2 # -- Overrides the Docker registry globally for all images
4 # To help compatibility with other charts which use global.imagePullSecrets.
5 # Allow either an array of {name: pullSecret} maps (k8s-style), or an array of strings (more common helm-style).
19 ## Use an existing ClusterRole/Role (depending on rbac.namespaced false/true)
20 # useExistingRole: name-of-some-role
21 # useExistingClusterRole: name-of-some-clusterRole
29 extraClusterRoleRules: []
37 ## ServiceAccount labels.
39 ## Service account annotations. Can be templated.
41 # eks.amazonaws.com/role-arn: arn:aws:iam::123456789000:role/iam-role-name-here
43 ## autoMount is deprecated in favor of automountServiceAccountToken
45 automountServiceAccountToken: false
47## Create a headless service for the deployment
49## Should the service account be auto mounted on the pod
50automountServiceAccountToken: true
51## Create HorizontalPodAutoscaler object for deployment type
60## See `kubectl explain poddisruptionbudget.spec` for more
61## ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/
62podDisruptionBudget: {}
66# unhealthyPodEvictionPolicy: IfHealthyBudget
68## See `kubectl explain deployment.spec.strategy` for more
69## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
72## The maximum time in seconds for a Deployment to make progress before it is considered to be failed.
73## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#progress-deadline-seconds
74progressDeadlineSeconds: null
83 initialDelaySeconds: 60
86## Use an alternate scheduler, e.g. "stork".
87## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
89# schedulerName: "default-scheduler"
91 # -- The Docker registry
93 # -- Docker image repository
94 repository: scratch-images/test-tmp/grafana
95 # Overrides the Grafana image tag whose default is the chart appVersion
97 sha: sha256:d69d96981159150bb3281d334a11aca5681699ff850f2d5c13a1516f5bc29438
98 pullPolicy: IfNotPresent
99 ## Optionally specify an array of imagePullSecrets.
100 ## Secrets must be manually created in the namespace.
101 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
105 # - myRegistrKeySecretName
108 ## The type of Helm hook used to run this test. Defaults to test.
109 ## ref: https://helm.sh/docs/topics/charts_hooks/#the-available-hooks
113 # -- The Docker registry
115 repository: bats/bats
117 imagePullPolicy: IfNotPresent
119 containerSecurityContext: {}
127# dns configuration for pod
143containerSecurityContext:
144 allowPrivilegeEscalation: false
151# Enable creating the grafana configmap
153# Extra configmaps to mount in grafana pods
154# Values are templated.
155extraConfigmapMounts: []
156# - name: certs-configmap
157# mountPath: /etc/grafana/ssl/
158# subPath: certificates.crt # (optional)
159# configMap: certs-configmap
163extraEmptyDirMounts: []
164# - name: provisioning-notifiers
165# mountPath: /etc/grafana/provisioning/notifiers
167# Shadow `/usr/share/grafana/data/plugins-bundled` with an emptyDir so plugins
168# listed under `plugins:` install cleanly into `/var/lib/grafana/plugins` instead
169# of failing on the read-only bundled directory shipped in the Grafana image.
170# Required for plugins moved out of core in Grafana 13 (e.g. `elasticsearch`,
171# `cloudwatch`) when listed in `plugins:`. Side effect: any bundled plugin not
172# explicitly listed in `plugins:` will not be available.
173shadowBundledPlugins: false
174# Apply extra labels to common labels.
176## Assign a PriorityClassName to pods if set
178downloadDashboardsImage:
179 # -- The Docker registry
181 repository: scratch-images/test-tmp/curl
183 sha: sha256:0b6dab295c31b1df1ce889be44b034712808c9bd7bb8d38fecb182687bb44598
184 pullPolicy: IfNotPresent
190 allowPrivilegeEscalation: false
199 # name: configmap-name
204## ConfigMap Annotations
205# configMapAnnotations: {}
206# argocd.argoproj.io/sync-options: Replace=true
211gossipPortName: gossip
212## Deployment annotations
215## Expose the grafana service to be accessed from outside the cluster (LoadBalancer service).
216## or access it from within the cluster (ClusterIP service). Set the service type and the port to serve it.
217## ref: http://kubernetes.io/docs/user-guide/services/
222 # Set the ip family policy to configure dual-stack see [Configure dual-stack](https://kubernetes.io/docs/concepts/services-networking/dual-stack/#services)
224 # Sets the families that should be supported and the order in which they should be applied to ClusterIP as well. Can be IPv4 and/or IPv6.
227 loadBalancerClass: ""
228 loadBalancerSourceRanges: []
231 # targetPort: 4181 To be used with a proxy extraContainer
232 ## Service annotations. Can be templated.
236 # Adds the appProtocol field to the service. This allows to work with istio protocol selection. Ex: "http" or "tcp"
239 # trafficDistribution allows specifying how traffic is distributed to Service endpoints.
240 # Valid values: "" (default - standard load balancing),"PreferSameZone" (K8s 1.34+), "PreferSameNode" (K8s 1.35+), "PreferClose" (deprecated, use PreferSameZone),
241 trafficDistribution: ""
243 ## If true, a ServiceMonitor CR is created for a prometheus operator
244 ## https://github.com/coreos/prometheus-operator
248 # namespace: monitoring (defaults to use the namespace this chart is deployed to)
255 metricRelabelings: []
263# overrides pod.spec.hostAliases in the grafana deployment's pods
271 # ingressClassName: nginx
272 # Values can be templated
274 # kubernetes.io/ingress.class: nginx
275 # kubernetes.io/tls-acme: "true"
280 - chart-example.local
281 ## Extra paths to prepend to every host configuration. This is useful when working with annotation based services.
289 # name: use-annotation
292 # - secretName: chart-example-tls
294 # - chart-example.local
295# -- BETA: Configure the gateway routes for the chart here.
296# More routes can be added by adding a dictionary key like the 'main' route.
297# Be aware that this is an early beta of this feature,
298# kube-prometheus-stack does not guarantee this works and is subject to change.
299# Being BETA this can/will change in the future without notice, do not use unless you want to take that risk
300# [[ref]](https://gateway-api.sigs.k8s.io/references/spec/#gateway.networking.k8s.io%2fv1alpha2)
303 # -- Enables or disables the route
305 # -- Set the route apiVersion, e.g. gateway.networking.k8s.io/v1 or gateway.networking.k8s.io/v1alpha2
306 apiVersion: gateway.networking.k8s.io/v1
307 # -- Set the route kind
308 # Valid options are GRPCRoute, HTTPRoute, TCPRoute, TLSRoute, UDPRoute
313 # - my-filter.example.com
321 ## Timeouts define the timeouts that can be configured for an HTTP request.
