No introduction found. Create it?
Install with:
helm repo add victoria-metrics oci://ghcr.io/victoriametrics/helm-charts/victoria-metrics-k8s-stack
helm install victoria-metrics victoria-metrics/victoria-metrics -f values.yamlSee examples from other people.
| Name | Repo | Stars | Version | Timestamp |
|---|---|---|---|---|
| victoria-metrics | oscaromeu/home-ops | 32 | 0.38.0 | 3 days ago |
| victoria-metrics | wrmilling/k3s-gitops | 227 | 0.78.0 | 4 days ago |
| victoria-metrics | Diaoul/home-ops | 113 | 0.78.0 | 10 days ago |
See the most popular values for this chart:
| Key | Types |
|---|---|
fullnameOverride (21) victoria-metrics | string |
grafana.enabled (20) false | boolean |
| boolean | |
grafana.plugins[] (2) - victoriametrics-metrics-datasource | string |
| string | |
| string | |
vmsingle.spec.storage.accessModes[] (17) - ReadWriteOnce | string |
| string | |
| string | |
| number, string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| number | |
| boolean | |
vmsingle.spec.image.pullPolicy (1) IfNotPresent | string |
vmsingle.spec.image.repository (1) victoriametrics/victoria-metrics | string |
vmsingle.spec.image.tag (1) v1.143.0 | string |
| string | |
| number | |
vmsingle.spec.securityContext.fsGroupChangePolicy (1) OnRootMismatch | string |
| number | |
| boolean | |
| number | |
vmsingle.spec.securityContext.seccompProfile.type (1) RuntimeDefault | string |
| boolean | |
vmsingle.route.hostnames[] (16) - vmsingle.${DOMAIN_NAME} | string |
vmsingle.route.parentRefs[].name (16) envoy-internal | string |
| string | |
| string | |
| string | |
| string | |
vmsingle.route.annotations."gethomepage.dev/icon" (2) victoriametrics | string |
vmsingle.route.annotations."gethomepage.dev/name" (2) Victoria Metrics | string |
vmsingle.route.annotations."gethomepage.dev/pod-selector" (2) app.kubernetes.io/name=vmsingle | string |
vmsingle.route.annotations."gethomepage.dev/description" (1) Time series database and monitoring solution | string |
| string | |
| string | |
| number | |
vmsingle.route.extraRules[].filters[].type (1) RequestRedirect | string |
| string | |
| string | |
| string | |
| string | |
| boolean | |
| boolean | |
| boolean | |
alertmanager.spec.externalURL (18) https://alertmanager.${DOMAIN_NAME} | string |
| string | |
| string | |
alertmanager.spec.image.repository (11) quay.io/prometheus/alertmanager | string |
| number | |
| number | |
| boolean | |
| number | |
| boolean | |
| number | |
| string | |
| string | |
| string | |
| string | |
alertmanager.spec.rollingUpdateStrategy (2) RollingUpdate | string |
| string | |
| boolean | |
| boolean | |
alertmanager.spec.configSecret (1) alertmanager-config-secret | string |
| string | |
alertmanager.config.receivers[].name (17) blackhole | string |
| boolean | |
alertmanager.config.receivers[].pushover_configs[].message (11) {{- range .Alerts }}
{{- if ne .Annotations.description "" }}
{{ .Annotations.description }}
{{- else if ne .Annotations.summary "" }}
{{ .Annotations.summary }}
{{- else if ne .Annotations.message "" }}
{{ .Annotations.message }}
{{- else }}
Alert description not available
{{- end }}
{{- if gt (len .Labels.SortedPairs) 0 }}
<small>
{{- range .Labels.SortedPairs }}
<b>{{ .Name }}:</b> {{ .Value }}
{{- end }}
</small>
{{- end }}
{{- end }} | string |
alertmanager.config.receivers[].pushover_configs[].priority (11) {{ if eq .Status "firing" }}1{{ else }}0{{ end }} | string |
| boolean | |
alertmanager.config.receivers[].pushover_configs[].title (11) [{{ .Status | toUpper }}{{ if eq .Status "firing" }}:{{ .Alerts.Firing | len }}{{ end }}] {{ .CommonLabels.alertname }} | string |
