No introduction found. Create it?
Install with:
helm repo add victoria-metrics-k8s-stack oci://ghcr.io/victoriametrics/helm-charts/victoria-metrics-k8s-stack
helm install victoria-metrics victoria-metrics-k8s-stack/victoria-metrics-k8s-stack -f values.yamlSee examples from other people.
| Name | Repo | Stars | Version | Timestamp |
|---|---|---|---|---|
| victoria-metrics | wrmilling/k3s-gitops | 227 | 0.69.0 | 6 hours ago |
See the most popular values for this chart:
| Key | Types |
|---|---|
alertmanager.config.receivers[].name (6) null | string |
alertmanager.config.receivers[].webhook_configs[].url_secret.key (4) ALERTMANAGER_HEARTBEAT_URL | string |
alertmanager.config.receivers[].webhook_configs[].url_secret.name (4) alertmanager-secret | string |
| boolean | |
alertmanager.config.receivers[].pushover_configs[].message (3) {{- range .Alerts }}
{{- if ne .Annotations.description "" }}
{{ .Annotations.description }}
{{- else if ne .Annotations.summary "" }}
{{ .Annotations.summary }}
{{- else if ne .Annotations.message "" }}
{{ .Annotations.message }}
{{- else }}
Alert description not available
{{- end }}
{{- if gt (len .Labels.SortedPairs) 0 }}
<small>
{{- range .Labels.SortedPairs }}
<b>{{ .Name }}:</b> {{ .Value }}
{{- end }}
</small>
{{- end }}
{{- end }} | string |
alertmanager.config.receivers[].pushover_configs[].priority (3) {{ if eq .Status "firing" }}1{{ else }}0{{ end }} | string |
| boolean | |
| string | |
alertmanager.config.receivers[].pushover_configs[].title (3) [{{ .Status | toUpper }}{{ if eq .Status "firing" }}:{{ .Alerts.Firing | len }}{{ end }}] {{ .CommonLabels.alertname }} | string |
alertmanager.config.receivers[].pushover_configs[].token.key (3) PUSHOVER_ALERTMANAGER_TOKEN | string |
alertmanager.config.receivers[].pushover_configs[].token.name (3) alertmanager-secret | string |
| string | |
alertmanager.config.receivers[].pushover_configs[].url_title (3) View in Alertmanager | string |
alertmanager.config.receivers[].pushover_configs[].user_key.key (3) PUSHOVER_USER_KEY | string |
alertmanager.config.receivers[].pushover_configs[].user_key.name (3) alertmanager-secret | string |
alertmanager.config.receivers[].discord_configs[].message (2) {{ range .Alerts -}}
**Alert:** {{ .Annotations.title }}{{ if .Labels.severity }} - `{{ .Labels.severity }}`{{ end }}
{{ if ne .Annotations.summary ""}}**Summary:** {{ .Annotations.summary }}{{ else if ne .Annotations.message ""}}**Message:** {{ .Annotations.message }}{{ else if ne .Annotations.description ""}}**Description:** {{ .Annotations.description }}{{ end }}
🏷 **Labels:**
{{ range .Labels.SortedPairs }} • {{ .Name }}: {{ .Value }}
{{ end }}
{{ end }} | string |
alertmanager.config.receivers[].discord_configs[].title (2) [{{ .Status | toUpper }}{{ if eq .Status "firing" }}:{{ .Alerts.Firing | len }}{{ end }}] {{ if eq .Status "firing" }}🔥{{ else }}✅{{ end }} {{ if ne .CommonAnnotations.summary ""}}{{ .CommonAnnotations.summary }}{{ else if ne .CommonAnnotations.message ""}}{{ .CommonAnnotations.message }}{{ else if ne .CommonAnnotations.description ""}}{{ .CommonAnnotations.description }}{{ else }}{{ .CommonLabels.alertname }}{{ end }} | string |
alertmanager.config.receivers[].discord_configs[].webhook_url (2) ${SECRET_KPS_SLACK_API_URL} | string |
| boolean | |
alertmanager.config.receivers[].discord_configs[].username (1) ${DOMAIN} | string |
alertmanager.config.receivers[].webhookConfigs[].url (1) http://alertmanager-telegram.observability.svc.cluster.local:8080/alerts | string |
alertmanager.config.route.group_by[] (6) - alertname | string |
| string | |
| string | |
| string | |
| string | |
alertmanager.config.route.routes[].matchers[] (6) - alertname=InfoInhibitor | string |
alertmanager.config.route.routes[].receiver (6) null | string |
| string | |
| string | |
| string | |
alertmanager.config.route.routes[].continue (1) false | boolean |
alertmanager.config.route.routes[].group_by[] (1) - alertname | string |
