victoria-metrics helm

No introduction found. Create it?

Install

Install with:

helm repo add victoria-metrics-k8s-stack oci://ghcr.io/victoriametrics/helm-charts/victoria-metrics-k8s-stack
helm install victoria-metrics victoria-metrics-k8s-stack/victoria-metrics-k8s-stack -f values.yaml

Examples

See examples from other people.

Top Repositories (1 out of 6)

NameRepoStarsVersionTimestamp
victoria-metricswrmilling/k3s-gitops2270.69.06 hours ago

Values

See the most popular values for this chart:

KeyTypes
string
string
string
boolean
alertmanager.config.receivers[].pushover_configs[].message (3)
{{- range .Alerts }} {{- if ne .Annotations.description "" }} {{ .Annotations.description }} {{- else if ne .Annotations.summary "" }} {{ .Annotations.summary }} {{- else if ne .Annotations.message "" }} {{ .Annotations.message }} {{- else }} Alert description not available {{- end }} {{- if gt (len .Labels.SortedPairs) 0 }} <small> {{- range .Labels.SortedPairs }} <b>{{ .Name }}:</b> {{ .Value }} {{- end }} </small> {{- end }} {{- end }}
string
alertmanager.config.receivers[].pushover_configs[].priority (3)
{{ if eq .Status "firing" }}1{{ else }}0{{ end }}
string
boolean
string
alertmanager.config.receivers[].pushover_configs[].title (3)
[{{ .Status | toUpper }}{{ if eq .Status "firing" }}:{{ .Alerts.Firing | len }}{{ end }}] {{ .CommonLabels.alertname }}
string
string
string
string
string
string
string
alertmanager.config.receivers[].discord_configs[].message (2)
{{ range .Alerts -}} **Alert:** {{ .Annotations.title }}{{ if .Labels.severity }} - `{{ .Labels.severity }}`{{ end }} {{ if ne .Annotations.summary ""}}**Summary:** {{ .Annotations.summary }}{{ else if ne .Annotations.message ""}}**Message:** {{ .Annotations.message }}{{ else if ne .Annotations.description ""}}**Description:** {{ .Annotations.description }}{{ end }} 🏷 **Labels:** {{ range .Labels.SortedPairs }} • {{ .Name }}: {{ .Value }} {{ end }} {{ end }}
{{ range .Alerts -}} **Alert:** {{ .Annotations.title }}{{ if .Labels.severity }} - `{{ .Labels.severity }}`{{ end }} {{ if ne .Annotations.summary ""}}**Summary:** {{ .Annotations.summary }}{{ else if ne .Annotations.message ""}}**Message:** {{ .Annotations.message }}{{ else if ne .Annotations.description ""}}**Description:** {{ .Annotations.description }}{{ end }} 🏷 **Labels:** {{ range .Labels.SortedPairs }} • {{ .Name }}: {{ .Value }} {{ end }} {{ end }}
string
alertmanager.config.receivers[].discord_configs[].title (2)
[{{ .Status | toUpper }}{{ if eq .Status "firing" }}:{{ .Alerts.Firing | len }}{{ end }}] {{ if eq .Status "firing" }}🔥{{ else }}✅{{ end }} {{ if ne .CommonAnnotations.summary ""}}{{ .CommonAnnotations.summary }}{{ else if ne .CommonAnnotations.message ""}}{{ .CommonAnnotations.message }}{{ else if ne .CommonAnnotations.description ""}}{{ .CommonAnnotations.description }}{{ else }}{{ .CommonLabels.alertname }}{{ end }}
[{{ .Status | toUpper }}{{ if eq .Status "firing" }}:{{ .Alerts.Firing | len }}{{ end }}] {{ if eq .Status "firing" }}⚠️{{ else }}✅{{ end }} {{ if ne .CommonAnnotations.summary ""}}{{ .CommonAnnotations.summary }}{{ else if ne .CommonAnnotations.message ""}}{{ .CommonAnnotations.message }}{{ else if ne .CommonAnnotations.description ""}}{{ .CommonAnnotations.description }}{{ else }}{{ .CommonLabels.alertname }}{{ end }}
string
alertmanager.config.receivers[].discord_configs[].webhook_url (2)
${SECRET_KPS_SLACK_API_URL}
${SECRET_KPS_SLACK_API_URL}
string
boolean