alertmanager.config.receivers[].pushover_configs[].token.key (11) ALERTMANAGER_PUSHOVER_TOKEN | string |
alertmanager.config.receivers[].pushover_configs[].token.name (11) vmalertmanager-secret | string |
alertmanager.config.receivers[].pushover_configs[].url_title (11) View in Alertmanager | string |
alertmanager.config.receivers[].pushover_configs[].user_key.key (11) PUSHOVER_USER_KEY | string |
alertmanager.config.receivers[].pushover_configs[].user_key.name (11) vmalertmanager-secret | string |
| string | |
| string | |
alertmanager.config.receivers[].webhook_configs[].url_secret.key (9) ALERTMANAGER_HEARTBEAT_URL | string |
alertmanager.config.receivers[].webhook_configs[].url_secret.name (9) vmalertmanager-secret | string |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
alertmanager.config.receivers[].webhook_configs[].http_config.tls_config.serverName (1) friday3.${SECRET_DOMAIN} | string |
| boolean | |
alertmanager.config.receivers[].webhook_configs[].url (2) https://friday3.${SECRET_DOMAIN}/webhooks/amdiag | string |
| number | |
| string | |
alertmanager.config.receivers[].discord_configs[].message (4) {{ range .Alerts -}}
**Alert:** {{ .Annotations.title }}{{ if .Labels.severity }} - `{{ .Labels.severity }}`{{ end }}
{{ if ne .Annotations.summary ""}}**Summary:** {{ .Annotations.summary }} {{ else if ne .Annotations.message ""}}**Message:** {{ .Annotations.message }} {{ else if ne .Annotations.description ""}}**Description:** {{ .Annotations.description }}{{ end }}
🏷 Labels:
{{ range .Labels.SortedPairs }} • *{{ .Name }}:* `{{ .Value }}`
{{ end }}
{{ end }} | string |
alertmanager.config.receivers[].discord_configs[].title (4) [{{ .Status | toUpper }}{{ if eq .Status "firing" }}:{{ .Alerts.Firing | len }}{{ end }}] {{ if eq .Status "firing" }}{{ if eq .CommonLabels.severity "critical" }}🔥{{ else if eq .CommonLabels.severity "warning" }}⚠️{{ else }}ℹ️{{ end }}{{ else }}✅{{ end }} {{ if ne .CommonAnnotations.summary ""}}{{ .CommonAnnotations.summary }} {{ else if ne .CommonAnnotations.message ""}}{{ .CommonAnnotations.message }} {{ else if ne .CommonAnnotations.description ""}}{{ .CommonAnnotations.description }} {{ else }}{{ .CommonLabels.alertname }}{{ end }} | string |
| boolean | |
alertmanager.config.receivers[].discord_configs[].webhook_url (2) ${SECRET_KPS_SLACK_API_URL} | string |
alertmanager.config.receivers[].discord_configs[].webhook_url_secret.key (2) DISCORD_WEBHOOK_URL | string |
alertmanager.config.receivers[].discord_configs[].webhook_url_secret.name (2) vmalertmanager-secret | string |
alertmanager.config.receivers[].discord_configs[].username (1) ${DOMAIN} | string |
alertmanager.config.receivers[].webhookConfigs[].url (1) http://alertmanager-telegram.observability.svc.cluster.local:8080/alerts | string |
| string | |
alertmanager.config.route.group_by[] (16) - alertname | string |
| string | |
| string | |
| string | |
alertmanager.config.route.routes[].matchers[] (16) - alertname = InfoInhibitor | string |
alertmanager.config.route.routes[].receiver (16) blackhole | string |
| string | |
| string | |
| string | |
alertmanager.config.route.routes[].continue (2) false | boolean |
alertmanager.config.route.routes[].group_by[] (1) - alertname | string |
alertmanager.config.inhibit_rules[].equal[] (15) - alertname | string |
alertmanager.config.inhibit_rules[].source_matchers[] (15) - severity = "critical" | string |
alertmanager.config.inhibit_rules[].target_matchers[] (15) - severity = "warning" | string |