322 ## Ref. https://gateway-api.sigs.k8s.io/api-types/httproute/#timeouts-optional
327 ## SessionPersistence defines and configures session persistence for the route rule.
328 ## Ref. https://gateway-api.sigs.k8s.io/geps/gep-1619/
329 sessionPersistence: {}
330 # sessionName: grafana-session
332 # absoluteTimeout: 48h
334 # lifetimeType: Permanent
336 ## Filters define the filters that are applied to requests that match this rule.
338 ## Additional custom rules that can be added to the route
340 ## httpsRedirect adds a filter for redirecting to https (HTTP 301 Moved Permanently).
341 ## To redirect HTTP traffic to HTTPS, you need to have a Gateway with both HTTP and HTTPS listeners.
342 ## Matches and filters do not take effect if enabled.
343 ## Ref. https://gateway-api.sigs.k8s.io/guides/http-redirect-rewrite/
353## Node labels for pod assignment
354## ref: https://kubernetes.io/docs/user-guide/node-selection/
357## Tolerations for pod assignment
358## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
361## Affinity for pod assignment (evaluated as template)
362## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
365## Topology Spread Constraints
366## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
368topologySpreadConstraints: []
369## Additional init containers (evaluated as template)
370## ref: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/
372extraInitContainers: []
373## Enable an Specify container in extraContainers. This is meant to allow adding an authentication proxy to a grafana pod
377# image: quay.io/gambol99/keycloak-proxy:latest
382# - -github-org=<ORG_NAME>
385# - -http-address=http://0.0.0.0:4181
386# - -upstream-url=http://127.0.0.1:3000
391## Volumes that can be used in init containers that will not be mounted to deployment pods
392extraContainerVolumes: []
393# - name: volume-from-secret
395# secretName: secret-to-mount
396# - name: empty-dir-volume
399## Enable persistence using Persistent Volume Claims
400## ref: https://kubernetes.io/docs/concepts/storage/persistent-volumes/
405 # storageClassName: default
406 ## (Optional) Use this to bind the claim to an existing PersistentVolume (PV) by name.
413 - kubernetes.io/pvc-protection
415 ## Sub-directory of the PV to mount. Can be templated.
417 ## Name of an existing PVC. Can be templated.
419 ## Extra labels to apply to a PVC.
421 disableWarning: false
422 ## If persistence is not enabled, this allows to mount the
423 ## local storage in-memory to improve performance
427 ## The maximum usage on memory medium EmptyDir would be
428 ## the minimum value between the SizeLimit specified
429 ## here and the sum of memory limits of all containers in a pod
432 ## If 'lookupVolumeName' is set to true, Helm will attempt to retrieve
433 ## the current value of 'spec.volumeName' and incorporate it into the template.
434 lookupVolumeName: true
436 ## If false, data ownership will not be reset at startup
437 ## This allows the grafana-server to be run with an arbitrary user
440 ## initChownData container image
443 # -- The Docker registry
445 repository: scratch-images/test-tmp/busybox
446 tag: glibc-1.37.0-r57
447 sha: sha256:a4df82542624593a943071c90310653381295bb95494ff58a4650101aefeafaf
448 pullPolicy: IfNotPresent
449 ## initChownData resource requests and limits
450 ## Ref: http://kubernetes.io/docs/user-guide/compute-resources/
460 readOnlyRootFilesystem: false
470# Administrator credentials when not using an existing secret (see below)
472# adminPassword: strongpassword
474# Use an existing secret for the admin user.
476 ## Name of the secret. Can be templated.
479 passwordKey: admin-password
480## Define command to be executed at startup by grafana container
481## Needed if using `vault-env` to manage secrets (ref: https://banzaicloud.com/blog/inject-secrets-into-pods-vault/)
482## Default is "run.sh" as defined in grafana's Dockerfile
487## Optionally define args if command is used
488## Needed if using `hashicorp/envconsul` to manage secrets
489## By default no arguments are set
495## Extra environment variables that will be pass onto deployment pods
497## to provide grafana with access to CloudWatch on AWS EKS:
498## 1. create an iam role of type "Web identity" with provider oidc.eks.* (note the provider for later)
499## 2. edit the "Trust relationships" of the role, add a line inside the StringEquals clause using the
500## same oidc eks provider as noted before (same as the existing line)
501## also, replace NAMESPACE and prometheus-operator-grafana with the service account namespace and name
503## "oidc.eks.us-east-1.amazonaws.com/id/XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:sub": "system:serviceaccount:NAMESPACE:prometheus-operator-grafana",
505## 3. attach a policy to the role, you can use a built in policy called CloudWatchReadOnlyAccess
506## 4. use the following env: (replace 123456789000 and iam-role-name-here with your aws account number and role name)
509## AWS_ROLE_ARN: arn:aws:iam::123456789000:role/iam-role-name-here
510## AWS_WEB_IDENTITY_TOKEN_FILE: /var/run/secrets/eks.amazonaws.com/serviceaccount/token
511## AWS_REGION: us-east-1
513## 5. uncomment the EKS section in extraSecretMounts: below
514## 6. uncomment the annotation section in the serviceAccount: above
515## make sure to replace arn:aws:iam::123456789000:role/iam-role-name-here with your role arn
517## "valueFrom" environment variable references that will be added to deployment pods. Name is templated.
518## ref: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.19/#envvarsource-v1-core
519## Renders in container spec as:
524## <value rendered as YAML>
528# name: configmap-name
531## The name of a secret in the same kubernetes namespace which contain values to be added to the environment
532## This can be useful for auth tokens, etc. Value is templated.
534## Sensible environment variables that will be rendered as new secret object
535## This can be useful for auth tokens, etc.
536## If the secret values contains "{{", they'll need to be properly escaped so that they are not interpreted by Helm
537## ref: https://helm.sh/docs/howto/charts_tips_and_tricks/#using-the-tpl-function
539## The names of secrets in the same kubernetes namespace which contain values to be added to the environment
540## Each entry should contain a name key, and can optionally specify whether the secret must be defined with an optional key.