string
alertmanager.config.receivers[].webhookConfigs[].url (1)
http://alertmanager-telegram.observability.svc.cluster.local:8080/alerts
string
string
string
string
string
string
alertmanager.config.route.routes[].matchers[] (6)
- alertname=InfoInhibitor
- alertname=Watchdog
- severity=~"warning|critical"
string
string
string
string
string
boolean
alertmanager.config.route.routes[].group_by[] (1)
- alertname
- instance
- alertname
- instance
- alertname
- namespace
- alertname
- namespace
- alertname
- alertname
string
string
string
string
boolean
boolean
alertmanager.spec.externalURL (3)
https://vm-alert.${SECRET_DOMAIN}
string
string
string
number
boolean
string
string
string
alertmanager.ingress.annotations."nginx.ingress.kubernetes.io/auth-url" (1)
http://authelia.kube-system.svc.cluster.local/api/authz/auth-request
string
boolean
alertmanager.ingress.hosts[] (1)
- vm-alert.k.${SECRET_DOMAIN}
string
string
string
alertmanager.ingress.tls[].hosts[] (1)
- vm-alert.k.${SECRET_DOMAIN}
string
string
boolean
boolean
boolean
string
boolean
boolean
string
string
string
string
string
string
string
string
string
string
boolean
boolean
string
string
string
vmagent.ingress.annotations."nginx.ingress.kubernetes.io/auth-url" (1)
http://authelia.kube-system.svc.cluster.local/api/authz/auth-request
string
boolean
vmagent.ingress.hosts[] (1)
- vmagent.k.${SECRET_DOMAIN}
string
string
string
vmagent.ingress.tls[].hosts[] (1)
- vmagent.k.${SECRET_DOMAIN}
string
number
string
string
string
string
string
string
string
string
string
string
string
string
string
string
string
string
string
number
string
number
boolean
number
string
boolean
boolean
vmsingle.route.hostnames[] (2)
- ${APP}.${SECRET_DOMAIN}
string
string
string
string
string
string
number
string
string
string
boolean
string
string
string
vmsingle.ingress.annotations."nginx.ingress.kubernetes.io/auth-url" (1)
http://authelia.kube-system.svc.cluster.local/api/authz/auth-request
string
vmsingle.ingress.hosts[] (1)
- vm.k.${SECRET_DOMAIN}
string
string
string
vmsingle.ingress.tls[].hosts[] (1)
- vm.k.${SECRET_DOMAIN}
string
boolean
string
string
string
additionalVictoriaMetricsMap.dockerhub-rules.groups[].rules[].expr (4)
count(time() - container_last_seen{image=~"(docker.io).*",container!=""} < 30) > 100
string
string
boolean
string
string
additionalVictoriaMetricsMap.oom-rules.groups[].rules[].annotations.summary (4)
Container {{ $labels.container }} in pod {{ $labels.namespace }}/{{ $labels.pod }} has been OOMKilled {{ $value }} times in the last 10 minutes.
string
additionalVictoriaMetricsMap.oom-rules.groups[].rules[].expr (4)
(kube_pod_container_status_restarts_total - kube_pod_container_status_restarts_total offset 10m >= 1) and ignoring (reason) min_over_time(kube_pod_container_status_last_terminated_reason{reason="OOMKilled"}[10m]) == 1
string
string
boolean
string
string
additionalVictoriaMetricsMap.pod-failed-rules.groups[].rules[].annotations.description (2)
Pod {{ $labels.namespace }}/{{ $labels.pod }} has been in Failed state for longer than 15 minutes on cluster {{ $labels.cluster }}.
string
string
additionalVictoriaMetricsMap.pod-failed-rules.groups[].rules[].expr (2)
sum(max(kube_pod_status_phase{namespace=~".*",job="kube-state-metrics",phase=~"Failed"}) by(namespace,pod,cluster) * on(namespace,pod,cluster) group_left(owner_kind) topk(1, max(kube_pod_owner{owner_kind!="Job"}) by(namespace,pod,owner_kind,cluster)) by(namespace,pod,cluster)) by(namespace,pod,cluster) > 0
