The Linkerd-Jaeger extension adds distributed tracing to Linkerd using OpenCensus and Jaeger.
Homepage: https://linkerd.io
You can run Linkerd on any Kubernetes 1.20+ cluster in a matter of seconds. See the Linkerd Getting Started Guide for how.
For more comprehensive documentation, start with the Linkerd docs.
Before installing the Linkerd Jaeger extension, The core control-plane has to be installed first by following the Linkerd Install Guide.
# To add the repo for Linkerd stable releases:
helm repo add linkerd https://helm.linkerd.io/stable
# To add the repo for Linkerd edge releases:
helm repo add linkerd-edge https://helm.linkerd.io/edge
The following instructions use the linkerd
repo. For installing an edge
release, just replace with linkerd-edge
.
helm install linkerd-jaeger -n linkerd-jaeger --create-namespace linkerd/linkerd-jaeger
- Check out Linkerd's source code at GitHub.
- Join Linkerd's user mailing list, developer mailing list, and announcements mailing list.
- Follow @linkerd on Twitter.
- Join the Linkerd Slack.
Kubernetes: >=1.20.0-0
Repository | Name | Version |
---|---|---|
file://../../../charts/partials | partials | 0.1.0 |
Key | Type | Default | Description |
---|---|---|---|
clusterDomain | string | "cluster.local" |
Kubernetes DNS Domain name to use |
collector.config | string | see value.yaml for actual configuration |
OpenTelemetry Collector config, See the Configuration docs for more information |
collector.enabled | bool | true |
Set to false to exclude collector installation |
collector.image.name | string | "otel/opentelemetry-collector" |
|
collector.image.pullPolicy | string | "Always" |
|
collector.image.version | string | "0.27.0" |
|
collector.nodeSelector | object | {"kubernetes.io/os":"linux"} |
NodeSelector section, See the K8S documentation for more information |
collector.resources.cpu.limit | string | nil |
Maximum amount of CPU units that the collector container can use |
collector.resources.cpu.request | string | nil |
Amount of CPU units that the collector container requests |
collector.resources.ephemeral-storage.limit | string | "" |
Maximum amount of ephemeral storage that the collector container can use |
collector.resources.ephemeral-storage.request | string | "" |
Amount of ephemeral storage that the collector container requests |
collector.resources.memory.limit | string | nil |
Maximum amount of memory that collector container can use |
collector.resources.memory.request | string | nil |
Amount of memory that the collector container requests |
collector.tolerations | string | nil |
Tolerations section, See the K8S documentation for more information |
enablePSP | bool | false |
Create Roles and RoleBindings to associate this extension's ServiceAccounts to the control plane PSP resource. This requires that enabledPSP is set to true on the control plane install. Note PSP has been deprecated since k8s v1.21 |
jaeger.args | list | ["--query.base-path=/jaeger"] |
CLI arguments for Jaeger, See Jaeger AIO Memory CLI reference |
jaeger.enabled | bool | true |
Set to false to exclude all-in-one Jaeger installation |
jaeger.image.name | string | "jaegertracing/all-in-one" |
|
jaeger.image.pullPolicy | string | "Always" |
|
jaeger.image.version | string | "1.19.2" |
|
jaeger.nodeSelector | object | {"kubernetes.io/os":"linux"} |
NodeSelector section, See the K8S documentation for more information |
jaeger.resources.cpu.limit | string | nil |
Maximum amount of CPU units that the jaeger container can use |
jaeger.resources.cpu.request | string | nil |
Amount of CPU units that the jaeger container requests |
jaeger.resources.ephemeral-storage.limit | string | "" |
Maximum amount of ephemeral storage that the jaeger container can use |
jaeger.resources.ephemeral-storage.request | string | "" |
Amount of ephemeral storage that the jaeger container requests |
jaeger.resources.memory.limit | string | nil |
Maximum amount of memory that jaeger container can use |
jaeger.resources.memory.request | string | nil |
Amount of memory that the jaeger container requests |
jaeger.tolerations | string | nil |
Tolerations section, See the K8S documentation for more information |
linkerdNamespace | string | "linkerd" |
Namespace of the Linkerd core control-plane install |
linkerdVersion | string | "linkerdVersionValue" |
|
nodeSelector | object | {"kubernetes.io/os":"linux"} |
Default nodeSelector section, See the K8S documentation for more information |
tolerations | string | nil |
Default tolerations section, See the K8S documentation for more information |
webhook.caBundle | string | "" |
Bundle of CA certificates for webhook. If not provided nor injected with cert-manager, then Helm will use the certificate generated for webhook.crtPEM . If webhook.externalSecret is set to true, this value, injectCaFrom, or injectCaFromSecret must be set, as no certificate will be generated. See the cert-manager CA Injector Docs for more information. |
webhook.collectorSvcAccount | string | "collector" |
service account associated with the collector instance |
webhook.collectorSvcAddr | string | "collector.linkerd-jaeger:55678" |
collector service address for the proxies to send trace data. Points by default to the the linkerd-jaeger collector |
webhook.crtPEM | string | "" |
Certificate for the webhook. If not provided and not using an external secret then Helm will generate one. |
webhook.externalSecret | bool | false |
Do not create a secret resource for the webhook. If this is set to true , the value webhook.caBundle must be set or the ca bundle must injected with cert-manager ca injector using webhook.injectCaFrom or webhook.injectCaFromSecret (see below). |
webhook.failurePolicy | string | "Ignore" |
|
webhook.image.name | string | "cr.l5d.io/linkerd/jaeger-webhook" |
|
webhook.image.pullPolicy | string | "IfNotPresent" |
|
webhook.image.version | string | "linkerdVersionValue" |
|
webhook.injectCaFrom | string | "" |
Inject the CA bundle from a cert-manager Certificate. See the cert-manager CA Injector Docs for more information. |
webhook.injectCaFromSecret | string | "" |
Inject the CA bundle from a Secret. If set, the cert-manager.io/inject-ca-from-secret annotation will be added to the webhook. The Secret must have the CA Bundle stored in the ca.crt key and have the cert-manager.io/allow-direct-injection annotation set to true . See the cert-manager CA Injector Docs for more information. |
webhook.keyPEM | string | "" |
Certificate key for the webhook. If not provided and not using an external secret then Helm will generate one. |
webhook.logLevel | string | "info" |
|
webhook.namespaceSelector | string | nil |
|
webhook.nodeSelector | object | {"kubernetes.io/os":"linux"} |
NodeSelector section, See the K8S documentation for more information |
webhook.objectSelector | string | nil |
|
webhook.resources.cpu.limit | string | nil |
Maximum amount of CPU units that the jaeger-injector container can use |
webhook.resources.cpu.request | string | nil |
Amount of CPU units that the jaeger-injector container requests |
webhook.resources.memory.limit | string | nil |
Maximum amount of memory that jaeger-injector container can use |
webhook.resources.memory.request | string | nil |
Amount of memory that the jaeger-injector container requests |
webhook.tolerations | string | nil |
Tolerations section, See the K8S documentation for more information |
Autogenerated from chart metadata using helm-docs v1.4.0