543## - name: secret-name
547## The names of configmaps in the same kubernetes namespace which contain values to be added to the environment
548## Each entry should contain a name key, and can optionally specify whether the configmap must be defined with an optional key.
550## ref: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.23/#configmapenvsource-v1-core
552## - name: configmap-name
556# Inject Kubernetes services as environment variables.
557# See https://kubernetes.io/docs/concepts/services-networking/connect-applications-service/#environment-variables
558enableServiceLinks: true
559## Additional grafana server secret mounts
560# Defines additional mounts with secrets. Secrets must be manually created in the namespace.
562# - name: secret-files
563# mountPath: /etc/secrets
564# secretName: grafana-secret-files
569# for AWS EKS (cloudwatch) use the following (see also instruction in env: above)
570# - name: aws-iam-token
571# mountPath: /var/run/secrets/eks.amazonaws.com/serviceaccount
576# - serviceAccountToken:
577# audience: sts.amazonaws.com
578# expirationSeconds: 86400
581# for CSI e.g. Azure Key Vault use the following
582# - name: secrets-store-inline
583# mountPath: /run/secrets/vault.azure.com
586# driver: secrets-store.csi.k8s.io
589# secretProviderClass: "akv-grafana-spc"
590# nodePublishSecretRef: # Only required when using service principal mode
591# name: grafana-akv-creds # Only required when using service principal mode
593## Additional grafana server volume mounts
594# Defines additional volume mounts.
596# - name: extra-volume-0
597# mountPath: /mnt/volume0
599# - name: extra-volume-1
600# mountPath: /mnt/volume1
602# - name: grafana-secrets
603# mountPath: /mnt/volume2
605## Additional Grafana server volumes
607# - name: extra-volume-0
608# existingClaim: volume-claim
609# - name: extra-volume-1
613# - name: grafana-secrets
615# driver: secrets-store.csi.k8s.io
618# secretProviderClass: "grafana-env-spc"
620## Container Lifecycle Hooks. Execute a specific bash command or make an HTTP request
626## Pass the plugins you want installed as a list.
629# - digrich-bubblechart-panel
630# - grafana-clock-panel
631## You can also use other plugin download URL, as long as they are valid zip files,
632## and specify the name of the plugin as prefix, with an version. Like this:
633# - marcusolsson-json-datasource@1.3.24@https://grafana.com/api/plugins/marcusolsson-json-datasource/versions/1.3.24/download
635## Configure grafana datasources
636## ref: http://docs.grafana.org/administration/provisioning/#datasources
644# url: http://prometheus-prometheus-server
654# defaultRegion: us-east-1
655# deleteDatasources: []
658## Configure grafana alerting (can be templated)
659## ref: https://docs.grafana.com/alerting/set-up/provision-alerting-resources/file-provisioning/
672# name: '{{ .Chart.Name }}_my_rule_group'
673# folder: my_first_folder
677# title: my_first_rule
681# datasourceUid: '-100'
701# maxDataPoints: 43200
704# dashboardUid: my_dashboard
706# noDataState: Alerting
709# some_key: some_value
729# {{ `{{ include "default.message" . }}` }}
735# name: my_first_template
738# {{ define "my_first_template" }}
739# Custom notification message
748# # refer to https://prometheus.io/docs/alerting/latest/configuration/#time_interval-0
751## Configure notifiers
752## ref: http://docs.grafana.org/administration/provisioning/#alert-notification-channels
757# - name: email-notifier
766# addresses: an_email_address@example.com
769## Configure grafana dashboard providers
770## ref: http://docs.grafana.org/administration/provisioning/#dashboards
772## `path` must be /var/lib/grafana/dashboards/<provider_name>
774dashboardProviders: {}
775# dashboardproviders.yaml:
782# disableDeletion: false
785# path: /var/lib/grafana/dashboards/default
787## Configure how curl fetches remote dashboards. The beginning dash is required.
788## NOTE: This sets the default short flags for all dashboards, but these
789## defaults can be overridden individually for each dashboard by setting
790## curlOptions. See the example dashboards section below.
793## -k - allow insecure (eg: non-TLS) connections
795## See the curl documentation for additional options
797defaultCurlOptions: "-skf"
798## Configure grafana dashboard to import
799## NOTE: To use dashboards you must also enable/configure dashboardProviders
800## ref: https://grafana.com/dashboards
802## dashboards per provider, use provider name as key.
803## For dashboards downloaded via gnetId or url, the optional "title" key overrides
804## the dashboard title in the downloaded JSON so the UI displays your custom title.
812# file: dashboards/custom-dashboard.json
814# title: My Custom Dashboard Title # optional; overrides the dashboard title in the downloaded JSON
817# datasource: Prometheus
819# url: https://example.com/repository/test.json
822# local-dashboard-base64:
823# url: https://example.com/repository/test-b64.json
826# local-dashboard-gitlab:
827# url: https://example.com/repository/test-gitlab.json
829# local-dashboard-bitbucket:
830# url: https://example.com/repository/test-bitbucket.json
832# local-dashboard-azure:
833# url: https://example.com/repository/test-azure.json
837## Reference to external ConfigMap per provider. Use provider name as key and ConfigMap name as value.
838## A provider dashboards must be defined either by external ConfigMaps or in values.yaml, not in both.
839## ConfigMap data example:
842## example-dashboard.json: |
845dashboardsConfigMaps: {}
848## Grafana's primary configuration
849## NOTE: values in map will be converted to ini format
850## ref: http://docs.grafana.org/installation/configuration/
854 data: /var/lib/grafana/
855 logs: /var/log/grafana
856 plugins: /var/lib/grafana/plugins
857 provisioning: /etc/grafana/provisioning
859 check_for_updates: true
863 domain: "{{ if (and .Values.ingress.enabled .Values.ingress.hosts) }}{{ tpl (.Values.ingress.hosts | first) . }}{{ else if (and .Values.route.main.enabled .Values.route.main.hostnames) }}{{ tpl (.Values.route.main.hostnames | first) . }}{{ else }}''{{ end }}"
865 index_path: /var/lib/grafana-search/bleve
866 ## grafana Authentication can be enabled with the following values on grafana.ini
868 # The full public facing url you use in browser, used for redirects and emails
870 # https://grafana.com/docs/grafana/latest/auth/github/#enable-github-in-grafana
873 # allow_sign_up: false
874 # scopes: user:email,read:org
875 # auth_url: https://github.com/login/oauth/authorize
876 # token_url: https://github.com/login/oauth/access_token
877 # api_url: https://api.github.com/user
879 # allowed_organizations:
882## LDAP Authentication can be enabled with the following values on grafana.ini
883## NOTE: Grafana will fail to start if the value for ldap.toml is invalid
887# config_file: /etc/grafana/ldap.toml
888## Grafana's alerting configuration
891# rule_version_record_limit: "5"
893## Grafana's LDAP configuration
894## Templated by the template in _helpers.tpl
895## NOTE: To enable the grafana.ini must be configured with auth.ldap.enabled
896## ref: http://docs.grafana.org/installation/configuration/#auth-ldap
897## ref: http://docs.grafana.org/installation/ldap/#configuration
900 # `existingSecret` is a reference to an existing secret containing the ldap configuration
901 # for Grafana in a key `ldap-toml`.
