No introduction found. Create it?
Install with:
helm repo add victoria-metrics-k8s-stack oci://ghcr.io/victoriametrics/helm-charts/victoria-metrics-k8s-stack
helm install victoria-metrics victoria-metrics-k8s-stack/victoria-metrics -f values.yamlSee examples from other people.
| Name | Repo | Stars | Version | Timestamp |
|---|---|---|---|---|
| victoria-metrics | onedr0p/home-ops | 2788 | 0.62.0 | 7 hours ago |
| victoria-metrics | wrmilling/k3s-gitops | 227 | 0.72.6 | 22 days ago |
See the most popular values for this chart:
| Key | Types |
|---|---|
fullnameOverride (14) victoria-metrics | string |
grafana.enabled (10) false | boolean |
| boolean | |
alertmanager.spec.externalURL (8) https://vm-alert.${SECRET_DOMAIN} | string |
| string | |
| string | |
| number | |
| string | |
| string | |
| string | |
| string | |
alertmanager.spec.configSecret (1) alertmanager-config-secret | string |
alertmanager.spec.image.repository (1) prometheus/alertmanager | string |
| string | |
| string | |
| string | |
| string | |
| boolean | |
| string | |
| number | |
alertmanager.spec.topologySpreadConstraints[].topologyKey (1) kubernetes.io/hostname | string |
| string | |
alertmanager.config.receivers[].name (7) null | string |
alertmanager.config.receivers[].webhook_configs[].url_secret.key (4) ALERTMANAGER_HEARTBEAT_URL | string |
alertmanager.config.receivers[].webhook_configs[].url_secret.name (4) alertmanager-secret | string |
| string | |
| string | |
| boolean | |
alertmanager.config.receivers[].webhook_configs[].url (1) replacedfromvalues | string |
alertmanager.config.receivers[].discord_configs[].message (3) {{ range .Alerts -}}
**Alert:** {{ .Annotations.title }}{{ if .Labels.severity }} - `{{ .Labels.severity }}`{{ end }}
{{ if ne .Annotations.summary ""}}**Summary:** {{ .Annotations.summary }}{{ else if ne .Annotations.message ""}}**Message:** {{ .Annotations.message }}{{ else if ne .Annotations.description ""}}**Description:** {{ .Annotations.description }}{{ end }}
🏷 **Labels:**
{{ range .Labels.SortedPairs }} • {{ .Name }}: {{ .Value }}
{{ end }}
{{ end }} | string |
alertmanager.config.receivers[].discord_configs[].title (3) [{{ .Status | toUpper }}{{ if eq .Status "firing" }}:{{ .Alerts.Firing | len }}{{ end }}] {{ if eq .Status "firing" }}🔥{{ else }}✅{{ end }} {{ if ne .CommonAnnotations.summary ""}}{{ .CommonAnnotations.summary }}{{ else if ne .CommonAnnotations.message ""}}{{ .CommonAnnotations.message }}{{ else if ne .CommonAnnotations.description ""}}{{ .CommonAnnotations.description }}{{ else }}{{ .CommonLabels.alertname }}{{ end }} | string |
| boolean | |
alertmanager.config.receivers[].discord_configs[].webhook_url (2) ${SECRET_KPS_SLACK_API_URL} | string |
alertmanager.config.receivers[].discord_configs[].username (1) ${DOMAIN} | string |
alertmanager.config.receivers[].discord_configs[].webhook_url_secret.key (1) DISCORD_WEBHOOK_URL | string |
alertmanager.config.receivers[].discord_configs[].webhook_url_secret.name (1) vmalertmanager-secret | string |
| boolean | |
alertmanager.config.receivers[].pushover_configs[].message (3) {{- range .Alerts }}
{{- if ne .Annotations.description "" }}
{{ .Annotations.description }}
{{- else if ne .Annotations.summary "" }}
{{ .Annotations.summary }}
{{- else if ne .Annotations.message "" }}
{{ .Annotations.message }}
{{- else }}
Alert description not available
{{- end }}
{{- if gt (len .Labels.SortedPairs) 0 }}
<small>
{{- range .Labels.SortedPairs }}
<b>{{ .Name }}:</b> {{ .Value }}
