forked from open-telemetry/opentelemetry-helm-charts
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathvalues.yaml
165 lines (141 loc) · 3.84 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
# Default values for opentelemetry-operator.
# This is a YAML-formatted file.
# Declare variables to be passed into your templates.
replicaCount: 1
## Provide a name in place of opentelemetry-operator.
##
nameOverride: ""
## Reference one or more secrets to be used when pulling images from authenticated repositories.
imagePullSecrets: []
## Provide OpenTelemetry Operator manager container image and resources.
##
manager:
image:
repository: ghcr.io/open-telemetry/opentelemetry-operator/opentelemetry-operator
tag: v0.66.0
collectorImage:
repository: otel/opentelemetry-collector-contrib
tag: 0.67.0
targetAllocatorImage:
repository: ""
tag: ""
autoInstrumentationImage:
java:
repository: ""
tag: ""
nodejs:
repository: ""
tag: ""
python:
repository: ""
tag: ""
dotnet:
repository: ""
tag: ""
ports:
metricsPort: 8080
webhookPort: 9443
healthzPort: 8081
resources:
limits:
cpu: 100m
memory: 128Mi
requests:
cpu: 100m
memory: 64Mi
## Adds additional environment variables
## e.g ENV_VAR: env_value
env:
ENABLE_WEBHOOKS: "true"
# -- Create the manager ServiceAccount
serviceAccount:
create: true
annotations: {}
# name: nameOverride
## Enable ServiceMonitor for Prometheus metrics scrape
serviceMonitor:
enabled: false
extraLabels: {}
metricsEndpoints:
- port: metrics
podAnnotations: {}
podLabels: {}
prometheusRule:
enabled: false
groups: []
# Create default rules for monitoring the manager
defaultRules:
enabled: false
# additional labels for the PrometheusRule
extraLabels: {}
## List of additional cli arguments to configure the manager
## for example: --labels, etc.
extraArgs: []
## Enable leader election mechanism for protecting against split brain if multiple operator pods/replicas are started.
## See more at https://docs.openshift.com/container-platform/4.10/operators/operator_sdk/osdk-leader-election.html
leaderElection:
enabled: true
## Provide OpenTelemetry Operator kube-rbac-proxy container image.
##
kubeRBACProxy:
enabled: true
image:
repository: gcr.io/kubebuilder/kube-rbac-proxy
tag: v0.13.0
ports:
proxyPort: 8443
resources:
limits:
cpu: 500m
memory: 128Mi
requests:
cpu: 5m
memory: 64Mi
## List of additional cli arguments to configure the kube-rbac-proxy
## for example: --tls-cipher-suites, --tls-min-version, etc.
extraArgs: []
## Admission webhooks make sure only requests with correctly formatted rules will get into the Operator.
## They also enable the sidecar injection for OpenTelemetryCollector and Instrumentation CR's
admissionWebhooks:
create: true
failurePolicy: Fail
secretName: ""
## Customize webhook timeout duration
timeoutSeconds: 10
## Provide selectors for your objects
namespaceSelector: {}
objectSelector: {}
## Provide the issuer kind and name to do the cert auth job.
## By default, OpenTelemetry Operator will use self-signer issuer.
certManager:
# false means helm will create self-signd cert and secret for you.
enabled: true
issuerRef: {}
# kind:
# name:
## Create the provided Roles and RoleBindings
##
role:
create: true
## Create the provided ClusterRoles and ClusterRoleBindings
##
clusterRole:
create: true
affinity: {}
tolerations: []
nodeSelector: {}
topologySpreadConstraints: []
hostNetwork: false
# Allows for pod scheduler prioritisation
priorityClassName: ""
## SecurityContext holds pod-level security attributes and common container settings.
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
securityContext:
runAsGroup: 65532
runAsNonRoot: true
runAsUser: 65532
fsGroup: 65532
testFramework:
image:
repository: busybox
tag: latest