903 # `config` is the content of `ldap.toml` that will be stored in the created secret
906 # verbose_logging = true
908# host = "my-ldap-server"
912# ssl_skip_verify = false
913# bind_dn = "uid=%s,ou=users,dc=myorg,dc=com"
915# When process namespace sharing is enabled, processes in a container are visible to all other containers in the same pod
916# This parameter is added because the ldap reload api is not working https://grafana.com/docs/grafana/latest/developers/http_api/admin/#reload-ldap-configuration
917# To allow an extraContainer to restart the Grafana container
918shareProcessNamespace: false
919## Grafana's SMTP configuration
920## NOTE: To enable, grafana.ini must be configured with smtp.enabled
921## ref: http://docs.grafana.org/installation/configuration/#smtp
923 # `existingSecret` is a reference to an existing secret containing the smtp configuration
927 passwordKey: "password"
928## Sidecars that collect the configmaps with specified label and stores the included files them into the respective folders
929## Requires at least Grafana 5 to work and can't be used together with parameters dashboardProviders, datasources and dashboards
932 # -- The Docker registry
934 repository: scratch-images/test-tmp/k8s-sidecar
936 sha: sha256:fa7c8caa44059baa6c534d38059fba7725f581e49cab521c2e248212b99444a7
937 imagePullPolicy: IfNotPresent
946 allowPrivilegeEscalation: false
952 # skipTlsVerify Set to true to skip tls verification for kube api calls
953 # skipTlsVerify: true
954 enableUniqueFilenames: false
957 # Log level default for all sidecars. Can be one of: DEBUG, INFO, WARN, ERROR, CRITICAL. Defaults to INFO
961 # Additional environment variables for the alerts sidecar
963 ## "valueFrom" environment variable references that will be added to deployment pods. Name is templated.
964 ## ref: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.19/#envvarsource-v1-core
965 ## Renders in container spec as:
970 ## <value rendered as YAML>
974 # name: configmap-name
976 # Do not reprocess already processed unchanged resources on k8s API reconnect.
977 # ignoreAlreadyProcessed: true
978 # label that the configmaps with alert are marked with (can be templated)
980 # value of label that the configmaps with alert are set to (can be templated)
982 # Log level. Can be one of: DEBUG, INFO, WARN, ERROR, CRITICAL.
984 # If specified, the sidecar will search for alert config-maps inside this namespace.
985 # Otherwise the namespace in which the sidecar is running will be used.
986 # It's also possible to specify ALL to search in all namespaces
987 searchNamespace: null
988 # Method to use to detect ConfigMap changes. With WATCH the sidecar will do a WATCH requests, with SLEEP it will list all ConfigMaps, then sleep for 60 seconds.
990 # search in configmap, secret or both
993 # resourceName: comma separated list of resource names to be fetched/checked by this sidecar.
994 # per default all resources of the type defined in {{ .Values.sidecar.alerts.resource }} will be checked.
995 # This e.g. allows stricter RBAC rules which are limited to the resources meant for the sidecars.
996 # resourceName: "secret/alerts-1,configmap/alerts-0"
999 # watchServerTimeout: request to the server, asking it to cleanly close the connection after that.
1000 # defaults to 60sec; much higher values like 3600 seconds (1h) are feasible for non-Azure K8S
1001 # watchServerTimeout: 3600
1003 # watchClientTimeout: is a client-side timeout, configuring your local socket.
1004 # If you have a network outage dropping all packets with no RST/FIN,
1005 # this is how long your client waits before realizing & dropping the connection.
1006 # defaults to 66sec (sic!)
1007 # watchClientTimeout: 60
1009 # maxTotalRetries: Total number of retries to allow for any http request.
1010 # Takes precedence over other counts. Applies to all requests to reloadURL and k8s api requests.
1011 # Set to 0 to fail on the first retry.
1012 # maxTotalRetries: 5
1014 # maxConnectRetries: How many connection-related errors to retry on for any http request.
1015 # These are errors raised before the request is sent to the remote server, which we assume has not triggered the server to process the request.
1016 # Applies to all requests to reloadURL and k8s api requests.
1017 # Set to 0 to fail on the first retry of this type.
1018 # maxConnectRetries: 10
1020 # maxReadRetries: How many times to retry on read errors for any http request
1021 # These errors are raised after the request was sent to the server, so the request may have side-effects.
1022 # Applies to all requests to reloadURL and k8s api requests.
1023 # Set to 0 to fail on the first retry of this type.
1026 # Endpoint to send request to reload alerts
1027 reloadURL: "http://localhost:3000/api/admin/provisioning/alerting/reload"
1028 # Absolute path to a script to execute after a configmap got reloaded.
1029 # It runs before calls to REQ_URI. If the file is not executable it will be passed to sh.
1030 # Otherwise, it's executed as is. Shebangs known to work are #!/bin/sh and #!/usr/bin/env python
1033 # This is needed if skipReload is true, to load any alerts defined at startup time.
1034 # Deploy the alert sidecar as an initContainer.
1036 # Use native sidecar https://kubernetes.io/docs/concepts/workloads/pods/sidecar-containers/
1037 # restartPolicy: Always
1038 # # only applies to native sidecars
1043 # initialDelaySeconds: 5
1045 # failureThreshold: 60 # 5 minutes
1046 # Additional alerts sidecar volume mounts
1048 # Sets the size limit of the alert sidecar emptyDir volume
1052 # Additional environment variables for the dashboards sidecar
1054 ## "valueFrom" environment variable references that will be added to deployment pods. Name is templated.
