additionalPrometheusRulesMap: {} alertmanager: alertmanagerSpec: additionalPeers: [] affinity: {} alertmanagerConfigMatcherStrategy: {} alertmanagerConfigNamespaceSelector: {} alertmanagerConfigSelector: {} alertmanagerConfiguration: {} clusterAdvertiseAddress: false clusterGossipInterval: "" clusterPeerTimeout: "" clusterPushpullInterval: "" configMaps: [] containers: [] forceEnableClusterMode: false image: registry: quay.io repository: prometheus/alertmanager sha: "" tag: v0.25.0 initContainers: [] listenLocal: false logFormat: logfmt logLevel: info minReadySeconds: 0 nodeSelector: {} paused: false podAntiAffinity: "" podAntiAffinityTopologyKey: kubernetes.io/hostname podMetadata: {} portName: http-web priorityClassName: "" replicas: 1 resources: {} retention: 120h routePrefix: / scheme: "" secrets: [] securityContext: fsGroup: 2000 runAsGroup: 2000 runAsNonRoot: true runAsUser: 1000 seccompProfile: type: RuntimeDefault storage: {} tlsConfig: {} tolerations: [] topologySpreadConstraints: [] useExistingSecret: false volumeMounts: [] volumes: [] web: {} annotations: {} apiVersion: v2 config: global: resolve_timeout: 5m inhibit_rules: - equal: - namespace - alertname source_matchers: - severity = critical target_matchers: - severity =~ warning|info - equal: - namespace - alertname source_matchers: - severity = warning target_matchers: - severity = info - equal: - namespace source_matchers: - alertname = InfoInhibitor target_matchers: - severity = info receivers: - name: "null" route: group_by: - namespace group_interval: 5m group_wait: 30s receiver: "null" repeat_interval: 12h routes: - matchers: - alertname =~ "InfoInhibitor|Watchdog" receiver: "null" templates: - /etc/alertmanager/config/*.tmpl enabled: false extraSecret: annotations: {} data: {} ingress: annotations: {} enabled: false hosts: [] labels: {} paths: [] tls: [] ingressPerReplica: annotations: {} enabled: false hostDomain: "" hostPrefix: "" labels: {} paths: [] tlsSecretName: "" tlsSecretPerReplica: enabled: false prefix: alertmanager podDisruptionBudget: enabled: false maxUnavailable: "" minAvailable: 1 secret: annotations: {} service: additionalPorts: [] annotations: {} clusterIP: "" externalIPs: [] externalTrafficPolicy: Cluster labels: {} loadBalancerIP: "" loadBalancerSourceRanges: [] nodePort: 30903 port: 9093 sessionAffinity: "" targetPort: 9093 type: ClusterIP serviceAccount: annotations: {} automountServiceAccountToken: true create: true name: "" serviceMonitor: additionalLabels: {} enableHttp2: true interval: "" labelLimit: 0 labelNameLengthLimit: 0 labelValueLengthLimit: 0 metricRelabelings: [] proxyUrl: "" relabelings: [] sampleLimit: 0 scheme: "" selfMonitor: true targetLimit: 0 tlsConfig: {} servicePerReplica: annotations: {} enabled: false externalTrafficPolicy: Cluster loadBalancerSourceRanges: [] nodePort: 30904 port: 9093 targetPort: 9093 type: ClusterIP stringConfig: "" templateFiles: {} tplConfig: false cleanPrometheusOperatorObjectNames: false commonLabels: {} coreDns: enabled: true service: port: 9153 targetPort: 9153 serviceMonitor: additionalLabels: {} interval: "" labelLimit: 0 labelNameLengthLimit: 0 labelValueLengthLimit: 0 metricRelabelings: [] proxyUrl: "" relabelings: [] sampleLimit: 0 targetLimit: 0 crds: enabled: true global: imagePullSecrets: [] imageRegistry: "" rbac: create: true createAggregateClusterRoles: false pspAnnotations: {} pspEnabled: false defaultRules: additionalRuleAnnotations: {} additionalRuleGroupAnnotations: alertmanager: {} configReloaders: {} etcd: {} general: {} k8s: {} kubeApiserverAvailability: {} kubeApiserverBurnrate: {} kubeApiserverHistogram: {} kubeApiserverSlos: {} kubeControllerManager: {} kubePrometheusGeneral: {} kubePrometheusNodeRecording: {} kubeProxy: {} kubeSchedulerAlerting: {} kubeSchedulerRecording: {} kubeStateMetrics: {} kubelet: {} kubernetesApps: {} kubernetesResources: {} kubernetesStorage: {} kubernetesSystem: {} network: {} node: {} nodeExporterAlerting: {} nodeExporterRecording: {} prometheus: {} prometheusOperator: {} additionalRuleGroupLabels: alertmanager: {} configReloaders: {} etcd: {} general: {} k8s: {} kubeApiserverAvailability: {} kubeApiserverBurnrate: {} kubeApiserverHistogram: {} kubeApiserverSlos: {} kubeControllerManager: {} kubePrometheusGeneral: {} kubePrometheusNodeRecording: {} kubeProxy: {} kubeSchedulerAlerting: {} kubeSchedulerRecording: {} kubeStateMetrics: {} kubelet: {} kubernetesApps: {} kubernetesResources: {} kubernetesStorage: {} kubernetesSystem: {} network: {} node: {} nodeExporterAlerting: {} nodeExporterRecording: {} prometheus: {} prometheusOperator: {} additionalRuleLabels: {} annotations: {} appNamespacesTarget: .* create: true disabled: {} labels: {} rules: alertmanager: true configReloaders: true etcd: true general: true k8s: true kubeApiserverAvailability: true kubeApiserverBurnrate: true kubeApiserverHistogram: true kubeApiserverSlos: true kubeControllerManager: true kubePrometheusGeneral: true kubePrometheusNodeRecording: true kubeProxy: true kubeSchedulerAlerting: true kubeSchedulerRecording: true kubeStateMetrics: true kubelet: true kubernetesApps: true kubernetesResources: true kubernetesStorage: true kubernetesSystem: true network: true node: true nodeExporterAlerting: true nodeExporterRecording: true prometheus: true prometheusOperator: true windows: true runbookUrl: https://runbooks.prometheus-operator.dev/runbooks extraManifests: [] fullnameOverride: "" global: imagePullSecrets: [] imageRegistry: "" rbac: create: true createAggregateClusterRoles: false pspAnnotations: {} pspEnabled: false grafana: additionalDataSources: [] adminPassword: prom-operator defaultDashboardsEnabled: true defaultDashboardsTimezone: utc deleteDatasources: [] enabled: false extraConfigmapMounts: [] forceDeployDashboards: false forceDeployDatasources: false ingress: annotations: {} enabled: false hosts: [] labels: {} path: / tls: [] namespaceOverride: "" rbac: pspEnabled: false service: portName: http-web serviceMonitor: enabled: true interval: "" labels: {} path: /metrics relabelings: [] scheme: http scrapeTimeout: 30s tlsConfig: {} sidecar: dashboards: annotations: {} enabled: true label: grafana_dashboard labelValue: "1" multicluster: etcd: enabled: false global: enabled: false provider: allowUiUpdates: false searchNamespace: ALL datasources: alertmanager: enabled: true handleGrafanaManagedAlerts: false implementation: prometheus uid: alertmanager annotations: {} createPrometheusReplicasDatasources: false defaultDatasourceEnabled: true enabled: true exemplarTraceIdDestinations: {} httpMethod: POST isDefaultDatasource: true label: grafana_datasource labelValue: "1" uid: prometheus kube-state-metrics: affinity: {} annotations: {} autosharding: enabled: false collectors: - certificatesigningrequests - configmaps - cronjobs - daemonsets - deployments - endpoints - horizontalpodautoscalers - ingresses - jobs - leases - limitranges - mutatingwebhookconfigurations - namespaces - networkpolicies - nodes - persistentvolumeclaims - persistentvolumes - poddisruptionbudgets - pods - replicasets - replicationcontrollers - resourcequotas - secrets - services - statefulsets - storageclasses - validatingwebhookconfigurations - volumeattachments containerSecurityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL customLabels: {} customResourceState: config: {} enabled: false extraArgs: [] global: imagePullSecrets: [] imageRegistry: "" rbac: create: true createAggregateClusterRoles: false pspAnnotations: {} pspEnabled: false hostNetwork: false image: pullPolicy: IfNotPresent registry: registry.k8s.io repository: kube-state-metrics/kube-state-metrics sha: "" tag: "" imagePullSecrets: [] kubeRBACProxy: containerSecurityContext: {} enabled: false extraArgs: [] image: pullPolicy: IfNotPresent registry: quay.io repository: brancz/kube-rbac-proxy sha: "" tag: v0.14.0 resources: {} volumeMounts: [] kubeTargetVersionOverride: "" kubeconfig: enabled: false metricAllowlist: [] metricAnnotationsAllowList: [] metricDenylist: [] metricLabelsAllowlist: [] namespaceOverride: "" namespaces: "" namespacesDenylist: "" networkPolicy: enabled: false flavor: kubernetes nodeSelector: {} podAnnotations: {} podDisruptionBudget: {} podSecurityPolicy: additionalVolumes: [] annotations: {} enabled: false prometheus: monitor: additionalLabels: {} annotations: {} bearerTokenFile: "" bearerTokenSecret: {} enabled: true honorLabels: true interval: "" jobLabel: "" labelLimit: 0 labelNameLengthLimit: 0 labelValueLengthLimit: 0 metricRelabelings: [] namespace: "" podTargetLabels: [] proxyUrl: "" relabelings: [] sampleLimit: 0 scheme: "" scrapeTimeout: "" selectorOverride: {} targetLabels: [] targetLimit: 0 tlsConfig: {} prometheusScrape: true rbac: create: true extraRules: [] useClusterRole: true releaseLabel: true releaseNamespace: false replicas: 1 resources: {} securityContext: enabled: true fsGroup: 65534 runAsGroup: 65534 runAsNonRoot: true runAsUser: 65534 seccompProfile: type: RuntimeDefault selectorOverride: {} selfMonitor: enabled: false service: annotations: {} clusterIP: "" loadBalancerIP: "" loadBalancerSourceRanges: [] nodePort: 0 port: 8080 type: ClusterIP serviceAccount: annotations: {} create: true imagePullSecrets: [] tolerations: [] topologySpreadConstraints: [] verticalPodAutoscaler: controlledResources: [] enabled: false maxAllowed: {} minAllowed: {} volumeMounts: [] volumes: [] kubeApiServer: enabled: true serviceMonitor: additionalLabels: {} interval: "" jobLabel: component labelLimit: 0 labelNameLengthLimit: 0 labelValueLengthLimit: 0 metricRelabelings: - action: drop regex: apiserver_request_duration_seconds_bucket;(0.15|0.2|0.3|0.35|0.4|0.45|0.6|0.7|0.8|0.9|1.25|1.5|1.75|2|3|3.5|4|4.5|6|7|8|9|15|25|40|50) sourceLabels: - __name__ - le proxyUrl: "" relabelings: [] sampleLimit: 0 selector: matchLabels: component: apiserver provider: kubernetes targetLimit: 0 tlsConfig: insecureSkipVerify: false serverName: kubernetes kubeControllerManager: enabled: true endpoints: [] service: enabled: true serviceMonitor: additionalLabels: {} enabled: true interval: "" labelLimit: 0 labelNameLengthLimit: 0 labelValueLengthLimit: 0 metricRelabelings: [] proxyUrl: "" relabelings: [] sampleLimit: 0 targetLimit: 0 kubeDns: enabled: false service: dnsmasq: port: 10054 targetPort: 10054 skydns: port: 10055 targetPort: 10055 serviceMonitor: additionalLabels: {} dnsmasqMetricRelabelings: [] dnsmasqRelabelings: [] interval: "" labelLimit: 0 labelNameLengthLimit: 0 labelValueLengthLimit: 0 metricRelabelings: [] proxyUrl: "" relabelings: [] sampleLimit: 0 targetLimit: 0 kubeEtcd: enabled: true endpoints: [] service: enabled: true port: 2381 targetPort: 2381 serviceMonitor: additionalLabels: {} caFile: "" certFile: "" enabled: true insecureSkipVerify: false interval: "" keyFile: "" labelLimit: 0 labelNameLengthLimit: 0 labelValueLengthLimit: 0 metricRelabelings: [] proxyUrl: "" relabelings: [] sampleLimit: 0 scheme: http serverName: "" targetLimit: 0 kubeProxy: enabled: true endpoints: [] service: enabled: true port: 10249 targetPort: 10249 serviceMonitor: additionalLabels: {} enabled: true https: false interval: "" labelLimit: 0 labelNameLengthLimit: 0 labelValueLengthLimit: 0 metricRelabelings: [] proxyUrl: "" relabelings: [] sampleLimit: 0 targetLimit: 0 kubeScheduler: enabled: true endpoints: [] service: enabled: true serviceMonitor: additionalLabels: {} enabled: true interval: "" labelLimit: 0 labelNameLengthLimit: 0 labelValueLengthLimit: 0 metricRelabelings: [] proxyUrl: "" relabelings: [] sampleLimit: 0 targetLimit: 0 kubeStateMetrics: enabled: true kubeTargetVersionOverride: "" kubeVersionOverride: "" kubelet: enabled: true namespace: kube-system serviceMonitor: additionalLabels: {} cAdvisor: true cAdvisorMetricRelabelings: - action: drop regex: container_cpu_(cfs_throttled_seconds_total|load_average_10s|system_seconds_total|user_seconds_total) sourceLabels: - __name__ - action: drop regex: container_fs_(io_current|io_time_seconds_total|io_time_weighted_seconds_total|reads_merged_total|sector_reads_total|sector_writes_total|writes_merged_total) sourceLabels: - __name__ - action: drop regex: container_memory_(mapped_file|swap) sourceLabels: - __name__ - action: drop regex: container_(file_descriptors|tasks_state|threads_max) sourceLabels: - __name__ - action: drop regex: container_spec.* sourceLabels: - __name__ - action: drop regex: .+; sourceLabels: - id - pod cAdvisorRelabelings: - action: replace sourceLabels: - __metrics_path__ targetLabel: metrics_path https: true interval: "" labelLimit: 0 labelNameLengthLimit: 0 labelValueLengthLimit: 0 metricRelabelings: [] probes: true probesMetricRelabelings: [] probesRelabelings: - action: replace sourceLabels: - __metrics_path__ targetLabel: metrics_path proxyUrl: "" relabelings: - action: replace sourceLabels: - __metrics_path__ targetLabel: metrics_path resource: false resourcePath: /metrics/resource/v1alpha1 resourceRelabelings: - action: replace sourceLabels: - __metrics_path__ targetLabel: metrics_path sampleLimit: 0 targetLimit: 0 kubernetesServiceMonitors: enabled: true nameOverride: "" namespaceOverride: "" nodeExporter: enabled: true prometheus: additionalPodMonitors: [] additionalRulesForClusterRole: [] additionalServiceMonitors: [] agentMode: false annotations: {} enabled: true extraSecret: annotations: {} data: {} ingress: annotations: {} enabled: false hosts: [] labels: {} paths: [] tls: [] ingressPerReplica: annotations: {} enabled: false hostDomain: "" hostPrefix: "" labels: {} paths: [] tlsSecretName: "" tlsSecretPerReplica: enabled: false prefix: prometheus networkPolicy: enabled: false flavor: kubernetes podDisruptionBudget: enabled: false maxUnavailable: "" minAvailable: 1 podSecurityPolicy: allowedCapabilities: [] allowedHostPaths: [] volumes: [] prometheusSpec: additionalAlertManagerConfigs: [] additionalAlertManagerConfigsSecret: {} additionalAlertRelabelConfigs: [] additionalAlertRelabelConfigsSecret: {} additionalArgs: [] additionalPrometheusSecretsAnnotations: {} additionalRemoteRead: [] additionalRemoteWrite: [] additionalScrapeConfigs: [] additionalScrapeConfigsSecret: {} affinity: {} alertingEndpoints: [] allowOverlappingBlocks: false apiserverConfig: {} arbitraryFSAccessThroughSMs: false configMaps: [] containers: [] disableCompaction: false enableAdminAPI: false enableFeatures: [] enableRemoteWriteReceiver: false enforcedLabelLimit: false enforcedLabelNameLengthLimit: false enforcedLabelValueLengthLimit: false enforcedNamespaceLabel: "" enforcedSampleLimit: false enforcedTargetLimit: false evaluationInterval: "" excludedFromEnforcement: [] exemplars: "" externalLabels: clusterName: test-uat-central-observ externalUrl: "" hostAliases: [] hostNetwork: false ignoreNamespaceSelectors: false image: registry: quay.io repository: prometheus/prometheus sha: "" tag: v2.45.0 initContainers: [] listenLocal: false logFormat: logfmt logLevel: info minReadySeconds: 0 nodeSelector: {} overrideHonorLabels: false overrideHonorTimestamps: false paused: false podAntiAffinity: "" podAntiAffinityTopologyKey: kubernetes.io/hostname podMetadata: {} podMonitorNamespaceSelector: {} podMonitorSelector: {} podMonitorSelectorNilUsesHelmValues: true portName: http-web priorityClassName: "" probeNamespaceSelector: {} probeSelector: {} probeSelectorNilUsesHelmValues: true prometheusExternalLabelName: "" prometheusExternalLabelNameClear: false prometheusRulesExcludedFromEnforce: [] query: {} queryLogFile: false remoteRead: [] remoteWrite: - send_exemplars: true url: http://mimir-nginx.observability.svc/api/v1/push remoteWriteDashboards: false replicaExternalLabelName: "" replicaExternalLabelNameClear: false replicas: 1 resources: {} retention: 10d retentionSize: "" routePrefix: / ruleNamespaceSelector: {} ruleSelector: {} ruleSelectorNilUsesHelmValues: true scrapeConfigNamespaceSelector: {} scrapeConfigSelector: {} scrapeConfigSelectorNilUsesHelmValues: true scrapeInterval: "" scrapeTimeout: "" secrets: [] securityContext: fsGroup: 2000 runAsGroup: 2000 runAsNonRoot: true runAsUser: 1000 seccompProfile: type: RuntimeDefault serviceMonitorNamespaceSelector: {} serviceMonitorSelector: {} serviceMonitorSelectorNilUsesHelmValues: true shards: 1 storageSpec: {} thanos: {} tolerations: [] topologySpreadConstraints: [] tracingConfig: {} tsdb: outOfOrderTimeWindow: 0s version: "" volumeMounts: [] volumes: [] walCompression: true web: {} service: additionalPorts: [] annotations: {} clusterIP: "" externalIPs: [] externalTrafficPolicy: Cluster labels: {} loadBalancerIP: "" loadBalancerSourceRanges: [] nodePort: 30090 port: 9090 publishNotReadyAddresses: false sessionAffinity: "" targetPort: 9090 type: ClusterIP serviceAccount: annotations: {} create: true name: "" serviceMonitor: additionalLabels: {} interval: "" labelLimit: 0 labelNameLengthLimit: 0 labelValueLengthLimit: 0 metricRelabelings: [] relabelings: [] sampleLimit: 0 scheme: "" selfMonitor: true targetLimit: 0 tlsConfig: {} servicePerReplica: annotations: {} enabled: false externalTrafficPolicy: Cluster loadBalancerSourceRanges: [] nodePort: 30091 port: 9090 targetPort: 9090 type: ClusterIP thanosIngress: annotations: {} enabled: false hosts: [] labels: {} nodePort: 30901 paths: [] servicePort: 10901 tls: [] thanosService: annotations: {} clusterIP: None enabled: false externalTrafficPolicy: Cluster httpNodePort: 30902 httpPort: 10902 httpPortName: http labels: {} nodePort: 30901 port: 10901 portName: grpc targetHttpPort: http targetPort: grpc type: ClusterIP thanosServiceExternal: annotations: {} enabled: false externalTrafficPolicy: Cluster httpNodePort: 30902 httpPort: 10902 httpPortName: http labels: {} loadBalancerIP: "" loadBalancerSourceRanges: [] nodePort: 30901 port: 10901 portName: grpc targetHttpPort: http targetPort: grpc type: LoadBalancer thanosServiceMonitor: additionalLabels: {} enabled: false interval: "" metricRelabelings: [] relabelings: [] scheme: "" tlsConfig: {} prometheus-node-exporter: affinity: {} configmaps: [] containerSecurityContext: readOnlyRootFilesystem: true daemonsetAnnotations: {} dnsConfig: {} endpoints: [] env: {} extraArgs: - --collector.filesystem.mount-points-exclude=^/(dev|proc|sys|var/lib/docker/.