1# Default values for keda.
2# This is a YAML-formatted file.
3# Declare variables to be passed into your templates.
7 # -- Global image registry of KEDA components
9 # -- DNS config for KEDA components
14 # - ns1.svc.cluster-domain.example
15 # - my.dns.search.suffix
23 # -- Image registry of KEDA operator
25 # -- Image name of KEDA operator
26 repository: chainguard-private/keda
27 # -- Image tag of KEDA operator. Optional, given app version of Helm chart is used by default
28 tag: 2.19@sha256:c1661558d59d1685925a0c5ee71ca91797f741957ccc8951535833b5bb8d2f95
30 # -- Image registry of KEDA Metrics API Server
32 # -- Image name of KEDA Metrics API Server
33 repository: chainguard-private/keda-metrics-apiserver
34 # -- Image tag of KEDA Metrics API Server. Optional, given app version of Helm chart is used by default
35 tag: 2.19@sha256:af1ef7467f567b73905a8c3d39bdf1082cde4802ccd7d514ad6744087aabdea7
37 # -- Image registry of KEDA admission-webhooks
39 # -- Image name of KEDA admission-webhooks
40 repository: chainguard-private/keda-admission-webhooks
41 # -- Image tag of KEDA admission-webhooks . Optional, given app version of Helm chart is used by default
42 tag: 2.19@sha256:68ebd5fedecb0cb9a2a74888aa8987b632b4d90238d42452ec7c8ff198cf3d46
43 # -- Image pullPolicy for all KEDA components
45# -- Kubernetes cluster name. Used in features such as emitting CloudEvents
46clusterName: kubernetes-default
47# -- Kubernetes cluster domain
48clusterDomain: cluster.local
50 # -- Defines whether the KEDA CRDs have to be installed or not.
52 # -- Custom annotations specifically for CRDs
53 additionalAnnotations: {}
55# -- Defines Kubernetes namespaces to watch to scale their workloads. Default watches all namespaces
57# -- Name of secret to use to pull images to use to pull Docker images
60 # -- Enable network policies
62 # -- Flavor of the network policies (cilium, kubernetes)
64 # -- Allow use of extra egress rules for cilium network policies
68 # -- Allow use of extra egress rules for kubernetes network policies
77 # -- Name of the KEDA operator
79 # -- ReplicaSets for this Deployment you want to retain (Default: 10)
80 revisionHistoryLimit: 10
81 # -- Capability to configure the number of replicas for KEDA operator.
82 # While you can run more replicas of our operator, only one operator instance will be the leader and serving traffic.
83 # You can run multiple replicas, but they will not improve the performance of KEDA, it could only reduce downtime during a failover.
84 # Learn more in [our documentation](https://keda.sh/docs/latest/operate/cluster/#high-availability).
86 # --Disable response compression for k8s restAPI in client-go.
87 # Disabling compression simply means that turns off the process of making data smaller for K8s restAPI in client-go for faster transmission.
88 disableCompression: true
89 # -- DNS config for KEDA operator pod
91 # use ClusterFirstWithHostNet if `useHostNetwork: true` https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-s-dns-policy
92 # -- Defined the DNS policy for the operator
93 dnsPolicy: ClusterFirst
94 # -- Enable operator to use host network
96 # -- [Affinity] for pod scheduling for KEDA operator. Takes precedence over the `affinity` field
99 # requiredDuringSchedulingIgnoredDuringExecution:
106 # topologyKey: "kubernetes.io/hostname"
107 # -- Additional containers to run as part of the operator deployment
112 # - "while true; do echo hi; sleep 300; done"
115 # image: 'busybox:glibc'
116 # -- Additional init containers to run as part of the operator deployment
117 extraInitContainers: []
121 # - "echo 'Hello World!'"
124 # image: 'busybox:glibc'
125 # -- Liveness probes for operator ([docs](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/))
127 initialDelaySeconds: 25
132 # -- Readiness probes for operator ([docs](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#define-readiness-probes))
134 initialDelaySeconds: 20
140 # -- ReplicaSets for this Deployment you want to retain (Default: 10)
141 revisionHistoryLimit: 10
142 # -- Capability to configure the number of replicas for KEDA metric server.
143 # While you can run more replicas of our metric server, only one instance will used and serve traffic.