| boolean | |
| boolean | |
alertmanager.route.hostnames[] (15) - alertmanager.${DOMAIN_NAME} | string |
alertmanager.route.parentRefs[].name (15) envoy-internal | string |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
alertmanager.route.annotations."gethomepage.dev/pod-selector" (2) app.kubernetes.io/name=vmalertmanager | string |
alertmanager.route.annotations."gethomepage.dev/description" (1) Collects, manages and sends alerts to receivers | string |
| string | |
| string | |
| boolean | |
| boolean | |
| boolean | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
vmagent.spec.extraArgs."remoteWrite.streamAggr.config" (1) /etc/vm/configs/vmagent-stream-aggr/config.yaml | string |
| string | |
| string | |
| string | |
| string | |
| string, number | |
| string | |
| boolean | |
vmagent.spec.inlineRelabelConfig[].action (2) drop | string |
vmagent.spec.inlineRelabelConfig[].regex (2) cpu_feature_.+ | string |
vmagent.spec.inlineRelabelConfig[].source_labels[] (1) - __name__ | string |
| boolean | |
vmagent.spec.configMaps[] (1) - vmagent-stream-aggr | string |
| string | |
vmagent.spec.inlineScrapeConfig (1) - job_name: home-assistant
scrape_interval: 60s
metrics_path: /api/prometheus
bearer_token: "${HA_PROMETHEUS_TOKEN}"
scheme: http
static_configs:
- targets:
- home-assistant-app.home.svc.cluster.local:8123
| string |
| string | |
| string | |
vmagent.spec.remoteWrite[].inlineUrlRelabelConfig[].source_labels[] (1) - __name__ | string |
| string | |
vmagent.spec.remoteWrite[].url (1) http://vmsingle-vm.monitoring.svc.cluster.local:8428/api/v1/write | string |
| string | |
| boolean, string | |
| boolean | |
vmagent.route.hostnames[] (3) - vmagent.k.${SECRET_DOMAIN} | string |
| string | |
vmagent.route.parentRefs[].namespace (3) kube-system | string |
| string | |
| string | |
| string | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| string | |
| string | |
| string | |
| boolean | |
| string | |
defaultDashboards.annotations.grafana_folder (1) observability | string |
| boolean | |
| boolean | |
| boolean | |
| string | |
| string | |
| string | |
| string | |
| boolean | |
defaultDatasources.victoriametrics.datasources[].name (2) VictoriaMetrics | string |
| string | |
defaultDatasources.victoriametrics.datasources[].uid (2) victoriametrics | string |
| string | |
| string | |
| number | |
| string | |
defaultDatasources.victoriametrics.datasources[].url (1) http://vmsingle-victoria-metrics.observability.svc.cluster.local:8428 | string |
| string | |
| string | |
defaultDatasources.alertmanager.datasources[].name (1) VictoriaMetrics Alertmanager | string |
| string | |
defaultDatasources.alertmanager.datasources[].uid (1) vmalertmanager | string |
defaultDatasources.alertmanager.datasources[].url (1) http://vmalertmanager-victoria-metrics.observability.svc.cluster.local:9093 | string |
| boolean | |
kube-state-metrics.fullnameOverride (3) kube-state-metrics | string |
kube-state-metrics.customResourceState.config.spec.resources[].groupVersionKind.group (2) kustomize.toolkit.fluxcd.io | string |
kube-state-metrics.customResourceState.config.spec.resources[].groupVersionKind.kind (2) Kustomization | string |
kube-state-metrics.customResourceState.config.spec.resources[].groupVersionKind.version (2) v1 | string |