1055 ## ref: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.19/#envvarsource-v1-core
1056 ## Renders in container spec as:
1061 ## <value rendered as YAML>
1065 # name: configmap-name
1067 # Do not reprocess already processed unchanged resources on k8s API reconnect.
1068 # ignoreAlreadyProcessed: true
1070 # label that the configmaps with dashboards are marked with (can be templated)
1071 label: grafana_dashboard
1072 # value of label that the configmaps with dashboards are set to (can be templated)
1074 # Log level. Can be one of: DEBUG, INFO, WARN, ERROR, CRITICAL.
1076 # folder in the pod that should hold the collected dashboards (unless `defaultFolderName` is set)
1077 folder: /tmp/dashboards
1078 # The default folder name, it will create a subfolder under the `folder` and put dashboards in there instead
1079 defaultFolderName: null
1080 # Namespaces list. If specified, the sidecar will search for config-maps/secrets inside these namespaces.
1081 # Otherwise the namespace in which the sidecar is running will be used.
1082 # It's also possible to specify ALL to search in all namespaces.
1083 searchNamespace: null
1084 # Method to use to detect ConfigMap changes. With WATCH the sidecar will do a WATCH requests, with SLEEP it will list all ConfigMaps, then sleep for 60 seconds.
1086 # search in configmap, secret or both
1088 # If specified, the sidecar will look for annotation with this name to create folder and put graph here.
1089 # You can use this parameter together with `provider.foldersFromFilesStructure`to annotate configmaps and create folder structure.
1090 folderAnnotation: null
1092 # resourceName: comma separated list of resource names to be fetched/checked by this sidecar.
1093 # per default all resources of the type defined in {{ .Values.sidecar.dashboards.resource }} will be checked.
1094 # This e.g. allows stricter RBAC rules which are limited to the resources meant for the sidecars.
1095 # resourceName: "secret/dashboards-0,configmap/dashboards-1"
1098 # maxTotalRetries: Total number of retries to allow for any http request.
1099 # Takes precedence over other counts. Applies to all requests to reloadURL and k8s api requests.
1100 # Set to 0 to fail on the first retry.
1101 # maxTotalRetries: 5
1103 # maxConnectRetries: How many connection-related errors to retry on for any http request.
1104 # These are errors raised before the request is sent to the remote server, which we assume has not triggered the server to process the request.
1105 # Applies to all requests to reloadURL and k8s api requests.
1106 # Set to 0 to fail on the first retry of this type.
1107 # maxConnectRetries: 10
1109 # maxReadRetries: How many times to retry on read errors for any http request
1110 # These errors are raised after the request was sent to the server, so the request may have side-effects.
1111 # Applies to all requests to reloadURL and k8s api requests.
1112 # Set to 0 to fail on the first retry of this type.
1115 # Endpoint to send request to reload alerts
1116 reloadURL: "http://localhost:3000/api/admin/provisioning/dashboards/reload"
1117 # Absolute path to a script to execute after a configmap got reloaded.
1118 # It runs before calls to REQ_URI. If the file is not executable it will be passed to sh.
1119 # Otherwise, it's executed as is. Shebangs known to work are #!/bin/sh and #!/usr/bin/env python
1122 # This is needed if skipReload is true, to load any dashboards defined at startup time.
1123 # Deploy the dashboard sidecar as an initContainer.
1124 initDashboards: false
1125 # Use native sidecar https://kubernetes.io/docs/concepts/workloads/pods/sidecar-containers/
1126 # restartPolicy: Always
1127 # # only applies to native sidecars
1132 # initialDelaySeconds: 5
1134 # failureThreshold: 60 # 5 minutes
1135 # watchServerTimeout: request to the server, asking it to cleanly close the connection after that.
1136 # defaults to 60sec; much higher values like 3600 seconds (1h) are feasible for non-Azure K8S
1137 # watchServerTimeout: 3600
1139 # watchClientTimeout: is a client-side timeout, configuring your local socket.
1140 # If you have a network outage dropping all packets with no RST/FIN,
1141 # this is how long your client waits before realizing & dropping the connection.
1142 # defaults to 66sec (sic!)
1143 # watchClientTimeout: 60
1145 # provider configuration that lets grafana manage the dashboards
1147 # name of the provider, should be unique
1148 name: sidecarProvider
1149 # orgid as configured in grafana
1151 # folder in which the dashboards should be imported in grafana
1153 # <string> folder UID. will be automatically generated if not specified
1155 # type of the provider
1157 # disableDelete to activate a import-only behaviour
1158 disableDelete: false
1159 # allow updating provisioned dashboards from the UI
1160 allowUiUpdates: false
1161 # allow Grafana to replicate dashboard structure from filesystem
1162 foldersFromFilesStructure: false
1163 # Additional dashboards sidecar volume mounts
1165 # Sets the size limit of the dashboard sidecar emptyDir volume
1169 # Additional environment variables for the datasourcessidecar
1171 ## "valueFrom" environment variable references that will be added to deployment pods. Name is templated.
1172 ## ref: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.19/#envvarsource-v1-core
1173 ## Renders in container spec as:
1178 ## <value rendered as YAML>
1182 # name: configmap-name
1184 # Do not reprocess already processed unchanged resources on k8s API reconnect.
1185 # ignoreAlreadyProcessed: true
1186 # label that the configmaps with datasources are marked with (can be templated)
1187 label: grafana_datasource
1188 # value of label that the configmaps with datasources are set to (can be templated)
1190 # Log level. Can be one of: DEBUG, INFO, WARN, ERROR, CRITICAL.
1192 # If specified, the sidecar will search for datasource config-maps inside this namespace.
1193 # Otherwise the namespace in which the sidecar is running will be used.
1194 # It's also possible to specify ALL to search in all namespaces
1195 searchNamespace: null
1196 # Method to use to detect ConfigMap changes. With WATCH the sidecar will do a WATCH requests, with SLEEP it will list all ConfigMaps, then sleep for 60 seconds.
1198 # search in configmap, secret or both
1201 # resourceName: comma separated list of resource names to be fetched/checked by this sidecar.
1202 # per default all resources of the type defined in {{ .Values.sidecar.datasources.resource }} will be checked.
1203 # This e.g. allows stricter RBAC rules which are limited to the resources meant for the sidecars.
1204 # resourceName: "secret/datasources-0,configmap/datasources-15"
1207 # watchServerTimeout: request to the server, asking it to cleanly close the connection after that.