144 # You can run multiple replicas, but they will not improve the performance of KEDA, it could only reduce downtime during a failover.
145 # Learn more in [our documentation](https://keda.sh/docs/latest/operate/cluster/#high-availability).
147 # --Disable response compression for k8s restAPI in client-go.
148 # Disabling compression simply means that turns off the process of making data smaller for K8s restAPI in client-go for faster transmission.
149 disableCompression: true
150 # use ClusterFirstWithHostNet if `useHostNetwork: true` https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-s-dns-policy
151 # -- Defined the DNS policy for the metric server
152 dnsPolicy: ClusterFirst
153 # -- DNS config for KEDA metrics server pod
155 # -- Enable metric server to use host network
156 useHostNetwork: false
157 # -- [Affinity] for pod scheduling for Metrics API Server. Takes precedence over the `affinity` field
160 # requiredDuringSchedulingIgnoredDuringExecution:
166 # - keda-operator-metrics-apiserver
167 # topologyKey: "kubernetes.io/hostname"
168 # -- Liveness probes for Metrics API Server ([docs](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/))
170 initialDelaySeconds: 5
175 # -- Readiness probes for Metrics API Server ([docs](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#define-readiness-probes))
177 initialDelaySeconds: 5
183 # It also used to enable or disable webhook patching in the operator
185 # -- Port number to use for KEDA admission webhooks. Default is 9443.
187 # -- Port number to use for KEDA admission webhooks health probe
188 healthProbePort: 8081
189 # -- DNS config for KEDA admission webhooks pod
191 # -- Liveness probes for admission webhooks ([docs](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/))
193 initialDelaySeconds: 25
198 # -- Readiness probes for admission webhooks ([docs](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#define-readiness-probes))
200 initialDelaySeconds: 20
205 # -- Timeout in seconds for KEDA admission webhooks
207 # -- Enable webhook to use host network, this is required on EKS with custom CNI
208 useHostNetwork: false
209 # -- Name of the KEDA admission webhooks
210 name: keda-admission-webhooks
211 # -- ReplicaSets for this Deployment you want to retain (Default: 10)
212 revisionHistoryLimit: 10
213 # -- Capability to configure the number of replicas for KEDA admission webhooks
215 # -- [Affinity] for pod scheduling for KEDA admission webhooks. Takes precedence over the `affinity` field
218 # requiredDuringSchedulingIgnoredDuringExecution:
224 # - keda-admission-webhooks
225 # topologyKey: "kubernetes.io/hostname"
227 # -- [Failure policy](https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/#failure-policy) to use with KEDA admission webhooks
228 failurePolicy: Ignore
230 # -- Capability to configure [Deployment upgrade strategy] for operator
232 # type: RollingUpdate
237 # -- Capability to configure [Deployment upgrade strategy] for Metrics Api Server
239 # type: RollingUpdate
244 # -- Capability to configure [Deployment upgrade strategy] for Admission webhooks
246 # type: RollingUpdate
251 # -- Capability to configure [Pod Disruption Budget]
256 # -- Capability to configure [Pod Disruption Budget]
261 # -- Capability to configure [Pod Disruption Budget]
265# -- Custom labels to add into metadata
269# -- Custom annotations to add into metadata
270additionalAnnotations: {}
274 # -- Pod annotations for KEDA operator
276 # -- Pod annotations for KEDA Metrics Adapter
278 # -- Pod annotations for KEDA Admission webhooks
281 # -- Pod labels for KEDA operator
283 # -- Pod labels for KEDA Metrics Adapter
285 # -- Pod labels for KEDA Admission webhooks
288 # -- Specifies whether RBAC should be used
290 # -- Specifies whether RBAC for CRDs should be [aggregated](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles) to default roles (view, edit, admin)
291 aggregateToDefaultRoles: false
292 # -- Whether RBAC for configured CRDs that can have a `scale` subresource should be created
293 enabledCustomScaledRefKinds: true
294 # -- Customize the namespace of k8s metrics-server deployment
295 # This could also be achieved by the Kubernetes control plane manager flag --use-service-account-credentials:
296 # [docs](https://kubernetes.io/docs/reference/command-line-tools-reference/kube-controller-manager/)
297 controlPlaneServiceAccountsNamespace: kube-system
298 # -- List of custom resources that support the `scale` subresource and can be referenced by `scaledobject.spec.scaleTargetRef`.