string
string
string
boolean
string
string
additionalVictoriaMetricsMap.zfs-rules.groups[].rules[].annotations.summary (1)
ZFS pool {{$labels.zpool}} on {{$labels.instance}} is in a unexpected state {{$labels.state}}
string
string
string
boolean
string
kubeControllerManager.vmScrape.spec.endpoints[].bearerTokenFile (1)
/var/run/secrets/kubernetes.io/serviceaccount/token
string
string
string
kubeControllerManager.vmScrape.spec.endpoints[].tlsConfig.caFile (1)
/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
string
boolean
string
boolean
boolean
string
kubeScheduler.vmScrape.spec.endpoints[].bearerTokenFile (1)
/var/run/secrets/kubernetes.io/serviceaccount/token
string
string
string
kubeScheduler.vmScrape.spec.endpoints[].tlsConfig.caFile (1)
/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
string
boolean
string
string
string
string
string
string
string
string
string
string
prometheus-node-exporter.vmScrape.spec.selector.matchLabels."app.kubernetes.io/name" (1)
{{ include "prometheus-node-exporter.name" (index .Subcharts "prometheus-node-exporter") }}
string
boolean
boolean
string
string
string
string
victoria-metrics-operator.env[].name (4)
VM_VMALERTDEFAULT_CONFIGRELOADERCPU
VM_VMAGENTDEFAULT_CONFIGRELOADERCPU
VM_VMALERTMANAGER_CONFIGRELOADERCPU
string
string, number
boolean
boolean
boolean
string
string
string
boolean
boolean
boolean
boolean
string
string
string
boolean
string
string
string
string
vmalert.spec.extraArgs."external.url" (2)
https://vmalert.${SECRET_DOMAIN}
string
string
string
vmalert.spec.datasource.url (1)
http://vmsingle-stack.observability.svc.cluster.local:8429
string
string
vmalert.spec.remoteWrite.url (1)
http://vmsingle-stack.observability.svc.cluster.local:8429/api/v1/write
string
string
string
string
string
string
string
string
boolean
string
string
string
vmalert.ingress.annotations."nginx.ingress.kubernetes.io/auth-url" (1)
http://authelia.kube-system.svc.cluster.local/api/authz/auth-request
string
boolean
vmalert.ingress.hosts[] (1)
- vmalert.k.${SECRET_DOMAIN}
string
string
string
vmalert.ingress.tls[].hosts[] (1)
- vmalert.k.${SECRET_DOMAIN}
string
boolean
boolean
boolean
boolean
boolean
boolean
boolean
boolean
boolean
boolean
boolean
kubelet.vmScrape.spec.metricRelabelConfigs[].action (3)
drop
drop
drop
drop
drop
drop
drop
drop
labeldrop
drop
string
kubelet.vmScrape.spec.metricRelabelConfigs[].regex (3)
container_cpu_(cfs_throttled_seconds_total|load_average_10s|system_seconds_total|user_seconds_total)
container_memory_(failures_total|mapped_file|swap)
container_(tasks_state|threads_max)
container_fs_(io_current|io_time_seconds_total|io_time_weighted_seconds_total|reads_merged_total|sector_reads_total|sector_writes_total|writes_merged_total)
container_blkio_device_usage_total
container_spec.*
.+;
prober_probe_duration_seconds_bucket
(uid|id|pod_uid|interface)
(rest_client_request_duration_seconds_bucket|rest_client_request_duration_seconds_sum|rest_client_request_duration_seconds_count)
string
kubelet.vmScrape.spec.metricRelabelConfigs[].sourceLabels[] (3)
- __name__
- __name__
- __name__
- __name__
- __name__
- __name__
- id
- pod
- __name__
- __name__
string
boolean
boolean
string
kubelet.vmScrapes.cadvisor.spec.metricRelabelConfigs[].action (1)
drop
drop
drop
drop
drop
drop
drop
labeldrop
drop
drop
drop
string
kubelet.vmScrapes.cadvisor.spec.metricRelabelConfigs[].regex (1)
container_cpu_(cfs_throttled_seconds_total|load_average_10s|system_seconds_total|user_seconds_total)