alertmanager.config.inhibit_rules[].equal[] (5) - alertname | string |
alertmanager.config.inhibit_rules[].source_matchers[] (5) - severity = "critical" | string |
alertmanager.config.inhibit_rules[].target_matchers[] (5) - severity = "warning" | string |
| boolean | |
| boolean | |
alertmanager.spec.externalURL (3) https://vm-alert.${SECRET_DOMAIN} | string |
| string | |
| string | |
| number | |
| boolean | |
| string | |
| string | |
alertmanager.ingress.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://auth.${SECRET_DOMAIN} | string |
alertmanager.ingress.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://authelia.kube-system.svc.cluster.local/api/authz/auth-request | string |
| boolean | |
alertmanager.ingress.hosts[] (1) - vm-alert.k.${SECRET_DOMAIN} | string |
alertmanager.ingress.ingressClassName (1) nginx-internal | string |
| string | |
alertmanager.ingress.tls[].hosts[] (1) - vm-alert.k.${SECRET_DOMAIN} | string |
fullnameOverride (6) stack | string |
grafana.enabled (6) false | boolean |
| boolean | |
| boolean | |
| string | |
| boolean | |
kubeEtcd.enabled (5) false | boolean |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| boolean | |
| boolean | |
vmagent.ingress.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-prod | string |
| string | |
vmagent.ingress.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://auth.${SECRET_DOMAIN} | string |
vmagent.ingress.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://authelia.kube-system.svc.cluster.local/api/authz/auth-request | string |
| boolean | |
vmagent.ingress.hosts[] (1) - vmagent.k.${SECRET_DOMAIN} | string |
vmagent.ingress.ingressClassName (1) nginx-internal | string |
| string | |
vmagent.ingress.tls[].hosts[] (1) - vmagent.k.${SECRET_DOMAIN} | string |
| number | |
| string | |
| string | |
| string | |
| string | |
| string | |
vmsingle.spec.storage.accessModes[] (5) - ReadWriteOnce | string |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| number | |
vmsingle.spec.securityContext.fsGroupChangePolicy (1) OnRootMismatch | string |
| number | |
| boolean | |
| number | |
vmsingle.spec.securityContext.seccompProfile.type (1) RuntimeDefault | string |
| boolean | |
| boolean | |
vmsingle.route.hostnames[] (2) - ${APP}.${SECRET_DOMAIN} | string |
| string | |
vmsingle.route.parentRefs[].namespace (2) kube-system | string |
| string | |
| string | |
| string | |
| number | |
vmsingle.route.extraRules[].filters[].type (1) RequestRedirect | string |
| string | |
| string | |
| boolean | |
| string | |
| string | |
vmsingle.ingress.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://auth.${SECRET_DOMAIN} | string |
vmsingle.ingress.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://authelia.kube-system.svc.cluster.local/api/authz/auth-request | string |
vmsingle.ingress.hosts[] (1) - vm.k.${SECRET_DOMAIN} | string |
vmsingle.ingress.ingressClassName (1) nginx-internal | string |
| string | |
vmsingle.ingress.tls[].hosts[] (1) - vm.k.${SECRET_DOMAIN} | string |
| boolean | |
| string | |
additionalVictoriaMetricsMap.dockerhub-rules.groups[].rules[].alert (4) DockerhubRateLimitRisk | string |
additionalVictoriaMetricsMap.dockerhub-rules.groups[].rules[].annotations.summary (4) Kubernetes cluster Dockerhub rate limit risk | string |
additionalVictoriaMetricsMap.dockerhub-rules.groups[].rules[].expr (4) count(time() - container_last_seen{image=~"(docker.io).*",container!=""} < 30) > 100 | string |
| string | |
| boolean | |
| string | |
| string | |
additionalVictoriaMetricsMap.oom-rules.groups[].rules[].annotations.summary (4) Container {{ $labels.container }} in pod {{ $labels.namespace }}/{{ $labels.pod }} has been OOMKilled {{ $value }} times in the last 10 minutes. | string |
additionalVictoriaMetricsMap.oom-rules.groups[].rules[].expr (4) (kube_pod_container_status_restarts_total - kube_pod_container_status_restarts_total offset 10m >= 1) and ignoring (reason) min_over_time(kube_pod_container_status_last_terminated_reason{reason="OOMKilled"}[10m]) == 1 | string |