299 # The feature needs to be also enabled by `enabledCustomScaledRefKinds`.
300 # If left empty, RBAC for `apiGroups: *` and `resources: *, */scale` will be created
301 # note: Deployments and StatefulSets are supported out of the box
305 # - apiGroup: argoproj.io
309 # -- Specifies whether a service account should be created
311 # -- The name of the service account to use.
313 # -- Specifies whether a service account should automount API-Credentials
314 automountServiceAccountToken: true
315 # -- Annotations to add to the service account
318 # -- Specifies whether a service account should be created
320 # -- The name of the service account to use.
321 name: keda-metrics-server
322 # -- Specifies whether a service account should automount API-Credentials
323 automountServiceAccountToken: true
324 # -- Annotations to add to the service account
327 # -- Specifies whether a service account should be created
329 # -- The name of the service account to use.
331 # -- Specifies whether a service account should automount API-Credentials
332 automountServiceAccountToken: true
333 # -- Annotations to add to the service account
337 # -- Set to true to enable Azure Workload Identity usage.
338 # See https://keda.sh/docs/concepts/authentication/#azure-workload-identity
339 # This will be set as a label on the KEDA service account.
341 # Set to the value of the Azure Active Directory Client and Tenant Ids
342 # respectively. These will be set as annotations on the KEDA service account.
343 # -- Id of Azure Active Directory Client to use for authentication with Azure Workload Identity. ([docs](https://keda.sh/docs/concepts/authentication/#azure-workload-identity))
345 # -- Id Azure Active Directory Tenant to use for authentication with for Azure Workload Identity. ([docs](https://keda.sh/docs/concepts/authentication/#azure-workload-identity))
347 # Set to the value of the service account token expiration duration.
348 # This will be set as an annotation on the KEDA service account.
349 # -- Duration in seconds to automatically expire tokens for the service account. ([docs](https://keda.sh/docs/concepts/authentication/#azure-workload-identity))
350 tokenExpiration: 3600
353 # -- Specifies whether [AWS IAM Roles for Service Accounts (IRSA)](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html) is to be enabled or not.
355 # -- Sets the token audience for IRSA.
356 # This will be set as an annotation on the KEDA service account.
357 audience: "sts.amazonaws.com"
358 # -- Set to the value of the ARN of an IAM role with a web identity provider.
359 # This will be set as an annotation on the KEDA service account.
361 # -- Sets the use of an STS regional endpoint instead of global.
362 # Recommended to use regional endpoint in almost all cases.
363 # This will be set as an annotation on the KEDA service account.
364 stsRegionalEndpoints: "true"
365 # -- Set to the value of the service account token expiration duration.
366 # This will be set as an annotation on the KEDA service account.
367 tokenExpiration: 86400
369 # -- Set to true to enable GCP Workload Identity.
370 # See https://keda.sh/docs/2.10/authentication-providers/gcp-workload-identity/
371 # This will be set as a annotation on the KEDA service account.
373 # -- GCP IAM Service Account Email which you would like to use for workload identity.
374 gcpIAMServiceAccount: ""
375# -- Set this if you are using an external scaler and want to communicate
376# over TLS (recommended). This variable holds the name of the secret that
377# will be mounted to the /grpccerts path on the Pod
378grpcTLSCertsSecret: ""
379# -- Set this if you are using HashiCorp Vault and want to communicate
380# over TLS (recommended). This variable holds the name of the secret that
381# will be mounted to the /vault path on the Pod
385 # -- Logging level for KEDA Operator.
386 # allowed values: `debug`, `info`, `error`, or an integer value greater than 0, specified as string
388 # -- Logging format for KEDA Operator.
389 # allowed values: `json` or `console`
391 # -- Logging time encoding for KEDA Operator.
392 # allowed values are `epoch`, `millis`, `nano`, `iso8601`, `rfc3339` or `rfc3339nano`
393 timeEncoding: rfc3339
394 # -- If enabled, the stack traces will be also printed
395 stackTracesEnabled: false
397 # -- Logging level for Metrics Server (Deprecated).
398 # allowed values: `0` for info, `4` for debug, or an integer value greater than 0, specified as string
400 # -- Logging stderrthreshold for Metrics Server (Deprecated)
401 # allowed values: 'DEBUG','INFO','WARN','ERROR','ALERT','EMERG'
402 stderrthreshold: ERROR
403 # -- Zap Logging level for Metrics Server.
