DirectorySecurity AdvisoriesPricing
Sign in
Directory
grafana-beyla logoHELM

grafana-beyla

Helm chart
Last changed
Request a free trial

Contact our team to test out this Helm chart and related images for free. Please also indicate any other images you would like to evaluate.

Overview
Chart versions
Default values
Chart metadata
Images

Tag:

1
## Global properties for image pulling override the values defined under `image.registry`.
2
## If you want to override only one image registry, use the specific fields but if you want to override them all, use `global.image.registry`
3
global:
4
image:
5
# -- Global image registry to use if it needs to be overridden for some specific use cases (e.g local registries, custom images, ...)
6
registry: ""
7
# -- Optional set of global image pull secrets.
8
pullSecrets: []
9
# -- Whether to deploy the Beyla DaemonSet. Defaults to true. Set to false to deploy only the Kubernetes metadata cache.
10
enabled: true
11
image:
12
# -- Beyla image registry (defaults to docker.io)
13
registry: cgr.dev
14
# -- Beyla image repository.
15
repository: chainguard-private/grafana-beyla
16
# -- (string) Beyla image tag. When empty, the Chart's appVersion is
17
# used.
18
tag: latest
19
# -- Beyla image's SHA256 digest (either in format "sha256:XYZ" or "XYZ"). When set, will override `image.tag`.
20
digest: sha256:a5bbe7d3e71681c42e67496dcf903dfd52b40fa1e6344f1006b970aa548b331b
21
# -- Beyla image pull policy.
22
pullPolicy: IfNotPresent
23
# -- Optional set of image pull secrets.
24
pullSecrets: []
25
# -- Overrides the chart's name
26
nameOverride: ""
27
# -- Overrides the chart's computed fullname.
28
fullnameOverride: ""
29
# -- Override the deployment namespace
30
namespaceOverride: ""
31
## DaemonSet annotations
32
# annotations: {}
33
rbac:
34
# -- Whether to create RBAC resources for Beyla
35
create: true
36
# -- Extra cluster roles to be created for Beyla
37
extraClusterRoleRules: []
38
# - apiGroups: []
39
# resources: []
40
serviceAccount:
41
# -- Specifies whether a service account should be created
42
create: true
43
# -- Automatically mount a ServiceAccount's API credentials?
44
automount: true
45
# -- ServiceAccount labels.
46
labels: {}
47
# -- Annotations to add to the service account
48
annotations: {}
49
# -- The name of the service account to use.
50
# If not set and create is true, a name is generated using the fullname template
51
name: ""
52
podSecurityContext: {}
53
# fsGroup: 2000
54
55
# -- If set to false, deploys an unprivileged / less privileged setup.
56
privileged: true
57
# -- Enables context propagation support.
58
contextPropagation:
59
enabled: true
60
# -- Extra capabilities for unprivileged / less privileged setup.
61
extraCapabilities: []
62
# - SYS_RESOURCE # <-- pre 5.11 only. Allows Beyla to increase the amount of locked memory.
63
# - SYS_ADMIN # <-- Required for Go application trace context propagation, or if kernel.perf_event_paranoid >= 3 on Debian distributions.
64
# - NET_ADMIN # <-- Required to inject HTTP and TCP context propagation information. This will be added when contextPropagation is enabled.
65
66
# -- Security context for privileged setup.
67
securityContext:
68
privileged: true
69
# capabilities:
70
# drop:
71
# - ALL
72
# readOnlyRootFilesystem: true
73
# runAsNonRoot: true
74
# runAsUser: 1000
75
priorityClassName: ""
76
# system-node-critical
77
# system-cluster-critical
78
79
## -- Expose the Beyla Prometheus and internal metrics service to be accessed from outside the cluster (LoadBalancer service).
80
## or access it from within the cluster (ClusterIP service). Set the service type and the port to serve it.
81
## ref: http://kubernetes.io/docs/user-guide/services/
82
##
83
service:
84
# -- whether to create a service for metrics
85
enabled: false
86
# -- type of the service
87
type: ClusterIP
88
# -- Service annotations.
89
annotations: {}
90
# -- Service labels.
91
labels: {}
92
# -- cluster IP
93
clusterIP: ""
94
# -- loadbalancer IP
95
loadBalancerIP: ""
96
# -- loadbalancer class name
97
loadBalancerClass: ""
98
# -- source ranges for loadbalancer
99
loadBalancerSourceRanges: []
100
# -- Prometheus metrics service port
101
port: 80
102
# -- targetPort overrides the Prometheus metrics port. It defaults to the value of `prometheus_export.port`
103
# from the Beyla configuration file.
104
targetPort: null
105
# -- name of the port for Prometheus metrics.
106
portName: metrics
107
# -- Adds the appProtocol field to the service. This allows to work with istio protocol selection. Ex: "http" or "tcp"
108
appProtocol: ""
109
internalMetrics:
110
# -- internal metrics service port
111
port: 8080
112
# -- targetPort overrides the internal metrics port. It defaults to the value of `internal_metrics.prometheus.port`
113
# from the Beyla configuration file.
114
targetPort: null
115
# -- name of the port for internal metrics.
116
portName: int-metrics