| string | |
| boolean | |
additionalVictoriaMetricsMap.pod-failed-rules.groups[].name (2) kube-pod-failures | string |
| string | |
additionalVictoriaMetricsMap.pod-failed-rules.groups[].rules[].annotations.description (2) Pod {{ $labels.namespace }}/{{ $labels.pod }} has been in Failed state for longer than 15 minutes on cluster {{ $labels.cluster }}. | string |
additionalVictoriaMetricsMap.pod-failed-rules.groups[].rules[].annotations.summary (2) Pod has been in Failed state for more than 15 minutes | string |
additionalVictoriaMetricsMap.pod-failed-rules.groups[].rules[].expr (2) sum(max(kube_pod_status_phase{namespace=~".*",job="kube-state-metrics",phase=~"Failed"})
by(namespace,pod,cluster) * on(namespace,pod,cluster) group_left(owner_kind)
topk(1, max(kube_pod_owner{owner_kind!="Job"}) by(namespace,pod,owner_kind,cluster))
by(namespace,pod,cluster)) by(namespace,pod,cluster) > 0
| string |
| string | |
| string | |
| boolean | |
| string | |
additionalVictoriaMetricsMap.zfs-rules.groups[].rules[].alert (1) ZfsUnexpectedPoolState | string |
additionalVictoriaMetricsMap.zfs-rules.groups[].rules[].annotations.summary (1) ZFS pool {{$labels.zpool}} on {{$labels.instance}} is in a unexpected state {{$labels.state}} | string |
additionalVictoriaMetricsMap.zfs-rules.groups[].rules[].expr (1) node_zfs_zpool_state{state!="online"} > 0 | string |
| string | |
| boolean | |
kubeControllerManager.endpoints[] (1) - "10.0.10.2" | string |
kubeControllerManager.vmScrape.spec.endpoints[].bearerTokenFile (1) /var/run/secrets/kubernetes.io/serviceaccount/token | string |
| string | |
| string | |
kubeControllerManager.vmScrape.spec.endpoints[].tlsConfig.caFile (1) /var/run/secrets/kubernetes.io/serviceaccount/ca.crt | string |
| boolean | |
| string | |
| boolean | |
| boolean | |
kubeScheduler.endpoints[] (1) - "10.0.10.2" | string |
kubeScheduler.vmScrape.spec.endpoints[].bearerTokenFile (1) /var/run/secrets/kubernetes.io/serviceaccount/token | string |
kubeScheduler.vmScrape.spec.endpoints[].port (1) http-metrics | string |
| string | |
kubeScheduler.vmScrape.spec.endpoints[].tlsConfig.caFile (1) /var/run/secrets/kubernetes.io/serviceaccount/ca.crt | string |
| boolean | |
| string | |
prometheus-node-exporter.vmScrape.spec.endpoints[].relabelConfigs[].source_labels[] (3) - __meta_kubernetes_endpoint_node_name | string |
| string | |
| string | |
| string | |
| string | |
prometheus-node-exporter.vmScrape.spec.endpoints[].relabelConfigs[].sourceLabels[] (1) - __meta_kubernetes_pod_node_name | string |
| string | |
| string | |
prometheus-node-exporter.vmScrape.spec.selector.matchLabels."app.kubernetes.io/instance" (1) {{ include "vm.release" . }} | string |
prometheus-node-exporter.vmScrape.spec.selector.matchLabels."app.kubernetes.io/name" (1) {{ include "prometheus-node-exporter.name" (index .Subcharts "prometheus-node-exporter") }} | string |
| boolean | |
| boolean | |
prometheus-node-exporter.fullnameOverride (1) node-exporter | string |
| string | |
| string | |
| string | |
victoria-metrics-operator.env[].name (4) VM_VMALERTDEFAULT_CONFIGRELOADERCPU | string |
| string, number | |
| boolean | |
| boolean | |
| boolean | |
| string | |
| string | |
| string | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
vmalert.spec.ruleSelector.matchExpressions[].key (4) vmalert-logs.io/enabled | string |
| string | |
| string | |
| boolean | |
| string | |
| string | |
vmalert.spec.ruleNamespaceSelector.matchExpressions[].values[] (3) - never-used-value | string |
| string | |
vmalert.spec.extraArgs."external.url" (2) https://vmalert.${SECRET_DOMAIN} | string |
| string | |
| string | |
vmalert.spec.datasource.url (1) http://vmsingle-stack.observability.svc.cluster.local:8429 | string |
| string | |