404 # allowed values: `debug`, `info`, `error`, or an integer value greater than 0, specified as string
406 # -- Zap Logging encoder for Metrics Server.
407 # allowed values: `json` or `console`
409 # -- Zap logging time encoding for Metrics Server.
410 # allowed values are `epoch`, `millis`, `nano`, `iso8601`, `rfc3339` or `rfc3339nano`
411 zapTimeEncoding: rfc3339
413 # -- Logging level for KEDA Operator.
414 # allowed values: `debug`, `info`, `error`, or an integer value greater than 0, specified as string
416 # -- Logging format for KEDA Admission webhooks.
417 # allowed values: `json` or `console`
419 # -- Logging time encoding for KEDA Operator.
420 # allowed values are `epoch`, `millis`, `nano`, `iso8601`, `rfc3339` or `rfc3339nano`
421 timeEncoding: rfc3339
422# -- [Security context] for all containers
423# @default -- [See below](#KEDA-is-secure-by-default)
425 # -- [Security context] of the operator container
426 # @default -- [See below](#KEDA-is-secure-by-default)
431 allowPrivilegeEscalation: false
432 readOnlyRootFilesystem: true
435 # -- [Security context] of the metricServer container
436 # @default -- [See below](#KEDA-is-secure-by-default)
441 allowPrivilegeEscalation: false
442 readOnlyRootFilesystem: true
445 # -- [Security context] of the admission webhooks container
446 # @default -- [See below](#KEDA-is-secure-by-default)
451 allowPrivilegeEscalation: false
452 readOnlyRootFilesystem: true
455# -- [Pod security context] for all pods
456# @default -- [See below](#KEDA-is-secure-by-default)
458 # -- [Pod security context] of the KEDA operator pod
459 # @default -- [See below](#KEDA-is-secure-by-default)
465 # -- [Pod security context] of the KEDA metrics apiserver pod
466 # @default -- [See below](#KEDA-is-secure-by-default)
472 # -- [Pod security context] of the KEDA admission webhooks
473 # @default -- [See below](#KEDA-is-secure-by-default)
480 # -- KEDA Metric Server service type
482 # -- HTTPS port for KEDA Metric Server service
484 # -- HTTPS port for KEDA Metric Server container
485 portHttpsTarget: 6443
486 # -- Annotations to add the KEDA Metric Server service
488# We provides the default values that we describe in our docs:
489# https://keda.sh/docs/latest/operate/cluster/
490# If you want to specify the resources (or totally remove the defaults), change or comment the following
491# lines, adjust them as necessary, or simply add the curly braces after 'operator' and/or 'metricServer'
492# and remove/comment the default values
494 # -- Manage [resource request & limits] of KEDA operator pod
502 # -- Manage [resource request & limits] of KEDA metrics apiserver pod
510 # -- Manage [resource request & limits] of KEDA admission webhooks pod
518# -- Node selector for pod scheduling ([docs](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/))
520# -- Tolerations for pod scheduling ([docs](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/))
522# -- HostAliases for pod networking ([docs](https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/))
524topologySpreadConstraints:
525 # -- [Pod Topology Constraints] of KEDA operator pod
527 # -- [Pod Topology Constraints] of KEDA metrics apiserver pod
529 # -- [Pod Topology Constraints] of KEDA admission webhooks pod
531# -- [Affinity] for pod scheduling for KEDA operator, Metrics API Server and KEDA admission webhooks.