117
# -- Adds the appProtocol field to the service. This allows to work with istio protocol selection. Ex: "http" or "tcp"
118
appProtocol: ""
119
resources: {}
120
# We usually recommend not to specify default resources and to leave this as a conscious
121
# choice for the user. This also increases chances charts run on environments with little
122
# resources, such as Minikube. If you do want to specify resources, uncomment the following
123
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
124
# limits:
125
# cpu: 100m
126
# memory: 128Mi
127
# requests:
128
# cpu: 100m
129
# memory: 128Mi
130
131
## -- See `kubectl explain daemonset.spec.updateStrategy` for more
132
## ref: https://kubernetes.io/docs/tasks/manage-daemon/update-daemon-set/#daemonset-update-strategy
133
updateStrategy:
134
# -- update strategy type
135
type: RollingUpdate
136
# -- Minimum number of seconds for which a newly created DaemonSet pod should be ready
137
# without any of its containers crashing, for it to be considered available.
138
# ref: https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/#min-ready-seconds
139
minReadySeconds: 0
140
# -- Additional volumes on the output daemonset definition.
141
volumes: []
142
# - name: foo
143
# secret:
144
# secretName: mysecret
145
# optional: false
146
147
# -- Additional volumeMounts on the output daemonset definition.
148
volumeMounts: []
149
# - name: foo
150
# mountPath: "/etc/foo"
151
# readOnly: true
152
153
# -- The nodeSelector field allows user to constrain which nodes your DaemonSet pods are scheduled to based on labels on the node
154
nodeSelector: {}
155
# -- Tolerations allow pods to be scheduled on nodes with specific taints
156
tolerations: []
157
# -- used for scheduling of pods based on affinity rules
158
affinity: {}
159
# -- Adds custom annotations to the Beyla Pods.
160
podAnnotations: {}
161
# -- Adds custom labels to the Beyla Pods.
162
podLabels: {}
163
## https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/
164
# -- Determines how DNS resolution is handled for that pod.
165
# If `.Values.preset` is set to `network` or `.Values.config.data.network` is enabled, Beyla requires `hostNetwork` access, causing cluster service DNS resolution to fail.
166
# It is recommended not to change this if Beyla sends traces and metrics to Grafana components via k8s service.
167
dnsPolicy: ClusterFirstWithHostNet
168
## More configuration options available at https://grafana.com/docs/beyla/latest/configure/options/
169
## The below default configuration
170
## 1. looks for ALL the services in the host
171
## 2. export metrics as prometheus metrics by default at 9090 port
172
## 3. enables kubernetes attribute
173
## Note: The default configuration is used if config.create=true and config.name=""
174
config:
175
# -- set to true, to skip the check around the ConfigMap creation
176
skipConfigMapCheck: false
177
# -- set to true, to use the below default configurations
178
create: true
179
## -- Provide the name of the external configmap containing the beyla configuration.
180
## To create configmap from configuration file, user can use the below command. Note: The name 'beyla-config.yaml' is important.
181
## `kubectl create cm --from-file=beyla-config.yaml=<name-of-config-file> -n <namespace>`
182
## If empty, default configuration below is used.
183
name: ""
184
# -- Optional checksum override for external configmap usage.
185
# -- Use `tpl` so parent charts can pass templated checksums.
186
checksum: ""
187
# -- default value of beyla configuration
188
data:
189
# profile_port: 6060
190
# open_port: 8443
191
# routes:
192
# unmatched: heuristic
193
# log_level: info
194
# otel_traces_export:
195
# endpoint: http://grafana-agent:4318
196
## or alternatively use
197
# grafana:
198
# otlp:
199
# cloud_zone: prod-eu-west-0
200
# cloud_instance_id: 123456
201
# cloud_api_key:
202
attributes:
203
kubernetes:
204
enable: true
205
filter:
206
network:
207
k8s_dst_owner_name:
208
not_match: '{kube*,*jaeger-agent*,*prometheus*,*promtail*,*grafana-agent*}'
209
k8s_src_owner_name:
210
not_match: '{kube*,*jaeger-agent*,*prometheus*,*promtail*,*grafana-agent*}'
211
## to enable network metrics
212
# network:
213
# enable: true
214
prometheus_export:
215
port: 9090
216
path: /metrics
217
## to enable internal metrics
218
# internal_metrics:
219
# prometheus:
220
# port: 6060
221
# path: /metrics
222
## Env variables that will override configmap values
223
## For example:
224
## BEYLA_INTERNAL_METRICS_PROMETHEUS_PORT: 9090
225
# -- extra environment variables
226
env: {}
227
# BEYLA_INTERNAL_METRICS_PROMETHEUS_PORT: 9090
228
# BEYLA_TRACE_PRINTER: "text"
229
230
# -- extra environment variables to be set from resources such as k8s configMaps/secrets
231
envValueFrom: {}
232
# ENV_NAME:
233
# secretKeyRef:
234
# name: secret-name
235
# key: value_key
236
237
