/ready" |
|
distributor.livenessProbe.httpGet.port | string | "http-metrics" |
|
distributor.nodeSelector | object | {} |
|
distributor.persistence.subPath | string | nil |
|
distributor.podAnnotations."prometheus.io/port" | string | "http-metrics" |
|
distributor.podAnnotations."prometheus.io/scrape" | string | "true" |
|
distributor.podDisruptionBudget.maxUnavailable | int | 1 |
|
distributor.podLabels | object | {} |
|
distributor.readinessProbe.httpGet.path | string | "/ready" |
|
distributor.readinessProbe.httpGet.port | string | "http-metrics" |
|
distributor.replicas | int | 2 |
|
distributor.resources | object | {} |
|
distributor.securityContext | object | {} |
|
distributor.service.annotations | object | {} |
|
distributor.service.labels | object | {} |
|
distributor.serviceMonitor.additionalLabels | object | {} |
|
distributor.serviceMonitor.enabled | bool | false |
|
distributor.serviceMonitor.metricRelabelings | list | [] |
|
distributor.serviceMonitor.relabelings | list | [] |
|
distributor.startupProbe.failureThreshold | int | 10 |
|
distributor.startupProbe.httpGet.path | string | "/ready" |
|
distributor.startupProbe.httpGet.port | string | "http-metrics" |
|
distributor.strategy.rollingUpdate.maxSurge | int | 0 |
|
distributor.strategy.rollingUpdate.maxUnavailable | int | 1 |
|
distributor.strategy.type | string | "RollingUpdate" |
|
distributor.terminationGracePeriodSeconds | int | 60 |
|
distributor.tolerations | list | [] |
|
externalConfigSecretName | string | "secret-with-config.yaml" |
|
externalConfigVersion | string | "0" |
|
image.pullPolicy | string | "IfNotPresent" |
|
image.repository | string | "quay.io/cortexproject/cortex" |
|
image.tag | string | "v1.9.0" |
|
ingester.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].key | string | "app.kubernetes.io/component" |
|
ingester.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].operator | string | "In" |
|
ingester.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].values[0] | string | "ingester" |
|
ingester.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.topologyKey | string | "kubernetes.io/hostname" |
|
ingester.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].weight | int | 100 |
|
ingester.annotations | object | {} |
|
ingester.autoscaling.behavior.scaleDown.policies | list | [{"periodSeconds":1800,"type":"Pods","value":1}] |
see https://cortexmetrics.io/docs/guides/ingesters-scaling-up-and-down/#scaling-down for scaledown details |
ingester.autoscaling.behavior.scaleDown.stabilizationWindowSeconds | int | 3600 |
uses metrics from the past 1h to make scaleDown decisions |
ingester.autoscaling.behavior.scaleUp.policies | list | [{"periodSeconds":1800,"type":"Pods","value":1}] |
This default scaleup policy allows adding 1 pod every 30 minutes. Ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/#support-for-configurable-scaling-behavior |
ingester.autoscaling.enabled | bool | false |
|
ingester.autoscaling.maxReplicas | int | 30 |
|
ingester.autoscaling.minReplicas | int | 3 |
|
ingester.autoscaling.targetMemoryUtilizationPercentage | int | 80 |
|
ingester.containerSecurityContext.enabled | bool | true |
|
ingester.containerSecurityContext.readOnlyRootFilesystem | bool | true |
|
ingester.env | list | [] |
|
ingester.extraArgs | object | {} |
|
ingester.extraContainers | list | [] |
|
ingester.extraPorts | list | [] |
|
ingester.extraVolumeMounts | list | [] |
|
ingester.extraVolumes | list | [] |
|
ingester.initContainers | list | [] |
|
ingester.lifecycle.preStop | object | {"httpGet":{"path":"/ingester/shutdown","port":"http-metrics"}} |