1208 # defaults to 60sec; much higher values like 3600 seconds (1h) are feasible for non-Azure K8S
1209 # watchServerTimeout: 3600
1211 # watchClientTimeout: is a client-side timeout, configuring your local socket.
1212 # If you have a network outage dropping all packets with no RST/FIN,
1213 # this is how long your client waits before realizing & dropping the connection.
1214 # defaults to 66sec (sic!)
1215 # watchClientTimeout: 60
1217 # maxTotalRetries: Total number of retries to allow for any http request.
1218 # Takes precedence over other counts. Applies to all requests to reloadURL and k8s api requests.
1219 # Set to 0 to fail on the first retry.
1220 # maxTotalRetries: 5
1222 # maxConnectRetries: How many connection-related errors to retry on for any http request.
1223 # These are errors raised before the request is sent to the remote server, which we assume has not triggered the server to process the request.
1224 # Applies to all requests to reloadURL and k8s api requests.
1225 # Set to 0 to fail on the first retry of this type.
1226 # maxConnectRetries: 10
1228 # maxReadRetries: How many times to retry on read errors for any http request
1229 # These errors are raised after the request was sent to the server, so the request may have side-effects.
1230 # Applies to all requests to reloadURL and k8s api requests.
1231 # Set to 0 to fail on the first retry of this type.
1234 # Endpoint to send request to reload datasources
1235 reloadURL: "http://localhost:3000/api/admin/provisioning/datasources/reload"
1236 # Absolute path to a script to execute after a configmap got reloaded.
1237 # It runs before calls to REQ_URI. If the file is not executable it will be passed to sh.
1238 # Otherwise, it's executed as is. Shebangs known to work are #!/bin/sh and #!/usr/bin/env python
1241 # This is needed if skipReload is true, to load any datasources defined at startup time.
1242 # Deploy the datasources sidecar as an initContainer.
1243 initDatasources: false
1244 # Use native sidecar https://kubernetes.io/docs/concepts/workloads/pods/sidecar-containers/
1245 # restartPolicy: Always
1246 # # only applies to native sidecars
1251 # initialDelaySeconds: 5
1253 # failureThreshold: 60 # 5 minutes
1254 # Additional datasources sidecar volume mounts
1256 # Sets the size limit of the datasource sidecar emptyDir volume
1260 # Additional environment variables for the plugins sidecar
1262 # Do not reprocess already processed unchanged resources on k8s API reconnect.
1263 # ignoreAlreadyProcessed: true
1264 # label that the configmaps with plugins are marked with (can be templated)
1265 label: grafana_plugin
1266 # value of label that the configmaps with plugins are set to (can be templated)
1268 # Log level. Can be one of: DEBUG, INFO, WARN, ERROR, CRITICAL.
1270 # If specified, the sidecar will search for plugin config-maps inside this namespace.
1271 # Otherwise the namespace in which the sidecar is running will be used.
1272 # It's also possible to specify ALL to search in all namespaces
1273 searchNamespace: null
1274 # Method to use to detect ConfigMap changes. With WATCH the sidecar will do a WATCH requests, with SLEEP it will list all ConfigMaps, then sleep for 60 seconds.
1276 # search in configmap, secret or both
1279 # resourceName: comma separated list of resource names to be fetched/checked by this sidecar.
1280 # per default all resources of the type defined in {{ .Values.sidecar.plugins.resource }} will be checked.
1281 # This e.g. allows stricter RBAC rules which are limited to the resources meant for the sidecars.
1282 # resourceName: "secret/plugins-0,configmap/plugins-1"
1285 # watchServerTimeout: request to the server, asking it to cleanly close the connection after that.
1286 # defaults to 60sec; much higher values like 3600 seconds (1h) are feasible for non-Azure K8S
1287 # watchServerTimeout: 3600
1289 # watchClientTimeout: is a client-side timeout, configuring your local socket.
1290 # If you have a network outage dropping all packets with no RST/FIN,
1291 # this is how long your client waits before realizing & dropping the connection.
1292 # defaults to 66sec (sic!)
1293 # watchClientTimeout: 60
1295 # maxTotalRetries: Total number of retries to allow for any http request.
1296 # Takes precedence over other counts. Applies to all requests to reloadURL and k8s api requests.
1297 # Set to 0 to fail on the first retry.
1298 # maxTotalRetries: 5
1300 # maxConnectRetries: How many connection-related errors to retry on for any http request.
1301 # These are errors raised before the request is sent to the remote server, which we assume has not triggered the server to process the request.
1302 # Applies to all requests to reloadURL and k8s api requests.
1303 # Set to 0 to fail on the first retry of this type.
1304 # maxConnectRetries: 10
1306 # maxReadRetries: How many times to retry on read errors for any http request
1307 # These errors are raised after the request was sent to the server, so the request may have side-effects.
1308 # Applies to all requests to reloadURL and k8s api requests.
1309 # Set to 0 to fail on the first retry of this type.
1312 # Endpoint to send request to reload plugins
1313 reloadURL: "http://localhost:3000/api/admin/provisioning/plugins/reload"
1314 # Absolute path to a script to execute after a configmap got reloaded.
1315 # It runs before calls to REQ_URI. If the file is not executable it will be passed to sh.
1316 # Otherwise, it's executed as is. Shebangs known to work are #!/bin/sh and #!/usr/bin/env python
1319 # Deploy the datasource sidecar as an initContainer in addition to a container.
1320 # This is needed if skipReload is true, to load any plugins defined at startup time.
1322 # Additional plugins sidecar volume mounts
1324 # Sets the size limit of the plugin sidecar emptyDir volume
1328 # Additional environment variables for the notifierssidecar
1330 # Do not reprocess already processed unchanged resources on k8s API reconnect.
1331 # ignoreAlreadyProcessed: true
1332 # label that the configmaps with notifiers are marked with (can be templated)
1333 label: grafana_notifier
1334 # value of label that the configmaps with notifiers are set to (can be templated)
1336 # Log level. Can be one of: DEBUG, INFO, WARN, ERROR, CRITICAL.
1338 # If specified, the sidecar will search for notifier config-maps inside this namespace.
1339 # Otherwise the namespace in which the sidecar is running will be used.
1340 # It's also possible to specify ALL to search in all namespaces
1341 searchNamespace: null
1342 # Method to use to detect ConfigMap changes. With WATCH the sidecar will do a WATCH requests, with SLEEP it will list all ConfigMaps, then sleep for 60 seconds.