vmalert.spec.remoteWrite.url (1) http://vmsingle-stack.observability.svc.cluster.local:8429/api/v1/write | string |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| boolean | |
vmalert.ingress.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-prod | string |
| string | |
vmalert.ingress.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://auth.${SECRET_DOMAIN} | string |
vmalert.ingress.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://authelia.kube-system.svc.cluster.local/api/authz/auth-request | string |
| boolean | |
vmalert.ingress.hosts[] (1) - vmalert.k.${SECRET_DOMAIN} | string |
vmalert.ingress.ingressClassName (1) nginx-internal | string |
| string | |
vmalert.ingress.tls[].hosts[] (1) - vmalert.k.${SECRET_DOMAIN} | string |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
| boolean | |
kubelet.vmScrape.spec.metricRelabelConfigs[].action (3) drop | string |
kubelet.vmScrape.spec.metricRelabelConfigs[].regex (3) container_cpu_(cfs_throttled_seconds_total|load_average_10s|system_seconds_total|user_seconds_total) | string |
kubelet.vmScrape.spec.metricRelabelConfigs[].sourceLabels[] (3) - __name__ | string |
| boolean | |
| boolean | |
| string | |
kubelet.vmScrapes.cadvisor.spec.metricRelabelConfigs[].action (1) drop | string |
kubelet.vmScrapes.cadvisor.spec.metricRelabelConfigs[].regex (1) container_cpu_(cfs_throttled_seconds_total|load_average_10s|system_seconds_total|user_seconds_total) | string |
kubelet.vmScrapes.cadvisor.spec.metricRelabelConfigs[].sourceLabels[] (1) - __name__ | string |
kubelet.vmScrapes.cadvisor.spec.path (1) /metrics/cadvisor | string |
| boolean | |
kubelet.vmScrapes.probes.spec.path (1) /metrics/probes | string |
| boolean | |
kubelet.vmScrapes.resource.spec.path (1) /metrics/resource | string |
external.grafana.datasource (2) Prometheus | string |
| string | |
extraObjects[].apiVersion (2) monitoring.coreos.com/v1 | string |
extraObjects[].kind (2) PrometheusRule | string |
extraObjects[].metadata.name (2) custom-kube-apiserver-slos | string |
extraObjects[].metadata.namespace (2) observability | string |
extraObjects[].spec.groups[].name (2) kube-apiserver-slos | string |
extraObjects[].spec.groups[].rules[].alert (2) KubeAPIErrorBudgetBurn | string |
extraObjects[].spec.groups[].rules[].annotations.description (2) The API server is burning too much error budget on cluster . | string |
extraObjects[].spec.groups[].rules[].annotations.runbook_url (2) https://runbooks.prometheus-operator.dev/runbooks/kubernetes/kubeapierrorbudgetburn | string |
extraObjects[].spec.groups[].rules[].annotations.summary (2) The API server is burning too much error budget. | string |
extraObjects[].spec.groups[].rules[].condition (2) true | string |
extraObjects[].spec.groups[].rules[].expr (2) sum by (cluster) (apiserver_request:burnrate1h{code=~"4..|5.."}) > (14.40 * 0.01000)
and on (cluster)
sum by (cluster) (apiserver_request:burnrate5m{code=~"4..|5.."}) > (14.40 * 0.01000) | string |
| string | |
| string | |
extraObjects[].spec.groups[].rules[].labels.severity (2) critical | string |
| string | |
| number | |
| string | |
| string | |
| number | |
| number | |
| number | |
| string | |
| string | |
| number | |
| number | |
| boolean | |
kube-state-metrics.fullnameOverride (1) kube-state-metrics | string |
kube-state-metrics.metricLabelsAllowlist[] (1) - pods=[*] | string |
| string | |
| string | |
| string | |
| boolean | |
| boolean | |
| string | |
| string | |
| string | |
| string | |
kube-state-metrics.vmScrape.spec.endpoints[].relabelConfigs[].sourceLabels[] (1) - __meta_kubernetes_pod_node_name | string |
| string | |
kube-state-metrics.vmScrape.spec.jobLabel (1) app.kubernetes.io/name | string |
kube-state-metrics.vmScrape.spec.selector.matchLabels."app.kubernetes.io/instance" (1) {{ include "vm.release" . }} | string |
kube-state-metrics.vmScrape.spec.selector.matchLabels."app.kubernetes.io/name" (1) {{ include "kube-state-metrics.name" (index .Subcharts "kube-state-metrics") }} | string |
| boolean | |
| boolean |