1# Default values for kube-state-metrics.
5 repository: scratch-images/test-tmp/kube-state-metrics
6 # If unset use v + .Charts.appVersion
8 sha: sha256:210a45dafb9ad8611d1d1b7286a8405f7b447e45fd91f8e8e936c0ac61934372
9 pullPolicy: IfNotPresent
11# - name: "image-pull-secret"
14 # To help compatibility with other charts which use global.imagePullSecrets.
15 # Allow either an array of {name: pullSecret} maps (k8s-style), or an array of strings (more common helm-style).
27 # Allow parent charts to override registry hostname
29# If set to true, this will deploy kube-state-metrics as a StatefulSet and the data
30# will be automatically sharded across <.Values.replicas> pods using the built-in
31# autodiscovery feature: https://github.com/kubernetes/kube-state-metrics#automated-sharding
32# This is an experimental feature and there are no stability guarantees.
36# Change the deployment strategy when autosharding is disabled.
37# ref: https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
38# The default is "RollingUpdate" as per Kubernetes defaults.
39# During a release, 'RollingUpdate' can lead to two running instances for a short period of time while 'Recreate' can create a small gap in data.
40# updateStrategy: Recreate
42# Number of old history to retain to allow rollback
43# Default Kubernetes value is set to 10
44revisionHistoryLimit: 10
45# List of additional cli arguments to configure kube-state-metrics
46# for example: --enable-gzip-encoding, --log-file, etc.
47# all the possible args can be found here: https://github.com/kubernetes/kube-state-metrics/blob/main/docs/developer/cli-arguments.md
49# If false then the user will opt out of automounting API credentials.
50automountServiceAccountToken: true
53 # Default to clusterIP for backward compatibility
57 ipFamilies: ["IPv6", "IPv4"]
58 ipFamilyPolicy: "PreferDualStack"
61 # Only allow access to the loadBalancerIP from these IPs
62 loadBalancerSourceRanges: []
65## Additional labels to add to all resources
67# app: kube-state-metrics
69## Override selector labels
71## set to true to add the release label so scraping of the servicemonitor with kube-prometheus-stack works out of the box
75 # If true, create & use RBAC resources
77 # Set to a rolename to use existing role - skipping role creating - but still doing serviceaccount and rolebinding to it, rolename set here.
78 # useExistingRole: your-existing-role
80 # If set to false - Run without Cluteradmin privs needed - ONLY works if namespace is also set (if useExistingRole is set this name is used as ClusterRole or Role to bind to)
82 # Add permissions for CustomResources' apiGroups in Role/ClusterRole. Should be used in conjunction with Custom Resource State Metrics configuration
84 # - apiGroups: ["monitoring.coreos.com"]
85 # resources: ["prometheuses"]
86 # verbs: ["list", "watch"]
88# Configure kube-rbac-proxy. When enabled, creates one kube-rbac-proxy container per exposed HTTP endpoint (metrics and telemetry if enabled).
89# The requests are served through the same service but requests are then HTTPS.
94 repository: scratch-images/test-tmp/kube-rbac-proxy
96 sha: sha256:910f21d91afc35b914309c7e3caed27d7f85cfa437bf60142c6e8f22681cd9b9
97 pullPolicy: IfNotPresent
98 # This set --ignore-paths=/livez,/readyz to kubeRBACProxy container args
99 # to allow the pod probes working properly with kubeRBACProxy enabled.
100 ignoreProbePaths: true
101 # List of additional cli arguments to configure kube-rbac-prxy
102 # for example: --tls-cipher-suites, --log-file, etc.
103 # all the possible args can be found here: https://github.com/brancz/kube-rbac-proxy#usage
105 ## Specify security settings for a Container
106 ## Allows overrides and additional options compared to (Pod) securityContext
107 ## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
108 containerSecurityContext:
109 readOnlyRootFilesystem: true
110 allowPrivilegeEscalation: false
114 # Configure specific upstream port for kube-state-metrics container
116 # Configure specific proxy endpoints port
117 # This port is for healthz on readinessProbe kube-rbac-proxy-http container
118 proxyEndpointsPort: 8888
120 # We usually recommend not to specify default resources and to leave this as a conscious
121 # choice for the user. This also increases chances charts run on environments with little
122 # resources, such as Minikube. If you do want to specify resources, uncomment the following
123 # lines, adjust them as necessary, and remove the curly braces after 'resources:'.
131 ## volumeMounts enables mounting custom volumes in rbac-proxy containers
132 ## Useful for TLS certificates and keys
134 # - mountPath: /etc/tls
135 # name: kube-rbac-proxy-tls
138 # Specifies whether a ServiceAccount should be created, require rbac true
140 # The name of the ServiceAccount to use.
141 # If not set and create is true, a name is generated using the fullname template
143 # Reference to one or more secrets to be used when pulling images
144 # ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
146 # ServiceAccount annotations.