The /shutdown preStop hook is recommended as part of the ingester scaledown process, but can be removed to optimize rolling restarts in instances that will never be scaled down or when using chunks storage with WAL disabled. https://cortexmetrics.io/docs/guides/ingesters-scaling-up-and-down/#scaling-down |
ingester.livenessProbe.httpGet.path | string | "/ready" |
|
ingester.livenessProbe.httpGet.port | string | "http-metrics" |
|
ingester.livenessProbe.httpGet.scheme | string | "HTTP" |
|
ingester.nodeSelector | object | {} |
|
ingester.persistence.subPath | string | nil |
|
ingester.persistentVolume.accessModes[0] | string | "ReadWriteOnce" |
|
ingester.persistentVolume.annotations | object | {} |
|
ingester.persistentVolume.enabled | bool | true |
|
ingester.persistentVolume.size | string | "2Gi" |
|
ingester.persistentVolume.subPath | string | "" |
|
ingester.podAnnotations."prometheus.io/port" | string | "http-metrics" |
|
ingester.podAnnotations."prometheus.io/scrape" | string | "true" |
|
ingester.podDisruptionBudget.maxUnavailable | int | 1 |
|
ingester.podLabels | object | {} |
|
ingester.readinessProbe.httpGet.path | string | "/ready" |
|
ingester.readinessProbe.httpGet.port | string | "http-metrics" |
|
ingester.replicas | int | 3 |
|
ingester.resources | object | {} |
|
ingester.securityContext | object | {} |
|
ingester.service.annotations | object | {} |
|
ingester.service.labels | object | {} |
|
ingester.serviceMonitor.additionalLabels | object | {} |
|
ingester.serviceMonitor.enabled | bool | false |
|
ingester.serviceMonitor.metricRelabelings | list | [] |
|
ingester.serviceMonitor.relabelings | list | [] |
|
ingester.startupProbe.failureThreshold | int | 60 |
|
ingester.startupProbe.httpGet.path | string | "/ready" |
|
ingester.startupProbe.httpGet.port | string | "http-metrics" |
|
ingester.startupProbe.httpGet.scheme | string | "HTTP" |
|
ingester.startupProbe.initialDelaySeconds | int | 120 |
|
ingester.startupProbe.periodSeconds | int | 30 |
|
ingester.statefulSet.enabled | bool | false |
|
ingester.statefulStrategy.type | string | "RollingUpdate" |
|
ingester.strategy.rollingUpdate.maxSurge | int | 0 |
|
ingester.strategy.rollingUpdate.maxUnavailable | int | 1 |
|
ingester.strategy.type | string | "RollingUpdate" |
|
ingester.terminationGracePeriodSeconds | int | 240 |
|
ingester.tolerations | list | [] |
|
ingress.annotations | string | nil |
|
ingress.enabled | bool | false |
|
ingress.hosts[0].host | string | "chart-example.local" |
|
ingress.hosts[0].paths[0] | string | "/" |
|
ingress.tls | list | [] |
|
memcached-blocks-index.architecture | string | "high-availability" |
|
memcached-blocks-index.memcached.extraArgs[0] | string | "-I 32m" |
|
memcached-blocks-index.memcached.maxItemMemory | int | 3840 |
|
memcached-blocks-index.memcached.threads | int | 32 |
|
memcached-blocks-index.metrics.enabled | bool | true |
|
memcached-blocks-index.replicaCount | int | 2 |
|
memcached-blocks-index.resources | object | {} |
|
memcached-blocks-metadata.architecture | string | "high-availability" |
|
memcached-blocks-metadata.memcached.extraArgs[0] | string | "-I 32m" |
|
memcached-blocks-metadata.memcached.maxItemMemory | int | 3840 |
|
memcached-blocks-metadata.memcached.threads | int | 32 |
|
memcached-blocks-metadata.metrics.enabled | bool | true |
|
memcached-blocks-metadata.replicaCount | int | 2 |
|
memcached-blocks-metadata.resources | object | {} |
|
memcached-blocks.architecture | string | "high-availability" |
|