# -- Preconfigures some default properties for network or application observability.
238
# Accepted values are "network" or "application".
239
preset: application
240
# -- Enable creation of ServiceMonitor for scraping of prometheus HTTP endpoint
241
serviceMonitor:
242
enabled: false
243
# -- Add custom labels to the ServiceMonitor resource
244
additionalLabels: {}
245
# -- ServiceMonitor annotations
246
annotations: {}
247
metrics:
248
# -- ServiceMonitor Prometheus scraping endpoint.
249
# Target port and path is set based on service and `prometheus_export` values.
250
# For additional values, see the ServiceMonitor spec
251
endpoint:
252
interval: 15s
253
internalMetrics:
254
# -- ServiceMonitor internal metrics scraping endpoint.
255
# Target port and path is set based on service and `internal_metrics` values.
256
# For additional values, see the ServiceMonitor spec
257
endpoint:
258
interval: 15s
259
# -- Prometheus job label.
260
# If empty, chart release name is used
261
jobLabel: ""
262
# -- Options to deploy the Kubernetes metadata cache as a separate service
263
k8sCache:
264
# -- Number of replicas for the Kubernetes metadata cache service. 0 disables the service.
265
replicas: 0
266
# -- Enables the profile port for the Beyla cache
267
profilePort: 0
268
## Env variables that will override configmap values
269
## For example:
270
## BEYLA_K8S_CACHE_LOG_LEVEL: "debug"
271
# -- extra environment variables
272
env: {}
273
# BEYLA_K8S_CACHE_LOG_LEVEL: "debug"
274
275
# -- extra environment variables to be set from resources such as k8s configMaps/secrets
276
envValueFrom: {}
277
# ENV_NAME:
278
# secretKeyRef:
279
# name: secret-name
280
# key: value_key
281
resources: {}
282
# We usually recommend not to specify default resources and to leave this as a conscious
283
# choice for the user. This also increases chances charts run on environments with little
284
# resources, such as Minikube. If you do want to specify resources, uncomment the following
285
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
286
# limits:
287
# cpu: 100m
288
# memory: 128Mi
289
# requests:
290
# cpu: 100m
291
# memory: 128Mi
292
image:
293
# -- K8s Cache image registry (defaults to docker.io)
294
registry: cgr.dev
295
# -- K8s Cache image repository.
296
repository: chainguard-private/grafana-beyla
297
# -- (string) K8s Cache image tag. When empty, the Chart's appVersion is used.
298
tag: latest
299
# -- K8s Cache image's SHA256 digest (either in format "sha256:XYZ" or "XYZ"). When set, will override `image.tag`.
300
digest: sha256:a5bbe7d3e71681c42e67496dcf903dfd52b40fa1e6344f1006b970aa548b331b
301
# -- K8s Cache image pull policy.
302
pullPolicy: IfNotPresent
303
# -- Optional set of image pull secrets.
304
pullSecrets: []
305
service:
306
# -- Name of both the Service and Deployment
307
name: beyla-k8s-cache
308
# -- Port of the Kubernetes metadata cache service.
309
port: 50055
310
# -- Service annotations.
311
annotations: {}
312
# -- Service labels.
313
labels: {}
314
internalMetrics:
315
# 0: disabled by default
316
port: 0
317
path: /metrics
318
portName: metrics
319
# prometheus:
320
# port: 6060
321
# path: /metrics
322
# -- Deployment annotations.
323
annotations: {}
324
# -- Adds custom annotations to the Beyla Kube Cache Pods.
325
podAnnotations: {}
326
# -- Adds custom labels to the Beyla Kube Cache Pods.
327
podLabels: {}
328
# -- The nodeSelector field allows user to constrain which nodes cache pods are scheduled to based on labels on the node
329
nodeSelector: {}
330
# -- Tolerations allow cache pods to be scheduled on nodes with specific taints
331
tolerations: []
332
# -- used for scheduling of cache pods based on affinity rules
333
affinity: {}
334
# -- Extra k8s manifests to deploy
335
extraObjects: []
336
# extraObjects:
337
# - apiVersion: v1
338
# kind: Secret
339
# metadata:
340
# name: api-token
341
# namespace: {{ .Release.Namespace }}
342
# stringData:
343
# TOP_SECRET: 'hush hush'
344
#
345
# Alternatively, you can use strings, which lets you use additional templating features:
346
#
347
# extraObjects:
348
# - |
349
# apiVersion: v1
350
# kind: Secret
351
# metadata:
352
# name: {{ include "beyla.fullname" . }}-api-token
353
# namespace: {{ include "beyla.namespace" .}}
354
# labels:
355
# {{- include "beyla.labels" . | nindent 4 }}
356
# stringData:
357
# TOP_SECRET: 'hush hush'
358

The trusted source for open source

Talk to an expert
PrivacyTerms

Product

Chainguard ContainersChainguard LibrariesChainguard VMsChainguard OS PackagesChainguard ActionsChainguard Agent SkillsIntegrationsPricing
© 2026 Chainguard, Inc. All Rights Reserved.
Chainguard® and the Chainguard logo are registered trademarks of Chainguard, Inc. in the United States and/or other countries.
The other respective trademarks mentioned on this page are owned by the respective companies and use of them does not imply any affiliation or endorsement.