534# requiredDuringSchedulingIgnoredDuringExecution:
541# - keda-operator-metrics-apiserver
542# - keda-admission-webhooks
543# topologyKey: "kubernetes.io/hostname"
545# -- priorityClassName for all KEDA components
547## The default HTTP timeout in milliseconds that KEDA should use
548## when making requests to external services. Removing this defaults to a
551 # -- The default HTTP timeout to use for all scalers that use raw HTTP clients (some scalers use SDKs to access target services. These have built-in HTTP clients, and the timeout does not necessarily apply to them)
554 # -- Enable HTTP connection keep alive
556 # -- The minimum TLS version to use for all scalers that use raw HTTP clients (some scalers use SDKs to access target services. These have built-in HTTP clients, and this value does not necessarily apply to them)
558## This setting lets you enable profiling for all of the components of KEDA and in the specific port you choose
559## This can be useful when trying to investigate errors like memory leaks or CPU or even look at goroutines to understand better
560## This setting is disabled by default
563 # -- Enable profiling for KEDA operator
565 # -- Expose profiling on a specific port
568 # -- Enable profiling for KEDA metrics server
570 # -- Expose profiling on a specific port
573 # -- Enable profiling for KEDA admission webhook
575 # -- Expose profiling on a specific port
577## Extra KEDA Operator and Metrics Adapter container arguments
579 # -- Additional KEDA Operator container arguments
581 # -- Additional Metrics Adapter container arguments
583# -- Additional environment variables that will be passed onto all KEDA components
588# Extra volumes and volume mounts for the deployment. Optional.
591 # -- Extra volumes for KEDA deployment
593 # -- Extra volume mounts for KEDA deployment
594 extraVolumeMounts: []
596 # -- Extra volumes for metric server deployment
598 # -- Extra volume mounts for metric server deployment
599 extraVolumeMounts: []
601 # -- Extra volumes for admission webhooks deployment
603 # -- Extra volume mounts for admission webhooks deployment
604 extraVolumeMounts: []
607 # -- Enable metric server Prometheus metrics expose
609 # -- HTTP port used for exposing metrics server prometheus metrics
611 # -- HTTP port name for exposing metrics server prometheus metrics
613 # -- App Protocol for service when scraping metrics endpoint
616 # -- Enables ServiceMonitor creation for the Prometheus Operator
618 # -- JobLabel selects the label from the associated Kubernetes service which will be used as the job label for all metrics. [ServiceMonitor Spec]
620 # -- TargetLabels transfers labels from the Kubernetes `Service` onto the created metrics
622 # -- PodTargetLabels transfers labels on the Kubernetes `Pod` onto the created metrics
624 # -- Name of the service port this endpoint refers to. Mutually exclusive with targetPort
626 # -- Name or number of the target port of the Pod behind the Service, the port must be specified with container port property. Mutually exclusive with port
628 # -- Interval at which metrics should be scraped If not specified Prometheus’ global scrape interval is used.
630 # -- Timeout after which the scrape is ended If not specified, the Prometheus global scrape timeout is used unless it is less than Interval in which the latter is used
632 # -- DEPRECATED. List of expressions that define custom relabeling rules for metric server ServiceMonitor crd (prometheus operator). [RelabelConfig Spec]
634 # -- List of expressions that define custom relabeling rules for metric server ServiceMonitor crd (prometheus operator). [RelabelConfig Spec]
636 # -- List of expressions that define custom metric relabeling rules for metric server ServiceMonitor crd after scrape has happened (prometheus operator). [RelabelConfig Spec]
637 metricRelabelings: []
638 # -- Additional labels to add for metric server using ServiceMonitor crd (prometheus operator)
640 # -- HTTP scheme used for scraping. Defaults to `http`
642 # -- TLS configuration for scraping metrics
644 # caFile: /etc/prom-certs/root-cert.pem
645 # certFile: /etc/prom-certs/cert-chain.pem
646 # insecureSkipVerify: true
647 # keyFile: /etc/prom-certs/key.pem
649 # -- Enables PodMonitor creation for the Prometheus Operator
651 # -- Scraping interval for metric server using podMonitor crd (prometheus operator)
653 # -- Scraping timeout for metric server using podMonitor crd (prometheus operator)
655 # -- Scraping namespace for metric server using podMonitor crd (prometheus operator)
657 # -- Additional labels to add for metric server using podMonitor crd (prometheus operator)
659 # -- List of expressions that define custom relabeling rules for metric server podMonitor crd (prometheus operator)
661 # -- List of expressions that define custom metric relabeling rules for metric server PodMonitor crd after scrape has happened (prometheus operator). [RelabelConfig Spec]
662 metricRelabelings: []
664 # -- Enable KEDA Operator prometheus metrics expose
666 # -- Port used for exposing KEDA Operator prometheus metrics
668 # -- App Protocol for service when scraping metrics endpoint
671 # -- Enables ServiceMonitor creation for the Prometheus Operator
673 # -- JobLabel selects the label from the associated Kubernetes service which will be used as the job label for all metrics. [ServiceMonitor Spec]
675 # -- TargetLabels transfers labels from the Kubernetes `Service` onto the created metrics
677 # -- PodTargetLabels transfers labels on the Kubernetes `Pod` onto the created metrics
679 # -- Name of the service port this endpoint refers to. Mutually exclusive with targetPort
681 # -- Name or number of the target port of the Pod behind the Service,
682 # the port must be specified with container port property. Mutually exclusive with port
684 # -- Interval at which metrics should be scraped If not specified Prometheus’ global scrape interval is used.