memcached-blocks.memcached.extraArgs[0] | string | "-I 32m" |
|
memcached-blocks.memcached.maxItemMemory | int | 3840 |
|
memcached-blocks.memcached.threads | int | 32 |
|
memcached-blocks.metrics.enabled | bool | true |
|
memcached-blocks.replicaCount | int | 2 |
|
memcached-blocks.resources | object | {} |
|
memcached-frontend.architecture | string | "high-availability" |
|
memcached-frontend.enabled | bool | false |
|
memcached-frontend.memcached.extraArgs[0] | string | "-I 32m" |
|
memcached-frontend.memcached.maxItemMemory | int | 3840 |
|
memcached-frontend.memcached.threads | int | 32 |
|
memcached-frontend.metrics.enabled | bool | true |
|
memcached-frontend.replicaCount | int | 2 |
|
memcached-frontend.resources | object | {} |
|
memcached-index-read.architecture | string | "high-availability" |
|
memcached-index-read.enabled | bool | false |
|
memcached-index-read.memcached.extraArgs[0] | string | "-I 32m" |
|
memcached-index-read.memcached.maxItemMemory | int | 3840 |
|
memcached-index-read.memcached.threads | int | 32 |
|
memcached-index-read.metrics.enabled | bool | true |
|
memcached-index-read.replicaCount | int | 2 |
|
memcached-index-read.resources | object | {} |
|
memcached-index-write.architecture | string | "high-availability" |
|
memcached-index-write.enabled | bool | false |
|
memcached-index-write.memcached.extraArgs[0] | string | "-I 32m" |
|
memcached-index-write.memcached.maxItemMemory | int | 3840 |
|
memcached-index-write.memcached.threads | int | 32 |
|
memcached-index-write.metrics.enabled | bool | true |
|
memcached-index-write.replicaCount | int | 2 |
|
memcached-index-write.resources | object | {} |
|
memcached.architecture | string | "high-availability" |
|
memcached.enabled | bool | false |
|
memcached.memcached.extraArgs[0] | string | "-I 32m" |
|
memcached.memcached.maxItemMemory | int | 3840 |
|
memcached.memcached.threads | int | 32 |
|
memcached.metrics.enabled | bool | true |
|
memcached.pdbMinAvailable | int | 1 |
|
memcached.replicaCount | int | 2 |
|
memcached.resources | object | {} |
|
nginx.affinity | object | {} |
|
nginx.annotations | object | {} |
|
nginx.config.auth_orgs | list | [] |
(optional) List of auth tenants to set in the nginx config |
nginx.config.client_max_body_size | string | "1M" |
|
nginx.config.dnsResolver | string | "kube-dns.kube-system.svc.cluster.local" |
|
nginx.config.setHeaders | object | {} |
|
nginx.containerSecurityContext.enabled | bool | true |
|
nginx.containerSecurityContext.readOnlyRootFilesystem | bool | false |
|
nginx.enabled | bool | true |
|
nginx.env | list | [] |
|
nginx.extraArgs | object | {} |
|
nginx.extraContainers | list | [] |
|
nginx.extraPorts | list | [] |
|
nginx.extraVolumeMounts | list | [] |
|
nginx.extraVolumes | list | [] |
|
nginx.http_listen_port | int | 80 |
|
nginx.image.pullPolicy | string | "IfNotPresent" |
|
nginx.image.repository | string | "nginx" |
|
nginx.image.tag | float | 1.21 |
|
nginx.initContainers | list | [] |
|
nginx.livenessProbe.httpGet.path | string | "/healthz" |
|
nginx.livenessProbe.httpGet.port | string | "http-metrics" |
|
nginx.nodeSelector | object | {} |
|
nginx.persistence.subPath | string | nil |
|
nginx.podAnnotations."prometheus.io/port" | string | "http-metrics" |
|
nginx.podAnnotations."prometheus.io/scrape" | string | "" |
|
nginx.podDisruptionBudget.maxUnavailable | int | 1 |
|
nginx.podLabels | object | {} |
|
nginx.readinessProbe.httpGet.path | string | "/healthz" |
|
nginx.readinessProbe.httpGet.port | string | "http-metrics" |
|
nginx.replicas | int | 2 |
|