+|var/lib/kubelet/.+)($|/) - --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ extraHostVolumeMounts: [] extraInitContainers: [] fullnameOverride: "" global: imagePullSecrets: [] imageRegistry: "" rbac: create: true createAggregateClusterRoles: false pspAnnotations: {} pspEnabled: false hostNetwork: true hostPID: true hostRootFsMount: enabled: true mountPropagation: HostToContainer image: digest: "" pullPolicy: IfNotPresent registry: quay.io repository: prometheus/node-exporter tag: "" imagePullSecrets: [] kubeRBACProxy: containerSecurityContext: {} enabled: false extraArgs: [] image: pullPolicy: IfNotPresent registry: quay.io repository: brancz/kube-rbac-proxy sha: "" tag: v0.14.0 resources: {} livenessProbe: failureThreshold: 3 httpGet: httpHeaders: [] scheme: http initialDelaySeconds: 0 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 nameOverride: "" namespaceOverride: "" networkPolicy: enabled: false nodeSelector: kubernetes.io/os: linux podAnnotations: cluster-autoscaler.kubernetes.io/safe-to-evict: "true" podLabels: jobLabel: node-exporter prometheus: monitor: additionalLabels: {} apiVersion: "" attachMetadata: node: false basicAuth: {} bearerTokenFile: null enabled: true interval: "" jobLabel: jobLabel labelLimit: 0 labelNameLengthLimit: 0 labelValueLengthLimit: 0 metricRelabelings: [] namespace: "" podTargetLabels: [] proxyUrl: "" relabelings: [] sampleLimit: 0 scheme: http scrapeTimeout: "" selectorOverride: {} targetLimit: 0 tlsConfig: {} podMonitor: additionalLabels: {} apiVersion: "" attachMetadata: node: false authorization: {} basicAuth: {} bearerTokenSecret: {} enableHttp2: "" enabled: false filterRunning: "" followRedirects: "" honorLabels: true honorTimestamps: true interval: "" jobLabel: "" labelLimit: 0 labelNameLengthLimit: 0 labelValueLengthLimit: 0 metricRelabelings: [] namespace: "" oauth2: {} params: {} path: /metrics podTargetLabels: [] proxyUrl: "" relabelings: [] sampleLimit: 0 scheme: http scrapeTimeout: "" selectorOverride: {} targetLimit: 0 tlsConfig: {} rbac: create: true pspAnnotations: {} pspEnabled: false readinessProbe: failureThreshold: 3 httpGet: httpHeaders: [] scheme: http initialDelaySeconds: 0 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 releaseLabel: true resources: {} secrets: [] securityContext: fsGroup: 65534 runAsGroup: 65534 runAsNonRoot: true runAsUser: 65534 service: annotations: prometheus.io/scrape: "true" listenOnAllInterfaces: true nodePort: null port: 9100 portName: http-metrics targetPort: 9100 type: ClusterIP serviceAccount: annotations: {} automountServiceAccountToken: false create: true imagePullSecrets: [] sidecarHostVolumeMounts: [] sidecarVolumeMount: [] sidecars: [] tolerations: - effect: NoSchedule operator: Exists updateStrategy: rollingUpdate: maxUnavailable: 1 type: RollingUpdate verticalPodAutoscaler: controlledResources: [] enabled: false maxAllowed: {} minAllowed: {} prometheusOperator: admissionWebhooks: annotations: {} caBundle: "" certManager: admissionCert: duration: "" enabled: false rootCert: duration: "" createSecretJob: securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: true enabled: true failurePolicy: "" patch: affinity: {} annotations: {} enabled: true image: pullPolicy: IfNotPresent registry: registry.k8s.io repository: ingress-nginx/kube-webhook-certgen sha: "" tag: v20221220-controller-v1.5.1-58-g787ea74b6 nodeSelector: {} podAnnotations: {} priorityClassName: "" resources: {} securityContext: runAsGroup: 2000 runAsNonRoot: true runAsUser: 2000 seccompProfile: type: RuntimeDefault tolerations: [] patchWebhookJob: securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: true timeoutSeconds: 10 affinity: {} alertmanagerConfigNamespaces: [] alertmanagerInstanceNamespaces: [] alertmanagerInstanceSelector: "" annotations: {} containerSecurityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: true denyNamespaces: [] dnsConfig: {} enabled: true hostNetwork: false image: pullPolicy: IfNotPresent registry: quay.io repository: prometheus-operator/prometheus-operator sha: "" tag: "" kubeletService: enabled: true name: "" namespace: kube-system labels: {} namespaces: {} networkPolicy: enabled: false flavor: kubernetes nodeSelector: {} podAnnotations: {} podLabels: {} prometheusConfigReloader: enableProbe: false image: registry: quay.io repository: prometheus-operator/prometheus-config-reloader sha: "" tag: "" resources: limits: cpu: 200m memory: 50Mi requests: cpu: 200m memory: 50Mi prometheusInstanceNamespaces: [] prometheusInstanceSelector: "" resources: {} secretFieldSelector: type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 securityContext: fsGroup: 65534 runAsGroup: 65534 runAsNonRoot: true runAsUser: 65534 seccompProfile: type: RuntimeDefault service: additionalPorts: [] annotations: {} clusterIP: "" externalIPs: [] externalTrafficPolicy: Cluster labels: {} loadBalancerIP: "" loadBalancerSourceRanges: [] nodePort: 30080 nodePortTls: 30443 type: ClusterIP serviceAccount: create: true name: "" serviceMonitor: additionalLabels: {} interval: "" labelLimit: 0 labelNameLengthLimit: 0 labelValueLengthLimit: 0 metricRelabelings: [] relabelings: [] sampleLimit: 0 scrapeTimeout: "" selfMonitor: true targetLimit: 0 thanosImage: registry: quay.io repository: thanos/thanos sha: "" tag: v0.31.0 thanosRulerInstanceNamespaces: [] thanosRulerInstanceSelector: "" tls: enabled: true internalPort: 10250 tlsMinVersion: VersionTLS13 tolerations: [] verticalPodAutoscaler: controlledResources: [] enabled: false maxAllowed: {} minAllowed: {} updatePolicy: updateMode: Auto thanosRuler: annotations: {} enabled: false extraSecret: annotations: {} data: {} ingress: annotations: {} enabled: false hosts: [] labels: {} paths: [] tls: [] podDisruptionBudget: enabled: false maxUnavailable: "" minAvailable: 1 service: additionalPorts: [] annotations: {} clusterIP: "" externalIPs: [] externalTrafficPolicy: Cluster labels: {} loadBalancerIP: "" loadBalancerSourceRanges: [] nodePort: 30905 port: 10902 targetPort: 10902 type: ClusterIP serviceAccount: annotations: {} create: true name: "" serviceMonitor: additionalLabels: {} interval: "" labelLimit: 0 labelNameLengthLimit: 0 labelValueLengthLimit: 0 metricRelabelings: [] proxyUrl: "" relabelings: [] sampleLimit: 0 scheme: "" selfMonitor: true targetLimit: 0 tlsConfig: {} thanosRulerSpec: affinity: {} alertmanagersConfig: {} containers: [] evaluationInterval: "" image: registry: quay.io repository: thanos/thanos sha: "" tag: v0.31.0 initContainers: [] labels: {} listenLocal: false logFormat: logfmt logLevel: info nodeSelector: {} objectStorageConfig: {} objectStorageConfigFile: "" paused: false podAntiAffinity: "" podAntiAffinityTopologyKey: kubernetes.io/hostname podMetadata: {} portName: web priorityClassName: "" queryConfig: {} queryEndpoints: [] replicas: 1 resources: {} retention: 24h routePrefix: / ruleNamespaceSelector: {} ruleSelector: {} ruleSelectorNilUsesHelmValues: true securityContext: fsGroup: 2000 runAsGroup: 2000 runAsNonRoot: true runAsUser: 1000 seccompProfile: type: RuntimeDefault storage: {} tolerations: [] topologySpreadConstraints: [] volumeMounts: [] volumes: [] windowsMonitoring: enabled: false job: prometheus-windows-exporter