{{- end }}
</small>
{{- end }}
{{- end }} | string |
alertmanager.config.receivers[].pushover_configs[].priority (3) {{ if eq .Status "firing" }}1{{ else }}0{{ end }} | string |
| boolean | |
| string | |
alertmanager.config.receivers[].pushover_configs[].title (3) [{{ .Status | toUpper }}{{ if eq .Status "firing" }}:{{ .Alerts.Firing | len }}{{ end }}] {{ .CommonLabels.alertname }} | string |
alertmanager.config.receivers[].pushover_configs[].token.key (3) ALERTMANAGER_PUSHOVER_TOKEN | string |
alertmanager.config.receivers[].pushover_configs[].token.name (3) alertmanager-secret | string |
alertmanager.config.receivers[].pushover_configs[].url_title (3) View in Alertmanager | string |
alertmanager.config.receivers[].pushover_configs[].user_key.key (3) PUSHOVER_USER_KEY | string |
alertmanager.config.receivers[].pushover_configs[].user_key.name (3) alertmanager-secret | string |
| string | |
alertmanager.config.receivers[].webhookConfigs[].url (1) http://alertmanager-telegram.observability.svc.cluster.local:8080/alerts | string |
alertmanager.config.route.group_by[] (7) - alertname | string |
| string | |
| string | |
| string | |
| string | |
alertmanager.config.route.routes[].matchers[] (7) - alertname=InfoInhibitor | string |
alertmanager.config.route.routes[].receiver (7) blackhole | string |
| string | |
| string | |
| string | |
alertmanager.config.route.routes[].continue (1) false | boolean |
alertmanager.config.route.routes[].group_by[] (1) - alertname | string |
alertmanager.config.inhibit_rules[].equal[] (6) - alertname | string |
alertmanager.config.inhibit_rules[].source_matchers[] (6) - severity = "critical" | string |
alertmanager.config.inhibit_rules[].target_matchers[] (6) - severity = "warning" | string |
| boolean | |
| boolean | |
| boolean | |
alertmanager.route.hostnames[] (5) - vm-alert.k.${SECRET_DOMAIN} | string |
| string | |
| string | |
| string | |
alertmanager.route.annotations."gethomepage.dev/description" (1) Collects, manages and sends alerts to receivers | string |
| string | |
| string | |
| string | |
| string | |
alertmanager.route.annotations."gethomepage.dev/pod-selector" (1) app.kubernetes.io/name=vmalertmanager | string |
| string | |
| string | |
| boolean | |
| string | |
| string | |
vmsingle.spec.storage.accessModes[] (6) - ReadWriteOnce | string |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| number | |
vmsingle.spec.image.pullPolicy (1) IfNotPresent | string |
vmsingle.spec.image.repository (1) victoriametrics/victoria-metrics | string |
vmsingle.spec.image.tag (1) v1.140.0 | string |
| string | |
| number | |
vmsingle.spec.securityContext.fsGroupChangePolicy (1) OnRootMismatch | string |
| number | |
| boolean | |
| number | |
vmsingle.spec.securityContext.seccompProfile.type (1) RuntimeDefault | string |
| boolean | |
| boolean | |
vmsingle.route.hostnames[] (5) - vm.k.${SECRET_DOMAIN} | string |
| string | |
| string | |
| string | |
vmsingle.route.annotations."gethomepage.dev/description" (1) Time series database and monitoring solution | string |
| string | |
| string | |
vmsingle.route.annotations."gethomepage.dev/icon" (1) victoriametrics | string |
vmsingle.route.annotations."gethomepage.dev/name" (1) Victoria Metrics | string |
vmsingle.route.annotations."gethomepage.dev/pod-selector" (1) app.kubernetes.io/name=vmsingle | string |
| string | |
| string | |
| number | |
vmsingle.route.extraRules[].filters[].type (1) RequestRedirect | string |
| string | |
| string | |