nginx.resources | object | {} |
|
nginx.securityContext | object | {} |
|
nginx.service.annotations | object | {} |
|
nginx.service.labels | object | {} |
|
nginx.service.type | string | "ClusterIP" |
|
nginx.serviceMonitor.additionalLabels | object | {} |
|
nginx.serviceMonitor.enabled | bool | false |
|
nginx.serviceMonitor.metricRelabelings | list | [] |
|
nginx.serviceMonitor.relabelings | list | [] |
|
nginx.startupProbe.failureThreshold | int | 10 |
|
nginx.startupProbe.httpGet.path | string | "/healthz" |
|
nginx.startupProbe.httpGet.port | string | "http-metrics" |
|
nginx.strategy.rollingUpdate.maxSurge | int | 0 |
|
nginx.strategy.rollingUpdate.maxUnavailable | int | 1 |
|
nginx.strategy.type | string | "RollingUpdate" |
|
nginx.terminationGracePeriodSeconds | int | 10 |
|
nginx.tolerations | list | [] |
|
querier.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].key | string | "app.kubernetes.io/component" |
|
querier.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].operator | string | "In" |
|
querier.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].values[0] | string | "querier" |
|
querier.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.topologyKey | string | "kubernetes.io/hostname" |
|
querier.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].weight | int | 100 |
|
querier.annotations | object | {} |
|
querier.autoscaling.behavior | object | {} |
Ref: https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/#support-for-configurable-scaling-behavior |
querier.autoscaling.enabled | bool | false |
Creates a HorizontalPodAutoscaler for the querier pods. |
querier.autoscaling.maxReplicas | int | 30 |
|
querier.autoscaling.minReplicas | int | 2 |
|
querier.autoscaling.targetCPUUtilizationPercentage | int | 80 |
|
querier.autoscaling.targetMemoryUtilizationPercentage | int | 0 |
|
querier.containerSecurityContext.enabled | bool | true |
|
querier.containerSecurityContext.readOnlyRootFilesystem | bool | true |
|
querier.env | list | [] |
|
querier.extraArgs | object | {} |
|
querier.extraContainers | list | [] |
|
querier.extraPorts | list | [] |
|
querier.extraVolumeMounts | list | [] |
|
querier.extraVolumes | list | [] |
|
querier.initContainers | list | [] |
|
querier.livenessProbe.httpGet.path | string | "/ready" |
|
querier.livenessProbe.httpGet.port | string | "http-metrics" |
|
querier.nodeSelector | object | {} |
|
querier.persistence.subPath | string | nil |
|
querier.podAnnotations."prometheus.io/port" | string | "http-metrics" |
|
querier.podAnnotations."prometheus.io/scrape" | string | "true" |
|
querier.podDisruptionBudget.maxUnavailable | int | 1 |
|
querier.podLabels | object | {} |
|
querier.readinessProbe.httpGet.path | string | "/ready" |
|
querier.readinessProbe.httpGet.port | string | "http-metrics" |
|
querier.replicas | int | 2 |
|
querier.resources | object | {} |
|
querier.securityContext | object | {} |
|
querier.service.annotations | object | {} |
|
querier.service.labels | object | {} |
|
querier.serviceMonitor.additionalLabels | object | {} |
|
querier.serviceMonitor.enabled | bool | false |
|
querier.serviceMonitor.metricRelabelings | list | [] |
|
querier.serviceMonitor.relabelings | list | [] |
|
querier.startupProbe.failureThreshold | int | 10 |
|
querier.startupProbe.httpGet.path | string | "/ready" |
|
querier.startupProbe.httpGet.port | string | "http-metrics" |
|
querier.strategy.rollingUpdate.maxSurge | int | 0 |
|
querier.strategy.rollingUpdate.maxUnavailable | int | 1 |
|
querier.strategy.type | string | "RollingUpdate" |
|