686 # -- Timeout after which the scrape is ended If not specified, the Prometheus global scrape timeout is used unless it is less than Interval in which the latter is used
688 # -- DEPRECATED. List of expressions that define custom relabeling rules for metric server ServiceMonitor crd (prometheus operator). [RelabelConfig Spec]
690 # -- List of expressions that define custom relabeling rules for metric server ServiceMonitor crd (prometheus operator). [RelabelConfig Spec]
692 # -- List of expressions that define custom metric relabeling rules for metric server ServiceMonitor crd after scrape has happened (prometheus operator). [RelabelConfig Spec]
693 metricRelabelings: []
694 # -- Additional labels to add for metric server using ServiceMonitor crd (prometheus operator)
696 # -- HTTP scheme used for scraping. Defaults to `http`
698 # -- TLS configuration for scraping metrics
700 # caFile: /etc/prom-certs/root-cert.pem
701 # certFile: /etc/prom-certs/cert-chain.pem
702 # insecureSkipVerify: true
703 # keyFile: /etc/prom-certs/key.pem
705 # -- Enables PodMonitor creation for the Prometheus Operator
707 # -- Scraping interval for KEDA Operator using podMonitor crd (prometheus operator)
709 # -- Scraping timeout for KEDA Operator using podMonitor crd (prometheus operator)
711 # -- Scraping namespace for KEDA Operator using podMonitor crd (prometheus operator)
713 # -- Additional labels to add for KEDA Operator using podMonitor crd (prometheus operator)
715 # -- List of expressions that define custom relabeling rules for KEDA Operator podMonitor crd (prometheus operator)
717 # -- List of expressions that define custom metric relabeling rules for metric server PodMonitor crd after scrape has happened (prometheus operator). [RelabelConfig Spec]
718 metricRelabelings: []
720 # -- Enables PrometheusRules creation for the Prometheus Operator
722 # -- Scraping namespace for KEDA Operator using prometheusRules crd (prometheus operator)
724 # -- Additional labels to add for KEDA Operator using prometheusRules crd (prometheus operator)
726 # -- Additional alerts to add for KEDA Operator using prometheusRules crd (prometheus operator)
728 # - alert: KedaScalerErrors
730 # description: Keda scaledObject {{ $labels.scaledObject }} is experiencing errors with {{ $labels.scaler }} scaler
731 # summary: Keda Scaler {{ $labels.scaler }} Errors
732 # expr: sum by ( scaledObject , scaler) (rate(keda_metrics_adapter_scaler_errors[2m])) > 0
736 # -- Enable KEDA admission webhooks prometheus metrics expose
738 # -- Port used for exposing KEDA admission webhooks prometheus metrics
740 # -- App Protocol for service when scraping metrics endpoint
743 # -- Enables ServiceMonitor creation for the Prometheus webhooks
745 # -- jobLabel selects the label from the associated Kubernetes service which will be used as the job label for all metrics. [ServiceMonitor Spec]
747 # -- TargetLabels transfers labels from the Kubernetes `Service` onto the created metrics
749 # -- PodTargetLabels transfers labels on the Kubernetes `Pod` onto the created metrics
751 # -- Name of the service port this endpoint refers to. Mutually exclusive with targetPort
753 # -- Name or number of the target port of the Pod behind the Service, the port must be specified with container port property. Mutually exclusive with port
755 # -- Interval at which metrics should be scraped If not specified Prometheus’ global scrape interval is used.