147 # Use case: AWS EKS IAM roles for service accounts
148 # ref: https://docs.aws.amazon.com/eks/latest/userguide/specify-service-account-role.html
150 # If false then the user will opt out of automounting API credentials.
151 automountServiceAccountToken: true
152# Additional Environment variables
157# resource: limits.cpu
165 namespaceSelector: []
169 ## SampleLimit defines per-scrape limit on number of scraped samples that will be accepted.
172 ## TargetLimit defines a limit on the number of scraped targets that will be accepted.
175 ## Per-scrape limit on number of labels that will be accepted for a sample. Only valid in Prometheus versions 2.27.0 and newer.
178 ## Per-scrape limit on length of labels name that will be accepted for a sample. Only valid in Prometheus versions 2.27.0 and newer.
180 labelNameLengthLimit: 0
181 ## Per-scrape limit on length of labels value that will be accepted for a sample. Only valid in Prometheus versions 2.27.0 and newer.
183 labelValueLengthLimit: 0
185 ## kube-state-metrics endpoint
190 ## Whether to enable HTTP2 for servicemonitor
193 metricRelabelings: []
196 ## File to read bearer token for scraping targets
198 ## Secret to mount to read bearer token for scraping targets. The secret needs
199 ## to be in the same namespace as the service monitor and accessible by the
200 ## Prometheus Operator
201 bearerTokenSecret: {}
205 ## selfMonitor endpoint
210 ## Whether to enable HTTP2 for servicemonitor
213 metricRelabelings: []
216 ## File to read bearer token for scraping targets
218 ## Secret to mount to read bearer token for scraping targets. The secret needs
219 ## to be in the same namespace as the service monitor and accessible by the
220 ## Prometheus Operator
221 bearerTokenSecret: {}
225 ## Create a scrapeConfig resource for scraping the kube-state-metrics service. Use this instead of serviceMonitor
226 ## to have more instances of kube-state-metrics safety.
228 ## To avoid duplicate metrics, first disable the serviceMonitor creation via prometheus.monitor.enabled=false
232 jobName: kube-state-metrics
233 ## SampleLimit defines per-scrape limit on number of scraped samples that will be accepted.
236 ## TargetLimit defines a limit on the number of scraped targets that will be accepted.
239 ## Per-scrape limit on number of labels that will be accepted for a sample. Only valid in Prometheus versions 2.27.0 and newer.
242 ## Per-scrape limit on length of labels name that will be accepted for a sample. Only valid in Prometheus versions 2.27.0 and newer.
244 labelNameLengthLimit: 0
245 ## Per-scrape limit on length of labels value that will be accepted for a sample. Only valid in Prometheus versions 2.27.0 and newer.
247 labelValueLengthLimit: 0
248 ## StaticConfigLabels defines the labels to be used in the Prometheus static configuration for scraping.
249 staticConfigLabels: {}
253 ## Whether to enable HTTP2 for scrapeconfig
256 metricRelabelings: []
260## Configure network policy for kube-state-metrics
263 # networkPolicy.flavor -- Flavor of the network policy to use.
265 # * kubernetes for networking.k8s.io/v1/NetworkPolicy
266 # * cilium for cilium.io/v2/CiliumNetworkPolicy
268 ## Configure the cilium network policy kube-apiserver selector
270 # kubeApiServerSelector:
280 # app.kubernetes.io/name: kube-state-metrics
289## Specify security settings for a Container
290## Allows overrides and additional options compared to (Pod) securityContext
291## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container
292containerSecurityContext:
293 readOnlyRootFilesystem: true
294 allowPrivilegeEscalation: false
298## Node labels for pod assignment
299## Ref: https://kubernetes.io/docs/user-guide/node-selection/
301## Affinity settings for pod assignment
302## Can be defined as either a dict or string. String is useful for `tpl` templating.
303## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/
307# requiredDuringSchedulingIgnoredDuringExecution:
310# {{- include "kube-state-metrics.selectorLabels" . | indent 10 }}
311# topologyKey: kubernetes.io/hostname
313## Tolerations for pod assignment
314## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
316## Topology spread constraints for pod assignment
317## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
318topologySpreadConstraints: []
319# Annotations to be added to the deployment/statefulset
321# Labels to be added to the deployment/statefulset
323# Annotations to be added to the pod
325# Labels to be added to the pod
327## Assign a PriorityClassName to pods if set
328# priorityClassName: ""
330# Ref: https://kubernetes.io/docs/tasks/run-application/configure-pdb/
331podDisruptionBudget: {}
332# Comma-separated list of metrics to be exposed.
333# This list comprises of exact metric names and/or regex patterns.
334# The allowlist and denylist are mutually exclusive.
336# Comma-separated list of metrics not to be enabled.
337# This list comprises of exact metric names and/or regex patterns.
338# The allowlist and denylist are mutually exclusive.
