Compare commits

..

No commits in common. "211b84b8b5312641d77125ad07406b37cf81c5bd" and "951057490aaf7a93fd978a6d1f59350d54047217" have entirely different histories.

8 changed files with 10 additions and 109 deletions

View File

@ -1,6 +1,4 @@
alloy: alloy:
clustering:
enabled: true
configMap: configMap:
content: |- content: |-
logging { logging {
@ -124,76 +122,8 @@ alloy:
forward_to = [prometheus.remote_write.metrics.receiver] forward_to = [prometheus.remote_write.metrics.receiver]
scrape_interval = "30s" scrape_interval = "30s"
} }
discovery.kubernetes "kube_state_metrics" {
role = "endpoints"
selectors {
role = "endpoints"
label = "app.kubernetes.io/name=kube-state-metrics"
}
namespaces {
names = ["grafana"]
}
}
discovery.relabel "kube_state_metrics" {
targets = discovery.kubernetes.kube_state_metrics.targets
// only keep targets with a matching port name
rule {
source_labels = ["__meta_kubernetes_endpoint_port_name"]
regex = "http"
action = "keep"
}
rule {
action = "replace"
replacement = "kubernetes"
target_label = "source"
}
}
prometheus.scrape "kube_state_metrics" {
targets = discovery.relabel.kube_state_metrics.output
job_name = "integrations/kubernetes/kube-state-metrics"
scrape_interval = "30s"
scheme = "http"
bearer_token_file = ""
tls_config {
insecure_skip_verify = true
}
clustering {
enabled = true
}
forward_to = [prometheus.relabel.kube_state_metrics.receiver]
}
prometheus.relabel "kube_state_metrics" {
max_cache_size = 100000
rule {
source_labels = ["__name__"]
regex = "up|scrape_samples_scraped|kube_configmap_info|kube_configmap_metadata_resource_version|kube_daemonset.*|kube_deployment_metadata_generation|kube_deployment_spec_replicas|kube_deployment_status_condition|kube_deployment_status_observed_generation|kube_deployment_status_replicas_available|kube_deployment_status_replicas_updated|kube_horizontalpodautoscaler_spec_max_replicas|kube_horizontalpodautoscaler_spec_min_replicas|kube_horizontalpodautoscaler_status_current_replicas|kube_horizontalpodautoscaler_status_desired_replicas|kube_job.*|kube_namespace_status_phase|kube_node.*|kube_persistentvolume_status_phase|kube_persistentvolumeclaim_access_mode|kube_persistentvolumeclaim_info|kube_persistentvolumeclaim_labels|kube_persistentvolumeclaim_resource_requests_storage_bytes|kube_persistentvolumeclaim_status_phase|kube_pod_container_info|kube_pod_container_resource_limits|kube_pod_container_resource_requests|kube_pod_container_status_last_terminated_reason|kube_pod_container_status_restarts_total|kube_pod_container_status_waiting_reason|kube_pod_info|kube_pod_owner|kube_pod_spec_volumes_persistentvolumeclaims_info|kube_pod_start_time|kube_pod_status_phase|kube_pod_status_reason|kube_replicaset.*|kube_resourcequota|kube_secret_metadata_resource_version|kube_statefulset.*"
action = "keep"
}
forward_to = [prometheus.remote_write.metrics.receiver]
}
prometheus.remote_write "metrics" { prometheus.remote_write "metrics" {
endpoint { endpoint {
url = "http://grafana-mimir-nginx/api/v1/push" url = "http://grafana-mimir-nginx/api/v1/push"
} }
} }
resources:
requests:
cpu: 1m
memory: 5Mi
limits:
cpu: 1
memory: 400Mi

View File

@ -6,5 +6,3 @@ grafana:
annotations: annotations:
"traefik.ingress.kubernetes.io/router.tls.certresolver": "letsencrypt" "traefik.ingress.kubernetes.io/router.tls.certresolver": "letsencrypt"
persistence:
enabled: true

View File

@ -18,9 +18,6 @@ dependencies:
- name: k8up - name: k8up
repository: https://k8up-io.github.io/k8up repository: https://k8up-io.github.io/k8up
version: 4.8.4 version: 4.8.4
- name: kube-state-metrics
repository: https://prometheus-community.github.io/helm-charts
version: 5.30.1
- name: lgtm-distributed - name: lgtm-distributed
repository: https://grafana.github.io/helm-charts repository: https://grafana.github.io/helm-charts
version: 2.1.0 version: 2.1.0
@ -51,5 +48,5 @@ dependencies:
- name: traefik - name: traefik
repository: https://traefik.github.io/charts repository: https://traefik.github.io/charts
version: 34.4.1 version: 34.4.1
digest: sha256:5645dcc617a44ae663f1550e08169a323c8d96e491f45178362a5389763f4b2f digest: sha256:e2c65297653c325106e0a9055ed7a59f9c801035089e1684934ceef50a032ac8
generated: "2025-03-18T20:53:53.212208477-06:00" generated: "2025-03-17T21:13:03.161466198-06:00"

View File

@ -106,10 +106,7 @@ releases:
chart: grafana/alloy chart: grafana/alloy
values: values:
- grafana/alloy_values.yaml - grafana/alloy_values.yaml
- name: kube-state-metrics
namespace: grafana
createNamespace: true
chart: prometheus-community/kube-state-metrics
# goatchat matrix # goatchat matrix
- name: goatchat - name: goatchat
namespace: goatchat namespace: goatchat

View File

@ -7,5 +7,5 @@ spec:
- ReadWriteOnce - ReadWriteOnce
resources: resources:
requests: requests:
storage: 200Gi storage: 50Gi

View File

@ -1,6 +1,3 @@
image:
tag: v1.129.0
env: env:
DB_HOSTNAME: {{ exec "kubectl" (list "-n" "immich" "get" "secrets" "postgres-pguser-immich" "-ogo-template='{{.data.host | base64decode }}'") }} DB_HOSTNAME: {{ exec "kubectl" (list "-n" "immich" "get" "secrets" "postgres-pguser-immich" "-ogo-template='{{.data.host | base64decode }}'") }}
DB_USERNAME: {{ exec "kubectl" (list "-n" "immich" "get" "secrets" "postgres-pguser-immich" "-ogo-template='{{.data.user | base64decode }}'") }} DB_USERNAME: {{ exec "kubectl" (list "-n" "immich" "get" "secrets" "postgres-pguser-immich" "-ogo-template='{{.data.user | base64decode }}'") }}
@ -17,10 +14,8 @@ redis:
enabled: true enabled: true
master: master:
resources: resources:
requests:
cpu: 10m
limits: limits:
cpu: 1
server: server:
ingress: ingress:
main: main:
@ -32,17 +27,4 @@ server:
paths: paths:
- path: "/" - path: "/"
pathType: Prefix pathType: Prefix
resources:
requests:
cpu: 10m
limits:
cpu: 1
controller:
strategy: Recreate
machine-learning:
resources:
requests:
cpu: 10m
limits:
cpu: 1

View File

@ -1,6 +1,5 @@
cluster: cluster:
clusterName: fog proxy:
proxy: extraArgs:
extraArgs: ipvs-strict-arp: true
ipvs-strict-arp: true allowSchedulingOnControlPlanes: true
allowSchedulingOnControlPlanes: true

View File

@ -1,6 +1,4 @@
machine: machine:
install:
image: ghcr.io/siderolabs/installer:v1.9.5
kubelet: kubelet:
extraArgs: extraArgs:
rotate-server-certificates: true rotate-server-certificates: true