kube-state-metrics.customResourceState.config.spec.resources[].metricNamePrefix (2) gotk | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].each.info.labelsFromPath.name[] (2) - metadata | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].each.type (2) Info | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].help (2) The current state of a Flux Kustomization resource. | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].labelsFromPath.chart_app_version[] (2) - status | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].labelsFromPath.chart_name[] (2) - status | string |
| string | |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].labelsFromPath.chart_source_name[] (2) - spec | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].labelsFromPath.exported_namespace[] (2) - metadata | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].labelsFromPath.ready[] (2) - status | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].labelsFromPath.revision[] (2) - status | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].labelsFromPath.source_name[] (2) - spec | string |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].labelsFromPath.suspended[] (2) - spec | string |
| string | |
| string | |
| string | |
| string | |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].labelsFromPath.url[] (1) - spec | string |
| string | |
kube-state-metrics.customResourceState.config.spec.resources[].metrics[].name (2) resource_info | string |
| boolean | |
kube-state-metrics.metricLabelsAllowlist[] (2) - pods=[*] | string |
kube-state-metrics.rbac.extraRules[].apiGroups[] (2) - source.toolkit.fluxcd.io | string |
kube-state-metrics.rbac.extraRules[].resources[] (2) - gitrepositories | string |
kube-state-metrics.rbac.extraRules[].verbs[] (2) - list | string |
| string | |
| string | |
| string | |
| boolean | |
| boolean | |
| string | |
| string | |
kube-state-metrics.vmScrape.spec.endpoints[].metricRelabelConfigs[].regex (1) (uid|container_id|image_id) | string |
| string | |
| string | |
| string | |
kube-state-metrics.vmScrape.spec.endpoints[].relabelConfigs[].sourceLabels[] (1) - __meta_kubernetes_pod_node_name | string |
| string | |
kube-state-metrics.vmScrape.spec.jobLabel (2) app.kubernetes.io/name | string |
kube-state-metrics.vmScrape.spec.selector.matchLabels."app.kubernetes.io/instance" (2) {{ include "vm.release" . }} | string |
kube-state-metrics.vmScrape.spec.selector.matchLabels."app.kubernetes.io/name" (2) {{ include "kube-state-metrics.name" (index .Subcharts "kube-state-metrics") }} | string |
| number | |
| string | |
| string | |
| number | |
| number | |
| number | |
| string | |
| string | |
| number | |
| number | |
| boolean | |
| boolean | |
| boolean | |
| string | |
| string | |
| string | |
| boolean | |
| boolean | |
| boolean | |
| string | |
victoria-metrics-operator.env[].name (4) VM_VMALERTDEFAULT_CONFIGRELOADERCPU | string |
| string, number | |
| boolean | |
victoria-metrics-operator.fullnameOverride (2) victoria-metrics-operator | string |
| string | |
| string | |
| string | |
| string | |
| boolean | |
vmalert.spec.extraArgs."external.url" (15) https://vmalert.${SECRET_DOMAIN} | string |
vmalert.spec.extraArgs."external.alert.source" (2) explore?orgId=1&left={"datasource":"VictoriaMetrics","queries":[{"expr":{{ "{{" }}.Expr|jsonEscape|queryEscape{{ "}}" }},"refId":"A"}],"range":{"from":"{{ "{{" }} .ActiveAt.UnixMilli {{ "}}" }}","to":"now"}} | string |
| string | |
| string | |
vmalert.spec.datasource.url (12) http://vmauth-victoria-metrics.observability.svc.cluster.local:8427 | string |
| string | |
| string | |
| string | |
| string | |
| string | |
vmalert.spec.ruleSelector.matchExpressions[].key (3) vmalert-logs.io/enabled | string |
| string | |
| string | |
| boolean | |
