From 273bce4a89d73f830296a0a411cb608255d19c23 Mon Sep 17 00:00:00 2001 From: Bitnami Bot Date: Fri, 5 Apr 2024 03:02:27 +0200 Subject: [PATCH] [bitnami/thanos] Release 15.0.3 (#24921) * [bitnami/thanos] Release 15.0.3 updating components versions Signed-off-by: Bitnami Containers * Update README.md with readme-generator-for-helm Signed-off-by: Bitnami Containers --------- Signed-off-by: Bitnami Containers --- bitnami/thanos/Chart.lock | 6 +- bitnami/thanos/Chart.yaml | 6 +- bitnami/thanos/README.md | 2166 ++++++++++++++++++------------------ bitnami/thanos/values.yaml | 4 +- 4 files changed, 1091 insertions(+), 1091 deletions(-) diff --git a/bitnami/thanos/Chart.lock b/bitnami/thanos/Chart.lock index f018a3ddf48c87..f2c851883cb553 100644 --- a/bitnami/thanos/Chart.lock +++ b/bitnami/thanos/Chart.lock @@ -1,9 +1,9 @@ dependencies: - name: minio repository: oci://registry-1.docker.io/bitnamicharts - version: 14.1.3 + version: 14.1.4 - name: common repository: oci://registry-1.docker.io/bitnamicharts version: 2.19.1 -digest: sha256:d294ec93902cb6c1718c958f0ea24c936f15e753779da929ddff74160175f2a9 -generated: "2024-03-27T14:28:52.631171107+01:00" +digest: sha256:e8422ec121b5756fadb0e952de11350b9c36816cd3969b55304046f9c3bbad7b +generated: "2024-04-05T00:42:14.694254148Z" diff --git a/bitnami/thanos/Chart.yaml b/bitnami/thanos/Chart.yaml index 49ccdcff9c6d62..370cb31d03a8cb 100644 --- a/bitnami/thanos/Chart.yaml +++ b/bitnami/thanos/Chart.yaml @@ -6,9 +6,9 @@ annotations: licenses: Apache-2.0 images: | - name: os-shell - image: docker.io/bitnami/os-shell:12-debian-12-r16 + image: docker.io/bitnami/os-shell:12-debian-12-r18 - name: thanos - image: docker.io/bitnami/thanos:0.34.1-debian-12-r1 + image: docker.io/bitnami/thanos:0.34.1-debian-12-r2 apiVersion: v2 appVersion: 0.34.1 dependencies: @@ -35,4 +35,4 @@ maintainers: name: thanos sources: - https://github.com/bitnami/charts/tree/main/bitnami/thanos -version: 15.0.2 +version: 15.0.3 diff --git a/bitnami/thanos/README.md b/bitnami/thanos/README.md index 7247e55be314e4..b64a00c8e3637e 100644 --- a/bitnami/thanos/README.md +++ b/bitnami/thanos/README.md @@ -360,1109 +360,1109 @@ You can enable this initContainer by setting `volumePermissions.enabled` to `tru ### Thanos Query parameters -| Name | Description | Value | -| --------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------ | -| `query.enabled` | Set to true to enable Thanos Query component | `true` | -| `query.logLevel` | Thanos Query log level | `info` | -| `query.logFormat` | Thanos Query log format | `logfmt` | -| `query.replicaLabel` | Replica indicator(s) along which data is de-duplicated | `["replica"]` | -| `query.dnsDiscovery.enabled` | Enable store APIs discovery via DNS | `true` | -| `query.dnsDiscovery.sidecarsService` | Sidecars service name to discover them using DNS discovery | `""` | -| `query.dnsDiscovery.sidecarsNamespace` | Sidecars namespace to discover them using DNS discovery | `""` | -| `query.stores` | Statically configure store APIs to connect with Thanos Query | `[]` | -| `query.sdConfig` | Query Service Discovery Configuration | `""` | -| `query.existingSDConfigmap` | Name of existing ConfigMap with Ruler configuration | `""` | -| `query.extraEnvVars` | Extra environment variables for Thanos Query container | `[]` | -| `query.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Thanos Query nodes | `""` | -| `query.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Thanos Query nodes | `""` | -| `query.extraFlags` | Extra Flags to passed to Thanos Query | `[]` | -| `query.command` | Override default container command (useful when using custom images) | `[]` | -| `query.args` | Override default container args (useful when using custom images) | `[]` | -| `query.replicaCount` | Number of Thanos Query replicas to deploy | `1` | -| `query.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` | -| `query.updateStrategy.type` | Update strategy type for Thanos Query replicas | `RollingUpdate` | -| `query.containerPorts.http` | HTTP container port | `10902` | -| `query.containerPorts.grpc` | HTTP container port | `10901` | -| `query.podSecurityContext.enabled` | Enable security context for the Thanos Query pods | `true` | -| `query.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | -| `query.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | -| `query.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | -| `query.podSecurityContext.fsGroup` | Group ID for the filesystem used by Thanos Query pods | `1001` | -| `query.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | -| `query.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | -| `query.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | -| `query.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | -| `query.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | -| `query.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | -| `query.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | -| `query.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | -| `query.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | -| `query.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | -| `query.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if query.resources is set (query.resources is recommended for production). | `nano` | -| `query.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | -| `query.livenessProbe.enabled` | Enable livenessProbe on Thanos Query containers | `true` | -| `query.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `30` | -| `query.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | -| `query.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` | -| `query.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | -| `query.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `query.readinessProbe.enabled` | Enable readinessProbe on Thanos Query containers | `true` | -| `query.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | -| `query.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | -| `query.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` | -| `query.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | -| `query.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `query.startupProbe.enabled` | Enable startupProbe on Thanos Query containers | `false` | -| `query.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | -| `query.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | -| `query.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | -| `query.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | -| `query.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `query.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | -| `query.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | -| `query.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | -| `query.initContainers` | Add additional init containers to the Thanos Query pods | `[]` | -| `query.sidecars` | Extra containers running as sidecars to Thanos Query pods | `[]` | -| `query.extraVolumes` | Extra volumes to add to Thanos Query | `[]` | -| `query.extraVolumeMounts` | Extra volume mounts to add to the query container | `[]` | -| `query.podAffinityPreset` | Thanos Query pod affinity preset | `""` | -| `query.podAntiAffinityPreset` | Thanos Query pod anti-affinity preset. Ignored if `query.affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `query.podAntiAffinityPresetTopologyKey` | Thanos Query pod anti-affinity topologyKey. Ignored if `query.affinity` is set. | `""` | -| `query.nodeAffinityPreset.type` | Thanos Query node affinity preset type. Ignored if `query.affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `query.nodeAffinityPreset.key` | Thanos Query node label key to match Ignored if `query.affinity` is set. | `""` | -| `query.nodeAffinityPreset.values` | Thanos Query node label values to match. Ignored if `query.affinity` is set. | `[]` | -| `query.affinity` | Thanos Query affinity for pod assignment | `{}` | -| `query.nodeSelector` | Thanos Query node labels for pod assignment | `{}` | -| `query.tolerations` | Thanos Query tolerations for pod assignment | `[]` | -| `query.podLabels` | Thanos Query pod labels | `{}` | -| `query.podAnnotations` | Annotations for Thanos Query pods | `{}` | -| `query.dnsConfig` | Deployment pod DNS config | `{}` | -| `query.dnsPolicy` | Deployment pod DNS policy | `""` | -| `query.hostAliases` | Deployment pod host aliases | `[]` | -| `query.lifecycleHooks` | for the Thanos Query container(s) to automate configuration before or after startup | `{}` | -| `query.priorityClassName` | Thanos Query priorityClassName | `""` | -| `query.schedulerName` | Name of the k8s scheduler (other than default) for Thanos Query pods | `""` | -| `query.topologySpreadConstraints` | Topology Spread Constraints for Thanos Query pods assignment spread across your cluster among failure-domains | `[]` | -| `query.grpc.server.tls.enabled` | Enable TLS encryption in the GRPC server | `false` | -| `query.grpc.server.tls.autoGenerated` | Create self-signed TLS certificates. Currently only supports PEM certificates | `false` | -| `query.grpc.server.tls.cert` | TLS Certificate for GRPC server - ignored if existingSecret is provided | `""` | -| `query.grpc.server.tls.key` | TLS Key for GRPC server - ignored if existingSecret is provided | `""` | -| `query.grpc.server.tls.ca` | TLS CA to verify clients against - ignored if existingSecret is provided | `""` | -| `query.grpc.server.tls.existingSecret` | Existing secret containing your own TLS certificates | `{}` | -| `query.grpc.client.serverName` | Server name to verify the hostname on the returned GRPC certificates | `""` | -| `query.grpc.client.tls.enabled` | Enable TLS encryption in the GRPC server | `false` | -| `query.grpc.client.tls.autoGenerated` | Create self-signed TLS certificates. Currently only supports PEM certificates | `false` | -| `query.grpc.client.tls.cert` | TLS Certificate for GRPC server - ignored if existingSecret is provided | `""` | -| `query.grpc.client.tls.key` | TLS Key for GRPC server - ignored if existingSecret is provided | `""` | -| `query.grpc.client.tls.ca` | TLS CA to verify clients against - ignored if existingSecret is provided | `""` | -| `query.grpc.client.tls.existingSecret` | Existing secret containing your own TLS certificates | `{}` | -| `query.networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | -| `query.networkPolicy.allowExternal` | Don't require client label for connections | `true` | -| `query.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | -| `query.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | -| `query.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | -| `query.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | -| `query.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | -| `query.service.type` | Kubernetes service type | `ClusterIP` | -| `query.service.ports.http` | Thanos Query service HTTP port | `9090` | -| `query.service.nodePorts.http` | Specify the Thanos Query HTTP nodePort value for the LoadBalancer and NodePort service types | `""` | -| `query.service.clusterIP` | Thanos Query service clusterIP IP | `""` | -| `query.service.loadBalancerIP` | Load balancer IP if service type is `LoadBalancer` | `""` | -| `query.service.loadBalancerSourceRanges` | Address that are allowed when service is LoadBalancer | `[]` | -| `query.service.externalTrafficPolicy` | Thanos Query service externalTrafficPolicy | `Cluster` | -| `query.service.labels` | Labels for Thanos Query service | `{}` | -| `query.service.annotations` | Annotations for Thanos Query service | `{}` | -| `query.service.extraPorts` | Extra ports to expose in the Thanos Query service | `[]` | -| `query.service.labelSelectorsOverride` | Selector for Thanos Query service | `{}` | -| `query.service.additionalHeadless` | Additional Headless service | `false` | -| `query.service.headless.annotations` | Annotations for the headless service. | `{}` | -| `query.serviceGrpc.type` | Kubernetes service type | `ClusterIP` | -| `query.serviceGrpc.ports.grpc` | Thanos Query service GRPC port | `10901` | -| `query.serviceGrpc.nodePorts.grpc` | Specify the Thanos Query GRPC nodePort value for the LoadBalancer and NodePort service types | `""` | -| `query.serviceGrpc.clusterIP` | Thanos Query service clusterIP IP | `""` | -| `query.serviceGrpc.loadBalancerIP` | Load balancer IP if service type is `LoadBalancer` | `""` | -| `query.serviceGrpc.loadBalancerSourceRanges` | Address that are allowed when service is LoadBalancer | `[]` | -| `query.serviceGrpc.externalTrafficPolicy` | Thanos Query service externalTrafficPolicy | `Cluster` | -| `query.serviceGrpc.labels` | Labels for Thanos Query service GRPC | `{}` | -| `query.serviceGrpc.annotations` | Annotations for Thanos Query service | `{}` | -| `query.serviceGrpc.extraPorts` | Extra ports to expose in the Thanos Query service | `[]` | -| `query.serviceGrpc.labelSelectorsOverride` | Selector for Thanos Query service | `{}` | -| `query.serviceGrpc.additionalHeadless` | Additional Headless service | `false` | -| `query.serviceGrpc.headless.annotations` | Annotations for the headless service. | `{}` | -| `query.automountServiceAccountToken` | Enable/disable auto mounting of the service account token only for the deployment | `true` | -| `query.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | -| `query.serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | -| `query.serviceAccount.annotations` | Annotations for Thanos Query Service Account | `{}` | -| `query.serviceAccount.automountServiceAccountToken` | Enable/disable auto mounting of the service account token | `false` | -| `query.rbac.create` | Create a ClusterRole and ClusterRoleBinding for the Thanos Query Service Account | `false` | -| `query.rbac.rules` | Custom RBAC rules to set | `[]` | -| `query.pspEnabled` | Whether to create a PodSecurityPolicy for Thanos Query | `false` | -| `query.autoscaling.enabled` | Enable autoscaling for Thanos Query | `false` | -| `query.autoscaling.minReplicas` | Minimum number of Thanos Query replicas | `""` | -| `query.autoscaling.maxReplicas` | Maximum number of Thanos Query replicas | `""` | -| `query.autoscaling.targetCPU` | Target CPU utilization percentage | `""` | -| `query.autoscaling.targetMemory` | Target Memory utilization percentage | `""` | -| `query.pdb.create` | Enable/disable a Pod Disruption Budget creation for Thanos Query | `false` | -| `query.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | -| `query.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` | -| `query.ingress.enabled` | Enable ingress controller resource | `false` | -| `query.ingress.hostname` | Default host for the ingress resource | `thanos.local` | -| `query.ingress.secretName` | Custom secretName for the ingress resource | `""` | -| `query.ingress.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | -| `query.ingress.annotations` | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | -| `query.ingress.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | -| `query.ingress.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | -| `query.ingress.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | -| `query.ingress.extraRules` | Additional rules to be covered with this ingress record | `[]` | -| `query.ingress.tls` | Enable TLS configuration for the hostname defined at `query.ingress.hostname` parameter | `false` | -| `query.ingress.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | -| `query.ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `""` | -| `query.ingress.path` | Ingress path | `/` | -| `query.ingress.pathType` | Ingress path type | `ImplementationSpecific` | -| `query.ingress.grpc.enabled` | Enable ingress controller resource (GRPC) | `false` | -| `query.ingress.grpc.hostname` | Default host for the ingress resource (GRPC) | `thanos-grpc.local` | -| `query.ingress.grpc.secretName` | Custom secretName for the ingress resource (GRPC) | `""` | -| `query.ingress.grpc.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | -| `query.ingress.grpc.annotations` | Additional annotations for the Ingress resource (GRPC). To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | -| `query.ingress.grpc.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | -| `query.ingress.grpc.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | -| `query.ingress.grpc.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | -| `query.ingress.grpc.extraRules` | Additional rules to be covered with this ingress record | `[]` | -| `query.ingress.grpc.tls` | Enable TLS configuration for the hostname defined at `query.ingress.grpc.hostname` parameter | `false` | -| `query.ingress.grpc.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | -| `query.ingress.grpc.apiVersion` | Override API Version (automatically detected if not set) | `""` | -| `query.ingress.grpc.path` | Ingress Path | `/` | -| `query.ingress.grpc.pathType` | Ingress Path type | `ImplementationSpecific` | +| Name | Description | Value | +| --------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------ | +| `query.enabled` | Set to true to enable Thanos Query component | `true` | +| `query.logLevel` | Thanos Query log level | `info` | +| `query.logFormat` | Thanos Query log format | `logfmt` | +| `query.replicaLabel` | Replica indicator(s) along which data is de-duplicated | `["replica"]` | +| `query.dnsDiscovery.enabled` | Enable store APIs discovery via DNS | `true` | +| `query.dnsDiscovery.sidecarsService` | Sidecars service name to discover them using DNS discovery | `""` | +| `query.dnsDiscovery.sidecarsNamespace` | Sidecars namespace to discover them using DNS discovery | `""` | +| `query.stores` | Statically configure store APIs to connect with Thanos Query | `[]` | +| `query.sdConfig` | Query Service Discovery Configuration | `""` | +| `query.existingSDConfigmap` | Name of existing ConfigMap with Ruler configuration | `""` | +| `query.extraEnvVars` | Extra environment variables for Thanos Query container | `[]` | +| `query.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Thanos Query nodes | `""` | +| `query.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Thanos Query nodes | `""` | +| `query.extraFlags` | Extra Flags to passed to Thanos Query | `[]` | +| `query.command` | Override default container command (useful when using custom images) | `[]` | +| `query.args` | Override default container args (useful when using custom images) | `[]` | +| `query.replicaCount` | Number of Thanos Query replicas to deploy | `1` | +| `query.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` | +| `query.updateStrategy.type` | Update strategy type for Thanos Query replicas | `RollingUpdate` | +| `query.containerPorts.http` | HTTP container port | `10902` | +| `query.containerPorts.grpc` | HTTP container port | `10901` | +| `query.podSecurityContext.enabled` | Enable security context for the Thanos Query pods | `true` | +| `query.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | +| `query.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | +| `query.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | +| `query.podSecurityContext.fsGroup` | Group ID for the filesystem used by Thanos Query pods | `1001` | +| `query.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | +| `query.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | +| `query.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `query.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | +| `query.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | +| `query.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | +| `query.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | +| `query.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | +| `query.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | +| `query.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | +| `query.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if query.resources is set (query.resources is recommended for production). | `nano` | +| `query.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | +| `query.livenessProbe.enabled` | Enable livenessProbe on Thanos Query containers | `true` | +| `query.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `30` | +| `query.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | +| `query.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` | +| `query.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | +| `query.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `query.readinessProbe.enabled` | Enable readinessProbe on Thanos Query containers | `true` | +| `query.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | +| `query.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | +| `query.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` | +| `query.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | +| `query.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `query.startupProbe.enabled` | Enable startupProbe on Thanos Query containers | `false` | +| `query.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | +| `query.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | +| `query.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | +| `query.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | +| `query.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `query.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | +| `query.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | +| `query.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | +| `query.initContainers` | Add additional init containers to the Thanos Query pods | `[]` | +| `query.sidecars` | Extra containers running as sidecars to Thanos Query pods | `[]` | +| `query.extraVolumes` | Extra volumes to add to Thanos Query | `[]` | +| `query.extraVolumeMounts` | Extra volume mounts to add to the query container | `[]` | +| `query.podAffinityPreset` | Thanos Query pod affinity preset | `""` | +| `query.podAntiAffinityPreset` | Thanos Query pod anti-affinity preset. Ignored if `query.affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `query.podAntiAffinityPresetTopologyKey` | Thanos Query pod anti-affinity topologyKey. Ignored if `query.affinity` is set. | `""` | +| `query.nodeAffinityPreset.type` | Thanos Query node affinity preset type. Ignored if `query.affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `query.nodeAffinityPreset.key` | Thanos Query node label key to match Ignored if `query.affinity` is set. | `""` | +| `query.nodeAffinityPreset.values` | Thanos Query node label values to match. Ignored if `query.affinity` is set. | `[]` | +| `query.affinity` | Thanos Query affinity for pod assignment | `{}` | +| `query.nodeSelector` | Thanos Query node labels for pod assignment | `{}` | +| `query.tolerations` | Thanos Query tolerations for pod assignment | `[]` | +| `query.podLabels` | Thanos Query pod labels | `{}` | +| `query.podAnnotations` | Annotations for Thanos Query pods | `{}` | +| `query.dnsConfig` | Deployment pod DNS config | `{}` | +| `query.dnsPolicy` | Deployment pod DNS policy | `""` | +| `query.hostAliases` | Deployment pod host aliases | `[]` | +| `query.lifecycleHooks` | for the Thanos Query container(s) to automate configuration before or after startup | `{}` | +| `query.priorityClassName` | Thanos Query priorityClassName | `""` | +| `query.schedulerName` | Name of the k8s scheduler (other than default) for Thanos Query pods | `""` | +| `query.topologySpreadConstraints` | Topology Spread Constraints for Thanos Query pods assignment spread across your cluster among failure-domains | `[]` | +| `query.grpc.server.tls.enabled` | Enable TLS encryption in the GRPC server | `false` | +| `query.grpc.server.tls.autoGenerated` | Create self-signed TLS certificates. Currently only supports PEM certificates | `false` | +| `query.grpc.server.tls.cert` | TLS Certificate for GRPC server - ignored if existingSecret is provided | `""` | +| `query.grpc.server.tls.key` | TLS Key for GRPC server - ignored if existingSecret is provided | `""` | +| `query.grpc.server.tls.ca` | TLS CA to verify clients against - ignored if existingSecret is provided | `""` | +| `query.grpc.server.tls.existingSecret` | Existing secret containing your own TLS certificates | `{}` | +| `query.grpc.client.serverName` | Server name to verify the hostname on the returned GRPC certificates | `""` | +| `query.grpc.client.tls.enabled` | Enable TLS encryption in the GRPC server | `false` | +| `query.grpc.client.tls.autoGenerated` | Create self-signed TLS certificates. Currently only supports PEM certificates | `false` | +| `query.grpc.client.tls.cert` | TLS Certificate for GRPC server - ignored if existingSecret is provided | `""` | +| `query.grpc.client.tls.key` | TLS Key for GRPC server - ignored if existingSecret is provided | `""` | +| `query.grpc.client.tls.ca` | TLS CA to verify clients against - ignored if existingSecret is provided | `""` | +| `query.grpc.client.tls.existingSecret` | Existing secret containing your own TLS certificates | `{}` | +| `query.networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | +| `query.networkPolicy.allowExternal` | Don't require client label for connections | `true` | +| `query.