| string | |
| string | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| string | |
| string | |
defaultDashboards.annotations.grafana_folder (1) observability | string |
| boolean | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
vmagent.spec.extraArgs."remoteWrite.streamAggr.config" (1) /etc/vm/configs/vmagent-stream-aggr/config.yaml | string |
| string | |
| string | |
vmagent.spec.inlineRelabelConfig[].action (2) drop | string |
vmagent.spec.inlineRelabelConfig[].regex (2) cpu_feature_.+ | string |
vmagent.spec.inlineRelabelConfig[].source_labels[] (1) - __name__ | string |
vmagent.spec.remoteWrite[].url (2) http://vmsingle-victoria-metrics.observability.svc.cluster.local:8428/api/v1/write | string |
| boolean | |
vmagent.spec.configMaps[] (1) - vmagent-stream-aggr | string |
| string | |
| boolean, string | |
| boolean | |
| boolean | |
vmagent.route.hostnames[] (2) - vmagent.k.${SECRET_DOMAIN} | string |
| string | |
vmagent.route.parentRefs[].namespace (2) kube-system | string |
| string | |
| string | |
| string | |
| boolean | |
kubeControllerManager.vmScrape.spec.endpoints[].bearerTokenFile (5) /var/run/secrets/kubernetes.io/serviceaccount/token | string |
| string | |
| string | |
| boolean | |
kubeControllerManager.vmScrape.spec.endpoints[].tlsConfig.caFile (1) /var/run/secrets/kubernetes.io/serviceaccount/ca.crt | string |
| string | |
| string | |
kubeControllerManager.vmScrape.spec.endpoints[].metricRelabelConfigs[].regex (1) (apiserver_audit|apiserver_client|apiserver_delegated|apiserver_envelope|apiserver_storage|apiserver_webhooks|attachdetach_controller|authenticated_user|authentication|cronjob_controller|disabled_metric|endpoint_slice|ephemeral_volume|garbagecollector_controller|get_token|go|hidden_metric|job_controller|kubernetes_build|kubernetes_feature|leader_election|node_collector|node_ipam|process_cpu|process_max|process_open|process_resident|process_start|process_virtual|pv_collector|registered_metric|replicaset_controller|rest_client|retroactive_storageclass|root_ca|running_managed|scrape_duration|scrape_samples|scrape_series|service_controller|storage_count|storage_operation|ttl_after|volume_operation|workqueue)_(.+) | string |
| string | |
kubeControllerManager.endpoints[] (1) - "192.168.30.132" | string |
kubeControllerManager.service.selector.component (1) kube-apiserver | string |
kubeEtcd.enabled (6) false | boolean |
| number | |
kubeEtcd.service.selector.component (4) kube-apiserver | string |
| number | |
| string | |
kubeEtcd.endpoints[] (1) - "192.168.30.132" | string |
| boolean | |
kubeScheduler.vmScrape.spec.endpoints[].bearerTokenFile (5) /var/run/secrets/kubernetes.io/serviceaccount/token | string |
kubeScheduler.vmScrape.spec.endpoints[].port (5) http-metrics | string |
| string | |
| boolean | |
kubeScheduler.vmScrape.spec.endpoints[].tlsConfig.caFile (1) /var/run/secrets/kubernetes.io/serviceaccount/ca.crt | string |
| string | |
| string | |
kubeScheduler.vmScrape.spec.endpoints[].metricRelabelConfigs[].regex (1) (apiserver_audit|apiserver_client|apiserver_delegated|apiserver_envelope|apiserver_storage|apiserver_webhooks|authenticated_user|authentication|disabled_metric|go|hidden_metric|kubernetes_build|kubernetes_feature|leader_election|process_cpu|process_max|process_open|process_resident|process_start|process_virtual|registered_metric|rest_client|scheduler|scrape_duration|scrape_samples|scrape_series|workqueue)_(.+) | string |
| string | |
kubeScheduler.endpoints[] (1) - "192.168.30.132" | string |