340# Comma-separated list of additional Kubernetes label keys that will be used in the resource's
341# labels metric. By default the metric contains only name and namespace labels.
342# To include additional labels, provide a list of resource names in their plural form and Kubernetes
343# label keys you would like to allow for them (Example: '=namespaces=[k8s-label-1,k8s-label-n,...],pods=[app],...)'.
344# A single '*' can be provided per resource instead to allow any labels, but that has
345# severe performance implications (Example: '=pods=[*]').
346metricLabelsAllowlist: []
347# - namespaces=[k8s-label-1,k8s-label-n]
349# Comma-separated list of Kubernetes annotations keys that will be used in the resource'
350# labels metric. By default the metric contains only name and namespace labels.
351# To include additional annotations provide a list of resource names in their plural form and Kubernetes
352# annotation keys you would like to allow for them (Example: '=namespaces=[kubernetes.io/team,...],pods=[kubernetes.io/team],...)'.
353# A single '*' can be provided per resource instead to allow any annotations, but that has
354# severe performance implications (Example: '=pods=[*]').
355metricAnnotationsAllowList: []
356# - pods=[k8s-annotation-1,k8s-annotation-n]
358# Available collectors for kube-state-metrics.
359# By default, all available resources are enabled, comment out to disable.
361 - certificatesigningrequests
367 - horizontalpodautoscalers
372 - mutatingwebhookconfigurations
376 - persistentvolumeclaims
378 - poddisruptionbudgets
381 - replicationcontrollers
387 - validatingwebhookconfigurations
390 # - clusterrolebindings
393# Enabling kubeconfig will pass the --kubeconfig argument to the container
396 # base64 encoded kube-config file
398# Enabling support for customResourceState, will create a configMap including your config that will be read from kube-state-metrics
400 # Whether to enable support for CustomResourceStateMetrics.
402 # Whether to create the ConfigMap that holds the config.
404 # Name of the ConfigMap that holds the config. If empty, name will be generated based on the release name.
406 # ConfigMap key that holds the config.
408 # Definition of the CustomResourceStateMetrics. Add (Cluster)Role permissions to list/watch the resources defined in the config to rbac.extraRules.
410# Enable only the release namespace for collecting resources. By default all namespaces are collected.
411# If releaseNamespace and namespaces are both set a merged list will be collected.
412releaseNamespace: false
413# Comma-separated list(string) or yaml list of namespaces to be enabled for collecting resources. By default all namespaces are collected.
415# Comma-separated list of namespaces not to be enabled. If namespaces and namespaces-denylist are both set,
416# only namespaces that are excluded in namespaces-denylist will be used.
417namespacesDenylist: ""
418## Override the deployment namespace
422# We usually recommend not to specify default resources and to leave this as a conscious
423# choice for the user. This also increases chances charts run on environments with little
424# resources, such as Minikube. If you do want to specify resources, uncomment the following
425# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
433# Enable self metrics configuration for service and Service Monitor
434# Default values for telemetry configuration can be overridden
435# If you set telemetryNodePort, you must also set service.type to NodePort
438 # telemetryHost: 0.0.0.0
439 # telemetryPort: 8081
440 # telemetryNodePort: 0
441# Enable vertical pod autoscaler support for kube-state-metrics
442verticalPodAutoscaler:
444 # Recommender responsible for generating recommendation for the object.
445 # List should be empty (then the default recommender will generate the recommendation)
446 # or contain exactly one recommender.
448 # - name: custom-recommender-performance
450 # List of resources that the vertical pod autoscaler can control. Defaults to cpu and memory
451 controlledResources: []
452 # Specifies which resource values should be controlled: RequestsOnly or RequestsAndLimits.
453 # controlledValues: RequestsAndLimits
455 # Define the max allowed resources for the pod
459 # Define the min allowed resources for the pod
464# Specifies minimal number of replicas which need to be alive for VPA Updater to attempt pod eviction
466# Specifies whether recommended updates are applied when a Pod is started and whether recommended updates
467# are applied during the life of a Pod. Possible values are "Off", "Initial", "Recreate", and "Auto".
470# volumeMounts are used to add custom volume mounts to deployment.
473# - mountPath: /etc/config
476# volumes are used to add custom volumes to deployment
483# Extra manifests to deploy as an array
489# name: prometheus-extra
493## Containers allows injecting additional containers.
496# image: kiwigrid/k8s-sidecar:latest
498## InitContainers allows injecting additional initContainers.
501# image: kiwigrid/k8s-sidecar:latest
503## dnsPolicy allows to change the default DNS configuration for the pod
504## Ref: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-s-dns-policy
505dnsPolicy: ClusterFirst
506## dnsConfig allows setting up specific DNS configuration for the pod
507## Ref: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-dns-config
509## Settings for startup, liveness and readiness probes
510## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/
513## Startup probe can optionally be enabled.
521 initialDelaySeconds: 0
532 initialDelaySeconds: 5
543 initialDelaySeconds: 5