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | +| `query.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | +| `query.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | +| `query.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | +| `query.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | +| `query.service.type` | Kubernetes service type | `ClusterIP` | +| `query.service.ports.http` | Thanos Query service HTTP port | `9090` | +| `query.service.nodePorts.http` | Specify the Thanos Query HTTP nodePort value for the LoadBalancer and NodePort service types | `""` | +| `query.service.clusterIP` | Thanos Query service clusterIP IP | `""` | +| `query.service.loadBalancerIP` | Load balancer IP if service type is `LoadBalancer` | `""` | +| `query.service.loadBalancerSourceRanges` | Address that are allowed when service is LoadBalancer | `[]` | +| `query.service.externalTrafficPolicy` | Thanos Query service externalTrafficPolicy | `Cluster` | +| `query.service.labels` | Labels for Thanos Query service | `{}` | +| `query.service.annotations` | Annotations for Thanos Query service | `{}` | +| `query.service.extraPorts` | Extra ports to expose in the Thanos Query service | `[]` | +| `query.service.labelSelectorsOverride` | Selector for Thanos Query service | `{}` | +| `query.service.additionalHeadless` | Additional Headless service | `false` | +| `query.service.headless.annotations` | Annotations for the headless service. | `{}` | +| `query.serviceGrpc.type` | Kubernetes service type | `ClusterIP` | +| `query.serviceGrpc.ports.grpc` | Thanos Query service GRPC port | `10901` | +| `query.serviceGrpc.nodePorts.grpc` | Specify the Thanos Query GRPC nodePort value for the LoadBalancer and NodePort service types | `""` | +| `query.serviceGrpc.clusterIP` | Thanos Query service clusterIP IP | `""` | +| `query.serviceGrpc.loadBalancerIP` | Load balancer IP if service type is `LoadBalancer` | `""` | +| `query.serviceGrpc.loadBalancerSourceRanges` | Address that are allowed when service is LoadBalancer | `[]` | +| `query.serviceGrpc.externalTrafficPolicy` | Thanos Query service externalTrafficPolicy | `Cluster` | +| `query.serviceGrpc.labels` | Labels for Thanos Query service GRPC | `{}` | +| `query.serviceGrpc.annotations` | Annotations for Thanos Query service | `{}` | +| `query.serviceGrpc.extraPorts` | Extra ports to expose in the Thanos Query service | `[]` | +| `query.serviceGrpc.labelSelectorsOverride` | Selector for Thanos Query service | `{}` | +| `query.serviceGrpc.additionalHeadless` | Additional Headless service | `false` | +| `query.serviceGrpc.headless.annotations` | Annotations for the headless service. | `{}` | +| `query.automountServiceAccountToken` | Enable/disable auto mounting of the service account token only for the deployment | `true` | +| `query.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | +| `query.serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | +| `query.serviceAccount.annotations` | Annotations for Thanos Query Service Account | `{}` | +| `query.serviceAccount.automountServiceAccountToken` | Enable/disable auto mounting of the service account token | `false` | +| `query.rbac.create` | Create a ClusterRole and ClusterRoleBinding for the Thanos Query Service Account | `false` | +| `query.rbac.rules` | Custom RBAC rules to set | `[]` | +| `query.pspEnabled` | Whether to create a PodSecurityPolicy for Thanos Query | `false` | +| `query.autoscaling.enabled` | Enable autoscaling for Thanos Query | `false` | +| `query.autoscaling.minReplicas` | Minimum number of Thanos Query replicas | `""` | +| `query.autoscaling.maxReplicas` | Maximum number of Thanos Query replicas | `""` | +| `query.autoscaling.targetCPU` | Target CPU utilization percentage | `""` | +| `query.autoscaling.targetMemory` | Target Memory utilization percentage | `""` | +| `query.pdb.create` | Enable/disable a Pod Disruption Budget creation for Thanos Query | `false` | +| `query.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | +| `query.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` | +| `query.ingress.enabled` | Enable ingress controller resource | `false` | +| `query.ingress.hostname` | Default host for the ingress resource | `thanos.local` | +| `query.ingress.secretName` | Custom secretName for the ingress resource | `""` | +| `query.ingress.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | +| `query.ingress.annotations` | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | +| `query.ingress.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | +| `query.ingress.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | +| `query.ingress.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | +| `query.ingress.extraRules` | Additional rules to be covered with this ingress record | `[]` | +| `query.ingress.tls` | Enable TLS configuration for the hostname defined at `query.ingress.hostname` parameter | `false` | +| `query.ingress.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | +| `query.ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `""` | +| `query.ingress.path` | Ingress path | `/` | +| `query.ingress.pathType` | Ingress path type | `ImplementationSpecific` | +| `query.ingress.grpc.enabled` | Enable ingress controller resource (GRPC) | `false` | +| `query.ingress.grpc.hostname` | Default host for the ingress resource (GRPC) | `thanos-grpc.local` | +| `query.ingress.grpc.secretName` | Custom secretName for the ingress resource (GRPC) | `""` | +| `query.ingress.grpc.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | +| `query.ingress.grpc.annotations` | Additional annotations for the Ingress resource (GRPC). To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | +| `query.ingress.grpc.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | +| `query.ingress.grpc.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | +| `query.ingress.grpc.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | +| `query.ingress.grpc.extraRules` | Additional rules to be covered with this ingress record | `[]` | +| `query.ingress.grpc.tls` | Enable TLS configuration for the hostname defined at `query.ingress.grpc.hostname` parameter | `false` | +| `query.ingress.grpc.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | +| `query.ingress.grpc.apiVersion` | Override API Version (automatically detected if not set) | `""` | +| `query.ingress.grpc.path` | Ingress Path | `/` | +| `query.ingress.grpc.pathType` | Ingress Path type | `ImplementationSpecific` | ### Thanos Query Frontend parameters -| Name | Description | Value | -| ----------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------ | -| `queryFrontend.enabled` | Enable/disable Thanos Query Frontend component | `true` | -| `queryFrontend.logLevel` | Thanos Query Frontend log level | `info` | -| `queryFrontend.logFormat` | Thanos Query Frontend log format | `logfmt` | -| `queryFrontend.config` | Thanos Query Frontend configuration | `""` | -| `queryFrontend.existingConfigmap` | Name of existing ConfigMap with Thanos Query Frontend configuration | `""` | -| `queryFrontend.extraEnvVars` | Extra environment variables for Thanos Query Frontend container | `[]` | -| `queryFrontend.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Thanos Query Frontend nodes | `""` | -| `queryFrontend.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Thanos Query Frontend nodes | `""` | -| `queryFrontend.extraFlags` | Extra Flags to passed to Thanos Query Frontend | `[]` | -| `queryFrontend.command` | Override default container command (useful when using custom images) | `[]` | -| `queryFrontend.args` | Override default container args (useful when using custom images) | `[]` | -| `queryFrontend.replicaCount` | Number of Thanos Query Frontend replicas to deploy | `1` | -| `queryFrontend.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` | -| `queryFrontend.updateStrategy.type` | Update strategy type for Thanos Query Frontend replicas | `RollingUpdate` | -| `queryFrontend.containerPorts.http` | HTTP container port | `9090` | -| `queryFrontend.podSecurityContext.enabled` | Enable security context for the Thanos Query Frontend pods | `true` | -| `queryFrontend.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | -| `queryFrontend.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | -| `queryFrontend.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | -| `queryFrontend.podSecurityContext.fsGroup` | Group ID for the filesystem used by Thanos Query Frontend pods | `1001` | -| `queryFrontend.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | -| `queryFrontend.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | -| `queryFrontend.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | -| `queryFrontend.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | -| `queryFrontend.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | -| `queryFrontend.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | -| `queryFrontend.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | -| `queryFrontend.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | -| `queryFrontend.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | -| `queryFrontend.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | -| `queryFrontend.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if queryFrontend.resources is set (queryFrontend.resources is recommended for production). | `nano` | -| `queryFrontend.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | -| `queryFrontend.livenessProbe.enabled` | Enable livenessProbe on Thanos Query Frontend containers | `true` | -| `queryFrontend.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `30` | -| `queryFrontend.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | -| `queryFrontend.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` | -| `queryFrontend.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | -| `queryFrontend.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `queryFrontend.readinessProbe.enabled` | Enable readinessProbe on Thanos Query Frontend containers | `true` | -| `queryFrontend.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | -| `queryFrontend.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | -| `queryFrontend.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` | -| `queryFrontend.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | -| `queryFrontend.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `queryFrontend.startupProbe.enabled` | Enable startupProbe on Thanos Query Frontend containers | `false` | -| `queryFrontend.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | -| `queryFrontend.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | -| `queryFrontend.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | -| `queryFrontend.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | -| `queryFrontend.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `queryFrontend.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | -| `queryFrontend.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | -| `queryFrontend.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | -| `queryFrontend.initContainers` | Add additional init containers to the Thanos Query Frontend pods | `[]` | -| `queryFrontend.sidecars` | Extra containers running as sidecars to Thanos Query Frontend pods | `[]` | -| `queryFrontend.extraVolumes` | Extra volumes to add to Thanos Query Frontend | `[]` | -| `queryFrontend.extraVolumeMounts` | Extra volume mounts to add to the query-frontend container | `[]` | -| `queryFrontend.podAffinityPreset` | Thanos Query Frontend pod affinity preset | `""` | -| `queryFrontend.podAntiAffinityPreset` | Thanos Query Frontend pod anti-affinity preset. Ignored if `queryFrontend.affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `queryFrontend.nodeAffinityPreset.type` | Thanos Query Frontend node affinity preset type. Ignored if `queryFrontend.affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `queryFrontend.nodeAffinityPreset.key` | Thanos Query Frontend node label key to match. Ignored if `queryFrontend.affinity` is set. | `""` | -| `queryFrontend.nodeAffinityPreset.values` | Thanos Query Frontend node label values to match. Ignored if `queryFrontend.affinity` is set. | `[]` | -| `queryFrontend.affinity` | Thanos Query Frontend affinity for pod assignment | `{}` | -| `queryFrontend.nodeSelector` | Thanos Query Frontend node labels for pod assignment | `{}` | -| `queryFrontend.tolerations` | Thanos Query Frontend tolerations for pod assignment | `[]` | -| `queryFrontend.podLabels` | Thanos Query Frontend pod labels | `{}` | -| `queryFrontend.podAnnotations` | Annotations for Thanos Query Frontend pods | `{}` | -| `queryFrontend.dnsConfig` | Deployment pod DNS config | `{}` | -| `queryFrontend.dnsPolicy` | Deployment pod DNS policy | `""` | -| `queryFrontend.hostAliases` | Deployment pod host aliases | `[]` | -| `queryFrontend.lifecycleHooks` | for the Thanos Query Frontend container(s) to automate configuration before or after startup | `{}` | -| `queryFrontend.priorityClassName` | Thanos Query Frontend priorityClassName | `""` | -| `queryFrontend.schedulerName` | Name of the k8s scheduler (other than default) for Thanos Query Frontend pods | `""` | -| `queryFrontend.topologySpreadConstraints` | Topology Spread Constraints for Thanos Query Frontend pods assignment spread across your cluster among failure-domains | `[]` | -| `queryFrontend.networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | -| `queryFrontend.networkPolicy.allowExternal` | Don't require client label for connections | `true` | -| `queryFrontend.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | -| `queryFrontend.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | -| `queryFrontend.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | -| `queryFrontend.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | -| `queryFrontend.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | -| `queryFrontend.service.type` | Kubernetes service type | `ClusterIP` | -| `queryFrontend.service.ports.http` | Thanos Query Frontend service HTTP port | `9090` | -| `queryFrontend.service.nodePorts.http` | Specify the Thanos Query Frontend HTTP nodePort value for the LoadBalancer and NodePort service types | `""` | -| `queryFrontend.service.clusterIP` | Thanos Query Frontend service clusterIP IP | `""` | -| `queryFrontend.service.loadBalancerIP` | Load balancer IP if service type is `LoadBalancer` | `""` | -| `queryFrontend.service.loadBalancerSourceRanges` | Address that are allowed when service is LoadBalancer | `[]` | -| `queryFrontend.service.externalTrafficPolicy` | Thanos Query Frontend service externalTrafficPolicy | `Cluster` | -| `queryFrontend.service.annotations` | Annotations for Thanos Query Frontend service | `{}` | -| `queryFrontend.service.labels` | Labels for Thanos Query Frontend service | `{}` | -| `queryFrontend.service.extraPorts` | Extra ports to expose in the Thanos Query Frontend service | `[]` | -| `queryFrontend.service.labelSelectorsOverride` | Selector for Thanos Query service | `{}` | -| `queryFrontend.automountServiceAccountToken` | Enable/disable auto mounting of the service account token only for the deployment | `true` | -| `queryFrontend.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | -| `queryFrontend.serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | -| `queryFrontend.serviceAccount.annotations` | Annotations for Thanos Query Frontend Service Account | `{}` | -| `queryFrontend.serviceAccount.automountServiceAccountToken` | Enable/disable auto mounting of the service account token | `false` | -| `queryFrontend.rbac.create` | Create a ClusterRole and ClusterRoleBinding for the Thanos Query Frontend Service Account | `false` | -| `queryFrontend.rbac.rules` | Custom RBAC rules to set | `[]` | -| `queryFrontend.pspEnabled` | Whether to create a PodSecurityPolicy for Thanos Query Frontend | `false` | -| `queryFrontend.autoscaling.enabled` | Enable autoscaling for Thanos Query Frontend | `false` | -| `queryFrontend.autoscaling.minReplicas` | Minimum number of Thanos Query Frontend replicas | `""` | -| `queryFrontend.autoscaling.maxReplicas` | Maximum number of Thanos Query Frontend replicas | `""` | -| `queryFrontend.autoscaling.targetCPU` | Target CPU utilization percentage | `""` | -| `queryFrontend.autoscaling.targetMemory` | Target Memory utilization percentage | `""` | -| `queryFrontend.pdb.create` | Enable/disable a Pod Disruption Budget creation for Thanos Query Frontend | `false` | -| `queryFrontend.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | -| `queryFrontend.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` | -| `queryFrontend.ingress.enabled` | Enable ingress controller resource | `false` | -| `queryFrontend.ingress.hostname` | Default host for the ingress resource | `thanos.local` | -| `queryFrontend.ingress.overrideAlertQueryURL` | Automatically use query-frontend's ingress hostname as --alert.queryURL for both Query and Ruler. | `true` | -| `queryFrontend.ingress.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | -| `queryFrontend.ingress.annotations` | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | -| `queryFrontend.ingress.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | -| `queryFrontend.ingress.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | -| `queryFrontend.ingress.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | -| `queryFrontend.ingress.extraRules` | Additional rules to be covered with this ingress record | `[]` | -| `queryFrontend.ingress.tls` | Enable TLS configuration for the hostname defined at `queryFrontend.ingress.hostname` parameter | `false` | -| `queryFrontend.ingress.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | -| `queryFrontend.ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `""` | -| `queryFrontend.ingress.path` | Ingress path | `/` | -| `queryFrontend.ingress.pathType` | Ingress path type | `ImplementationSpecific` | +| Name | Description | Value | +| ----------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------ | +| `queryFrontend.enabled` | Enable/disable Thanos Query Frontend component | `true` | +| `queryFrontend.logLevel` | Thanos Query Frontend log level | `info` | +| `queryFrontend.logFormat` | Thanos Query Frontend log format | `logfmt` | +| `queryFrontend.config` | Thanos Query Frontend configuration | `""` | +| `queryFrontend.existingConfigmap` | Name of existing ConfigMap with Thanos Query Frontend configuration | `""` | +| `queryFrontend.extraEnvVars` | Extra environment variables for Thanos Query Frontend container | `[]` | +| `queryFrontend.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Thanos Query Frontend nodes | `""` | +| `queryFrontend.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Thanos Query Frontend nodes | `""` | +| `queryFrontend.extraFlags` | Extra Flags to passed to Thanos Query Frontend | `[]` | +| `queryFrontend.command` | Override default container command (useful when using custom images) | `[]` | +| `queryFrontend.args` | Override default container args (useful when using custom images) | `[]` | +| `queryFrontend.replicaCount` | Number of Thanos Query Frontend replicas to deploy | `1` | +| `queryFrontend.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` | +| `queryFrontend.updateStrategy.type` | Update strategy type for Thanos Query Frontend replicas | `RollingUpdate` | +| `queryFrontend.containerPorts.http` | HTTP container port | `9090` | +| `queryFrontend.podSecurityContext.enabled` | Enable security context for the Thanos Query Frontend pods | `true` | +| `queryFrontend.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | +| `queryFrontend.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | +| `queryFrontend.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | +| `queryFrontend.podSecurityContext.fsGroup` | Group ID for the filesystem used by Thanos Query Frontend pods | `1001` | +| `queryFrontend.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | +| `queryFrontend.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | +| `queryFrontend.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `queryFrontend.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | +| `queryFrontend.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | +| `queryFrontend.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | +| `queryFrontend.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | +| `queryFrontend.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | +| `queryFrontend.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | +| `queryFrontend.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | +| `queryFrontend.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if queryFrontend.resources is set (queryFrontend.resources is recommended for production). | `nano` | +| `queryFrontend.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | +| `queryFrontend.livenessProbe.enabled` | Enable livenessProbe on Thanos Query Frontend containers | `true` | +| `queryFrontend.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `30` | +| `queryFrontend.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | +| `queryFrontend.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` | +| `queryFrontend.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | +| `queryFrontend.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `queryFrontend.readinessProbe.enabled` | Enable readinessProbe on Thanos Query Frontend containers | `true` | +| `queryFrontend.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | +| `queryFrontend.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | +| `queryFrontend.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` | +| `queryFrontend.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | +| `queryFrontend.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `queryFrontend.startupProbe.enabled` | Enable startupProbe on Thanos Query Frontend containers | `false` | +| `queryFrontend.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | +| `queryFrontend.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | +| `queryFrontend.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | +| `queryFrontend.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | +| `queryFrontend.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `queryFrontend.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | +| `queryFrontend.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | +| `queryFrontend.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | +| `queryFrontend.initContainers` | Add additional init containers to the Thanos Query Frontend pods | `[]` | +| `queryFrontend.sidecars` | Extra containers running as sidecars to Thanos Query Frontend pods | `[]` | +| `queryFrontend.extraVolumes` | Extra volumes to add to Thanos Query Frontend | `[]` | +| `queryFrontend.extraVolumeMounts` | Extra volume mounts to add to the query-frontend container | `[]` | +| `queryFrontend.podAffinityPreset` | Thanos Query Frontend pod affinity preset | `""` | +| `queryFrontend.podAntiAffinityPreset` | Thanos Query Frontend pod anti-affinity preset. Ignored if `queryFrontend.affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `queryFrontend.nodeAffinityPreset.type` | Thanos Query Frontend node affinity preset type. Ignored if `queryFrontend.affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `queryFrontend.nodeAffinityPreset.key` | Thanos Query Frontend node label key to match. Ignored if `queryFrontend.affinity` is set. | `""` | +| `queryFrontend.nodeAffinityPreset.values` | Thanos Query Frontend node label values to match. Ignored if `queryFrontend.affinity` is set. | `[]` | +| `queryFrontend.affinity` | Thanos Query Frontend affinity for pod assignment | `{}` | +| `queryFrontend.nodeSelector` | Thanos Query Frontend node labels for pod assignment | `{}` | +| `queryFrontend.tolerations` | Thanos Query Frontend tolerations for pod assignment | `[]` | +| `queryFrontend.podLabels` | Thanos Query Frontend pod labels | `{}` | +| `queryFrontend.podAnnotations` | Annotations for Thanos Query Frontend pods | `{}` | +| `queryFrontend.dnsConfig` | Deployment pod DNS config | `{}` | +| `queryFrontend.dnsPolicy` | Deployment pod DNS policy | `""` | +| `queryFrontend.hostAliases` | Deployment pod host aliases | `[]` | +| `queryFrontend.lifecycleHooks` | for the Thanos Query Frontend container(s) to automate configuration before or after startup | `{}` | +| `queryFrontend.priorityClassName` | Thanos Query Frontend priorityClassName | `""` | +| `queryFrontend.schedulerName` | Name of the k8s scheduler (other than default) for Thanos Query Frontend pods | `""` | +| `queryFrontend.topologySpreadConstraints` | Topology Spread Constraints for Thanos Query Frontend pods assignment spread across your cluster among failure-domains | `[]` | +| `queryFrontend.networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | +| `queryFrontend.networkPolicy.allowExternal` | Don't require client label for connections | `true` | +| `queryFrontend.