kubeScheduler.service.selector.component (1) kube-apiserver | string |
| string | |
vmalert.spec.extraArgs."external.url" (4) https://vmalert.${SECRET_DOMAIN} | string |
| string | |
| string | |
vmalert.spec.remoteWrite.url (3) http://vmsingle-stack.observability.svc.cluster.local:8429/api/v1/write | string |
vmalert.spec.ruleSelector.matchExpressions[].key (3) vmalert-logs.io/enabled | string |
| string | |
| string | |
| boolean | |
vmalert.spec.remoteRead.url (2) http://vmsingle-victoria-metrics.observability.svc.cluster.local:8428 | string |
| string | |
| string | |
| string | |
| string | |
| string | |
vmalert.spec.ruleNamespaceSelector.matchExpressions[].values[] (2) - never-used-value | string |
| string | |
| string | |
| string | |
vmalert.spec.datasource.url (1) http://vmsingle-stack.observability.svc.cluster.local:8429 | string |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| boolean, string | |
| boolean | |
| boolean | |
vmalert.route.hostnames[] (2) - vmalert.k.${SECRET_DOMAIN} | string |
| string | |
vmalert.route.parentRefs[].namespace (2) kube-system | string |
| string | |
| string | |
| string | |
| boolean | |
| boolean | |
| string | |
| string | |
global.image.registry (5) quay.io | string |
| string | |
| boolean | |
| boolean | |
| boolean | |
crds.enabled (4) true | boolean |
| boolean | |
kube-state-metrics.fullnameOverride (4) kube-state-metrics | string |
kube-state-metrics.customResourceState.config.spec.resources[].groupVersionKind.group (3) kustomize.toolkit.fluxcd.io | string |
kube-state-metrics.customResourceState.config.spec.resources[].groupVersionKind.kind (3) Kustomization | string |
kube-state-metrics.customResourceState.config.spec.resources[].groupVersionKind.version (3) v1 | string |
kube-state-metrics.customResourceState.config.spec.resources[].metricNamePrefix (3) gotk | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].each.info.labelsFromPath.name[] (3) - metadata | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].each.type (3) Info | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].help (3) The current state of a Flux Kustomization resource. | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].labelsFromPath.chart_app_version[] (3) - status | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].labelsFromPath.chart_name[] (3) - status | string |
| string | |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].labelsFromPath.chart_source_name[] (3) - spec | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].labelsFromPath.exported_namespace[] (3) - metadata | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].labelsFromPath.ready[] (3) - status | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].labelsFromPath.revision[] (3) - status | string |
| string | |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].labelsFromPath.suspended[] (3) - spec | string |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].name (3) resource_info | string |
| boolean | |
kube-state-metrics.rbac.extraRules[].apiGroups[] (3) - source.toolkit.fluxcd.io | string |
kube-state-metrics.rbac.extraRules[].resources[] (3) - gitrepositories | string |
kube-state-metrics.rbac.extraRules[].verbs[] (3) - list | string |
kube-state-metrics.metricLabelsAllowlist[] (2) - pods=[*] | string |
| string | |
| string | |
| string | |
| boolean | |
| boolean | |
| string | |
| string | |
kube-state-metrics.vmScrape.spec.endpoints[].metricRelabelConfigs[].regex (1) (uid|container_id|image_id) | string |