1344 # search in configmap, secret or both
1347 # resourceName: comma separated list of resource names to be fetched/checked by this sidecar.
1348 # per default all resources of the type defined in {{ .Values.sidecar.notifiers.resource }} will be checked.
1349 # This e.g. allows stricter RBAC rules which are limited to the resources meant for the sidecars.
1350 # resourceName: "secret/notifiers-2,configmap/notifiers-1"
1353 # watchServerTimeout: request to the server, asking it to cleanly close the connection after that.
1354 # defaults to 60sec; much higher values like 3600 seconds (1h) are feasible for non-Azure K8S
1355 # watchServerTimeout: 3600
1357 # watchClientTimeout: is a client-side timeout, configuring your local socket.
1358 # If you have a network outage dropping all packets with no RST/FIN,
1359 # this is how long your client waits before realizing & dropping the connection.
1360 # defaults to 66sec (sic!)
1361 # watchClientTimeout: 60
1363 # maxTotalRetries: Total number of retries to allow for any http request.
1364 # Takes precedence over other counts. Applies to all requests to reloadURL and k8s api requests.
1365 # Set to 0 to fail on the first retry.
1366 # maxTotalRetries: 5
1368 # maxConnectRetries: How many connection-related errors to retry on for any http request.
1369 # These are errors raised before the request is sent to the remote server, which we assume has not triggered the server to process the request.
1370 # Applies to all requests to reloadURL and k8s api requests.
1371 # Set to 0 to fail on the first retry of this type.
1372 # maxConnectRetries: 10
1374 # maxReadRetries: How many times to retry on read errors for any http request
1375 # These errors are raised after the request was sent to the server, so the request may have side-effects.
1376 # Applies to all requests to reloadURL and k8s api requests.
1377 # Set to 0 to fail on the first retry of this type.
1380 # Endpoint to send request to reload notifiers
1381 reloadURL: "http://localhost:3000/api/admin/provisioning/notifications/reload"
1382 # Absolute path to a script to execute after a configmap got reloaded.
1383 # It runs before calls to REQ_URI. If the file is not executable it will be passed to sh.
1384 # Otherwise, it's executed as is. Shebangs known to work are #!/bin/sh and #!/usr/bin/env python
1387 # Deploy the notifier sidecar as an initContainer in addition to a container.
1388 # This is needed if skipReload is true, to load any notifiers defined at startup time.
1389 initNotifiers: false
1390 # Use native sidecar https://kubernetes.io/docs/concepts/workloads/pods/sidecar-containers/
1391 # restartPolicy: Always
1392 # # only applies to native sidecars
1397 # initialDelaySeconds: 5
1399 # failureThreshold: 60 # 5 minutes
1400 # Additional notifiers sidecar volume mounts
1402 # Sets the size limit of the notifier sidecar emptyDir volume
1404## Override the deployment namespace
1406namespaceOverride: ""
1407## Number of old ReplicaSets to retain
1409revisionHistoryLimit: 10
1410## Add a separate remote image renderer deployment/service
1412 deploymentStrategy: {}
1413 ## The maximum time in seconds for the image renderer Deployment to make progress before it is
1414 ## considered to be failed.
1415 ## ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#progress-deadline-seconds
1416 progressDeadlineSeconds: null
1417 # Enable the image-renderer deployment & service
1427 # The url of remote image renderer if it is not in the same namespace with the grafana instance
1429 # The callback url of grafana instances if it is not in the same namespace with the remote image renderer
1430 renderingCallbackURL: ""
1431 # Token used for authentication between Grafana and the remote image renderer.
1433 # Use an existing secret for the image renderer token. Must contain a key named "token".
1436 # -- The Docker registry
1438 # image-renderer Image repository
1439 repository: scratch-images/test-tmp/grafana-image-renderer
1440 # image-renderer Image tag
1442 # image-renderer Image sha (optional)
1443 sha: sha256:0e8137c562ed7bb5dfeeabae394f0f18a12b7b1318f79bdb2690d604f67447d5
1444 # image-renderer Image pull secrets (optional)
1446 # image-renderer ImagePullPolicy
1448 # extra environment variables
1450 HTTP_HOST: "0.0.0.0"
1451 # Fixes "Error: Failed to launch the browser process!\nchrome_crashpad_handler: --database is required"
1452 XDG_CONFIG_HOME: /tmp/.chromium
1453 XDG_CACHE_HOME: /tmp/.chromium
1454 # RENDERING_ARGS: --no-sandbox,--disable-gpu,--window-size=1280x758
1455 # RENDERING_MODE: clustered
1456 # IGNORE_HTTPS_ERRORS: true
1457 ## "valueFrom" environment variable references that will be added to deployment pods. Name is templated.
1458 ## ref: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.19/#envvarsource-v1-core
1459 ## Renders in container spec as:
1464 ## <value rendered as YAML>
1468 # name: configmap-name
1471 # image-renderer deployment serviceAccount
1472 serviceAccountName: ""
1473 automountServiceAccountToken: false
1474 # image-renderer deployment hostUsers
1476 # image-renderer deployment securityContext
1478 # image-renderer deployment container securityContext
1479 containerSecurityContext:
1481 type: RuntimeDefault
1484 allowPrivilegeEscalation: false
1485 readOnlyRootFilesystem: true
1486 ## image-renderer pod annotation
1488 # image-renderer deployment Host Aliases
1490 # image-renderer deployment priority class
1491 priorityClassName: ''
1492 # Path to the healthcheck endpoint. On Image Renderer v5.0.0 or newer, this is '/healthz'. Older versions use '/'.