container_memory_(mapped_file|swap)
container_(tasks_state|threads_max)
container_fs_(io_current|io_time_seconds_total|io_time_weighted_seconds_total|reads_merged_total|sector_reads_total|sector_writes_total|writes_merged_total)
container_blkio_device_usage_total
container_spec.*
.+;
(uid|id|pod_uid|interface)
(rest_client_request_duration_seconds_bucket|rest_client_request_duration_seconds_sum|rest_client_request_duration_seconds_count)
(csi_operations|storage_operation_duration)_seconds_bucket;(0.25|2.5|15|25|120|600)(\.0)?
container_network_.*;(cali|cilium|cni|lxc|nodelocaldns|tunl).*
string
kubelet.vmScrapes.cadvisor.spec.metricRelabelConfigs[].sourceLabels[] (1)
- __name__
- __name__
- __name__
- __name__
- __name__
- __name__
- id
- pod
- __name__
- __name__
- le
- __name__
- interface
string
string
boolean
string
boolean
string
string
string
extraObjects[].apiVersion (2)
monitoring.coreos.com/v1
string
string
extraObjects[].metadata.name (2)
custom-kube-apiserver-slos
string
string
string
extraObjects[].spec.groups[].rules[].alert (2)
KubeAPIErrorBudgetBurn
KubeAPIErrorBudgetBurn
KubeAPIErrorBudgetBurn
KubeAPIErrorBudgetBurn
string
extraObjects[].spec.groups[].rules[].annotations.description (2)
The API server is burning too much error budget on cluster .
The API server is burning too much error budget on cluster .
The API server is burning too much error budget on cluster .
The API server is burning too much error budget on cluster .
string
extraObjects[].spec.groups[].rules[].annotations.runbook_url (2)
https://runbooks.prometheus-operator.dev/runbooks/kubernetes/kubeapierrorbudgetburn
https://runbooks.prometheus-operator.dev/runbooks/kubernetes/kubeapierrorbudgetburn
https://runbooks.prometheus-operator.dev/runbooks/kubernetes/kubeapierrorbudgetburn
https://runbooks.prometheus-operator.dev/runbooks/kubernetes/kubeapierrorbudgetburn
string
extraObjects[].spec.groups[].rules[].annotations.summary (2)
The API server is burning too much error budget.
The API server is burning too much error budget.
The API server is burning too much error budget.
The API server is burning too much error budget.
string
string
extraObjects[].spec.groups[].rules[].expr (2)
sum by (cluster) (apiserver_request:burnrate1h{code=~"4..|5.."}) > (14.40 * 0.01000) and on (cluster) sum by (cluster) (apiserver_request:burnrate5m{code=~"4..|5.."}) > (14.40 * 0.01000)
sum by (cluster) (apiserver_request:burnrate6h{code=~"4..|5.."}) > (6.00 * 0.01000) and on (cluster) sum by (cluster) (apiserver_request:burnrate30m{code=~"4..|5.."}) > (6.00 * 0.01000)
sum by (cluster) (apiserver_request:burnrate1d{code=~"4..|5.."}) > (3.00 * 0.01000) and on (cluster) sum by (cluster) (apiserver_request:burnrate2h{code=~"4..|5.."}) > (3.00 * 0.01000)
sum by (cluster) (apiserver_request:burnrate3d{code=~"4..|5.."}) > (1.00 * 0.01000) and on (cluster) sum by (cluster) (apiserver_request:burnrate6h{code=~"4..|5.."}) > (1.00 * 0.01000)
string
string
string
string
string
number
string
string
number
number
number
string
string
number
number
boolean
string
kube-state-metrics.metricLabelsAllowlist[] (1)
- pods=[*]
- deployments=[*]
- persistentvolumeclaims=[*]
string
string
string
string
boolean
boolean
string
string
string
string
string
string
string
string
kube-state-metrics.vmScrape.spec.selector.matchLabels."app.kubernetes.io/name" (1)
{{ include "kube-state-metrics.name" (index .Subcharts "kube-state-metrics") }}
string
boolean
boolean