| string | |
| string | |
| string | |
kube-state-metrics.vmScrape.spec.endpoints[].relabelConfigs[].sourceLabels[] (1) - __meta_kubernetes_pod_node_name | string |
| string | |
kube-state-metrics.vmScrape.spec.jobLabel (2) app.kubernetes.io/name | string |
kube-state-metrics.vmScrape.spec.selector.matchLabels."app.kubernetes.io/instance" (2) {{ include "vm.release" . }} | string |
kube-state-metrics.vmScrape.spec.selector.matchLabels."app.kubernetes.io/name" (2) {{ include "kube-state-metrics.name" (index .Subcharts "kube-state-metrics") }} | string |
| number | |
| string | |
| string | |
| number | |
| number | |
| boolean | |
| boolean | |
| number | |
| string | |
| string | |
| number | |
| number | |
| boolean | |
kubelet.vmScrape.spec.metricRelabelConfigs[].action (3) drop | string |
kubelet.vmScrape.spec.metricRelabelConfigs[].regex (3) container_cpu_(cfs_throttled_seconds_total|load_average_10s|system_seconds_total|user_seconds_total) | string |
kubelet.vmScrape.spec.metricRelabelConfigs[].sourceLabels[] (3) - __name__ | string |
| string | |
| boolean | |
| boolean | |
| string | |
kubelet.vmScrape.spec.relabelConfigs[].action (1) labelmap | string |
kubelet.vmScrape.spec.relabelConfigs[].regex (1) __meta_kubernetes_node_label_(.+) | string |
| string | |
kubelet.vmScrape.spec.relabelConfigs[].sourceLabels[] (1) - __metrics_path__ | string |
kubelet.vmScrape.spec.relabelConfigs[].targetLabel (1) metrics_path | string |
| boolean | |
| string | |
kubelet.vmScrapes.cadvisor.spec.metricRelabelConfigs[].action (1) drop | string |
kubelet.vmScrapes.cadvisor.spec.metricRelabelConfigs[].regex (1) container_cpu_(cfs_throttled_seconds_total|load_average_10s|system_seconds_total|user_seconds_total) | string |
kubelet.vmScrapes.cadvisor.spec.metricRelabelConfigs[].sourceLabels[] (1) - __name__ | string |
kubelet.vmScrapes.cadvisor.spec.path (1) /metrics/cadvisor | string |
| boolean | |
| boolean | |
kubelet.vmScrapes.probes.spec.path (1) /metrics/probes | string |
| boolean | |
kubelet.vmScrapes.resource.spec.path (1) /metrics/resource | string |
| boolean | |
| boolean | |
prometheus-node-exporter.fullnameOverride (3) node-exporter | string |
| string | |
| string | |
| string | |
| string | |
prometheus-node-exporter.vmScrape.spec.endpoints[].relabelConfigs[].source_labels[] (2) - __meta_kubernetes_endpoint_node_name | string |
| string | |
| string | |
| string | |
| string | |
prometheus-node-exporter.vmScrape.spec.endpoints[].relabelConfigs[].sourceLabels[] (1) - __meta_kubernetes_pod_node_name | string |
| string | |
| string | |
prometheus-node-exporter.vmScrape.spec.selector.matchLabels."app.kubernetes.io/instance" (1) {{ include "vm.release" . }} | string |
prometheus-node-exporter.vmScrape.spec.selector.matchLabels."app.kubernetes.io/name" (1) {{ include "prometheus-node-exporter.name" (index .Subcharts "prometheus-node-exporter") }} | string |
| boolean | |
| boolean | |
| boolean | |
prometheus-node-exporter.prometheus.monitor.jobLabel (1) app.kubernetes.io/instance | string |
prometheus-node-exporter.prometheus.monitor.relabelings[].action (1) replace | string |
| string | |
prometheus-node-exporter.prometheus.monitor.relabelings[].replacement (1) $1 | string |
prometheus-node-exporter.prometheus.monitor.relabelings[].sourceLabels[] (1) - __meta_kubernetes_pod_node_name | string |
prometheus-node-exporter.prometheus.monitor.relabelings[].targetLabel (1) kubernetes_node | string |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| string | |