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | +| `queryFrontend.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | +| `queryFrontend.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | +| `queryFrontend.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | +| `queryFrontend.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | +| `queryFrontend.service.type` | Kubernetes service type | `ClusterIP` | +| `queryFrontend.service.ports.http` | Thanos Query Frontend service HTTP port | `9090` | +| `queryFrontend.service.nodePorts.http` | Specify the Thanos Query Frontend HTTP nodePort value for the LoadBalancer and NodePort service types | `""` | +| `queryFrontend.service.clusterIP` | Thanos Query Frontend service clusterIP IP | `""` | +| `queryFrontend.service.loadBalancerIP` | Load balancer IP if service type is `LoadBalancer` | `""` | +| `queryFrontend.service.loadBalancerSourceRanges` | Address that are allowed when service is LoadBalancer | `[]` | +| `queryFrontend.service.externalTrafficPolicy` | Thanos Query Frontend service externalTrafficPolicy | `Cluster` | +| `queryFrontend.service.annotations` | Annotations for Thanos Query Frontend service | `{}` | +| `queryFrontend.service.labels` | Labels for Thanos Query Frontend service | `{}` | +| `queryFrontend.service.extraPorts` | Extra ports to expose in the Thanos Query Frontend service | `[]` | +| `queryFrontend.service.labelSelectorsOverride` | Selector for Thanos Query service | `{}` | +| `queryFrontend.automountServiceAccountToken` | Enable/disable auto mounting of the service account token only for the deployment | `true` | +| `queryFrontend.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | +| `queryFrontend.serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | +| `queryFrontend.serviceAccount.annotations` | Annotations for Thanos Query Frontend Service Account | `{}` | +| `queryFrontend.serviceAccount.automountServiceAccountToken` | Enable/disable auto mounting of the service account token | `false` | +| `queryFrontend.rbac.create` | Create a ClusterRole and ClusterRoleBinding for the Thanos Query Frontend Service Account | `false` | +| `queryFrontend.rbac.rules` | Custom RBAC rules to set | `[]` | +| `queryFrontend.pspEnabled` | Whether to create a PodSecurityPolicy for Thanos Query Frontend | `false` | +| `queryFrontend.autoscaling.enabled` | Enable autoscaling for Thanos Query Frontend | `false` | +| `queryFrontend.autoscaling.minReplicas` | Minimum number of Thanos Query Frontend replicas | `""` | +| `queryFrontend.autoscaling.maxReplicas` | Maximum number of Thanos Query Frontend replicas | `""` | +| `queryFrontend.autoscaling.targetCPU` | Target CPU utilization percentage | `""` | +| `queryFrontend.autoscaling.targetMemory` | Target Memory utilization percentage | `""` | +| `queryFrontend.pdb.create` | Enable/disable a Pod Disruption Budget creation for Thanos Query Frontend | `false` | +| `queryFrontend.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | +| `queryFrontend.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` | +| `queryFrontend.ingress.enabled` | Enable ingress controller resource | `false` | +| `queryFrontend.ingress.hostname` | Default host for the ingress resource | `thanos.local` | +| `queryFrontend.ingress.overrideAlertQueryURL` | Automatically use query-frontend's ingress hostname as --alert.queryURL for both Query and Ruler. | `true` | +| `queryFrontend.ingress.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | +| `queryFrontend.ingress.annotations` | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | +| `queryFrontend.ingress.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | +| `queryFrontend.ingress.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | +| `queryFrontend.ingress.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | +| `queryFrontend.ingress.extraRules` | Additional rules to be covered with this ingress record | `[]` | +| `queryFrontend.ingress.tls` | Enable TLS configuration for the hostname defined at `queryFrontend.ingress.hostname` parameter | `false` | +| `queryFrontend.ingress.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | +| `queryFrontend.ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `""` | +| `queryFrontend.ingress.path` | Ingress path | `/` | +| `queryFrontend.ingress.pathType` | Ingress path type | `ImplementationSpecific` | ### Thanos Bucket Web parameters -| Name | Description | Value | -| ------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | ------------------------ | -| `bucketweb.enabled` | Enable/disable Thanos Bucket Web component | `false` | -| `bucketweb.logLevel` | Thanos Bucket Web log level | `info` | -| `bucketweb.logFormat` | Thanos Bucket Web log format | `logfmt` | -| `bucketweb.refresh` | Refresh interval to download metadata from remote storage | `30m` | -| `bucketweb.timeout` | Timeout to download metadata from remote storage | `5m` | -| `bucketweb.extraEnvVars` | Extra environment variables for Thanos Bucket Web container | `[]` | -| `bucketweb.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Thanos Bucket Web nodes | `""` | -| `bucketweb.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Thanos Bucket Web nodes | `""` | -| `bucketweb.extraFlags` | Extra Flags to passed to Thanos Bucket Web | `[]` | -| `bucketweb.command` | Override default container command (useful when using custom images) | `[]` | -| `bucketweb.args` | Override default container args (useful when using custom images) | `[]` | -| `bucketweb.replicaCount` | Number of Thanos Bucket Web replicas to deploy | `1` | -| `bucketweb.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` | -| `bucketweb.updateStrategy.type` | Update strategy type for Thanos Bucket Web replicas | `RollingUpdate` | -| `bucketweb.containerPorts.http` | HTTP container port | `8080` | -| `bucketweb.podSecurityContext.enabled` | Enable security context for the Thanos Bucket Web pods | `true` | -| `bucketweb.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | -| `bucketweb.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | -| `bucketweb.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | -| `bucketweb.podSecurityContext.fsGroup` | Group ID for the filesystem used by Thanos Bucket Web pods | `1001` | -| `bucketweb.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | -| `bucketweb.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | -| `bucketweb.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | -| `bucketweb.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | -| `bucketweb.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | -| `bucketweb.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | -| `bucketweb.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | -| `bucketweb.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | -| `bucketweb.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | -| `bucketweb.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | -| `bucketweb.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if bucketweb.resources is set (bucketweb.resources is recommended for production). | `nano` | -| `bucketweb.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | -| `bucketweb.livenessProbe.enabled` | Enable livenessProbe on Thanos Bucket Web containers | `true` | -| `bucketweb.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `30` | -| `bucketweb.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | -| `bucketweb.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` | -| `bucketweb.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | -| `bucketweb.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `bucketweb.readinessProbe.enabled` | Enable readinessProbe on Thanos Bucket Web containers | `true` | -| `bucketweb.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | -| `bucketweb.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | -| `bucketweb.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` | -| `bucketweb.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | -| `bucketweb.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `bucketweb.startupProbe.enabled` | Enable startupProbe on Thanos Bucket Web containers | `false` | -| `bucketweb.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | -| `bucketweb.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | -| `bucketweb.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | -| `bucketweb.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | -| `bucketweb.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `bucketweb.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | -| `bucketweb.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | -| `bucketweb.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | -| `bucketweb.initContainers` | Add additional init containers to the Thanos Bucket Web pods | `[]` | -| `bucketweb.sidecars` | Extra containers running as sidecars to Thanos Bucket Web pods | `[]` | -| `bucketweb.extraVolumes` | Extra volumes to add to Bucket Web | `[]` | -| `bucketweb.extraVolumeMounts` | Extra volume mounts to add to the bucketweb container | `[]` | -| `bucketweb.podAffinityPreset` | Thanos Bucket Web pod affinity preset | `""` | -| `bucketweb.podAntiAffinityPreset` | Thanos Bucket Web pod anti-affinity preset. Ignored if `bucketweb.affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `bucketweb.nodeAffinityPreset.type` | Thanos Bucket Web node affinity preset type. Ignored if `bucketweb.affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `bucketweb.nodeAffinityPreset.key` | Thanos Bucket Web node label key to match. Ignored if `bucketweb.affinity` is set. | `""` | -| `bucketweb.nodeAffinityPreset.values` | Thanos Bucket Web node label values to match. Ignored if `bucketweb.affinity` is set. | `[]` | -| `bucketweb.affinity` | Thanos Bucket Web affinity for pod assignment | `{}` | -| `bucketweb.nodeSelector` | Thanos Bucket Web node labels for pod assignment | `{}` | -| `bucketweb.tolerations` | Thanos Bucket Web tolerations for pod assignment | `[]` | -| `bucketweb.podLabels` | Thanos Bucket Web pod labels | `{}` | -| `bucketweb.podAnnotations` | Annotations for Thanos Bucket Web pods | `{}` | -| `bucketweb.dnsConfig` | Deployment pod DNS config | `{}` | -| `bucketweb.dnsPolicy` | Deployment pod DNS policy | `""` | -| `bucketweb.hostAliases` | Deployment pod host aliases | `[]` | -| `bucketweb.lifecycleHooks` | for the Thanos Bucket Web container(s) to automate configuration before or after startup | `{}` | -| `bucketweb.priorityClassName` | Thanos Bucket Web priorityClassName | `""` | -| `bucketweb.schedulerName` | Name of the k8s scheduler (other than default) for Thanos Bucket Web pods | `""` | -| `bucketweb.topologySpreadConstraints` | Topology Spread Constraints for Thanos Bucket Web pods assignment spread across your cluster among failure-domains | `[]` | -| `bucketweb.networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | -| `bucketweb.networkPolicy.allowExternal` | Don't require client label for connections | `true` | -| `bucketweb.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | -| `bucketweb.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | -| `bucketweb.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | -| `bucketweb.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | -| `bucketweb.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | -| `bucketweb.service.type` | Kubernetes service type | `ClusterIP` | -| `bucketweb.service.ports.http` | Thanos Bucket Web service HTTP port | `8080` | -| `bucketweb.service.nodePorts.http` | Specify the Thanos Bucket Web HTTP nodePort value for the LoadBalancer and NodePort service types | `""` | -| `bucketweb.service.clusterIP` | Thanos Bucket Web service clusterIP IP | `""` | -| `bucketweb.service.loadBalancerIP` | Load balancer IP if service type is `LoadBalancer` | `""` | -| `bucketweb.service.loadBalancerSourceRanges` | Address that are allowed when service is LoadBalancer | `[]` | -| `bucketweb.service.externalTrafficPolicy` | Thanos Bucket Web service externalTrafficPolicy | `Cluster` | -| `bucketweb.service.labels` | Extra labels for Thanos Bucket Web service | `{}` | -| `bucketweb.service.annotations` | Annotations for Thanos Bucket Web service | `{}` | -| `bucketweb.service.extraPorts` | Extra ports to expose in the Thanos Bucket Web service | `[]` | -| `bucketweb.service.labelSelectorsOverride` | Selector for Thanos Query service | `{}` | -| `bucketweb.automountServiceAccountToken` | Enable/disable auto mounting of the service account token only for the deployment | `true` | -| `bucketweb.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | -| `bucketweb.serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | -| `bucketweb.serviceAccount.annotations` | Annotations for Thanos Bucket Web Service Account | `{}` | -| `bucketweb.serviceAccount.automountServiceAccountToken` | Enable/disable auto mounting of the service account token | `false` | -| `bucketweb.autoscaling.enabled` | Enable autoscaling for Thanos Bucket Web | `false` | -| `bucketweb.autoscaling.minReplicas` | Minimum number of Thanos Bucket Web replicas | `""` | -| `bucketweb.autoscaling.maxReplicas` | Maximum number of Thanos Bucket Web replicas | `""` | -| `bucketweb.autoscaling.targetCPU` | Target CPU utilization percentage | `""` | -| `bucketweb.autoscaling.targetMemory` | Target Memory utilization percentage | `""` | -| `bucketweb.pdb.create` | Enable/disable a Pod Disruption Budget creation for Thanos Bucket Web | `false` | -| `bucketweb.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | -| `bucketweb.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` | -| `bucketweb.ingress.enabled` | Enable ingress controller resource | `false` | -| `bucketweb.ingress.hostname` | Default host for the ingress resource | `thanos-bucketweb.local` | -| `bucketweb.ingress.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | -| `bucketweb.ingress.annotations` | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | -| `bucketweb.ingress.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | -| `bucketweb.ingress.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | -| `bucketweb.ingress.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | -| `bucketweb.ingress.extraRules` | Additional rules to be covered with this ingress record | `[]` | -| `bucketweb.ingress.tls` | Enable TLS configuration for the hostname defined at `bucketweb.ingress.hostname` parameter | `false` | -| `bucketweb.ingress.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | -| `bucketweb.ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `""` | -| `bucketweb.ingress.path` | Ingress path | `/` | -| `bucketweb.ingress.pathType` | Ingress path type | `ImplementationSpecific` | +| Name | Description | Value | +| ------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------ | +| `bucketweb.enabled` | Enable/disable Thanos Bucket Web component | `false` | +| `bucketweb.logLevel` | Thanos Bucket Web log level | `info` | +| `bucketweb.logFormat` | Thanos Bucket Web log format | `logfmt` | +| `bucketweb.refresh` | Refresh interval to download metadata from remote storage | `30m` | +| `bucketweb.timeout` | Timeout to download metadata from remote storage | `5m` | +| `bucketweb.extraEnvVars` | Extra environment variables for Thanos Bucket Web container | `[]` | +| `bucketweb.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Thanos Bucket Web nodes | `""` | +| `bucketweb.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Thanos Bucket Web nodes | `""` | +| `bucketweb.extraFlags` | Extra Flags to passed to Thanos Bucket Web | `[]` | +| `bucketweb.command` | Override default container command (useful when using custom images) | `[]` | +| `bucketweb.args` | Override default container args (useful when using custom images) | `[]` | +| `bucketweb.replicaCount` | Number of Thanos Bucket Web replicas to deploy | `1` | +| `bucketweb.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` | +| `bucketweb.updateStrategy.type` | Update strategy type for Thanos Bucket Web replicas | `RollingUpdate` | +| `bucketweb.containerPorts.http` | HTTP container port | `8080` | +| `bucketweb.podSecurityContext.enabled` | Enable security context for the Thanos Bucket Web pods | `true` | +| `bucketweb.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | +| `bucketweb.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | +| `bucketweb.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | +| `bucketweb.podSecurityContext.fsGroup` | Group ID for the filesystem used by Thanos Bucket Web pods | `1001` | +| `bucketweb.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | +| `bucketweb.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | +| `bucketweb.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `bucketweb.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | +| `bucketweb.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | +| `bucketweb.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | +| `bucketweb.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | +| `bucketweb.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | +| `bucketweb.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | +| `bucketweb.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | +| `bucketweb.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if bucketweb.resources is set (bucketweb.resources is recommended for production). | `nano` | +| `bucketweb.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | +| `bucketweb.livenessProbe.enabled` | Enable livenessProbe on Thanos Bucket Web containers | `true` | +| `bucketweb.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `30` | +| `bucketweb.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | +| `bucketweb.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` | +| `bucketweb.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | +| `bucketweb.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `bucketweb.readinessProbe.enabled` | Enable readinessProbe on Thanos Bucket Web containers | `true` | +| `bucketweb.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | +| `bucketweb.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | +| `bucketweb.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` | +| `bucketweb.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | +| `bucketweb.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `bucketweb.startupProbe.enabled` | Enable startupProbe on Thanos Bucket Web containers | `false` | +| `bucketweb.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | +| `bucketweb.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | +| `bucketweb.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | +| `bucketweb.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | +| `bucketweb.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `bucketweb.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | +| `bucketweb.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | +| `bucketweb.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | +| `bucketweb.initContainers` | Add additional init containers to the Thanos Bucket Web pods | `[]` | +| `bucketweb.sidecars` | Extra containers running as sidecars to Thanos Bucket Web pods | `[]` | +| `bucketweb.extraVolumes` | Extra volumes to add to Bucket Web | `[]` | +| `bucketweb.extraVolumeMounts` | Extra volume mounts to add to the bucketweb container | `[]` | +| `bucketweb.podAffinityPreset` | Thanos Bucket Web pod affinity preset | `""` | +| `bucketweb.podAntiAffinityPreset` | Thanos Bucket Web pod anti-affinity preset. Ignored if `bucketweb.affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `bucketweb.nodeAffinityPreset.type` | Thanos Bucket Web node affinity preset type. Ignored if `bucketweb.affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `bucketweb.nodeAffinityPreset.key` | Thanos Bucket Web node label key to match. Ignored if `bucketweb.affinity` is set. | `""` | +| `bucketweb.nodeAffinityPreset.values` | Thanos Bucket Web node label values to match. Ignored if `bucketweb.affinity` is set. | `[]` | +| `bucketweb.affinity` | Thanos Bucket Web affinity for pod assignment | `{}` | +| `bucketweb.nodeSelector` | Thanos Bucket Web node labels for pod assignment | `{}` | +| `bucketweb.tolerations` | Thanos Bucket Web tolerations for pod assignment | `[]` | +| `bucketweb.podLabels` | Thanos Bucket Web pod labels | `{}` | +| `bucketweb.podAnnotations` | Annotations for Thanos Bucket Web pods | `{}` | +| `bucketweb.dnsConfig` | Deployment pod DNS config | `{}` | +| `bucketweb.dnsPolicy` | Deployment pod DNS policy | `""` | +| `bucketweb.hostAliases` | Deployment pod host aliases | `[]` | +| `bucketweb.lifecycleHooks` | for the Thanos Bucket Web container(s) to automate configuration before or after startup | `{}` | +| `bucketweb.priorityClassName` | Thanos Bucket Web priorityClassName | `""` | +| `bucketweb.schedulerName` | Name of the k8s scheduler (other than default) for Thanos Bucket Web pods | `""` | +| `bucketweb.topologySpreadConstraints` | Topology Spread Constraints for Thanos Bucket Web pods assignment spread across your cluster among failure-domains | `[]` | +| `bucketweb.networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | +| `bucketweb.networkPolicy.allowExternal` | Don't require client label for connections | `true` | +| `bucketweb.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | +| `bucketweb.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | +| `bucketweb.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | +| `bucketweb.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | +| `bucketweb.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | +| `bucketweb.service.type` | Kubernetes service type | `ClusterIP` | +| `bucketweb.service.ports.http` | Thanos Bucket Web service HTTP port | `8080` | +| `bucketweb.service.nodePorts.http` | Specify the Thanos Bucket Web HTTP nodePort value for the LoadBalancer and NodePort service types | `""` | +| `bucketweb.service.clusterIP` | Thanos Bucket Web service clusterIP IP | `""` | +| `bucketweb.service.loadBalancerIP` | Load balancer IP if service type is `LoadBalancer` | `""` | +| `bucketweb.service.loadBalancerSourceRanges` | Address that are allowed when service is LoadBalancer | `[]` | +| `bucketweb.service.externalTrafficPolicy` | Thanos Bucket Web service externalTrafficPolicy | `Cluster` | +| `bucketweb.service.labels` | Extra labels for Thanos Bucket Web service | `{}` | +| `bucketweb.service.annotations` | Annotations for Thanos Bucket Web service | `{}` | +| `bucketweb.service.extraPorts` | Extra ports to expose in the Thanos Bucket Web service | `[]` | +| `bucketweb.service.labelSelectorsOverride` | Selector for Thanos Query service | `{}` | +| `bucketweb.automountServiceAccountToken` | Enable/disable auto mounting of the service account token only for the deployment | `true` | +| `bucketweb.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | +| `bucketweb.serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | +| `bucketweb.serviceAccount.annotations` | Annotations for Thanos Bucket Web Service Account | `{}` | +| `bucketweb.serviceAccount.automountServiceAccountToken` | Enable/disable auto mounting of the service account token | `false` | +| `bucketweb.autoscaling.enabled` | Enable autoscaling for Thanos Bucket Web | `false` | +| `bucketweb.autoscaling.minReplicas` | Minimum number of Thanos Bucket Web replicas | `""` | +| `bucketweb.autoscaling.maxReplicas` | Maximum number of Thanos Bucket Web replicas | `""` | +| `bucketweb.autoscaling.targetCPU` | Target CPU utilization percentage | `""` | +| `bucketweb.autoscaling.targetMemory` | Target Memory utilization percentage | `""` | +| `bucketweb.pdb.create` | Enable/disable a Pod Disruption Budget creation for Thanos Bucket Web | `false` | +| `bucketweb.