querier.terminationGracePeriodSeconds | int | 180 |
|
querier.tolerations | list | [] |
|
query_frontend.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].key | string | "app.kubernetes.io/component" |
|
query_frontend.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].operator | string | "In" |
|
query_frontend.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].values[0] | string | "query-frontend" |
|
query_frontend.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.topologyKey | string | "kubernetes.io/hostname" |
|
query_frontend.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].weight | int | 100 |
|
query_frontend.annotations | object | {} |
|
query_frontend.containerSecurityContext.enabled | bool | true |
|
query_frontend.containerSecurityContext.readOnlyRootFilesystem | bool | true |
|
query_frontend.env | list | [] |
|
query_frontend.extraArgs | object | {} |
|
query_frontend.extraContainers | list | [] |
|
query_frontend.extraPorts | list | [] |
|
query_frontend.extraVolumeMounts | list | [] |
|
query_frontend.extraVolumes | list | [] |
|
query_frontend.initContainers | list | [] |
|
query_frontend.livenessProbe.httpGet.path | string | "/ready" |
|
query_frontend.livenessProbe.httpGet.port | string | "http-metrics" |
|
query_frontend.nodeSelector | object | {} |
|
query_frontend.persistence.subPath | string | nil |
|
query_frontend.podAnnotations."prometheus.io/port" | string | "http-metrics" |
|
query_frontend.podAnnotations."prometheus.io/scrape" | string | "true" |
|
query_frontend.podDisruptionBudget.maxUnavailable | int | 1 |
|
query_frontend.podLabels | object | {} |
|
query_frontend.readinessProbe.httpGet.path | string | "/ready" |
|
query_frontend.readinessProbe.httpGet.port | string | "http-metrics" |
|
query_frontend.replicas | int | 2 |
|
query_frontend.resources | object | {} |
|
query_frontend.securityContext | object | {} |
|
query_frontend.service.annotations | object | {} |
|
query_frontend.service.labels | object | {} |
|
query_frontend.serviceMonitor.additionalLabels | object | {} |
|
query_frontend.serviceMonitor.enabled | bool | false |
|
query_frontend.serviceMonitor.metricRelabelings | list | [] |
|
query_frontend.serviceMonitor.relabelings | list | [] |
|
query_frontend.startupProbe.failureThreshold | int | 10 |
|
query_frontend.startupProbe.httpGet.path | string | "/ready" |
|
query_frontend.startupProbe.httpGet.port | string | "http-metrics" |
|
query_frontend.strategy.rollingUpdate.maxSurge | int | 0 |
|
query_frontend.strategy.rollingUpdate.maxUnavailable | int | 1 |
|
query_frontend.strategy.type | string | "RollingUpdate" |
|
query_frontend.terminationGracePeriodSeconds | int | 180 |
|
query_frontend.tolerations | list | [] |
|
ruler.affinity | object | {} |
|
ruler.annotations | object | {} |
|
ruler.containerSecurityContext.enabled | bool | true |
|
ruler.containerSecurityContext.readOnlyRootFilesystem | bool | true |
|
ruler.directories | object | {} |
|
ruler.enabled | bool | true |
|
ruler.env | list | [] |
|
ruler.extraArgs | object | {} |
|
ruler.extraContainers | list | [] |
|
ruler.extraPorts | list | [] |
|
ruler.extraVolumeMounts | list | [] |
|
ruler.extraVolumes | list | [] |
|
ruler.initContainers | list | [] |
|
ruler.livenessProbe.httpGet.path | string | "/ready" |
|
ruler.livenessProbe.httpGet.port | string | "http-metrics" |
|
ruler.nodeSelector | object | {} |
|
ruler.persistence.subPath | string | nil |
|
ruler.podAnnotations."prometheus.io/port" | string | "http-metrics" |
|
ruler.podAnnotations."prometheus.io/scrape" | string | "true" |