vmalert.spec.remoteWrite.url (2) http://vmsingle-stack.observability.svc.cluster.local:8429/api/v1/write | string |
| string | |
| string | |
vmalert.spec.ruleNamespaceSelector.matchExpressions[].values[] (2) - never-used-value | string |
| boolean | |
vmalert.spec.notifier.url (1) http://vmalertmanager-victoria-metrics.observability.svc.cluster.local:9093 | string |
| string | |
vmalert.spec.remoteRead.url (1) http://vmsingle-victoria-metrics.observability.svc.cluster.local:8428 | string |
| string | |
| string | |
| string | |
| string | |
| boolean | |
vmalert.route.hostnames[] (13) - alert.${DOMAIN_NAME} | string |
vmalert.route.parentRefs[].name (13) envoy-internal | string |
| string | |
| string | |
| string | |
| string | |
vmalert.route.annotations."gethomepage.dev/icon" (1) victoriametrics.svg | string |
vmalert.route.annotations."gethomepage.dev/name" (1) Victoria Metrics Alerts | string |
vmalert.route.annotations."gethomepage.dev/pod-selector" (1) app.kubernetes.io/name=vmalert | string |
| string | |
| string | |
| boolean, string | |
| boolean | |
| boolean | |
kubeControllerManager.vmScrape.spec.endpoints[].bearerTokenFile (14) /var/run/secrets/kubernetes.io/serviceaccount/token | string |
| string | |
| string | |
| boolean | |
kubeControllerManager.vmScrape.spec.endpoints[].tlsConfig.caFile (1) /var/run/secrets/kubernetes.io/serviceaccount/ca.crt | string |
| string | |
| string | |
kubeControllerManager.vmScrape.spec.endpoints[].metricRelabelConfigs[].regex (2) (apiserver_audit|apiserver_client|apiserver_delegated|apiserver_envelope|apiserver_storage|apiserver_webhooks|attachdetach_controller|authenticated_user|authentication|cronjob_controller|disabled_metric|endpoint_slice|ephemeral_volume|garbagecollector_controller|get_token|go|hidden_metric|job_controller|kubernetes_build|kubernetes_feature|leader_election|node_collector|node_ipam|process_cpu|process_max|process_open|process_resident|process_start|process_virtual|pv_collector|registered_metric|replicaset_controller|rest_client|retroactive_storageclass|root_ca|running_managed|scrape_duration|scrape_samples|scrape_series|service_controller|storage_count|storage_operation|ttl_after|volume_operation|workqueue)_(.+) | string |
| string | |
| boolean | |
kubeControllerManager.endpoints[] (2) - "192.168.4.10" | string |
kubeControllerManager.service.selector.component (1) kube-apiserver | string |
kubeScheduler.vmScrape.spec.endpoints[].bearerTokenFile (14) /var/run/secrets/kubernetes.io/serviceaccount/token | string |
| string | |
| string | |
| boolean | |
kubeScheduler.vmScrape.spec.endpoints[].tlsConfig.caFile (1) /var/run/secrets/kubernetes.io/serviceaccount/ca.crt | string |
| string | |
| string | |
kubeScheduler.vmScrape.spec.endpoints[].metricRelabelConfigs[].regex (2) (apiserver_audit|apiserver_client|apiserver_delegated|apiserver_envelope|apiserver_storage|apiserver_webhooks|authenticated_user|authentication|disabled_metric|go|hidden_metric|kubernetes_build|kubernetes_feature|leader_election|process_cpu|process_max|process_open|process_resident|process_start|process_virtual|registered_metric|rest_client|scheduler|scrape_duration|scrape_samples|scrape_series|workqueue)_(.+) | string |
| string | |
| boolean | |
kubeScheduler.endpoints[] (2) - "192.168.4.10" | string |
kubeScheduler.service.selector.component (1) kube-apiserver | string |
| boolean | |
prometheus-node-exporter.fullnameOverride (3) node-exporter | string |
| string | |
prometheus-node-exporter.vmScrape.spec.endpoints[].relabelConfigs[].source_labels[] (2) - __meta_kubernetes_endpoint_node_name | string |
| string | |