| string | |
| string | |
| boolean | |
victoria-metrics-operator.env[].name (3) VM_VMALERTDEFAULT_CONFIGRELOADERCPU | string |
| string, number | |
victoria-metrics-operator.fullnameOverride (3) victoria-metrics-operator | string |
victoria-metrics-operator.crds.cleanup.image.repository (2) registry.k8s.io/kubectl | string |
| boolean | |
| boolean | |
| boolean | |
| string | |
| string | |
| string | |
| boolean | |
| boolean | |
| string | |
additionalVictoriaMetricsMap.dockerhub-rules.groups[].rules[].alert (3) DockerhubRateLimitRisk | string |
additionalVictoriaMetricsMap.dockerhub-rules.groups[].rules[].annotations.summary (3) Kubernetes cluster Dockerhub rate limit risk | string |
additionalVictoriaMetricsMap.dockerhub-rules.groups[].rules[].expr (3) count(time() - container_last_seen{image=~"(docker.io).*",container!=""} < 30) > 100 | string |
| string | |
| boolean | |
| string | |
| string | |
additionalVictoriaMetricsMap.oom-rules.groups[].rules[].annotations.summary (3) Container {{ $labels.container }} in pod {{ $labels.namespace }}/{{ $labels.pod }} has been OOMKilled {{ $value }} times in the last 10 minutes. | string |
additionalVictoriaMetricsMap.oom-rules.groups[].rules[].expr (3) (kube_pod_container_status_restarts_total - kube_pod_container_status_restarts_total offset 10m >= 1) and ignoring (reason) min_over_time(kube_pod_container_status_last_terminated_reason{reason="OOMKilled"}[10m]) == 1 | string |
| string | |
| boolean | |
additionalVictoriaMetricsMap.pod-failed-rules.groups[].name (1) kube-pod-failures | string |
| string | |
additionalVictoriaMetricsMap.pod-failed-rules.groups[].rules[].annotations.description (1) Pod {{ $labels.namespace }}/{{ $labels.pod }} has been in Failed state for longer than 15 minutes on cluster {{ $labels.cluster }}. | string |
additionalVictoriaMetricsMap.pod-failed-rules.groups[].rules[].annotations.summary (1) Pod has been in Failed state for more than 15 minutes | string |
additionalVictoriaMetricsMap.pod-failed-rules.groups[].rules[].expr (1) sum(max(kube_pod_status_phase{namespace=~".*",job="kube-state-metrics",phase=~"Failed"})
by(namespace,pod,cluster) * on(namespace,pod,cluster) group_left(owner_kind)
topk(1, max(kube_pod_owner{owner_kind!="Job"}) by(namespace,pod,owner_kind,cluster))
by(namespace,pod,cluster)) by(namespace,pod,cluster) > 0
| string |
| string | |
| string | |
| boolean | |
| string | |
additionalVictoriaMetricsMap.zfs-rules.groups[].rules[].alert (1) ZfsUnexpectedPoolState | string |
additionalVictoriaMetricsMap.zfs-rules.groups[].rules[].annotations.summary (1) ZFS pool {{$labels.zpool}} on {{$labels.instance}} is in a unexpected state {{$labels.state}} | string |
additionalVictoriaMetricsMap.zfs-rules.groups[].rules[].expr (1) node_zfs_zpool_state{state!="online"} > 0 | string |
| string | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
vmcluster.route.insert.hostnames[] (1) - vminsert.hyde.services | string |
vmcluster.route.insert.parentRefs[].name (1) envoy-internal | string |
| string | |
| boolean | |
vmcluster.route.select.hostnames[] (1) - vmselect.hyde.services | string |
vmcluster.route.select.parentRefs[].name (1) envoy-internal | string |
| string | |
| string | |
| string | |
| number | |
vmcluster.spec.vminsert.topologySpreadConstraints[].topologyKey (1) kubernetes.io/hostname | string |
| string | |
| string | |
| string | |
| string | |
| number | |