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | +| `bucketweb.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` | +| `bucketweb.ingress.enabled` | Enable ingress controller resource | `false` | +| `bucketweb.ingress.hostname` | Default host for the ingress resource | `thanos-bucketweb.local` | +| `bucketweb.ingress.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | +| `bucketweb.ingress.annotations` | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | +| `bucketweb.ingress.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | +| `bucketweb.ingress.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | +| `bucketweb.ingress.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | +| `bucketweb.ingress.extraRules` | Additional rules to be covered with this ingress record | `[]` | +| `bucketweb.ingress.tls` | Enable TLS configuration for the hostname defined at `bucketweb.ingress.hostname` parameter | `false` | +| `bucketweb.ingress.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | +| `bucketweb.ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `""` | +| `bucketweb.ingress.path` | Ingress path | `/` | +| `bucketweb.ingress.pathType` | Ingress path type | `ImplementationSpecific` | ### Thanos Compactor parameters -| Name | Description | Value | -| ------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | ------------------------ | -| `compactor.enabled` | Enable/disable Thanos Compactor component | `false` | -| `compactor.logLevel` | Thanos Compactor log level | `info` | -| `compactor.logFormat` | Thanos Compactor log format | `logfmt` | -| `compactor.retentionResolutionRaw` | Resolution and Retention flag | `30d` | -| `compactor.retentionResolution5m` | Resolution and Retention flag | `30d` | -| `compactor.retentionResolution1h` | Resolution and Retention flag | `10y` | -| `compactor.consistencyDelay` | Minimum age of fresh (non-compacted) blocks before they are being processed | `30m` | -| `compactor.extraEnvVars` | Extra environment variables for Thanos Compactor container | `[]` | -| `compactor.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Thanos Compactor nodes | `""` | -| `compactor.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Thanos Compactor nodes | `""` | -| `compactor.extraFlags` | Extra Flags to passed to Thanos Compactor | `[]` | -| `compactor.command` | Override default container command (useful when using custom images) | `[]` | -| `compactor.args` | Override default container args (useful when using custom images) | `[]` | -| `compactor.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` | -| `compactor.cronJob.enabled` | Run compactor as a CronJob rather than a Deployment | `false` | -| `compactor.cronJob.schedule` | The schedule in Cron format, see | `0 */6 * * *` | -| `compactor.cronJob.timeZone` | The time zone name for the given schedule, see | `""` | -| `compactor.cronJob.concurrencyPolicy` | Specifies how to treat concurrent executions of a Job | `Forbid` | -| `compactor.cronJob.startingDeadlineSeconds` | Optional deadline in seconds for starting the job if it misses scheduled time for any reason | `""` | -| `compactor.cronJob.suspend` | This flag tells the controller to suspend subsequent executions | `""` | -| `compactor.cronJob.successfulJobsHistoryLimit` | The number of successful finished jobs to retain | `""` | -| `compactor.cronJob.failedJobsHistoryLimit` | The number of failed finished jobs to retain | `""` | -| `compactor.cronJob.backoffLimit` | The number of retries before marking this job failed | `""` | -| `compactor.cronJob.ttlSecondsAfterFinished` | The maximum retention before removing the job | `""` | -| `compactor.restartPolicy` | Compactor container restart policy. | `""` | -| `compactor.updateStrategy.type` | Update strategy type for Thanos Compactor replicas | `Recreate` | -| `compactor.containerPorts.http` | HTTP container port | `10902` | -| `compactor.podSecurityContext.enabled` | Enable security context for the Thanos Compactor pods | `true` | -| `compactor.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | -| `compactor.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | -| `compactor.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | -| `compactor.podSecurityContext.fsGroup` | Group ID for the filesystem used by Thanos Compactor pods | `1001` | -| `compactor.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | -| `compactor.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | -| `compactor.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | -| `compactor.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | -| `compactor.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | -| `compactor.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | -| `compactor.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | -| `compactor.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | -| `compactor.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | -| `compactor.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | -| `compactor.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if compactor.resources is set (compactor.resources is recommended for production). | `nano` | -| `compactor.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | -| `compactor.livenessProbe.enabled` | Enable livenessProbe on Thanos Compactor containers | `true` | -| `compactor.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `30` | -| `compactor.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | -| `compactor.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` | -| `compactor.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | -| `compactor.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `compactor.readinessProbe.enabled` | Enable readinessProbe on Thanos Compactor containers | `true` | -| `compactor.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | -| `compactor.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | -| `compactor.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` | -| `compactor.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | -| `compactor.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `compactor.startupProbe.enabled` | Enable startupProbe on Thanos Compactor containers | `false` | -| `compactor.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | -| `compactor.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | -| `compactor.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | -| `compactor.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | -| `compactor.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `compactor.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | -| `compactor.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | -| `compactor.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | -| `compactor.initContainers` | Add additional init containers to the Thanos Compactor pods | `[]` | -| `compactor.sidecars` | Extra containers running as sidecars to Thanos Compactor pods | `[]` | -| `compactor.extraVolumes` | Extra volumes to add to Thanos Compactor | `[]` | -| `compactor.extraVolumeMounts` | Extra volume mounts to add to the compactor container | `[]` | -| `compactor.podAffinityPreset` | Thanos Compactor pod affinity preset | `""` | -| `compactor.podAntiAffinityPreset` | Thanos Compactor pod anti-affinity preset. Ignored if `compactor.affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `compactor.nodeAffinityPreset.type` | Thanos Compactor node affinity preset type. Ignored if `compactor.affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `compactor.nodeAffinityPreset.key` | Thanos Compactor node label key to match. Ignored if `compactor.affinity` is set. | `""` | -| `compactor.nodeAffinityPreset.values` | Thanos Compactor node label values to match. Ignored if `compactor.affinity` is set. | `[]` | -| `compactor.affinity` | Thanos Compactor affinity for pod assignment | `{}` | -| `compactor.nodeSelector` | Thanos Compactor node labels for pod assignment | `{}` | -| `compactor.tolerations` | Thanos Compactor tolerations for pod assignment | `[]` | -| `compactor.podLabels` | Thanos Compactor pod labels | `{}` | -| `compactor.podAnnotations` | Annotations for Thanos Compactor pods | `{}` | -| `compactor.dnsConfig` | Deployment pod DNS config | `{}` | -| `compactor.dnsPolicy` | Deployment pod DNS policy | `""` | -| `compactor.hostAliases` | Deployment pod host aliases | `[]` | -| `compactor.lifecycleHooks` | for the Thanos Compactor container(s) to automate configuration before or after startup | `{}` | -| `compactor.priorityClassName` | Thanos Compactor priorityClassName | `""` | -| `compactor.schedulerName` | Name of the k8s scheduler (other than default) for Thanos Compactor pods | `""` | -| `compactor.topologySpreadConstraints` | Topology Spread Constraints for Thanos Compactor pods assignment spread across your cluster among failure-domains | `[]` | -| `compactor.networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | -| `compactor.networkPolicy.allowExternal` | Don't require client label for connections | `true` | -| `compactor.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | -| `compactor.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | -| `compactor.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | -| `compactor.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | -| `compactor.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | -| `compactor.service.type` | Kubernetes service type | `ClusterIP` | -| `compactor.service.ports.http` | Thanos Compactor service HTTP port | `9090` | -| `compactor.service.nodePorts.http` | Specify the Thanos Compactor HTTP nodePort value for the LoadBalancer and NodePort service types | `""` | -| `compactor.service.clusterIP` | Thanos Compactor service clusterIP IP | `""` | -| `compactor.service.loadBalancerIP` | Load balancer IP if service type is `LoadBalancer` | `""` | -| `compactor.service.loadBalancerSourceRanges` | Addresses that are allowed when service is LoadBalancer | `[]` | -| `compactor.service.externalTrafficPolicy` | Thanos Compactor service externalTrafficPolicy | `Cluster` | -| `compactor.service.labels` | Labels for Thanos Compactor service | `{}` | -| `compactor.service.annotations` | Annotations for Thanos Compactor service | `{}` | -| `compactor.service.extraPorts` | Extra ports to expose in the Thanos Compactor service | `[]` | -| `compactor.service.labelSelectorsOverride` | Selector for Thanos Query service | `{}` | -| `compactor.automountServiceAccountToken` | Enable/disable auto mounting of the service account token only for the deployment | `true` | -| `compactor.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | -| `compactor.serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | -| `compactor.serviceAccount.annotations` | Annotations for Thanos Compactor Service Account | `{}` | -| `compactor.serviceAccount.automountServiceAccountToken` | Enable/disable auto mounting of the service account token | `false` | -| `compactor.ingress.enabled` | Enable ingress controller resource | `false` | -| `compactor.ingress.hostname` | Default host for the ingress resource | `thanos-compactor.local` | -| `compactor.ingress.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | -| `compactor.ingress.annotations` | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | -| `compactor.ingress.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | -| `compactor.ingress.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | -| `compactor.ingress.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | -| `compactor.ingress.extraRules` | Additional rules to be covered with this ingress record | `[]` | -| `compactor.ingress.tls` | Enable TLS configuration for the hostname defined at `compactor.ingress.hostname` parameter | `false` | -| `compactor.ingress.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | -| `compactor.ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `""` | -| `compactor.ingress.path` | Ingress path | `/` | -| `compactor.ingress.pathType` | Ingress path type | `ImplementationSpecific` | -| `compactor.persistence.enabled` | Enable data persistence using PVC(s) on Thanos Compactor pods | `true` | -| `compactor.persistence.ephemeral` | Use ephemeral volume for data persistence using PVC(s) on Thanos Compactor pods | `false` | -| `compactor.persistence.defaultEmptyDir` | Defaults to emptyDir if persistence is disabled. | `true` | -| `compactor.persistence.storageClass` | Specify the `storageClass` used to provision the volume | `""` | -| `compactor.persistence.accessModes` | PVC Access Modes for data volume | `["ReadWriteOnce"]` | -| `compactor.persistence.size` | PVC Storage Request for data volume | `8Gi` | -| `compactor.persistence.labels` | Labels for the PVC | `{}` | -| `compactor.persistence.annotations` | Annotations for the PVC | `{}` | -| `compactor.persistence.existingClaim` | Name of an existing PVC to use | `""` | +| Name | Description | Value | +| ------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------ | +| `compactor.enabled` | Enable/disable Thanos Compactor component | `false` | +| `compactor.logLevel` | Thanos Compactor log level | `info` | +| `compactor.logFormat` | Thanos Compactor log format | `logfmt` | +| `compactor.retentionResolutionRaw` | Resolution and Retention flag | `30d` | +| `compactor.retentionResolution5m` | Resolution and Retention flag | `30d` | +| `compactor.retentionResolution1h` | Resolution and Retention flag | `10y` | +| `compactor.consistencyDelay` | Minimum age of fresh (non-compacted) blocks before they are being processed | `30m` | +| `compactor.extraEnvVars` | Extra environment variables for Thanos Compactor container | `[]` | +| `compactor.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Thanos Compactor nodes | `""` | +| `compactor.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Thanos Compactor nodes | `""` | +| `compactor.extraFlags` | Extra Flags to passed to Thanos Compactor | `[]` | +| `compactor.command` | Override default container command (useful when using custom images) | `[]` | +| `compactor.args` | Override default container args (useful when using custom images) | `[]` | +| `compactor.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` | +| `compactor.cronJob.enabled` | Run compactor as a CronJob rather than a Deployment | `false` | +| `compactor.cronJob.schedule` | The schedule in Cron format, see | `0 */6 * * *` | +| `compactor.cronJob.timeZone` | The time zone name for the given schedule, see | `""` | +| `compactor.cronJob.concurrencyPolicy` | Specifies how to treat concurrent executions of a Job | `Forbid` | +| `compactor.cronJob.startingDeadlineSeconds` | Optional deadline in seconds for starting the job if it misses scheduled time for any reason | `""` | +| `compactor.cronJob.suspend` | This flag tells the controller to suspend subsequent executions | `""` | +| `compactor.cronJob.successfulJobsHistoryLimit` | The number of successful finished jobs to retain | `""` | +| `compactor.cronJob.failedJobsHistoryLimit` | The number of failed finished jobs to retain | `""` | +| `compactor.cronJob.backoffLimit` | The number of retries before marking this job failed | `""` | +| `compactor.cronJob.ttlSecondsAfterFinished` | The maximum retention before removing the job | `""` | +| `compactor.restartPolicy` | Compactor container restart policy. | `""` | +| `compactor.updateStrategy.type` | Update strategy type for Thanos Compactor replicas | `Recreate` | +| `compactor.containerPorts.http` | HTTP container port | `10902` | +| `compactor.podSecurityContext.enabled` | Enable security context for the Thanos Compactor pods | `true` | +| `compactor.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | +| `compactor.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | +| `compactor.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | +| `compactor.podSecurityContext.fsGroup` | Group ID for the filesystem used by Thanos Compactor pods | `1001` | +| `compactor.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | +| `compactor.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | +| `compactor.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `compactor.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | +| `compactor.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | +| `compactor.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | +| `compactor.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | +| `compactor.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | +| `compactor.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | +| `compactor.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | +| `compactor.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if compactor.resources is set (compactor.resources is recommended for production). | `nano` | +| `compactor.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | +| `compactor.livenessProbe.enabled` | Enable livenessProbe on Thanos Compactor containers | `true` | +| `compactor.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `30` | +| `compactor.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | +| `compactor.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` | +| `compactor.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | +| `compactor.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `compactor.readinessProbe.enabled` | Enable readinessProbe on Thanos Compactor containers | `true` | +| `compactor.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | +| `compactor.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | +| `compactor.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` | +| `compactor.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | +| `compactor.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `compactor.startupProbe.enabled` | Enable startupProbe on Thanos Compactor containers | `false` | +| `compactor.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | +| `compactor.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | +| `compactor.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | +| `compactor.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | +| `compactor.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `compactor.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | +| `compactor.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | +| `compactor.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | +| `compactor.initContainers` | Add additional init containers to the Thanos Compactor pods | `[]` | +| `compactor.sidecars` | Extra containers running as sidecars to Thanos Compactor pods | `[]` | +| `compactor.extraVolumes` | Extra volumes to add to Thanos Compactor | `[]` | +| `compactor.extraVolumeMounts` | Extra volume mounts to add to the compactor container | `[]` | +| `compactor.podAffinityPreset` | Thanos Compactor pod affinity preset | `""` | +| `compactor.podAntiAffinityPreset` | Thanos Compactor pod anti-affinity preset. Ignored if `compactor.affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `compactor.nodeAffinityPreset.type` | Thanos Compactor node affinity preset type. Ignored if `compactor.affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `compactor.nodeAffinityPreset.key` | Thanos Compactor node label key to match. Ignored if `compactor.affinity` is set. | `""` | +| `compactor.nodeAffinityPreset.values` | Thanos Compactor node label values to match. Ignored if `compactor.affinity` is set. | `[]` | +| `compactor.affinity` | Thanos Compactor affinity for pod assignment | `{}` | +| `compactor.nodeSelector` | Thanos Compactor node labels for pod assignment | `{}` | +| `compactor.tolerations` | Thanos Compactor tolerations for pod assignment | `[]` | +| `compactor.podLabels` | Thanos Compactor pod labels | `{}` | +| `compactor.podAnnotations` | Annotations for Thanos Compactor pods | `{}` | +| `compactor.dnsConfig` | Deployment pod DNS config | `{}` | +| `compactor.dnsPolicy` | Deployment pod DNS policy | `""` | +| `compactor.hostAliases` | Deployment pod host aliases | `[]` | +| `compactor.lifecycleHooks` | for the Thanos Compactor container(s) to automate configuration before or after startup | `{}` | +| `compactor.priorityClassName` | Thanos Compactor priorityClassName | `""` | +| `compactor.schedulerName` | Name of the k8s scheduler (other than default) for Thanos Compactor pods | `""` | +| `compactor.topologySpreadConstraints` | Topology Spread Constraints for Thanos Compactor pods assignment spread across your cluster among failure-domains | `[]` | +| `compactor.networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | +| `compactor.networkPolicy.allowExternal` | Don't require client label for connections | `true` | +| `compactor.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | +| `compactor.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | +| `compactor.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | +| `compactor.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | +| `compactor.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | +| `compactor.service.type` | Kubernetes service type | `ClusterIP` | +| `compactor.service.ports.http` | Thanos Compactor service HTTP port | `9090` | +| `compactor.service.nodePorts.http` | Specify the Thanos Compactor HTTP nodePort value for the LoadBalancer and NodePort service types | `""` | +| `compactor.service.clusterIP` | Thanos Compactor service clusterIP IP | `""` | +| `compactor.service.loadBalancerIP` | Load balancer IP if service type is `LoadBalancer` | `""` | +| `compactor.service.loadBalancerSourceRanges` | Addresses that are allowed when service is LoadBalancer | `[]` | +| `compactor.service.externalTrafficPolicy` | Thanos Compactor service externalTrafficPolicy | `Cluster` | +| `compactor.service.labels` | Labels for Thanos Compactor service | `{}` | +| `compactor.service.annotations` | Annotations for Thanos Compactor service | `{}` | +| `compactor.service.extraPorts` | Extra ports to expose in the Thanos Compactor service | `[]` | +| `compactor.service.labelSelectorsOverride` | Selector for Thanos Query service | `{}` | +| `compactor.automountServiceAccountToken` | Enable/disable auto mounting of the service account token only for the deployment | `true` | +| `compactor.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | +| `compactor.serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | +| `compactor.serviceAccount.annotations` | Annotations for Thanos Compactor Service Account | `{}` | +| `compactor.serviceAccount.automountServiceAccountToken` | Enable/disable auto mounting of the service account token | `false` | +| `compactor.ingress.enabled` | Enable ingress controller resource | `false` | +| `compactor.ingress.hostname` | Default host for the ingress resource | `thanos-compactor.local` | +| `compactor.ingress.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | +| `compactor.ingress.annotations` | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | +| `compactor.ingress.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | +| `compactor.ingress.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | +| `compactor.ingress.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | +| `compactor.ingress.extraRules` | Additional rules to be covered with this ingress record | `[]` | +| `compactor.ingress.tls` | Enable TLS configuration for the hostname defined at `compactor.ingress.hostname` parameter | `false` | +| `compactor.ingress.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | +| `compactor.ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `""` | +| `compactor.ingress.path` | Ingress path | `/` | +| `compactor.ingress.pathType` | Ingress path type | `ImplementationSpecific` | +| `compactor.persistence.enabled` | Enable data persistence using PVC(s) on Thanos Compactor pods | `true` | +| `compactor.persistence.ephemeral` | Use ephemeral volume for data persistence using PVC(s) on Thanos Compactor pods | `false` | +| `compactor.persistence.defaultEmptyDir` | Defaults to emptyDir if persistence is disabled. | `true` | +| `compactor.persistence.storageClass` | Specify the `storageClass` used to provision the volume | `""` | +| `compactor.persistence.accessModes` | PVC Access Modes for data volume | `["ReadWriteOnce"]` | +| `compactor.persistence.size` | PVC Storage Request for data volume | `8Gi` | +| `compactor.persistence.labels` | Labels for the PVC | `{}` | +| `compactor.persistence.annotations` | Annotations for the PVC | `{}` | +| `compactor.persistence.existingClaim` | Name of an existing PVC to use | `""` | ### Thanos Store Gateway parameters -| Name | Description | Value | -| ---------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | --------------------------- | -| `storegateway.enabled` | Enable/disable Thanos Store Gateway component | `false` | -| `storegateway.logLevel` | Thanos Store Gateway log level | `info` | -| `storegateway.logFormat` | Thanos Store Gateway log format | `logfmt` | -| `storegateway.config` | Thanos Store Gateway configuration | `""` | -| `storegateway.existingConfigmap` | Name of existing ConfigMap with Thanos Store Gateway configuration | `""` | -| `storegateway.grpc.server.tls.enabled` | Enable TLS encryption in the GRPC server | `false` | -| `storegateway.grpc.server.tls.autoGenerated` | Create self-signed TLS certificates. Currently only supports PEM certificates | `false` | -| `storegateway.grpc.server.tls.cert` | TLS Certificate for GRPC server - ignored if existingSecret is provided | `""` | -| `storegateway.grpc.server.tls.key` | TLS Key for GRPC server - ignored if existingSecret is provided | `""` | -| `storegateway.grpc.server.tls.ca` | TLS CA to verify clients against - ignored if existingSecret is provided | `""` | -| `storegateway.grpc.server.tls.existingSecret` | Existing secret containing your own TLS certificates | `{}` | -| `storegateway.extraEnvVars` | Extra environment variables for Thanos Store Gateway container | `[]` | -| `storegateway.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Thanos Store Gateway nodes | `""` | -| `storegateway.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Thanos Store Gateway nodes | `""` | -| `storegateway.extraFlags` | Extra Flags to passed to Thanos Store Gateway | `[]` | -| `storegateway.command` | Override default container command (useful when using custom images) | `[]` | -| `storegateway.args` | Override default container args (useful when using custom images) | `[]` | -| `storegateway.replicaCount` | Number of Thanos Store Gateway replicas to deploy | `1` | -| `storegateway.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` | -| `storegateway.updateStrategy.type` | Update strategy type for Thanos Store Gateway replicas | `RollingUpdate` | -| `storegateway.podManagementPolicy` | Statefulset Pod management policy: OrderedReady (default) or Parallel | `OrderedReady` | -| `storegateway.containerPorts.http` | HTTP container port | `10902` | -| `storegateway.containerPorts.grpc` | GRPC container port | `10901` | -| `storegateway.podSecurityContext.enabled` | Enable security context for the Thanos Store Gateway pods | `true` | -| `storegateway.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | -| `storegateway.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | -| `storegateway.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | -| `storegateway.podSecurityContext.fsGroup` | Group ID for the filesystem used by Thanos Store Gateway pods | `1001` | -| `storegateway.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | -| `storegateway.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | -| `storegateway.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | -| `storegateway.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | -| `storegateway.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | -| `storegateway.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | -| `storegateway.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | -| `storegateway.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | -| `storegateway.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | -| `storegateway.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | -| `storegateway.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if storegateway.resources is set (storegateway.resources is recommended for production). | `nano` | -| `storegateway.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | -| `storegateway.livenessProbe.enabled` | Enable livenessProbe on Thanos Store Gateway containers | `true` | -| `storegateway.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `30` | -| `storegateway.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | -| `storegateway.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` | -| `storegateway.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | -| `storegateway.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `storegateway.readinessProbe.enabled` | Enable readinessProbe on Thanos Store Gateway containers | `true` | -| `storegateway.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | -| `storegateway.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | -| `storegateway.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` | -| `storegateway.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | -| `storegateway.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `storegateway.startupProbe.enabled` | Enable startupProbe on Thanos Store Gateway containers | `false` | -| `storegateway.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | -| `storegateway.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | -| `storegateway.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | -| `storegateway.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | -| `storegateway.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `storegateway.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | -| `storegateway.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | -| `storegateway.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | -| `storegateway.initContainers` | Add additional init containers to the Thanos Store Gateway pods | `[]` | -| `storegateway.sidecars` | Extra containers running as sidecars to Thanos Store Gateway pods | `[]` | -| `storegateway.extraVolumes` | Extra volumes to add to Thanos Store Gateway | `[]` | -| `storegateway.extraVolumeMounts` | Extra volume mounts to add to the storegateway container | `[]` | -| `storegateway.podAffinityPreset` | Thanos Store Gateway pod affinity preset | `""` | -| `storegateway.podAntiAffinityPreset` | Thanos Store Gateway pod anti-affinity preset. Ignored if `storegateway.affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `storegateway.nodeAffinityPreset.type` | Thanos Store Gateway node affinity preset type. Ignored if `storegateway.affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `storegateway.nodeAffinityPreset.key` | Thanos Store Gateway node label key to match. Ignored if `storegateway.affinity` is set. | `""` | -| `storegateway.nodeAffinityPreset.values` | Thanos Store Gateway node label values to match. Ignored if `storegateway.affinity` is set. | `[]` | -| `storegateway.affinity` | Thanos Store Gateway affinity for pod assignment | `{}` | -| `storegateway.nodeSelector` | Thanos Store Gateway node labels for pod assignment | `{}` | -| `storegateway.tolerations` | Thanos Store Gateway tolerations for pod assignment | `[]` | -| `storegateway.podLabels` | Thanos Store Gateway pod labels | `{}` | -| `storegateway.podAnnotations` | Annotations for Thanos Store Gateway pods | `{}` | -| `storegateway.dnsConfig` | Deployment pod DNS config | `{}` | -| `storegateway.dnsPolicy` | Deployment pod DNS policy | `""` | -| `storegateway.hostAliases` | Deployment pod host aliases | `[]` | -| `storegateway.lifecycleHooks` | for the Thanos Store Gateway container(s) to automate configuration before or after startup | `{}` | -| `storegateway.priorityClassName` | Thanos Store Gateway priorityClassName | `""` | -| `storegateway.topologySpreadConstraints` | Topology Spread Constraints for Thanos Store Gateway pods assignment spread across your cluster among failure-domains | `[]` | -| `storegateway.schedulerName` | Name of the k8s scheduler (other than default) for Thanos Store Gateway pods | `""` | -| `storegateway.networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | -| `storegateway.networkPolicy.allowExternal` | Don't require client label for connections | `true` | -| `storegateway.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | -| `storegateway.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | -| `storegateway.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | -| `storegateway.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | -| `storegateway.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | -| `storegateway.service.type` | Kubernetes service type | `ClusterIP` | -| `storegateway.service.ports.http` | Thanos Store Gateway service HTTP port | `9090` | -| `storegateway.service.ports.grpc` | Thanos Store Gateway service GRPC port | `10901` | -| `storegateway.service.nodePorts.http` | Specify the Thanos Store Gateway HTTP nodePort value for the LoadBalancer and NodePort service types | `""` | -| `storegateway.service.nodePorts.grpc` | Specify the Thanos Store Gateway GRPC nodePort value for the LoadBalancer and NodePort service types | `""` | -| `storegateway.service.clusterIP` | Thanos Store Gateway service clusterIP IP | `""` | -| `storegateway.service.loadBalancerIP` | Load balancer IP if service type is `LoadBalancer` | `""` | -| `storegateway.service.loadBalancerSourceRanges` | Addresses that are allowed when service is LoadBalancer | `[]` | -| `storegateway.service.externalTrafficPolicy` | Thanos Store Gateway service externalTrafficPolicy | `Cluster` | -| `storegateway.service.labels` | Extra labels for Thanos Store Gateway service | `{}` | -| `storegateway.service.annotations` | Annotations for Thanos Store Gateway service | `{}` | -| `storegateway.service.extraPorts` | Extra ports to expose in the Thanos Store Gateway service | `[]` | -| `storegateway.service.labelSelectorsOverride` | Selector for Thanos Query service | `{}` | -| `storegateway.service.additionalHeadless` | Additional Headless service | `false` | -| `storegateway.service.headless.annotations` | Annotations for the headless service. | `{}` | -| `storegateway.persistence.enabled` | Enable data persistence using PVC(s) on Thanos Store Gateway pods | `true` | -| `storegateway.persistence.storageClass` | Specify the `storageClass` used to provision the volume | `""` | -| `storegateway.persistence.accessModes` | PVC Access Modes for data volume | `["ReadWriteOnce"]` | -| `storegateway.persistence.size` | PVC Storage Request for data volume | `8Gi` | -| `storegateway.persistence.labels` | Labels for the PVC | `{}` | -| `storegateway.persistence.annotations` | Annotations for the PVC | `{}` | -| `storegateway.persistence.existingClaim` | Name of an existing PVC to use | `""` | -| `storegateway.automountServiceAccountToken` | Enable/disable auto mounting of the service account token only for the sts | `true` | -| `storegateway.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | -| `storegateway.serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | -| `storegateway.serviceAccount.annotations` | Annotations for Thanos Store Gateway Service Account | `{}` | -| `storegateway.serviceAccount.automountServiceAccountToken` | Enable/disable auto mounting of the service account token | `false` | -| `storegateway.autoscaling.enabled` | Enable autoscaling for Thanos Store Gateway | `false` | -| `storegateway.autoscaling.minReplicas` | Minimum number of Thanos Store Gateway replicas | `""` | -| `storegateway.autoscaling.maxReplicas` | Maximum number of Thanos Store Gateway replicas | `""` | -| `storegateway.autoscaling.targetCPU` | Target CPU utilization percentage | `""` | -| `storegateway.autoscaling.targetMemory` | Target Memory utilization percentage | `""` | -| `storegateway.pdb.create` | Enable/disable a Pod Disruption Budget creation for Thanos Store Gateway | `false` | -| `storegateway.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | -| `storegateway.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` | -| `storegateway.ingress.enabled` | Enable ingress controller resource | `false` | -| `storegateway.ingress.hostname` | Default host for the ingress resource | `thanos-storegateway.local` | -| `storegateway.ingress.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | -| `storegateway.ingress.annotations` | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | -| `storegateway.ingress.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | -| `storegateway.ingress.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | -| `storegateway.ingress.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | -| `storegateway.ingress.extraRules` | Additional rules to be covered with this ingress record | `[]` | -| `storegateway.ingress.tls` | Enable TLS configuration for the hostname defined at `storegateway.ingress.hostname` parameter | `false` | -| `storegateway.ingress.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | -| `storegateway.ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `""` | -| `storegateway.ingress.path` | Ingress path | `/` | -| `storegateway.ingress.pathType` | Ingress path type | `ImplementationSpecific` | -| `storegateway.ingress.grpc.enabled` | Enable ingress controller resource (GRPC) | `false` | -| `storegateway.ingress.grpc.hostname` | Default host for the ingress resource (GRPC) | `thanos-grpc.local` | -| `storegateway.ingress.grpc.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | -| `storegateway.ingress.grpc.annotations` | Additional annotations for the Ingress resource (GRPC). To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | -| `storegateway.ingress.grpc.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | -| `storegateway.ingress.grpc.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | -| `storegateway.ingress.grpc.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | -| `storegateway.ingress.grpc.extraRules` | Additional rules to be covered with this ingress record | `[]` | -| `storegateway.ingress.grpc.tls` | Enable TLS configuration for the hostname defined at `storegateway.ingress.grpc.hostname` parameter | `false` | -| `storegateway.ingress.grpc.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | -| `storegateway.ingress.grpc.apiVersion` | Override API Version (automatically detected if not set) | `""` | -| `storegateway.ingress.grpc.path` | Ingress Path | `/` | -| `storegateway.ingress.grpc.pathType` | Ingress Path type | `ImplementationSpecific` | -| `storegateway.sharded.enabled` | Enable sharding for Thanos Store Gateway | `false` | -| `storegateway.sharded.hashPartitioning.shards` | Setting hashPartitioning will create multiple store statefulsets based on the number of shards specified using the hashmod of the blocks | `""` | -| `storegateway.sharded.timePartitioning` | Setting time timePartitioning will create multiple store deployments based on the number of partitions | `[]` | -| `storegateway.sharded.service.clusterIPs` | Array of cluster IPs for each Store Gateway service. Length must be the same as the number of shards | `[]` | -| `storegateway.sharded.service.loadBalancerIPs` | Array of load balancer IPs for each Store Gateway service. Length must be the same as the number of shards | `[]` | -| `storegateway.sharded.service.http.nodePorts` | Array of http node ports used for Store Gateway service. Length must be the same as the number of shards | `[]` | -| `storegateway.sharded.service.grpc.nodePorts` | Array of grpc node ports used for Store Gateway service. Length must be the same as the number of shards | `[]` | +| Name | Description | Value | +| ---------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------------- | +| `storegateway.enabled` | Enable/disable Thanos Store Gateway component | `false` | +| `storegateway.logLevel` | Thanos Store Gateway log level | `info` | +| `storegateway.logFormat` | Thanos Store Gateway log format | `logfmt` | +| `storegateway.config` | Thanos Store Gateway configuration | `""` | +| `storegateway.existingConfigmap` | Name of existing ConfigMap with Thanos Store Gateway configuration | `""` | +| `storegateway.grpc.server.tls.enabled` | Enable TLS encryption in the GRPC server | `false` | +| `storegateway.grpc.server.tls.autoGenerated` | Create self-signed TLS certificates. Currently only supports PEM certificates | `false` | +| `storegateway.grpc.server.tls.cert` | TLS Certificate for GRPC server - ignored if existingSecret is provided | `""` | +| `storegateway.grpc.server.tls.key` | TLS Key for GRPC server - ignored if existingSecret is provided | `""` | +| `storegateway.grpc.server.tls.ca` | TLS CA to verify clients against - ignored if existingSecret is provided | `""` | +| `storegateway.grpc.server.tls.existingSecret` | Existing secret containing your own TLS certificates | `{}` | +| `storegateway.extraEnvVars` | Extra environment variables for Thanos Store Gateway container | `[]` | +| `storegateway.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Thanos Store Gateway nodes | `""` | +| `storegateway.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Thanos Store Gateway nodes | `""` | +| `storegateway.extraFlags` | Extra Flags to passed to Thanos Store Gateway | `[]` | +| `storegateway.command` | Override default container command (useful when using custom images) | `[]` | +| `storegateway.args` | Override default container args (useful when using custom images) | `[]` | +| `storegateway.replicaCount` | Number of Thanos Store Gateway replicas to deploy | `1` | +| `storegateway.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` | +| `storegateway.updateStrategy.type` | Update strategy type for Thanos Store Gateway replicas | `RollingUpdate` | +| `storegateway.podManagementPolicy` | Statefulset Pod management policy: OrderedReady (default) or Parallel | `OrderedReady` | +| `storegateway.containerPorts.http` | HTTP container port | `10902` | +| `storegateway.containerPorts.grpc` | GRPC container port | `10901` | +| `storegateway.podSecurityContext.enabled` | Enable security context for the Thanos Store Gateway pods | `true` | +| `storegateway.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | +| `storegateway.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | +| `storegateway.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | +| `storegateway.podSecurityContext.fsGroup` | Group ID for the filesystem used by Thanos Store Gateway pods | `1001` | +| `storegateway.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | +| `storegateway.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | +| `storegateway.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `storegateway.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | +| `storegateway.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | +| `storegateway.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | +| `storegateway.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | +| `storegateway.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | +| `storegateway.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | +| `storegateway.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | +| `storegateway.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if storegateway.resources is set (storegateway.resources is recommended for production). | `nano` | +| `storegateway.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | +| `storegateway.livenessProbe.enabled` | Enable livenessProbe on Thanos Store Gateway containers | `true` | +| `storegateway.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `30` | +| `storegateway.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | +| `storegateway.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` | +| `storegateway.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | +| `storegateway.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `storegateway.readinessProbe.enabled` | Enable readinessProbe on Thanos Store Gateway containers | `true` | +| `storegateway.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | +| `storegateway.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | +| `storegateway.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` | +| `storegateway.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | +| `storegateway.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `storegateway.startupProbe.enabled` | Enable startupProbe on Thanos Store Gateway containers | `false` | +| `storegateway.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | +| `storegateway.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | +| `storegateway.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | +| `storegateway.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | +| `storegateway.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `storegateway.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | +| `storegateway.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | +| `storegateway.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | +| `storegateway.initContainers` | Add additional init containers to the Thanos Store Gateway pods | `[]` | +| `storegateway.sidecars` | Extra containers running as sidecars to Thanos Store Gateway pods | `[]` | +| `storegateway.extraVolumes` | Extra volumes to add to Thanos Store Gateway | `[]` | +| `storegateway.extraVolumeMounts` | Extra volume mounts to add to the storegateway container | `[]` | +| `storegateway.podAffinityPreset` | Thanos Store Gateway pod affinity preset | `""` | +| `storegateway.podAntiAffinityPreset` | Thanos Store Gateway pod anti-affinity preset. Ignored if `storegateway.affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `storegateway.nodeAffinityPreset.type` | Thanos Store Gateway node affinity preset type. Ignored if `storegateway.affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `storegateway.nodeAffinityPreset.key` | Thanos Store Gateway node label key to match. Ignored if `storegateway.affinity` is set. | `""` | +| `storegateway.nodeAffinityPreset.values` | Thanos Store Gateway node label values to match. Ignored if `storegateway.affinity` is set. | `[]` | +| `storegateway.affinity` | Thanos Store Gateway affinity for pod assignment | `{}` | +| `storegateway.nodeSelector` | Thanos Store Gateway node labels for pod assignment | `{}` | +| `storegateway.tolerations` | Thanos Store Gateway tolerations for pod assignment | `[]` | +| `storegateway.podLabels` | Thanos Store Gateway pod labels | `{}` | +| `storegateway.podAnnotations` | Annotations for Thanos Store Gateway pods | `{}` | +| `storegateway.dnsConfig` | Deployment pod DNS config | `{}` | +| `storegateway.dnsPolicy` | Deployment pod DNS policy | `""` | +| `storegateway.hostAliases` | Deployment pod host aliases | `[]` | +| `storegateway.lifecycleHooks` | for the Thanos Store Gateway container(s) to automate configuration before or after startup | `{}` | +| `storegateway.priorityClassName` | Thanos Store Gateway priorityClassName | `""` | +| `storegateway.topologySpreadConstraints` | Topology Spread Constraints for Thanos Store Gateway pods assignment spread across your cluster among failure-domains | `[]` | +| `storegateway.schedulerName` | Name of the k8s scheduler (other than default) for Thanos Store Gateway pods | `""` | +| `storegateway.networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | +| `storegateway.networkPolicy.allowExternal` | Don't require client label for connections | `true` | +| `storegateway.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | +| `storegateway.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | +| `storegateway.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | +| `storegateway.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | +| `storegateway.