| string | |
| string | |
| string | |
prometheus-node-exporter.vmScrape.spec.endpoints[].relabelConfigs[].sourceLabels[] (1) - __meta_kubernetes_pod_node_name | string |
| string | |
| string | |
prometheus-node-exporter.vmScrape.spec.selector.matchLabels."app.kubernetes.io/instance" (1) {{ include "vm.release" . }} | string |
prometheus-node-exporter.vmScrape.spec.selector.matchLabels."app.kubernetes.io/name" (1) {{ include "prometheus-node-exporter.name" (index .Subcharts "prometheus-node-exporter") }} | string |
| boolean | |
| string | |
| string | |
| string | |
prometheus-node-exporter.extraArgs[] (1) - --collector.filesystem.mount-points-exclude=^/(dev|proc|sys|var/lib/docker/.+|var/lib/kubelet/.+|etc/nfsmount\.conf)($|/) | string |
| boolean | |
| string | |
additionalVictoriaMetricsMap.dockerhub-rules.groups[].rules[].alert (13) DockerhubRateLimitRisk | string |
additionalVictoriaMetricsMap.dockerhub-rules.groups[].rules[].annotations.summary (13) There are {{ $value }} containers pulling from Dockerhub. This may lead to rate limiting. | string |
additionalVictoriaMetricsMap.dockerhub-rules.groups[].rules[].expr (13) count(time() - container_last_seen{image=~"(docker.io).*",container!=""} < 30) > 100 | string |
| string | |
| boolean | |
| string | |
| string | |
additionalVictoriaMetricsMap.oom-rules.groups[].rules[].annotations.summary (13) Container {{ $labels.container }} in pod {{ $labels.namespace }}/{{ $labels.pod }} has been OOMKilled {{ $value }} times in the last 10 minutes. | string |
additionalVictoriaMetricsMap.oom-rules.groups[].rules[].expr (13) (kube_pod_container_status_restarts_total - kube_pod_container_status_restarts_total offset 10m >= 1) and ignoring (reason) min_over_time(kube_pod_container_status_last_terminated_reason{reason="OOMKilled"}[10m]) == 1 | string |
| string | |
| boolean | |
| string | |
additionalVictoriaMetricsMap.zfs-rules.groups[].rules[].alert (6) ZfsUnexpectedPoolState | string |
additionalVictoriaMetricsMap.zfs-rules.groups[].rules[].annotations.summary (6) ZFS pool {{$labels.zpool}} on {{$labels.instance}} is in a unexpected state {{$labels.state}} | string |
additionalVictoriaMetricsMap.zfs-rules.groups[].rules[].expr (6) node_zfs_zpool_state{state!="online"} > 0 | string |
| string | |
| string | |
additionalVictoriaMetricsMap.btrfs-rules.groups[].rules[].alert (1) BtrfsDeviceErrorsDetected | string |
additionalVictoriaMetricsMap.btrfs-rules.groups[].rules[].annotations.sumamry (1) BTRFS device {{$labels.device}} on {{$labels.kubernetes_node}}@{{$labels.instance}} detected an error of type {{$labels.type}} | string |
additionalVictoriaMetricsMap.btrfs-rules.groups[].rules[].annotations.summary (1) BTRFS device {{$labels.device}}@{{$labels.instance}} has less than 1% of free space left | string |
additionalVictoriaMetricsMap.btrfs-rules.groups[].rules[].expr (1) node_btrfs_device_errors_total > 0 | string |
| string | |
| boolean | |
additionalVictoriaMetricsMap.pod-failed-rules.groups[].name (1) kube-pod-failures | string |
| string | |
additionalVictoriaMetricsMap.pod-failed-rules.groups[].rules[].annotations.description (1) Pod {{ $labels.namespace }}/{{ $labels.pod }} has been in Failed state for longer than 15 minutes on cluster {{ $labels.cluster }}. | string |
additionalVictoriaMetricsMap.pod-failed-rules.groups[].rules[].annotations.summary (1) Pod has been in Failed state for more than 15 minutes | string |
additionalVictoriaMetricsMap.pod-failed-rules.groups[].rules[].expr (1) sum(max(kube_pod_status_phase{namespace=~".*",job="kube-state-metrics",phase=~"Failed"})