vmcluster.spec.vmselect.topologySpreadConstraints[].topologyKey (1) kubernetes.io/hostname | string |
| string | |
| number | |
| string | |
| string | |
| string | |
| number | |
vmcluster.spec.vmstorage.topologySpreadConstraints[].topologyKey (1) kubernetes.io/hostname | string |
| string | |
| boolean | |
| string | |
external.grafana.datasource (1) Prometheus | string |
| boolean | |
kubeApiServer.vmScrape.spec.endpoints[].bearerTokenFile (1) /var/run/secrets/kubernetes.io/serviceaccount/token | string |
| string | |
kubeApiServer.vmScrape.spec.endpoints[].metricRelabelConfigs[].regex (1) (aggregator_openapi|aggregator_unavailable|apiextensions_openapi|apiserver_admission|apiserver_audit|apiserver_cache|apiserver_cel|apiserver_client|apiserver_crd|apiserver_current|apiserver_envelope|apiserver_flowcontrol|apiserver_init|apiserver_kube|apiserver_longrunning|apiserver_request|apiserver_requested|apiserver_response|apiserver_selfrequest|apiserver_storage|apiserver_terminated|apiserver_tls|apiserver_watch|apiserver_webhooks|authenticated_user|authentication|disabled_metric|etcd_bookmark|etcd_lease|etcd_request|field_validation|get_token|go|grpc_client|hidden_metric|kube_apiserver|kubernetes_build|kubernetes_feature|node_authorizer|pod_security|process_cpu|process_max|process_open|process_resident|process_start|process_virtual|registered_metric|rest_client|scrape_duration|scrape_samples|scrape_series|serviceaccount_legacy|serviceaccount_stale|serviceaccount_valid|watch_cache|workqueue)_(.+) | string |
kubeApiServer.vmScrape.spec.endpoints[].metricRelabelConfigs[].sourceLabels[] (1) - __name__ | string |
| string | |
| string | |
kubeApiServer.vmScrape.spec.endpoints[].tlsConfig.caFile (1) /var/run/secrets/kubernetes.io/serviceaccount/ca.crt | string |
| string | |
extraObjects[].apiVersion (1) monitoring.coreos.com/v1 | string |
extraObjects[].kind (1) PrometheusRule | string |
extraObjects[].metadata.name (1) custom-kube-apiserver-slos | string |
extraObjects[].metadata.namespace (1) observability | string |
extraObjects[].spec.groups[].name (1) kube-apiserver-slos | string |
extraObjects[].spec.groups[].rules[].alert (1) KubeAPIErrorBudgetBurn | string |
extraObjects[].spec.groups[].rules[].annotations.description (1) The API server is burning too much error budget on cluster . | string |
extraObjects[].spec.groups[].rules[].annotations.runbook_url (1) https://runbooks.prometheus-operator.dev/runbooks/kubernetes/kubeapierrorbudgetburn | string |
extraObjects[].spec.groups[].rules[].annotations.summary (1) The API server is burning too much error budget. | string |
extraObjects[].spec.groups[].rules[].condition (1) true | string |
extraObjects[].spec.groups[].rules[].expr (1) sum by (cluster) (apiserver_request:burnrate1h{code=~"4..|5.."}) > (14.40 * 0.01000)
and on (cluster)
sum by (cluster) (apiserver_request:burnrate5m{code=~"4..|5.."}) > (14.40 * 0.01000) | string |
| string | |
| string | |
extraObjects[].spec.groups[].rules[].labels.severity (1) critical | string |
| string | |
kubeDns.enabled (1) false | boolean |
nameOverride (1) victoria-metrics | string |
| boolean | |
| boolean | |
| string | |
| string | |
| string | |
| boolean | |
| string | |
| string | |
| number | |
server.route.extraRules[].filters[].type (1) RequestRedirect | string |
| string | |
| string | |
server.route.hostnames[] (1) - victoria-metrics.marcocondrache.com | string |
server.route.parentRefs[].name (1) envoy-internal | string |
| string | |
| boolean |