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | +| `storegateway.service.type` | Kubernetes service type | `ClusterIP` | +| `storegateway.service.ports.http` | Thanos Store Gateway service HTTP port | `9090` | +| `storegateway.service.ports.grpc` | Thanos Store Gateway service GRPC port | `10901` | +| `storegateway.service.nodePorts.http` | Specify the Thanos Store Gateway HTTP nodePort value for the LoadBalancer and NodePort service types | `""` | +| `storegateway.service.nodePorts.grpc` | Specify the Thanos Store Gateway GRPC nodePort value for the LoadBalancer and NodePort service types | `""` | +| `storegateway.service.clusterIP` | Thanos Store Gateway service clusterIP IP | `""` | +| `storegateway.service.loadBalancerIP` | Load balancer IP if service type is `LoadBalancer` | `""` | +| `storegateway.service.loadBalancerSourceRanges` | Addresses that are allowed when service is LoadBalancer | `[]` | +| `storegateway.service.externalTrafficPolicy` | Thanos Store Gateway service externalTrafficPolicy | `Cluster` | +| `storegateway.service.labels` | Extra labels for Thanos Store Gateway service | `{}` | +| `storegateway.service.annotations` | Annotations for Thanos Store Gateway service | `{}` | +| `storegateway.service.extraPorts` | Extra ports to expose in the Thanos Store Gateway service | `[]` | +| `storegateway.service.labelSelectorsOverride` | Selector for Thanos Query service | `{}` | +| `storegateway.service.additionalHeadless` | Additional Headless service | `false` | +| `storegateway.service.headless.annotations` | Annotations for the headless service. | `{}` | +| `storegateway.persistence.enabled` | Enable data persistence using PVC(s) on Thanos Store Gateway pods | `true` | +| `storegateway.persistence.storageClass` | Specify the `storageClass` used to provision the volume | `""` | +| `storegateway.persistence.accessModes` | PVC Access Modes for data volume | `["ReadWriteOnce"]` | +| `storegateway.persistence.size` | PVC Storage Request for data volume | `8Gi` | +| `storegateway.persistence.labels` | Labels for the PVC | `{}` | +| `storegateway.persistence.annotations` | Annotations for the PVC | `{}` | +| `storegateway.persistence.existingClaim` | Name of an existing PVC to use | `""` | +| `storegateway.automountServiceAccountToken` | Enable/disable auto mounting of the service account token only for the sts | `true` | +| `storegateway.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | +| `storegateway.serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | +| `storegateway.serviceAccount.annotations` | Annotations for Thanos Store Gateway Service Account | `{}` | +| `storegateway.serviceAccount.automountServiceAccountToken` | Enable/disable auto mounting of the service account token | `false` | +| `storegateway.autoscaling.enabled` | Enable autoscaling for Thanos Store Gateway | `false` | +| `storegateway.autoscaling.minReplicas` | Minimum number of Thanos Store Gateway replicas | `""` | +| `storegateway.autoscaling.maxReplicas` | Maximum number of Thanos Store Gateway replicas | `""` | +| `storegateway.autoscaling.targetCPU` | Target CPU utilization percentage | `""` | +| `storegateway.autoscaling.targetMemory` | Target Memory utilization percentage | `""` | +| `storegateway.pdb.create` | Enable/disable a Pod Disruption Budget creation for Thanos Store Gateway | `false` | +| `storegateway.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | +| `storegateway.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` | +| `storegateway.ingress.enabled` | Enable ingress controller resource | `false` | +| `storegateway.ingress.hostname` | Default host for the ingress resource | `thanos-storegateway.local` | +| `storegateway.ingress.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | +| `storegateway.ingress.annotations` | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | +| `storegateway.ingress.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | +| `storegateway.ingress.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | +| `storegateway.ingress.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | +| `storegateway.ingress.extraRules` | Additional rules to be covered with this ingress record | `[]` | +| `storegateway.ingress.tls` | Enable TLS configuration for the hostname defined at `storegateway.ingress.hostname` parameter | `false` | +| `storegateway.ingress.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | +| `storegateway.ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `""` | +| `storegateway.ingress.path` | Ingress path | `/` | +| `storegateway.ingress.pathType` | Ingress path type | `ImplementationSpecific` | +| `storegateway.ingress.grpc.enabled` | Enable ingress controller resource (GRPC) | `false` | +| `storegateway.ingress.grpc.hostname` | Default host for the ingress resource (GRPC) | `thanos-grpc.local` | +| `storegateway.ingress.grpc.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | +| `storegateway.ingress.grpc.annotations` | Additional annotations for the Ingress resource (GRPC). To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | +| `storegateway.ingress.grpc.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | +| `storegateway.ingress.grpc.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | +| `storegateway.ingress.grpc.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | +| `storegateway.ingress.grpc.extraRules` | Additional rules to be covered with this ingress record | `[]` | +| `storegateway.ingress.grpc.tls` | Enable TLS configuration for the hostname defined at `storegateway.ingress.grpc.hostname` parameter | `false` | +| `storegateway.ingress.grpc.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | +| `storegateway.ingress.grpc.apiVersion` | Override API Version (automatically detected if not set) | `""` | +| `storegateway.ingress.grpc.path` | Ingress Path | `/` | +| `storegateway.ingress.grpc.pathType` | Ingress Path type | `ImplementationSpecific` | +| `storegateway.sharded.enabled` | Enable sharding for Thanos Store Gateway | `false` | +| `storegateway.sharded.hashPartitioning.shards` | Setting hashPartitioning will create multiple store statefulsets based on the number of shards specified using the hashmod of the blocks | `""` | +| `storegateway.sharded.timePartitioning` | Setting time timePartitioning will create multiple store deployments based on the number of partitions | `[]` | +| `storegateway.sharded.service.clusterIPs` | Array of cluster IPs for each Store Gateway service. Length must be the same as the number of shards | `[]` | +| `storegateway.sharded.service.loadBalancerIPs` | Array of load balancer IPs for each Store Gateway service. Length must be the same as the number of shards | `[]` | +| `storegateway.sharded.service.http.nodePorts` | Array of http node ports used for Store Gateway service. Length must be the same as the number of shards | `[]` | +| `storegateway.sharded.service.grpc.nodePorts` | Array of grpc node ports used for Store Gateway service. Length must be the same as the number of shards | `[]` | ### Thanos Ruler parameters -| Name | Description | Value | -| --------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------ | -| `ruler.enabled` | Enable/disable Thanos Ruler component | `false` | -| `ruler.logLevel` | Thanos Ruler log level | `info` | -| `ruler.logFormat` | Thanos Ruler log format | `logfmt` | -| `ruler.replicaLabel` | Label to treat as a replica indicator along which data is de-duplicated | `replica` | -| `ruler.dnsDiscovery.enabled` | Dynamically configure Query APIs using DNS discovery | `true` | -| `ruler.queryURL` | Thanos query/query-frontend URL to link in Ruler UI. | `""` | -| `ruler.alertmanagers` | Alert managers URLs array | `[]` | -| `ruler.alertmanagersConfig` | Alert managers configuration | `""` | -| `ruler.evalInterval` | The default evaluation interval to use | `1m` | -| `ruler.clusterName` | Used to set the 'ruler_cluster' label | `""` | -| `ruler.config` | Ruler configuration | `""` | -| `ruler.existingConfigmap` | Name of existing ConfigMap with Ruler configuration | `""` | -| `ruler.extraEnvVars` | Extra environment variables for Thanos Ruler container | `[]` | -| `ruler.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Thanos Ruler nodes | `""` | -| `ruler.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Thanos Ruler nodes | `""` | -| `ruler.extraFlags` | Extra Flags to passed to Thanos Ruler | `[]` | -| `ruler.command` | Override default container command (useful when using custom images) | `[]` | -| `ruler.args` | Override default container args (useful when using custom images) | `[]` | -| `ruler.replicaCount` | Number of Thanos Ruler replicas to deploy | `1` | -| `ruler.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` | -| `ruler.updateStrategy.type` | Update strategy type for Thanos Ruler replicas | `RollingUpdate` | -| `ruler.podManagementPolicy` | Statefulset Pod Management Policy Type | `OrderedReady` | -| `ruler.containerPorts.http` | HTTP container port | `10902` | -| `ruler.containerPorts.grpc` | GRPC container port | `10901` | -| `ruler.podSecurityContext.enabled` | Enable security context for the Thanos Ruler pods | `true` | -| `ruler.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | -| `ruler.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | -| `ruler.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | -| `ruler.podSecurityContext.fsGroup` | Group ID for the filesystem used by Thanos Ruler pods | `1001` | -| `ruler.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | -| `ruler.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | -| `ruler.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | -| `ruler.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | -| `ruler.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | -| `ruler.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | -| `ruler.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | -| `ruler.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | -| `ruler.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | -| `ruler.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | -| `ruler.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if ruler.resources is set (ruler.resources is recommended for production). | `nano` | -| `ruler.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | -| `ruler.livenessProbe.enabled` | Enable livenessProbe on Thanos Ruler containers | `true` | -| `ruler.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `30` | -| `ruler.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | -| `ruler.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` | -| `ruler.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | -| `ruler.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `ruler.readinessProbe.enabled` | Enable readinessProbe on Thanos Ruler containers | `true` | -| `ruler.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | -| `ruler.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | -| `ruler.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` | -| `ruler.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | -| `ruler.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `ruler.startupProbe.enabled` | Enable startupProbe on Thanos Ruler containers | `false` | -| `ruler.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | -| `ruler.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | -| `ruler.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | -| `ruler.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | -| `ruler.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `ruler.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | -| `ruler.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | -| `ruler.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | -| `ruler.initContainers` | Add additional init containers to the Thanos Ruler pods | `[]` | -| `ruler.sidecars` | Extra containers running as sidecars to Thanos Ruler pods | `[]` | -| `ruler.extraVolumes` | Extra volumes to add to Thanos Ruler | `[]` | -| `ruler.extraVolumeMounts` | Extra volume mounts to add to the ruler container | `[]` | -| `ruler.podAffinityPreset` | Thanos Ruler pod affinity preset | `""` | -| `ruler.podAntiAffinityPreset` | Thanos Ruler pod anti-affinity preset. Ignored if `ruler.affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `ruler.nodeAffinityPreset.type` | Thanos Ruler node affinity preset type. Ignored if `ruler.affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `ruler.nodeAffinityPreset.key` | Thanos Ruler node label key to match. Ignored if `ruler.affinity` is set. | `""` | -| `ruler.nodeAffinityPreset.values` | Thanos Ruler node label values to match. Ignored if `ruler.affinity` is set. | `[]` | -| `ruler.affinity` | Thanos Ruler affinity for pod assignment | `{}` | -| `ruler.nodeSelector` | Thanos Ruler node labels for pod assignment | `{}` | -| `ruler.tolerations` | Thanos Ruler tolerations for pod assignment | `[]` | -| `ruler.podLabels` | Thanos Ruler pod labels | `{}` | -| `ruler.podAnnotations` | Annotations for Thanos Ruler pods | `{}` | -| `ruler.dnsConfig` | Deployment pod DNS config | `{}` | -| `ruler.dnsPolicy` | Deployment pod DNS policy | `""` | -| `ruler.hostAliases` | Deployment pod host aliases | `[]` | -| `ruler.lifecycleHooks` | for the Thanos Ruler container(s) to automate configuration before or after startup | `{}` | -| `ruler.priorityClassName` | Thanos Ruler priorityClassName | `""` | -| `ruler.schedulerName` | Name of the k8s scheduler (other than default) for Thanos Ruler pods | `""` | -| `ruler.topologySpreadConstraints` | Topology Spread Constraints for Thanos Ruler pods assignment spread across your cluster among failure-domains | `[]` | -| `ruler.networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | -| `ruler.networkPolicy.allowExternal` | Don't require client label for connections | `true` | -| `ruler.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | -| `ruler.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | -| `ruler.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | -| `ruler.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | -| `ruler.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | -| `ruler.service.type` | Kubernetes service type | `ClusterIP` | -| `ruler.service.ports.http` | Thanos Ruler service HTTP port | `9090` | -| `ruler.service.ports.grpc` | Thanos Ruler service GRPC port | `10901` | -| `ruler.service.nodePorts.http` | Specify the Thanos Ruler HTTP nodePort value for the LoadBalancer and NodePort service types | `""` | -| `ruler.service.nodePorts.grpc` | Specify the Thanos Ruler GRPC nodePort value for the LoadBalancer and NodePort service types | `""` | -| `ruler.service.clusterIP` | Thanos Ruler service clusterIP IP | `""` | -| `ruler.service.loadBalancerIP` | Load balancer IP if service type is `LoadBalancer` | `""` | -| `ruler.service.loadBalancerSourceRanges` | Address that are allowed when service is LoadBalancer | `[]` | -| `ruler.service.externalTrafficPolicy` | Thanos Ruler service externalTrafficPolicy | `Cluster` | -| `ruler.service.labels` | Extra labels for Thanos Ruler service | `{}` | -| `ruler.service.annotations` | Annotations for Thanos Ruler service | `{}` | -| `ruler.service.extraPorts` | Extra ports to expose in the Thanos Ruler service | `[]` | -| `ruler.service.labelSelectorsOverride` | Selector for Thanos Query service | `{}` | -| `ruler.service.additionalHeadless` | Additional Headless service | `false` | -| `ruler.service.headless.annotations` | Annotations for the headless service. | `{}` | -| `ruler.persistence.enabled` | Enable data persistence using PVC(s) on Thanos Ruler pods | `true` | -| `ruler.persistence.storageClass` | Specify the `storageClass` used to provision the volume | `""` | -| `ruler.persistence.accessModes` | PVC Access Modes for data volume | `["ReadWriteOnce"]` | -| `ruler.persistence.size` | PVC Storage Request for data volume | `8Gi` | -| `ruler.persistence.annotations` | Annotations for the PVC | `{}` | -| `ruler.persistence.existingClaim` | Name of an existing PVC to use | `""` | -| `ruler.automountServiceAccountToken` | Enable/disable auto mounting of the service account token only for the sts | `true` | -| `ruler.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | -| `ruler.serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | -| `ruler.serviceAccount.annotations` | Annotations for Thanos Ruler Service Account | `{}` | -| `ruler.serviceAccount.automountServiceAccountToken` | Enable/disable auto mounting of the service account token | `false` | -| `ruler.autoscaling.enabled` | Enable autoscaling for Thanos Ruler | `false` | -| `ruler.autoscaling.minReplicas` | Minimum number of Thanos Ruler replicas | `""` | -| `ruler.autoscaling.maxReplicas` | Maximum number of Thanos Ruler replicas | `""` | -| `ruler.autoscaling.targetCPU` | Target CPU utilization percentage | `""` | -| `ruler.autoscaling.targetMemory` | Target Memory utilization percentage | `""` | -| `ruler.pdb.create` | Enable/disable a Pod Disruption Budget creation for Thanos Ruler | `false` | -| `ruler.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | -| `ruler.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` | -| `ruler.ingress.enabled` | Enable ingress controller resource | `false` | -| `ruler.ingress.hostname` | Default host for the ingress resource | `thanos-ruler.local` | -| `ruler.ingress.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | -| `ruler.ingress.annotations` | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | -| `ruler.ingress.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | -| `ruler.ingress.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | -| `ruler.ingress.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | -| `ruler.ingress.extraRules` | Additional rules to be covered with this ingress record | `[]` | -| `ruler.ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `""` | -| `ruler.ingress.path` | Ingress path | `/` | -| `ruler.ingress.pathType` | Ingress path type | `ImplementationSpecific` | +| Name | Description | Value | +| --------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------ | +| `ruler.enabled` | Enable/disable Thanos Ruler component | `false` | +| `ruler.logLevel` | Thanos Ruler log level | `info` | +| `ruler.logFormat` | Thanos Ruler log format | `logfmt` | +| `ruler.replicaLabel` | Label to treat as a replica indicator along which data is de-duplicated | `replica` | +| `ruler.dnsDiscovery.enabled` | Dynamically configure Query APIs using DNS discovery | `true` | +| `ruler.queryURL` | Thanos query/query-frontend URL to link in Ruler UI. | `""` | +| `ruler.alertmanagers` | Alert managers URLs array | `[]` | +| `ruler.alertmanagersConfig` | Alert managers configuration | `""` | +| `ruler.evalInterval` | The default evaluation interval to use | `1m` | +| `ruler.clusterName` | Used to set the 'ruler_cluster' label | `""` | +| `ruler.config` | Ruler configuration | `""` | +| `ruler.existingConfigmap` | Name of existing ConfigMap with Ruler configuration | `""` | +| `ruler.extraEnvVars` | Extra environment variables for Thanos Ruler container | `[]` | +| `ruler.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Thanos Ruler nodes | `""` | +| `ruler.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Thanos Ruler nodes | `""` | +| `ruler.extraFlags` | Extra Flags to passed to Thanos Ruler | `[]` | +| `ruler.command` | Override default container command (useful when using custom images) | `[]` | +| `ruler.args` | Override default container args (useful when using custom images) | `[]` | +| `ruler.replicaCount` | Number of Thanos Ruler replicas to deploy | `1` | +| `ruler.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` | +| `ruler.updateStrategy.type` | Update strategy type for Thanos Ruler replicas | `RollingUpdate` | +| `ruler.podManagementPolicy` | Statefulset Pod Management Policy Type | `OrderedReady` | +| `ruler.containerPorts.http` | HTTP container port | `10902` | +| `ruler.containerPorts.grpc` | GRPC container port | `10901` | +| `ruler.podSecurityContext.enabled` | Enable security context for the Thanos Ruler pods | `true` | +| `ruler.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | +| `ruler.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | +| `ruler.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | +| `ruler.podSecurityContext.fsGroup` | Group ID for the filesystem used by Thanos Ruler pods | `1001` | +| `ruler.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | +| `ruler.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | +| `ruler.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `ruler.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | +| `ruler.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | +| `ruler.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | +| `ruler.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | +| `ruler.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | +| `ruler.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | +| `ruler.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | +| `ruler.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if ruler.resources is set (ruler.resources is recommended for production). | `nano` | +| `ruler.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | +| `ruler.livenessProbe.enabled` | Enable livenessProbe on Thanos Ruler containers | `true` | +| `ruler.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `30` | +| `ruler.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | +| `ruler.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` | +| `ruler.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | +| `ruler.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `ruler.readinessProbe.enabled` | Enable readinessProbe on Thanos Ruler containers | `true` | +| `ruler.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | +| `ruler.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | +| `ruler.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` | +| `ruler.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | +| `ruler.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `ruler.startupProbe.enabled` | Enable startupProbe on Thanos Ruler containers | `false` | +| `ruler.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | +| `ruler.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | +| `ruler.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | +| `ruler.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | +| `ruler.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `ruler.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | +| `ruler.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | +| `ruler.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | +| `ruler.initContainers` | Add additional init containers to the Thanos Ruler pods | `[]` | +| `ruler.sidecars` | Extra containers running as sidecars to Thanos Ruler pods | `[]` | +| `ruler.extraVolumes` | Extra volumes to add to Thanos Ruler | `[]` | +| `ruler.extraVolumeMounts` | Extra volume mounts to add to the ruler container | `[]` | +| `ruler.podAffinityPreset` | Thanos Ruler pod affinity preset | `""` | +| `ruler.podAntiAffinityPreset` | Thanos Ruler pod anti-affinity preset. Ignored if `ruler.affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `ruler.nodeAffinityPreset.type` | Thanos Ruler node affinity preset type. Ignored if `ruler.affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `ruler.nodeAffinityPreset.key` | Thanos Ruler node label key to match. Ignored if `ruler.affinity` is set. | `""` | +| `ruler.nodeAffinityPreset.values` | Thanos Ruler node label values to match. Ignored if `ruler.affinity` is set. | `[]` | +| `ruler.affinity` | Thanos Ruler affinity for pod assignment | `{}` | +| `ruler.nodeSelector` | Thanos Ruler node labels for pod assignment | `{}` | +| `ruler.tolerations` | Thanos Ruler tolerations for pod assignment | `[]` | +| `ruler.podLabels` | Thanos Ruler pod labels | `{}` | +| `ruler.podAnnotations` | Annotations for Thanos Ruler pods | `{}` | +| `ruler.dnsConfig` | Deployment pod DNS config | `{}` | +| `ruler.dnsPolicy` | Deployment pod DNS policy | `""` | +| `ruler.hostAliases` | Deployment pod host aliases | `[]` | +| `ruler.lifecycleHooks` | for the Thanos Ruler container(s) to automate configuration before or after startup | `{}` | +| `ruler.priorityClassName` | Thanos Ruler priorityClassName | `""` | +| `ruler.schedulerName` | Name of the k8s scheduler (other than default) for Thanos Ruler pods | `""` | +| `ruler.topologySpreadConstraints` | Topology Spread Constraints for Thanos Ruler pods assignment spread across your cluster among failure-domains | `[]` | +| `ruler.networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | +| `ruler.networkPolicy.allowExternal` | Don't require client label for connections | `true` | +| `ruler.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | +| `ruler.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | +| `ruler.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | +| `ruler.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | +| `ruler.