by(namespace,pod,cluster) * on(namespace,pod,cluster) group_left(owner_kind)
topk(1, max(kube_pod_owner{owner_kind!="Job"}) by(namespace,pod,owner_kind,cluster))
by(namespace,pod,cluster)) by(namespace,pod,cluster) > 0
| string |
| string | |
| string | |
| number | |
| number | |
kubeEtcd.service.selector.component (12) kube-apiserver | string |
| string | |
kubeEtcd.vmScrape.spec.endpoints[].port (2) http-metrics | string |
kubeEtcd.enabled (8) false | boolean |
kubeEtcd.endpoints[] (2) - "192.168.4.10" | string |
global.image.registry (12) quay.io | string |
| string | |
| boolean | |
vmauth.spec.unauthorizedUserAccessSpec.url_map[].src_paths[] (11) - /api/v1/query.* | string |
vmauth.spec.unauthorizedUserAccessSpec.url_map[].url_prefix (11) http://vmsingle-victoria-metrics.observability.svc.cluster.local:8428 | string |
| string | |
| boolean | |
| boolean | |
kubelet.vmScrape.spec.metricRelabelConfigs[].action (5) drop | string |
kubelet.vmScrape.spec.metricRelabelConfigs[].regex (5) container_cpu_(cfs_throttled_seconds_total|load_average_10s|system_seconds_total|user_seconds_total) | string |
kubelet.vmScrape.spec.metricRelabelConfigs[].sourceLabels[] (4) - __name__ | string |
| string | |
| string | |
| boolean | |
| boolean | |
| string | |
kubelet.vmScrape.spec.relabelConfigs[].action (1) labelmap | string |
kubelet.vmScrape.spec.relabelConfigs[].regex (1) __meta_kubernetes_node_label_(.+) | string |
| string | |
kubelet.vmScrape.spec.relabelConfigs[].sourceLabels[] (1) - __metrics_path__ | string |
kubelet.vmScrape.spec.relabelConfigs[].targetLabel (1) metrics_path | string |
| boolean | |
| string | |
kubelet.vmScrapes.cadvisor.spec.metricRelabelConfigs[].action (1) drop | string |
kubelet.vmScrapes.cadvisor.spec.metricRelabelConfigs[].regex (1) container_cpu_(cfs_throttled_seconds_total|load_average_10s|system_seconds_total|user_seconds_total) | string |
kubelet.vmScrapes.cadvisor.spec.metricRelabelConfigs[].sourceLabels[] (1) - __name__ | string |
kubelet.vmScrapes.cadvisor.spec.path (1) /metrics/cadvisor | string |
| boolean | |
| boolean | |
kubelet.vmScrapes.probes.spec.path (1) /metrics/probes | string |
| boolean | |
kubelet.vmScrapes.resource.spec.path (1) /metrics/resource | string |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
kubeApiServer.vmScrape.spec.endpoints[].bearerTokenFile (2) /var/run/secrets/kubernetes.io/serviceaccount/token | string |
| string | |
kubeApiServer.vmScrape.spec.endpoints[].metricRelabelConfigs[].regex (2) (aggregator_openapi|aggregator_unavailable|apiextensions_openapi|apiserver_admission|apiserver_audit|apiserver_cache|apiserver_cel|apiserver_client|apiserver_crd|apiserver_current|apiserver_envelope|apiserver_flowcontrol|apiserver_init|apiserver_kube|apiserver_longrunning|apiserver_request|apiserver_requested|apiserver_response|apiserver_selfrequest|apiserver_storage|apiserver_terminated|apiserver_tls|apiserver_watch|apiserver_webhooks|authenticated_user|authentication|disabled_metric|etcd_bookmark|etcd_lease|etcd_request|field_validation|get_token|go|grpc_client|hidden_metric|kube_apiserver|kubernetes_build|kubernetes_feature|node_authorizer|pod_security|process_cpu|process_max|process_open|process_resident|process_start|process_virtual|registered_metric|rest_client|scrape_duration|scrape_samples|scrape_series|serviceaccount_legacy|serviceaccount_stale|serviceaccount_valid|watch_cache|workqueue)_(.+) | string |
| string | |
| string | |
| string | |
kubeApiServer.vmScrape.spec.endpoints[].tlsConfig.caFile (2) /var/run/secrets/kubernetes.io/serviceaccount/ca.crt | string |
