54 lines
1.6 KiB
YAML
54 lines
1.6 KiB
YAML
extraPorts:
|
|
syslog:
|
|
name: tcp-syslog
|
|
containerPort: 1514
|
|
service:
|
|
port: 1234
|
|
type: NodePort
|
|
httpPush:
|
|
name: http-push
|
|
containerPort: 3500
|
|
grpcPush:
|
|
name: grpc-push
|
|
containerPort: 3600
|
|
|
|
config:
|
|
snippets:
|
|
extraScrapeConfigs: |
|
|
- job_name: syslog
|
|
syslog:
|
|
listen_address: 0.0.0.0:{{ .Values.extraPorts.syslog.containerPort }}
|
|
labels:
|
|
job: syslog
|
|
relabel_configs:
|
|
- source_labels:
|
|
- __syslog_message_hostname
|
|
target_label: host
|
|
|
|
- job_name: push1
|
|
loki_push_api:
|
|
server:
|
|
http_listen_port: {{ .Values.extraPorts.httpPush.containerPort }}
|
|
grpc_listen_port: {{ .Values.extraPorts.grpcPush.containerPort }}
|
|
labels:
|
|
pushserver: push1
|
|
|
|
networkPolicy:
|
|
# -- Specifies whether Network Policies should be created
|
|
enabled: true
|
|
metrics:
|
|
# -- Specifies the Pods which are allowed to access the metrics port.
|
|
# As this is cross-namespace communication, you also neeed the namespaceSelector.
|
|
podSelector: {}
|
|
# -- Specifies the namespaces which are allowed to access the metrics port
|
|
namespaceSelector: {}
|
|
# -- Specifies specific network CIDRs which are allowed to access the metrics port.
|
|
# In case you use namespaceSelector, you also have to specify your kubelet networks here.
|
|
# The metrics ports are also used for probes.
|
|
cidrs: []
|
|
k8sApi:
|
|
# -- Specify the k8s API endpoint port
|
|
port: 8443
|
|
# -- Specifies specific network CIDRs you want to limit access to
|
|
cidrs: []
|