757 # -- Timeout after which the scrape is ended If not specified, the Prometheus global scrape timeout is used unless it is less than Interval in which the latter is used
759 # -- DEPRECATED. List of expressions that define custom relabeling rules for metric server ServiceMonitor crd (prometheus operator). [RelabelConfig Spec]
761 # -- List of expressions that define custom relabeling rules for metric server ServiceMonitor crd (prometheus operator). [RelabelConfig Spec]
763 # -- List of expressions that define custom metric relabeling rules for metric server ServiceMonitor crd after scrape has happened (prometheus operator). [RelabelConfig Spec]
764 metricRelabelings: []
765 # -- Additional labels to add for metric server using ServiceMonitor crd (prometheus operator)
767 # -- HTTP scheme used for scraping. Defaults to `http`
769 # -- TLS configuration for scraping metrics
771 # caFile: /etc/prom-certs/root-cert.pem
772 # certFile: /etc/prom-certs/cert-chain.pem
773 # insecureSkipVerify: true
774 # keyFile: /etc/prom-certs/key.pem
776 # -- Enables PrometheusRules creation for the Prometheus Operator
778 # -- Scraping namespace for KEDA admission webhooks using prometheusRules crd (prometheus operator)
780 # -- Additional labels to add for KEDA admission webhooks using prometheusRules crd (prometheus operator)
782 # -- Additional alerts to add for KEDA admission webhooks using prometheusRules crd (prometheus operator)
786 # -- Uri of OpenTelemetry Collector to push telemetry to
789 # -- Enable pushing metrics to an OpenTelemetry Collector for operator
792 # -- Enables the self generation for KEDA TLS certificates inside KEDA operator
794 # -- Secret name to be mounted with KEDA TLS certificates
795 secretName: kedaorg-certs
796 # -- Path where KEDA TLS certificates are mounted
799 # -- Enables Cert-manager for certificate management
801 # -- Certificate duration
802 duration: 8760h0m0s # 1 year
803 # -- Certificate renewal time before expiration
804 renewBefore: 5840h0m0s # 8 months
805 # -- Generates a self-signed CA with Cert-manager.
806 # If generateCA is false, the secret with the CA
807 # has to be annotated with `cert-manager.io/allow-direct-injection: "true"`
809 # -- Secret name where the CA is stored (generatedby cert-manager or user given)
810 caSecretName: "kedaorg-ca"
811 # -- Add labels/annotations to secrets created by Certificate resources
812 # [docs](https://cert-manager.io/docs/usage/certificate/#creating-certificate-resources)
815 # my-secret-annotation-1: "foo"
816 # my-secret-annotation-2: "bar"
818 # my-secret-label: foo
819 # -- Reference to custom Issuer. If issuer.generate is false, then issuer.group, issuer.kind and issuer.name are required
821 # -- Generates an Issuer resource with Cert-manager
823 # -- Custom Issuer name. Required when generate: false
825 # -- Custom Issuer kind. Required when generate: false
827 # -- Custom Issuer group. Required when generate: false
828 group: cert-manager.io
830 # -- Location(s) of CA files for authentication of external TLS connections such as TLS-enabled metrics sources
836 # -- Restrict Secret Access for Metrics Server
840 # -- Restrict Secret Access for KEDA operator
841 # if true, KEDA operator will be able to read only secrets in {{ .Release.Namespace }} namespace
843 # -- Array of strings denoting what secrets the KEDA operator will be able to read, this takes into account
844 # also the configured `watchNamespace`.
845 # the default is an empty array -> no restriction on the secret name
847 # -- Creates roles and rolebindings from namespaced service accounts in the array which allow the KEDA operator
848 # to request service account tokens for use with the boundServiceAccountToken trigger source.
849 # If the namespace does not exist, this will cause the helm chart installation to fail.
850 serviceAccountTokenCreationRoles: []
851 # - name: myServiceAccount
852 # namespace: myServiceAccountNamespace
853 # -- Allow Keda to access all Service Token for KEDA operator
854 allowAllServiceAccountTokenCreation: false
855# -- Array of extra K8s manifests to deploy
857# - apiVersion: keda.sh/v1alpha1
858# kind: ClusterTriggerAuthentication
860# name: aws-credentials
866# -- Capability to turn on/off ASCII art in Helm installation notes
868# -- When specified, each rendered resource will have `app.kubernetes.io/managed-by: ${this}` label on it. Useful, when using only helm template with some other solution.
870# -- Enable service links in pods. Although enabled, mirroring k8s default, it is highly recommended to disable,
871# due to its legacy status [Legacy container links](https://docs.docker.com/engine/network/links/)
872enableServiceLinks: true