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | +| `ruler.service.type` | Kubernetes service type | `ClusterIP` | +| `ruler.service.ports.http` | Thanos Ruler service HTTP port | `9090` | +| `ruler.service.ports.grpc` | Thanos Ruler service GRPC port | `10901` | +| `ruler.service.nodePorts.http` | Specify the Thanos Ruler HTTP nodePort value for the LoadBalancer and NodePort service types | `""` | +| `ruler.service.nodePorts.grpc` | Specify the Thanos Ruler GRPC nodePort value for the LoadBalancer and NodePort service types | `""` | +| `ruler.service.clusterIP` | Thanos Ruler service clusterIP IP | `""` | +| `ruler.service.loadBalancerIP` | Load balancer IP if service type is `LoadBalancer` | `""` | +| `ruler.service.loadBalancerSourceRanges` | Address that are allowed when service is LoadBalancer | `[]` | +| `ruler.service.externalTrafficPolicy` | Thanos Ruler service externalTrafficPolicy | `Cluster` | +| `ruler.service.labels` | Extra labels for Thanos Ruler service | `{}` | +| `ruler.service.annotations` | Annotations for Thanos Ruler service | `{}` | +| `ruler.service.extraPorts` | Extra ports to expose in the Thanos Ruler service | `[]` | +| `ruler.service.labelSelectorsOverride` | Selector for Thanos Query service | `{}` | +| `ruler.service.additionalHeadless` | Additional Headless service | `false` | +| `ruler.service.headless.annotations` | Annotations for the headless service. | `{}` | +| `ruler.persistence.enabled` | Enable data persistence using PVC(s) on Thanos Ruler pods | `true` | +| `ruler.persistence.storageClass` | Specify the `storageClass` used to provision the volume | `""` | +| `ruler.persistence.accessModes` | PVC Access Modes for data volume | `["ReadWriteOnce"]` | +| `ruler.persistence.size` | PVC Storage Request for data volume | `8Gi` | +| `ruler.persistence.annotations` | Annotations for the PVC | `{}` | +| `ruler.persistence.existingClaim` | Name of an existing PVC to use | `""` | +| `ruler.automountServiceAccountToken` | Enable/disable auto mounting of the service account token only for the sts | `true` | +| `ruler.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | +| `ruler.serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | +| `ruler.serviceAccount.annotations` | Annotations for Thanos Ruler Service Account | `{}` | +| `ruler.serviceAccount.automountServiceAccountToken` | Enable/disable auto mounting of the service account token | `false` | +| `ruler.autoscaling.enabled` | Enable autoscaling for Thanos Ruler | `false` | +| `ruler.autoscaling.minReplicas` | Minimum number of Thanos Ruler replicas | `""` | +| `ruler.autoscaling.maxReplicas` | Maximum number of Thanos Ruler replicas | `""` | +| `ruler.autoscaling.targetCPU` | Target CPU utilization percentage | `""` | +| `ruler.autoscaling.targetMemory` | Target Memory utilization percentage | `""` | +| `ruler.pdb.create` | Enable/disable a Pod Disruption Budget creation for Thanos Ruler | `false` | +| `ruler.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | +| `ruler.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` | +| `ruler.ingress.enabled` | Enable ingress controller resource | `false` | +| `ruler.ingress.hostname` | Default host for the ingress resource | `thanos-ruler.local` | +| `ruler.ingress.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | +| `ruler.ingress.annotations` | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | +| `ruler.ingress.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | +| `ruler.ingress.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | +| `ruler.ingress.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | +| `ruler.ingress.extraRules` | Additional rules to be covered with this ingress record | `[]` | +| `ruler.ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `""` | +| `ruler.ingress.path` | Ingress path | `/` | +| `ruler.ingress.pathType` | Ingress path type | `ImplementationSpecific` | ### Thanos Receive parameters -| Name | Description | Value | -| ----------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------ | -| `receive.enabled` | Enable/disable Thanos Receive component | `false` | -| `receive.mode` | Mode to run receiver in. Valid options are "standalone" or "dual-mode" | `standalone` | -| `receive.logLevel` | Thanos Receive log level | `info` | -| `receive.logFormat` | Thanos Receive log format | `logfmt` | -| `receive.tsdbRetention` | Thanos Receive TSDB retention period | `15d` | -| `receive.replicationFactor` | Thanos Receive replication-factor | `1` | -| `receive.config` | Receive Hashring configuration | `[]` | -| `receive.existingConfigmap` | Name of existing ConfigMap with Thanos Receive Hashring configuration | `""` | -| `receive.replicaLabel` | Label to treat as a replica indicator along which data is de-duplicated | `replica` | -| `receive.grpc.server.tls.enabled` | Enable TLS encryption in the GRPC server | `false` | -| `receive.grpc.server.tls.autoGenerated` | Create self-signed TLS certificates. Currently only supports PEM certificates | `false` | -| `receive.grpc.server.tls.cert` | TLS Certificate for GRPC server - ignored if existingSecret is provided | `""` | -| `receive.grpc.server.tls.key` | TLS Key for GRPC server - ignored if existingSecret is provided | `""` | -| `receive.grpc.server.tls.ca` | TLS CA to verify clients against - ignored if existingSecret is provided | `""` | -| `receive.grpc.server.tls.existingSecret` | Existing secret containing your own TLS certificates | `{}` | -| `receive.extraEnvVars` | Extra environment variables for Thanos Receive container | `[]` | -| `receive.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Thanos Receive nodes | `""` | -| `receive.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Thanos Receive nodes | `""` | -| `receive.extraFlags` | Extra Flags to passed to Thanos Receive | `[]` | -| `receive.command` | Override default container command (useful when using custom images) | `[]` | -| `receive.args` | Override default container args (useful when using custom images) | `[]` | -| `receive.replicaCount` | Number of Thanos Receive replicas to deploy | `1` | -| `receive.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` | -| `receive.updateStrategy.type` | Update strategy type for Thanos Receive replicas | `RollingUpdate` | -| `receive.podManagementPolicy` | | `OrderedReady` | -| `receive.podManagementPolicy` | Statefulset Pod management policy: OrderedReady (default) or Parallel | `OrderedReady` | -| `receive.minReadySeconds` | How many seconds a pod needs to be ready before killing the next, during update | `0` | -| `receive.containerPorts.http` | HTTP container port | `10902` | -| `receive.containerPorts.grpc` | GRPC container port | `10901` | -| `receive.containerPorts.remote` | remote-write container port | `19291` | -| `receive.podSecurityContext.enabled` | Enable security context for the Thanos Receive pods | `true` | -| `receive.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | -| `receive.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | -| `receive.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | -| `receive.podSecurityContext.fsGroup` | Group ID for the filesystem used by Thanos Receive pods | `1001` | -| `receive.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | -| `receive.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | -| `receive.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | -| `receive.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | -| `receive.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | -| `receive.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | -| `receive.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | -| `receive.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | -| `receive.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | -| `receive.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | -| `receive.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if receive.resources is set (receive.resources is recommended for production). | `nano` | -| `receive.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | -| `receive.livenessProbe.enabled` | Enable livenessProbe on Thanos Receive containers | `true` | -| `receive.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `30` | -| `receive.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | -| `receive.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` | -| `receive.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | -| `receive.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `receive.readinessProbe.enabled` | Enable readinessProbe on Thanos Receive containers | `true` | -| `receive.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | -| `receive.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | -| `receive.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` | -| `receive.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | -| `receive.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `receive.startupProbe.enabled` | Enable startupProbe on Thanos Receive containers | `false` | -| `receive.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | -| `receive.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | -| `receive.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | -| `receive.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | -| `receive.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `receive.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | -| `receive.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | -| `receive.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | -| `receive.initContainers` | Add additional init containers to the Thanos Receive pods | `[]` | -| `receive.sidecars` | Extra containers running as sidecars to Thanos Receive pods | `[]` | -| `receive.extraVolumes` | Extra volumes to add to Thanos Receive | `[]` | -| `receive.extraVolumeMounts` | Extra volume mounts to add to the receive container | `[]` | -| `receive.podAffinityPreset` | Thanos Receive pod affinity preset | `""` | -| `receive.podAntiAffinityPreset` | Thanos Receive pod anti-affinity preset. Ignored if `ruler.affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `receive.nodeAffinityPreset.type` | Thanos Receive node affinity preset type. Ignored if `receive.affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `receive.nodeAffinityPreset.key` | Thanos Receive node label key to match. Ignored if `receive.affinity` is set. | `""` | -| `receive.nodeAffinityPreset.values` | Thanos Receive node label values to match. Ignored if `receive.affinity` is set. | `[]` | -| `receive.affinity` | Thanos Receive affinity for pod assignment | `{}` | -| `receive.nodeSelector` | Thanos Receive node labels for pod assignment | `{}` | -| `receive.tolerations` | Thanos Receive tolerations for pod assignment | `[]` | -| `receive.statefulsetLabels` | Thanos Receive statefulset labels | `{}` | -| `receive.podLabels` | Thanos Receive pod labels | `{}` | -| `receive.podAnnotations` | Annotations for Thanos Receive pods | `{}` | -| `receive.dnsConfig` | Deployment pod DNS config | `{}` | -| `receive.dnsPolicy` | Deployment pod DNS policy | `""` | -| `receive.hostAliases` | Deployment pod host aliases | `[]` | -| `receive.lifecycleHooks` | for the Thanos Receive container(s) to automate configuration before or after startup | `{}` | -| `receive.priorityClassName` | Thanos Receive priorityClassName | `""` | -| `receive.schedulerName` | Name of the k8s scheduler (other than default) for Thanos Receive pods | `""` | -| `receive.topologySpreadConstraints` | Topology Spread Constraints for Thanos Receive pods assignment spread across your cluster among failure-domains | `[]` | -| `receive.networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | -| `receive.networkPolicy.allowExternal` | Don't require client label for connections | `true` | -| `receive.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | -| `receive.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | -| `receive.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | -| `receive.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | -| `receive.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | -| `receive.service.type` | Kubernetes service type | `ClusterIP` | -| `receive.service.ports.http` | Thanos Ruler service HTTP port | `10902` | -| `receive.service.ports.grpc` | Thanos Ruler service GRPC port | `10901` | -| `receive.service.ports.remote` | Thanos Ruler service remote port | `19291` | -| `receive.service.nodePorts.http` | Specify the Thanos Ruler HTTP nodePort value for the LoadBalancer and NodePort service types | `""` | -| `receive.service.nodePorts.grpc` | Specify the Thanos Ruler GRPC nodePort value for the LoadBalancer and NodePort service types | `""` | -| `receive.service.nodePorts.remote` | Specify the Thanos Ruler remote nodePort value for the LoadBalancer and NodePort service types | `""` | -| `receive.service.clusterIP` | Thanos Ruler service clusterIP IP | `""` | -| `receive.service.loadBalancerIP` | Load balancer IP if service type is `LoadBalancer` | `""` | -| `receive.service.loadBalancerSourceRanges` | Addresses that are allowed when service is LoadBalancer | `[]` | -| `receive.service.externalTrafficPolicy` | Thanos Ruler service externalTrafficPolicy | `Cluster` | -| `receive.service.labels` | Extra labels for Thanos Receive service | `{}` | -| `receive.service.annotations` | Annotations for Thanos Receive service | `{}` | -| `receive.service.extraPorts` | Extra ports to expose in the Thanos Receive service | `[]` | -| `receive.service.labelSelectorsOverride` | Selector for Thanos receive service | `{}` | -| `receive.service.additionalHeadless` | Additional Headless service | `false` | -| `receive.service.headless.annotations` | Annotations for the headless service. | `{}` | -| `receive.automountServiceAccountToken` | Enable/disable auto mounting of the service account token only for the sts | `true` | -| `receive.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | -| `receive.serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | -| `receive.serviceAccount.annotations` | Annotations for Thanos Receive Service Account | `{}` | -| `receive.serviceAccount.automountServiceAccountToken` | Enable/disable auto mounting of the service account token | `false` | -| `receive.autoscaling.enabled` | Enable autoscaling for Thanos Receive | `false` | -| `receive.autoscaling.minReplicas` | Minimum number of Thanos Receive replicas | `""` | -| `receive.autoscaling.maxReplicas` | Maximum number of Thanos Receive replicas | `""` | -| `receive.autoscaling.targetCPU` | Target CPU utilization percentage | `""` | -| `receive.autoscaling.targetMemory` | Target Memory utilization percentage | `""` | -| `receive.pdb.create` | Enable/disable a Pod Disruption Budget creation for Thanos Receive | `false` | -| `receive.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | -| `receive.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` | -| `receive.persistence.enabled` | Enable data persistence using PVC(s) on Thanos Receive pods | `true` | -| `receive.persistence.storageClass` | Specify the `storageClass` used to provision the volume | `""` | -| `receive.persistence.accessModes` | PVC Access Modes for data volume | `["ReadWriteOnce"]` | -| `receive.persistence.size` | PVC Storage Request for data volume | `8Gi` | -| `receive.persistence.annotations` | Annotations for the PVC | `{}` | -| `receive.persistence.existingClaim` | Name of an existing PVC to use | `""` | -| `receive.ingress.enabled` | Set to true to enable ingress record generation | `false` | -| `receive.ingress.hostname` | When the ingress is enabled, a host pointing to this will be created | `thanos-receive.local` | -| `receive.ingress.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | -| `receive.ingress.annotations` | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | -| `receive.ingress.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | -| `receive.ingress.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | -| `receive.ingress.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | -| `receive.ingress.extraRules` | Additional rules to be covered with this ingress record | `[]` | -| `receive.ingress.tls` | Enable TLS configuration for the hostname defined at `receive.ingress.hostname` parameter | `false` | -| `receive.ingress.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | -| `receive.ingress.apiVersion` | Override API Version (automatically detected if not set) | `""` | -| `receive.ingress.path` | Ingress Path | `/` | -| `receive.ingress.pathType` | Ingress Path type | `ImplementationSpecific` | +| Name | Description | Value | +| ----------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------ | +| `receive.enabled` | Enable/disable Thanos Receive component | `false` | +| `receive.mode` | Mode to run receiver in. Valid options are "standalone" or "dual-mode" | `standalone` | +| `receive.logLevel` | Thanos Receive log level | `info` | +| `receive.logFormat` | Thanos Receive log format | `logfmt` | +| `receive.tsdbRetention` | Thanos Receive TSDB retention period | `15d` | +| `receive.replicationFactor` | Thanos Receive replication-factor | `1` | +| `receive.config` | Receive Hashring configuration | `[]` | +| `receive.existingConfigmap` | Name of existing ConfigMap with Thanos Receive Hashring configuration | `""` | +| `receive.replicaLabel` | Label to treat as a replica indicator along which data is de-duplicated | `replica` | +| `receive.grpc.server.tls.enabled` | Enable TLS encryption in the GRPC server | `false` | +| `receive.grpc.server.tls.autoGenerated` | Create self-signed TLS certificates. Currently only supports PEM certificates | `false` | +| `receive.grpc.server.tls.cert` | TLS Certificate for GRPC server - ignored if existingSecret is provided | `""` | +| `receive.grpc.server.tls.key` | TLS Key for GRPC server - ignored if existingSecret is provided | `""` | +| `receive.grpc.server.tls.ca` | TLS CA to verify clients against - ignored if existingSecret is provided | `""` | +| `receive.grpc.server.tls.existingSecret` | Existing secret containing your own TLS certificates | `{}` | +| `receive.extraEnvVars` | Extra environment variables for Thanos Receive container | `[]` | +| `receive.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Thanos Receive nodes | `""` | +| `receive.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Thanos Receive nodes | `""` | +| `receive.extraFlags` | Extra Flags to passed to Thanos Receive | `[]` | +| `receive.command` | Override default container command (useful when using custom images) | `[]` | +| `receive.args` | Override default container args (useful when using custom images) | `[]` | +| `receive.replicaCount` | Number of Thanos Receive replicas to deploy | `1` | +| `receive.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` | +| `receive.updateStrategy.type` | Update strategy type for Thanos Receive replicas | `RollingUpdate` | +| `receive.podManagementPolicy` | | `OrderedReady` | +| `receive.podManagementPolicy` | Statefulset Pod management policy: OrderedReady (default) or Parallel | `OrderedReady` | +| `receive.minReadySeconds` | How many seconds a pod needs to be ready before killing the next, during update | `0` | +| `receive.containerPorts.http` | HTTP container port | `10902` | +| `receive.containerPorts.grpc` | GRPC container port | `10901` | +| `receive.containerPorts.remote` | remote-write container port | `19291` | +| `receive.podSecurityContext.enabled` | Enable security context for the Thanos Receive pods | `true` | +| `receive.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | +| `receive.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | +| `receive.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | +| `receive.podSecurityContext.fsGroup` | Group ID for the filesystem used by Thanos Receive pods | `1001` | +| `receive.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | +| `receive.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | +| `receive.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `receive.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | +| `receive.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | +| `receive.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | +| `receive.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | +| `receive.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | +| `receive.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | +| `receive.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | +| `receive.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if receive.resources is set (receive.resources is recommended for production). | `nano` | +| `receive.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | +| `receive.livenessProbe.enabled` | Enable livenessProbe on Thanos Receive containers | `true` | +| `receive.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `30` | +| `receive.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | +| `receive.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` | +| `receive.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | +| `receive.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `receive.readinessProbe.enabled` | Enable readinessProbe on Thanos Receive containers | `true` | +| `receive.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | +| `receive.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | +| `receive.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` | +| `receive.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | +| `receive.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `receive.startupProbe.enabled` | Enable startupProbe on Thanos Receive containers | `false` | +| `receive.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | +| `receive.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | +| `receive.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | +| `receive.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | +| `receive.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `receive.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | +| `receive.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | +| `receive.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | +| `receive.initContainers` | Add additional init containers to the Thanos Receive pods | `[]` | +| `receive.sidecars` | Extra containers running as sidecars to Thanos Receive pods | `[]` | +| `receive.extraVolumes` | Extra volumes to add to Thanos Receive | `[]` | +| `receive.extraVolumeMounts` | Extra volume mounts to add to the receive container | `[]` | +| `receive.podAffinityPreset` | Thanos Receive pod affinity preset | `""` | +| `receive.podAntiAffinityPreset` | Thanos Receive pod anti-affinity preset. Ignored if `ruler.affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `receive.nodeAffinityPreset.type` | Thanos Receive node affinity preset type. Ignored if `receive.affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `receive.nodeAffinityPreset.key` | Thanos Receive node label key to match. Ignored if `receive.affinity` is set. | `""` | +| `receive.nodeAffinityPreset.values` | Thanos Receive node label values to match. Ignored if `receive.affinity` is set. | `[]` | +| `receive.affinity` | Thanos Receive affinity for pod assignment | `{}` | +| `receive.nodeSelector` | Thanos Receive node labels for pod assignment | `{}` | +| `receive.tolerations` | Thanos Receive tolerations for pod assignment | `[]` | +| `receive.statefulsetLabels` | Thanos Receive statefulset labels | `{}` | +| `receive.podLabels` | Thanos Receive pod labels | `{}` | +| `receive.podAnnotations` | Annotations for Thanos Receive pods | `{}` | +| `receive.dnsConfig` | Deployment pod DNS config | `{}` | +| `receive.dnsPolicy` | Deployment pod DNS policy | `""` | +| `receive.hostAliases` | Deployment pod host aliases | `[]` | +| `receive.lifecycleHooks` | for the Thanos Receive container(s) to automate configuration before or after startup | `{}` | +| `receive.priorityClassName` | Thanos Receive priorityClassName | `""` | +| `receive.schedulerName` | Name of the k8s scheduler (other than default) for Thanos Receive pods | `""` | +| `receive.topologySpreadConstraints` | Topology Spread Constraints for Thanos Receive pods assignment spread across your cluster among failure-domains | `[]` | +| `receive.networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `true` | +| `receive.networkPolicy.allowExternal` | Don't require client label for connections | `true` | +| `receive.networkPolicy.allowExternalEgress` | Allow the pod to access any range of port and all destinations. | `true` | +| `receive.networkPolicy.extraIngress` | Add extra ingress rules to the NetworkPolice | `[]` | +| `receive.networkPolicy.extraEgress` | Add extra ingress rules to the NetworkPolicy | `[]` | +| `receive.networkPolicy.ingressNSMatchLabels` | Labels to match to allow traffic from other namespaces | `{}` | +| `receive.networkPolicy.ingressNSPodMatchLabels` | Pod labels to match to allow traffic from other namespaces | `{}` | +| `receive.service.type` | Kubernetes service type | `ClusterIP` | +| `receive.service.ports.http` | Thanos Ruler service HTTP port | `10902` | +| `receive.service.ports.grpc` | Thanos Ruler service GRPC port | `10901` | +| `receive.service.ports.remote` | Thanos Ruler service remote port | `19291` | +| `receive.service.nodePorts.http` | Specify the Thanos Ruler HTTP nodePort value for the LoadBalancer and NodePort service types | `""` | +| `receive.service.nodePorts.grpc` | Specify the Thanos Ruler GRPC nodePort value for the LoadBalancer and NodePort service types | `""` | +| `receive.service.nodePorts.remote` | Specify the Thanos Ruler remote nodePort value for the LoadBalancer and NodePort service types | `""` | +| `receive.service.clusterIP` | Thanos Ruler service clusterIP IP | `""` | +| `receive.service.loadBalancerIP` | Load balancer IP if service type is `LoadBalancer` | `""` | +| `receive.service.loadBalancerSourceRanges` | Addresses that are allowed when service is LoadBalancer | `[]` | +| `receive.service.externalTrafficPolicy` | Thanos Ruler service externalTrafficPolicy | `Cluster` | +| `receive.service.labels` | Extra labels for Thanos Receive service | `{}` | +| `receive.service.annotations` | Annotations for Thanos Receive service | `{}` | +| `receive.service.extraPorts` | Extra ports to expose in the Thanos Receive service | `[]` | +| `receive.service.labelSelectorsOverride` | Selector for Thanos receive service | `{}` | +| `receive.service.additionalHeadless` | Additional Headless service | `false` | +| `receive.service.headless.annotations` | Annotations for the headless service. | `{}` | +| `receive.automountServiceAccountToken` | Enable/disable auto mounting of the service account token only for the sts | `true` | +| `receive.