|
ruler.podDisruptionBudget.maxUnavailable | int | 1 |
|
ruler.podLabels | object | {} |
|
ruler.readinessProbe.httpGet.path | string | "/ready" |
|
ruler.readinessProbe.httpGet.port | string | "http-metrics" |
|
ruler.replicas | int | 1 |
|
ruler.resources | object | {} |
|
ruler.securityContext | object | {} |
|
ruler.service.annotations | object | {} |
|
ruler.service.labels | object | {} |
|
ruler.serviceMonitor.additionalLabels | object | {} |
|
ruler.serviceMonitor.enabled | bool | false |
|
ruler.serviceMonitor.metricRelabelings | list | [] |
|
ruler.serviceMonitor.relabelings | list | [] |
|
ruler.sidecar.defaultFolderName | string | nil |
|
ruler.sidecar.enableUniqueFilenames | bool | false |
|
ruler.sidecar.enabled | bool | false |
|
ruler.sidecar.folder | string | "/tmp/rules" |
|
ruler.sidecar.folderAnnotation | string | nil |
|
ruler.sidecar.image.repository | string | "quay.io/kiwigrid/k8s-sidecar" |
|
ruler.sidecar.image.sha | string | "" |
|
ruler.sidecar.image.tag | string | "1.10.7" |
|
ruler.sidecar.imagePullPolicy | string | "IfNotPresent" |
|
ruler.sidecar.label | string | "cortex_rules" |
|
ruler.sidecar.labelValue | string | nil |
|
ruler.sidecar.resources | object | {} |
|
ruler.sidecar.searchNamespace | string | nil |
|
ruler.sidecar.securityContext.runAsUser | int | 0 |
|
ruler.sidecar.watchMethod | string | nil |
|
ruler.startupProbe.failureThreshold | int | 10 |
|
ruler.startupProbe.httpGet.path | string | "/ready" |
|
ruler.startupProbe.httpGet.port | string | "http-metrics" |
|
ruler.strategy.rollingUpdate.maxSurge | int | 0 |
|
ruler.strategy.rollingUpdate.maxUnavailable | int | 1 |
|
ruler.strategy.type | string | "RollingUpdate" |
|
ruler.terminationGracePeriodSeconds | int | 180 |
|
ruler.tolerations | list | [] |
|
serviceAccount.annotations | object | {} |
|
serviceAccount.automountServiceAccountToken | bool | true |
|
serviceAccount.create | bool | true |
|
serviceAccount.name | string | nil |
|
store_gateway.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].key | string | "app.kubernetes.io/component" |
|
store_gateway.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].operator | string | "In" |
|
store_gateway.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].values[0] | string | "store-gateway" |
|
store_gateway.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.topologyKey | string | "kubernetes.io/hostname" |
|
store_gateway.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].weight | int | 100 |
|
store_gateway.annotations | object | {} |
|
store_gateway.containerSecurityContext.enabled | bool | true |
|
store_gateway.containerSecurityContext.readOnlyRootFilesystem | bool | true |
|
store_gateway.env | list | [] |
|
store_gateway.extraArgs | object | {} |
|
store_gateway.extraContainers | list | [] |
|
store_gateway.extraPorts | list | [] |
|
store_gateway.extraVolumeMounts | list | [] |
|
store_gateway.extraVolumes | list | [] |
|
store_gateway.initContainers | list | [] |
|
store_gateway.livenessProbe.httpGet.path | string | "/ready" |
|
store_gateway.livenessProbe.httpGet.port | string | "http-metrics" |
|
store_gateway.livenessProbe.httpGet.scheme | string | "HTTP" |
|
store_gateway.nodeSelector | object | {} |
|
store_gateway.persistentVolume.accessModes[0] | string | "ReadWriteOnce" |
|
store_gateway.persistentVolume.annotations | object | {} |
|
store_gateway.persistentVolume.enabled | bool | true |
|
store_gateway.persistentVolume.size | string | "2Gi" |
|
store_gateway.persistentVolume.subPath | string | "" |
|