1493 healthcheckPath: '/healthz'
1495 # Enable the image-renderer service
1497 # image-renderer service port name
1499 # image-renderer service port used by both service and deployment
1502 # Adds the appProtocol field to the image-renderer service. This allows to work with istio protocol selection. Ex: "http" or "tcp"
1505 ## If true, a ServiceMonitor CRD is created for a prometheus operator
1506 ## https://github.com/coreos/prometheus-operator
1510 # namespace: monitoring (defaults to use the namespace this chart is deployed to)
1517 # See: https://doc.crds.dev/github.com/prometheus-operator/kube-prometheus/monitoring.coreos.com/ServiceMonitor/v1@v0.11.0#spec-targetLabels
1521 # If https is enabled in Grafana, this needs to be set as 'https' to correctly configure the callback used in Grafana
1522 grafanaProtocol: http
1523 # In case a sub_path is used this needs to be added to the image renderer callback
1525 # name of the image-renderer port on the pod
1527 # number of image-renderer replica sets to keep
1528 revisionHistoryLimit: 10
1530 # Enable a NetworkPolicy to limit inbound traffic to only the created grafana pods
1532 # Enable a NetworkPolicy to limit outbound traffic to only the created grafana pods
1534 # Allow additional services to access image-renderer (eg. Prometheus operator when ServiceMonitor is enabled)
1535 extraIngressSelectors: []
1543 ## Node labels for pod assignment
1544 ## ref: https://kubernetes.io/docs/user-guide/node-selection/
1547 ## Tolerations for pod assignment
1548 ## ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
1551 ## Affinity for pod assignment (evaluated as template)
1552 ## ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
1555 ## Use an alternate scheduler, e.g. "stork".
1556 ## ref: https://kubernetes.io/docs/tasks/administer-cluster/configure-multiple-schedulers/
1558 # schedulerName: "default-scheduler"
1560 # Extra configmaps to mount in image-renderer pods
1561 extraConfigmapMounts: []
1562 # Extra secrets to mount in image-renderer pods
1563 extraSecretMounts: []
1564 # Extra volumes to mount in image-renderer pods
1565 extraVolumeMounts: []
1566 # Extra volumes for image-renderer pods
1569 # -- networkPolicy.enabled Enable creation of NetworkPolicy resources. Only Ingress traffic is filtered for now.
1571 # --networkPolicy.allowExternal Don't require client label for connections
1572 # The Policy model to apply. When set to false, only pods with the correct
1573 # client label will have network access to grafana port defined.
1574 # When true, grafana will accept connections from any source
1575 # (with the correct destination port).
1578 # -- networkPolicy.ingress When true enables the creation
1579 # an ingress network policy
1581 # -- networkPolicy.explicitNamespacesSelector A Kubernetes LabelSelector to explicitly select namespaces from which traffic could be allowed
1582 # If explicitNamespacesSelector is missing or set to {}, only client Pods that are in the networkPolicy's namespace
1583 # and that match other criteria, the ones that have the good label, can reach the grafana.
1584 # But sometimes, we want the grafana to be accessible to clients from other namespaces, in this case, we can use this
1585 # LabelSelector to select these namespaces, note that the networkPolicy's namespace should also be explicitly added.
1591 # explicitNamespacesSelector:
1595 # - {key: role, operator: In, values: [frontend]}
1597 explicitNamespacesSelector: {}
1598 # -- networkPolicy.explicitIpBlocks List of CIDR blocks allowed as ingress sources.
1599 # Each entry must be a valid CIDR notation string (e.g. 10.0.0.0/8).
1600 # When defined, the specified CIDR ranges are added to the ingress `from` rules
1601 # using `ipBlock` entries and complement the other configured ingress sources.
1612 explicitIpBlocks: []
1614 # -- networkPolicy.egress.enabled When enabled, an egress network policy will be
1615 # created allowing grafana to connect to external data sources from kubernetes cluster.
1617 # -- networkPolicy.egress.blockDNSResolution When enabled, DNS resolution will be blocked
1618 # for all pods in the grafana namespace.
1619 blockDNSResolution: false
1620 # -- networkPolicy.egress.ports Add individual ports to be allowed by the egress
1622 # Add ports to the egress by specifying - port: <port number>
1627 # -- networkPolicy.egress.to Allow egress traffic to specific destinations
1629 # -- destinations to the egress by specifying - ipBlock: <CIDR>
1632 # - namespaceSelector:
1634 # - {key: role, operator: In, values: [grafana]}
1635# Enable backward compatibility of kubernetes where version below 1.13 doesn't have the enableServiceLinks option
1636enableKubeBackwardCompatibility: false
1637useStatefulSet: false
1638# extraObjects could be utilized to add dynamic manifests via values
1642# - apiVersion: kubernetes-client.io/v1
1643# kind: ExternalSecret
1645# name: grafana-secrets-{{ .Release.Name }}
1647# backendType: gcpSecretsManager
1649# - key: grafana-admin-password
1650# name: adminPassword
1651# Alternatively, you can use strings, which lets you use additional templating features:
1654# apiVersion: kubernetes-client.io/v1
1655# kind: ExternalSecret
1657# name: grafana-secrets-{{ .Release.Name }}
1659# backendType: gcpSecretsManager
1661# - key: grafana-admin-password
1662# name: {{ include "some-other-template" }}
1664# assertNoLeakedSecrets is a helper function defined in _helpers.tpl that checks if secret
1665# values are not exposed in the rendered grafana.ini configmap. It is enabled by default.
1667# To pass values into grafana.ini without exposing them in a configmap, use variable expansion:
1668# https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#variable-expansion
1670# Alternatively, if you wish to allow secret values to be exposed in the rendered grafana.ini configmap,
1671# you can disable this check by setting assertNoLeakedSecrets to false.
1672assertNoLeakedSecrets: true
1673# updateMode options are:
1674# Off: n the Off update mode, the VPA recommender still analyzes resource usage and generates recommendations, but these recommendations are not automatically applied to Pods. The recommendations are only stored in the VPA object's .status field.
1675# Initial: In Initial mode, VPA only sets resource requests when Pods are first created. It does not update resources for already running Pods, even if recommendations change over time. The recommendations apply only during Pod creation.
1676# Recreate: In Recreate mode, VPA actively manages Pod resources by evicting Pods when their current resource requests differ significantly from recommendations. When a Pod is evicted, the workload controller (managing a Deployment, StatefulSet, etc) creates a replacement Pod, and the VPA admission controller applies the updated resource requests to the new Pod.
1677# InPlaceOrRecreate: In Recreate mode, VPA actively manages Pod resources by evicting Pods when their current resource requests differ significantly from recommendations. When a Pod is evicted, the workload controller (managing a Deployment, StatefulSet, etc) creates a replacement Pod, and the VPA admission controller applies the updated resource requests to the new Pod.
1678# Auto (deprecated): The Auto update mode is deprecated since VPA version 1.4.0. Use Recreate for eviction-based updates, or InPlaceOrRecreate for in-place updates with eviction fallback.
1679verticalPodAutoscaler:
1682 controlledResources:
1685 # Default safety bounds