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | +| `receive.serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | +| `receive.serviceAccount.annotations` | Annotations for Thanos Receive Service Account | `{}` | +| `receive.serviceAccount.automountServiceAccountToken` | Enable/disable auto mounting of the service account token | `false` | +| `receive.autoscaling.enabled` | Enable autoscaling for Thanos Receive | `false` | +| `receive.autoscaling.minReplicas` | Minimum number of Thanos Receive replicas | `""` | +| `receive.autoscaling.maxReplicas` | Maximum number of Thanos Receive replicas | `""` | +| `receive.autoscaling.targetCPU` | Target CPU utilization percentage | `""` | +| `receive.autoscaling.targetMemory` | Target Memory utilization percentage | `""` | +| `receive.pdb.create` | Enable/disable a Pod Disruption Budget creation for Thanos Receive | `false` | +| `receive.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | +| `receive.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` | +| `receive.persistence.enabled` | Enable data persistence using PVC(s) on Thanos Receive pods | `true` | +| `receive.persistence.storageClass` | Specify the `storageClass` used to provision the volume | `""` | +| `receive.persistence.accessModes` | PVC Access Modes for data volume | `["ReadWriteOnce"]` | +| `receive.persistence.size` | PVC Storage Request for data volume | `8Gi` | +| `receive.persistence.annotations` | Annotations for the PVC | `{}` | +| `receive.persistence.existingClaim` | Name of an existing PVC to use | `""` | +| `receive.ingress.enabled` | Set to true to enable ingress record generation | `false` | +| `receive.ingress.hostname` | When the ingress is enabled, a host pointing to this will be created | `thanos-receive.local` | +| `receive.ingress.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` | +| `receive.ingress.annotations` | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | +| `receive.ingress.extraHosts` | The list of additional hostnames to be covered with this ingress record. | `[]` | +| `receive.ingress.extraTls` | The tls configuration for additional hostnames to be covered with this ingress record. | `[]` | +| `receive.ingress.secrets` | If you're providing your own certificates, please use this to add the certificates as secrets | `[]` | +| `receive.ingress.extraRules` | Additional rules to be covered with this ingress record | `[]` | +| `receive.ingress.tls` | Enable TLS configuration for the hostname defined at `receive.ingress.hostname` parameter | `false` | +| `receive.ingress.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | +| `receive.ingress.apiVersion` | Override API Version (automatically detected if not set) | `""` | +| `receive.ingress.path` | Ingress Path | `/` | +| `receive.ingress.pathType` | Ingress Path type | `ImplementationSpecific` | ### Thanos Receive Distributor parameters -| Name | Description | Value | -| ---------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | -| `receiveDistributor.enabled` | Enable/disable Thanos Receive Distributor component | `false` | -| `receiveDistributor.logLevel` | Thanos Receive Distributor log level | `info` | -| `receiveDistributor.logFormat` | Thanos Receive Distributor log format | `logfmt` | -| `receiveDistributor.replicaLabel` | Label to treat as a replica indicator along which data is de-duplicated | `replica` | -| `receiveDistributor.replicationFactor` | Thanos Receive Distributor replication-factor | `1` | -| `receiveDistributor.extraEnvVars` | Extra environment variables for Thanos Receive Distributor container | `[]` | -| `receiveDistributor.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Thanos Receive Distributor nodes | `""` | -| `receiveDistributor.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Thanos Receive Distributor nodes | `""` | -| `receiveDistributor.extraFlags` | Extra Flags to passed to Thanos Receive Distributor | `[]` | -| `receiveDistributor.command` | Override default container command (useful when using custom images) | `[]` | -| `receiveDistributor.args` | Override default container args (useful when using custom images) | `[]` | -| `receiveDistributor.replicaCount` | Number of Thanos Receive Distributor replicas to deploy | `1` | -| `receiveDistributor.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` | -| `receiveDistributor.updateStrategy.type` | Update strategy type for Thanos Receive Distributor replicas | `RollingUpdate` | -| `receiveDistributor.podSecurityContext.enabled` | Enable security context for the Thanos Receive Distributor pods | `true` | -| `receiveDistributor.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | -| `receiveDistributor.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | -| `receiveDistributor.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | -| `receiveDistributor.podSecurityContext.fsGroup` | Group ID for the filesystem used by Thanos Receive Distributor pods | `1001` | -| `receiveDistributor.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | -| `receiveDistributor.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | -| `receiveDistributor.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | -| `receiveDistributor.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | -| `receiveDistributor.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | -| `receiveDistributor.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | -| `receiveDistributor.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | -| `receiveDistributor.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | -| `receiveDistributor.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | -| `receiveDistributor.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | -| `receiveDistributor.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, small, medium, large, xlarge, 2xlarge). This is ignored if receiveDistributor.resources is set (receiveDistributor.resources is recommended for production). | `nano` | -| `receiveDistributor.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | -| `receiveDistributor.livenessProbe.enabled` | Enable livenessProbe on Thanos Receive Distributor containers | `true` | -| `receiveDistributor.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `30` | -| `receiveDistributor.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | -| `receiveDistributor.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` | -| `receiveDistributor.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | -| `receiveDistributor.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | -| `receiveDistributor.readinessProbe.enabled` | Enable readinessProbe on Thanos Receive Distributor containers | `true` | -| `receiveDistributor.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | -| `receiveDistributor.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | -| `receiveDistributor.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` | -| `receiveDistributor.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | -| `receiveDistributor.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | -| `receiveDistributor.startupProbe.enabled` | Enable startupProbe on Thanos Receive Distributor containers | `false` | -| `receiveDistributor.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | -| `receiveDistributor.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | -| `receiveDistributor.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | -| `receiveDistributor.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | -| `receiveDistributor.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | -| `receiveDistributor.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | -| `receiveDistributor.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | -| `receiveDistributor.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | -| `receiveDistributor.initContainers` | Add additional init containers to the Thanos Receive Distributor pods | `[]` | -| `receiveDistributor.sidecars` | Extra containers running as sidecars to Thanos Receive Distributor pods | `[]` | -| `receiveDistributor.extraVolumes` | Extra volumes to add to Thanos Receive Distributor | `[]` | -| `receiveDistributor.extraVolumeMounts` | Extra volume mounts to add to the receive distributor container | `[]` | -| `receiveDistributor.podAffinityPreset` | Thanos Receive pod affinity preset | `""` | -| `receiveDistributor.podAntiAffinityPreset` | Thanos Receive pod anti-affinity preset. Ignored if `receiveDistributor.affinity` is set. Allowed values: `soft` or `hard` | `soft` | -| `receiveDistributor.nodeAffinityPreset.type` | Thanos Receive node affinity preset type. Ignored if `receiveDistributor.affinity` is set. Allowed values: `soft` or `hard` | `""` | -| `receiveDistributor.nodeAffinityPreset.key` | Thanos Receive node label key to match. Ignored if `receiveDistributor.affinity` is set. | `""` | -| `receiveDistributor.nodeAffinityPreset.values` | Thanos Receive node label values to match. Ignored if `receiveDistributor.affinity` is set. | `[]` | -| `receiveDistributor.affinity` | Thanos Receive Distributor affinity for pod assignment | `{}` | -| `receiveDistributor.nodeSelector` | Thanos Receive Distributor node labels for pod assignment | `{}` | -| `receiveDistributor.tolerations` | Thanos Receive Distributor tolerations for pod assignment | `[]` | -| `receiveDistributor.podLabels` | Thanos Receive Distributor pod labels | `{}` | -| `receiveDistributor.podAnnotations` | Annotations for Thanos Receive Distributor pods | `{}` | -| `receiveDistributor.dnsConfig` | Deployment pod DNS config | `{}` | -| `receiveDistributor.dnsPolicy` | Deployment pod DNS policy | `""` | -| `receiveDistributor.hostAliases` | Deployment pod host aliases | `[]` | -| `receiveDistributor.lifecycleHooks` | for the Thanos Receive Distributor container(s) to automate configuration before or after startup | `{}` | -| `receiveDistributor.priorityClassName` | Thanos Receive Distributor priorityClassName | `""` | -| `receiveDistributor.schedulerName` | Name of the k8s scheduler (other than default) for Thanos Receive Distributor pods | `""` | -| `receiveDistributor.topologySpreadConstraints` | Topology Spread Constraints for Thanos Receive Distributor pods assignment spread across your cluster among failure-domains | `[]` | -| `receiveDistributor.automountServiceAccountToken` | Enable/disable auto mounting of the service account token only for the deployment | `true` | -| `receiveDistributor.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | -| `receiveDistributor.serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | -| `receiveDistributor.serviceAccount.annotations` | Annotations for Thanos Receive Distributor Service Account | `{}` | -| `receiveDistributor.serviceAccount.automountServiceAccountToken` | Enable/disable auto mounting of the service account token | `false` | -| `receiveDistributor.autoscaling.enabled` | Enable autoscaling for Thanos Receive Distributor | `false` | -| `receiveDistributor.autoscaling.minReplicas` | Minimum number of Thanos Receive Distributor replicas | `""` | -| `receiveDistributor.autoscaling.maxReplicas` | Maximum number of Thanos Receive Distributor replicas | `""` | -| `receiveDistributor.autoscaling.targetCPU` | Target CPU utilization percentage | `""` | -| `receiveDistributor.autoscaling.targetMemory` | Target Memory utilization percentage | `""` | -| `receiveDistributor.pdb.create` | Enable/disable a Pod Disruption Budget creation for Thanos Receive Distributor | `false` | -| `receiveDistributor.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | -| `receiveDistributor.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` | +| Name | Description | Value | +| ---------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------- | +| `receiveDistributor.enabled` | Enable/disable Thanos Receive Distributor component | `false` | +| `receiveDistributor.logLevel` | Thanos Receive Distributor log level | `info` | +| `receiveDistributor.logFormat` | Thanos Receive Distributor log format | `logfmt` | +| `receiveDistributor.replicaLabel` | Label to treat as a replica indicator along which data is de-duplicated | `replica` | +| `receiveDistributor.replicationFactor` | Thanos Receive Distributor replication-factor | `1` | +| `receiveDistributor.extraEnvVars` | Extra environment variables for Thanos Receive Distributor container | `[]` | +| `receiveDistributor.extraEnvVarsCM` | Name of existing ConfigMap containing extra env vars for Thanos Receive Distributor nodes | `""` | +| `receiveDistributor.extraEnvVarsSecret` | Name of existing Secret containing extra env vars for Thanos Receive Distributor nodes | `""` | +| `receiveDistributor.extraFlags` | Extra Flags to passed to Thanos Receive Distributor | `[]` | +| `receiveDistributor.command` | Override default container command (useful when using custom images) | `[]` | +| `receiveDistributor.args` | Override default container args (useful when using custom images) | `[]` | +| `receiveDistributor.replicaCount` | Number of Thanos Receive Distributor replicas to deploy | `1` | +| `receiveDistributor.revisionHistoryLimit` | The number of old history to retain to allow rollback | `10` | +| `receiveDistributor.updateStrategy.type` | Update strategy type for Thanos Receive Distributor replicas | `RollingUpdate` | +| `receiveDistributor.podSecurityContext.enabled` | Enable security context for the Thanos Receive Distributor pods | `true` | +| `receiveDistributor.podSecurityContext.fsGroupChangePolicy` | Set filesystem group change policy | `Always` | +| `receiveDistributor.podSecurityContext.sysctls` | Set kernel settings using the sysctl interface | `[]` | +| `receiveDistributor.podSecurityContext.supplementalGroups` | Set filesystem extra groups | `[]` | +| `receiveDistributor.podSecurityContext.fsGroup` | Group ID for the filesystem used by Thanos Receive Distributor pods | `1001` | +| `receiveDistributor.containerSecurityContext.enabled` | Enabled containers' Security Context | `true` | +| `receiveDistributor.containerSecurityContext.seLinuxOptions` | Set SELinux options in container | `{}` | +| `receiveDistributor.containerSecurityContext.runAsUser` | Set containers' Security Context runAsUser | `1001` | +| `receiveDistributor.containerSecurityContext.runAsGroup` | Set containers' Security Context runAsGroup | `1001` | +| `receiveDistributor.containerSecurityContext.runAsNonRoot` | Set container's Security Context runAsNonRoot | `true` | +| `receiveDistributor.containerSecurityContext.privileged` | Set container's Security Context privileged | `false` | +| `receiveDistributor.containerSecurityContext.readOnlyRootFilesystem` | Set container's Security Context readOnlyRootFilesystem | `true` | +| `receiveDistributor.containerSecurityContext.allowPrivilegeEscalation` | Set container's Security Context allowPrivilegeEscalation | `false` | +| `receiveDistributor.containerSecurityContext.capabilities.drop` | List of capabilities to be dropped | `["ALL"]` | +| `receiveDistributor.containerSecurityContext.seccompProfile.type` | Set container's Security Context seccomp profile | `RuntimeDefault` | +| `receiveDistributor.resourcesPreset` | Set container resources according to one common preset (allowed values: none, nano, micro, small, medium, large, xlarge, 2xlarge). This is ignored if receiveDistributor.resources is set (receiveDistributor.resources is recommended for production). | `nano` | +| `receiveDistributor.resources` | Set container requests and limits for different resources like CPU or memory (essential for production workloads) | `{}` | +| `receiveDistributor.livenessProbe.enabled` | Enable livenessProbe on Thanos Receive Distributor containers | `true` | +| `receiveDistributor.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `30` | +| `receiveDistributor.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` | +| `receiveDistributor.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `30` | +| `receiveDistributor.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` | +| `receiveDistributor.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` | +| `receiveDistributor.readinessProbe.enabled` | Enable readinessProbe on Thanos Receive Distributor containers | `true` | +| `receiveDistributor.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `30` | +| `receiveDistributor.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` | +| `receiveDistributor.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `30` | +| `receiveDistributor.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` | +| `receiveDistributor.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` | +| `receiveDistributor.startupProbe.enabled` | Enable startupProbe on Thanos Receive Distributor containers | `false` | +| `receiveDistributor.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `5` | +| `receiveDistributor.startupProbe.periodSeconds` | Period seconds for startupProbe | `5` | +| `receiveDistributor.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` | +| `receiveDistributor.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` | +| `receiveDistributor.startupProbe.successThreshold` | Success threshold for startupProbe | `1` | +| `receiveDistributor.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` | +| `receiveDistributor.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` | +| `receiveDistributor.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` | +| `receiveDistributor.initContainers` | Add additional init containers to the Thanos Receive Distributor pods | `[]` | +| `receiveDistributor.sidecars` | Extra containers running as sidecars to Thanos Receive Distributor pods | `[]` | +| `receiveDistributor.extraVolumes` | Extra volumes to add to Thanos Receive Distributor | `[]` | +| `receiveDistributor.extraVolumeMounts` | Extra volume mounts to add to the receive distributor container | `[]` | +| `receiveDistributor.podAffinityPreset` | Thanos Receive pod affinity preset | `""` | +| `receiveDistributor.podAntiAffinityPreset` | Thanos Receive pod anti-affinity preset. Ignored if `receiveDistributor.affinity` is set. Allowed values: `soft` or `hard` | `soft` | +| `receiveDistributor.nodeAffinityPreset.type` | Thanos Receive node affinity preset type. Ignored if `receiveDistributor.affinity` is set. Allowed values: `soft` or `hard` | `""` | +| `receiveDistributor.nodeAffinityPreset.key` | Thanos Receive node label key to match. Ignored if `receiveDistributor.affinity` is set. | `""` | +| `receiveDistributor.nodeAffinityPreset.values` | Thanos Receive node label values to match. Ignored if `receiveDistributor.affinity` is set. | `[]` | +| `receiveDistributor.affinity` | Thanos Receive Distributor affinity for pod assignment | `{}` | +| `receiveDistributor.nodeSelector` | Thanos Receive Distributor node labels for pod assignment | `{}` | +| `receiveDistributor.tolerations` | Thanos Receive Distributor tolerations for pod assignment | `[]` | +| `receiveDistributor.podLabels` | Thanos Receive Distributor pod labels | `{}` | +| `receiveDistributor.podAnnotations` | Annotations for Thanos Receive Distributor pods | `{}` | +| `receiveDistributor.dnsConfig` | Deployment pod DNS config | `{}` | +| `receiveDistributor.dnsPolicy` | Deployment pod DNS policy | `""` | +| `receiveDistributor.hostAliases` | Deployment pod host aliases | `[]` | +| `receiveDistributor.lifecycleHooks` | for the Thanos Receive Distributor container(s) to automate configuration before or after startup | `{}` | +| `receiveDistributor.priorityClassName` | Thanos Receive Distributor priorityClassName | `""` | +| `receiveDistributor.schedulerName` | Name of the k8s scheduler (other than default) for Thanos Receive Distributor pods | `""` | +| `receiveDistributor.topologySpreadConstraints` | Topology Spread Constraints for Thanos Receive Distributor pods assignment spread across your cluster among failure-domains | `[]` | +| `receiveDistributor.automountServiceAccountToken` | Enable/disable auto mounting of the service account token only for the deployment | `true` | +| `receiveDistributor.serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | +| `receiveDistributor.serviceAccount.name` | Name of the service account to use. If not set and create is true, a name is generated using the fullname template. | `""` | +| `receiveDistributor.serviceAccount.annotations` | Annotations for Thanos Receive Distributor Service Account | `{}` | +| `receiveDistributor.serviceAccount.automountServiceAccountToken` | Enable/disable auto mounting of the service account token | `false` | +| `receiveDistributor.autoscaling.enabled` | Enable autoscaling for Thanos Receive Distributor | `false` | +| `receiveDistributor.autoscaling.minReplicas` | Minimum number of Thanos Receive Distributor replicas | `""` | +| `receiveDistributor.autoscaling.maxReplicas` | Maximum number of Thanos Receive Distributor replicas | `""` | +| `receiveDistributor.autoscaling.targetCPU` | Target CPU utilization percentage | `""` | +| `receiveDistributor.autoscaling.targetMemory` | Target Memory utilization percentage | `""` | +| `receiveDistributor.pdb.create` | Enable/disable a Pod Disruption Budget creation for Thanos Receive Distributor | `false` | +| `receiveDistributor.pdb.minAvailable` | Minimum number/percentage of pods that should remain scheduled | `1` | +| `receiveDistributor.pdb.maxUnavailable` | Maximum number/percentage of pods that may be made unavailable | `""` | ### Metrics parameters @@ -1836,4 +1836,4 @@ Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and -limitations under the License. +limitations under the License. \ No newline at end of file diff --git a/bitnami/thanos/values.yaml b/bitnami/thanos/values.yaml index 5a6e490851e733..a80e9d441da61f 100644 --- a/bitnami/thanos/values.yaml +++ b/bitnami/thanos/values.yaml @@ -64,7 +64,7 @@ extraDeploy: [] image: registry: docker.io repository: bitnami/thanos - tag: 0.34.1-debian-12-r1 + tag: 0.34.1-debian-12-r2 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/concepts/containers/images/#pre-pulled-images @@ -4895,7 +4895,7 @@ volumePermissions: image: registry: docker.io repository: bitnami/os-shell - tag: 12-debian-12-r16 + tag: 12-debian-12-r18 digest: "" ## Specify a imagePullPolicy. Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: https://kubernetes.io/docs/concepts/containers/images/#pre-pulled-images