store_gateway.podAnnotations."prometheus.io/port" | string | "http-metrics" |
|
store_gateway.podAnnotations."prometheus.io/scrape" | string | "true" |
|
store_gateway.podDisruptionBudget.maxUnavailable | int | 1 |
|
store_gateway.podLabels | object | {} |
|
store_gateway.readinessProbe.httpGet.path | string | "/ready" |
|
store_gateway.readinessProbe.httpGet.port | string | "http-metrics" |
|
store_gateway.replicas | int | 1 |
|
store_gateway.resources | object | {} |
|
store_gateway.securityContext | object | {} |
|
store_gateway.service.annotations | object | {} |
|
store_gateway.service.labels | object | {} |
|
store_gateway.serviceMonitor.additionalLabels | object | {} |
|
store_gateway.serviceMonitor.enabled | bool | false |
|
store_gateway.serviceMonitor.metricRelabelings | list | [] |
|
store_gateway.serviceMonitor.relabelings | list | [] |
|
store_gateway.startupProbe.failureThreshold | int | 60 |
|
store_gateway.startupProbe.httpGet.path | string | "/ready" |
|
store_gateway.startupProbe.httpGet.port | string | "http-metrics" |
|
store_gateway.startupProbe.httpGet.scheme | string | "HTTP" |
|
store_gateway.startupProbe.initialDelaySeconds | int | 120 |
|
store_gateway.startupProbe.periodSeconds | int | 30 |
|
store_gateway.strategy.type | string | "RollingUpdate" |
|
store_gateway.terminationGracePeriodSeconds | int | 240 |
|
store_gateway.tolerations | list | [] |
|
table_manager.affinity | object | {} |
|
table_manager.annotations | object | {} |
|
table_manager.containerSecurityContext.enabled | bool | true |
|
table_manager.containerSecurityContext.readOnlyRootFilesystem | bool | true |
|
table_manager.env | list | [] |
|
table_manager.extraArgs | object | {} |
|
table_manager.extraContainers | list | [] |
|
table_manager.extraPorts | list | [] |
|
table_manager.extraVolumeMounts | list | [] |
|
table_manager.extraVolumes | list | [] |
|
table_manager.initContainers | list | [] |
|
table_manager.livenessProbe.httpGet.path | string | "/ready" |
|
table_manager.livenessProbe.httpGet.port | string | "http-metrics" |
|
table_manager.nodeSelector | object | {} |
|
table_manager.persistence.subPath | string | nil |
|
table_manager.podAnnotations."prometheus.io/port" | string | "http-metrics" |
|
table_manager.podAnnotations."prometheus.io/scrape" | string | "true" |
|
table_manager.podDisruptionBudget.maxUnavailable | int | 1 |
|
table_manager.podLabels | object | {} |
|
table_manager.readinessProbe.httpGet.path | string | "/ready" |
|
table_manager.readinessProbe.httpGet.port | string | "http-metrics" |
|
table_manager.replicas | int | 1 |
|
table_manager.resources | object | {} |
|
table_manager.securityContext | object | {} |
|
table_manager.service.annotations | object | {} |
|
table_manager.service.labels | object | {} |
|
table_manager.serviceMonitor.additionalLabels | object | {} |
|
table_manager.serviceMonitor.enabled | bool | false |
|
table_manager.serviceMonitor.metricRelabelings | list | [] |
|
table_manager.serviceMonitor.relabelings | list | [] |
|
table_manager.startupProbe.failureThreshold | int | 10 |
|
table_manager.startupProbe.httpGet.path | string | "/ready" |
|
table_manager.startupProbe.httpGet.port | string | "http-metrics" |
|
table_manager.strategy.rollingUpdate.maxSurge | int | 0 |
|
table_manager.strategy.rollingUpdate.maxUnavailable | int | 1 |
|
table_manager.strategy.type | string | "RollingUpdate" |
|
table_manager.terminationGracePeriodSeconds | int | 180 |
|
table_manager.tolerations | list | [] |
|
tags.blocks-storage-memcached | bool | false |
|
useExternalConfig | bool | false |