| string | |
| boolean | |
coreDns.vmScrape.spec.endpoints[].bearerTokenFile (1) /var/run/secrets/kubernetes.io/serviceaccount/token | string |
coreDns.vmScrape.spec.endpoints[].port (1) http-metrics | string |
| string | |
| string | |
| string | |
external.grafana.datasource (1) Prometheus | string |
| string | |
server.persistentVolume.storageClassName (2) openebs-hostpath | string |
| boolean | |
| string | |
| boolean | |
server.route.hostnames[] (2) - victoria-metrics.${SECRET_DOMAIN} | string |
server.route.parentRefs[].name (2) envoy-internal | string |
| string | |
| string | |
| string | |
| string | |
| number | |
server.route.extraRules[].filters[].type (1) RequestRedirect | string |
| string | |
| string | |
| boolean | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
server.fullnameOverride (1) victoria-metrics | string |
| number | |
| string | |
| string | |
| boolean | |
| boolean | |
crds.enabled (1) false | boolean |
crds.plain (1) false | boolean |
env[].name (1) VM_VMALERTMANAGER_ALERTMANAGERDEFAULTBASEIMAGE | string |
env[].value (1) quay.io/prometheus/alertmanager | string |
extraObjects[].apiVersion (1) monitoring.coreos.com/v1 | string |
extraObjects[].kind (1) PrometheusRule | string |
extraObjects[].metadata.name (1) custom-kube-apiserver-slos | string |
extraObjects[].metadata.namespace (1) observability | string |
extraObjects[].spec.groups[].name (1) kube-apiserver-slos | string |
extraObjects[].spec.groups[].rules[].alert (1) KubeAPIErrorBudgetBurn | string |
extraObjects[].spec.groups[].rules[].annotations.description (1) The API server is burning too much error budget on cluster . | string |
extraObjects[].spec.groups[].rules[].annotations.runbook_url (1) https://runbooks.prometheus-operator.dev/runbooks/kubernetes/kubeapierrorbudgetburn | string |
extraObjects[].spec.groups[].rules[].annotations.summary (1) The API server is burning too much error budget. | string |
extraObjects[].spec.groups[].rules[].condition (1) true | string |
extraObjects[].spec.groups[].rules[].expr (1) sum by (cluster) (apiserver_request:burnrate1h{code=~"4..|5.."}) > (14.40 * 0.01000)
and on (cluster)
sum by (cluster) (apiserver_request:burnrate5m{code=~"4..|5.."}) > (14.40 * 0.01000) | string |
| string | |
| string | |
extraObjects[].spec.groups[].rules[].labels.severity (1) critical | string |
| string | |
| boolean | |
| string | |
extraRules.dockerhub-rules.groups[].rules[].alert (1) DockerhubRateLimitRisk | string |
extraRules.dockerhub-rules.groups[].rules[].annotations.summary (1) There are {{ $value }} containers pulling from Dockerhub. This may lead to rate limiting. | string |
extraRules.dockerhub-rules.groups[].rules[].expr (1) count(time() - container_last_seen{image=~"(docker.io).*",container!=""} < 30) > 100 | string |
| string | |
| boolean | |
| string | |
| string | |
extraRules.oom-rules.groups[].rules[].annotations.summary (1) Container {{ $labels.container }} in pod {{ $labels.namespace }}/{{ $labels.pod }} has been OOMKilled {{ $value }} times in the last 10 minutes. | string |
extraRules.oom-rules.groups[].rules[].expr (1) (kube_pod_container_status_restarts_total - kube_pod_container_status_restarts_total offset 10m >= 1) and ignoring (reason) min_over_time(kube_pod_container_status_last_terminated_reason{reason="OOMKilled"}[10m]) == 1 | string |
| string | |
image.registry (1) quay.io | string |
kubeDns.enabled (1) false | boolean |
nameOverride (1) victoria-metrics | string |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean |