mirror of https://github.com/grafana/loki
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
2091 lines
122 KiB
2091 lines
122 KiB
apiVersion: operators.coreos.com/v1alpha1
|
|
kind: ClusterServiceVersion
|
|
metadata:
|
|
annotations:
|
|
alm-examples: |-
|
|
[
|
|
{
|
|
"apiVersion": "loki.grafana.com/v1",
|
|
"kind": "AlertingRule",
|
|
"metadata": {
|
|
"name": "alertingrule-sample"
|
|
},
|
|
"spec": {
|
|
"groups": [
|
|
{
|
|
"interval": "10m",
|
|
"name": "alerting-rules-group",
|
|
"rules": [
|
|
{
|
|
"alert": "HighPercentageError",
|
|
"annotations": {
|
|
"summary": "High request latency"
|
|
},
|
|
"expr": "sum(rate({app=\"foo\", env=\"production\"} |= \"error\" [5m])) by (job)\n /\nsum(rate({app=\"foo\", env=\"production\"}[5m])) by (job)\n \u003e 0.05\n",
|
|
"for": "10m",
|
|
"labels": {
|
|
"severity": "page"
|
|
}
|
|
},
|
|
{
|
|
"alert": "HttpCredentialsLeaked",
|
|
"annotations": {
|
|
"message": "{{ $labels.job }} is leaking http basic auth credentials."
|
|
},
|
|
"expr": "sum by (cluster, job, pod) (count_over_time({namespace=\"prod\"} |~ \"http(s?)://(\\\\w+):(\\\\w+)@\" [5m]) \u003e 0)",
|
|
"for": "10m",
|
|
"labels": {
|
|
"severity": "critical"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"tenantID": "test-tenant"
|
|
}
|
|
},
|
|
{
|
|
"apiVersion": "loki.grafana.com/v1",
|
|
"kind": "LokiStack",
|
|
"metadata": {
|
|
"name": "lokistack-sample"
|
|
},
|
|
"spec": {
|
|
"size": "1x.small",
|
|
"storage": {
|
|
"secret": {
|
|
"name": "test"
|
|
}
|
|
},
|
|
"storageClassName": "standard"
|
|
}
|
|
},
|
|
{
|
|
"apiVersion": "loki.grafana.com/v1",
|
|
"kind": "RecordingRule",
|
|
"metadata": {
|
|
"name": "recordingrule-sample"
|
|
},
|
|
"spec": {
|
|
"groups": [
|
|
{
|
|
"interval": "10m",
|
|
"name": "recording-rules-group",
|
|
"rules": [
|
|
{
|
|
"expr": "sum(rate({container=\"myservice\"}[10m]))\n",
|
|
"record": "myservice:requests:rate10m"
|
|
},
|
|
{
|
|
"expr": "sum(rate({container=\"otherservice\"}[1m]))\n",
|
|
"record": "otherservice:requests:rate1m"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"tenantID": "test-tenant"
|
|
}
|
|
},
|
|
{
|
|
"apiVersion": "loki.grafana.com/v1",
|
|
"kind": "RulerConfig",
|
|
"metadata": {
|
|
"name": "rulerconfig-sample"
|
|
},
|
|
"spec": {
|
|
"alertmanager": {
|
|
"discovery": {
|
|
"enableSRV": true,
|
|
"refreshInterval": "1m"
|
|
},
|
|
"enableV2": true,
|
|
"endpoints": [
|
|
"http://alertmanager-host1.mycompany.org",
|
|
"http://alertmanager-host2.mycompany.org"
|
|
],
|
|
"externalLabels": {
|
|
"environment": "production",
|
|
"region": "us-east-2"
|
|
},
|
|
"externalUrl": "http://www.mycompany.org/alerts",
|
|
"notificationQueue": {
|
|
"capacity": 1000,
|
|
"forGracePeriod": "10m",
|
|
"forOutageTolerance": "1h",
|
|
"resendDelay": "1m",
|
|
"timeout": "30s"
|
|
}
|
|
},
|
|
"evaluationInterval": "1m",
|
|
"pollInterval": "1m",
|
|
"remoteWrite": {
|
|
"client": {
|
|
"authorization": "basic",
|
|
"authorizationSecretName": "my-secret-resource",
|
|
"name": "remote-write-log-metrics",
|
|
"proxyUrl": "http://proxy-host.mycompany.org",
|
|
"relabelConfigs": [
|
|
{
|
|
"action": "replace",
|
|
"regex": "ALERTS.*",
|
|
"replacement": "$1",
|
|
"separator": "",
|
|
"sourceLabels": [
|
|
"labelc",
|
|
"labeld"
|
|
],
|
|
"targetLabel": "labelnew"
|
|
}
|
|
],
|
|
"timeout": "30s",
|
|
"url": "http://remote-write-host.mycompany.org"
|
|
},
|
|
"enabled": true,
|
|
"refreshPeriod": "10s"
|
|
}
|
|
}
|
|
}
|
|
]
|
|
capabilities: Full Lifecycle
|
|
categories: OpenShift Optional, Logging & Tracing
|
|
certified: "false"
|
|
containerImage: docker.io/grafana/loki-operator:0.7.1
|
|
createdAt: "2024-11-08T17:18:28Z"
|
|
description: The Community Loki Operator provides Kubernetes native deployment
|
|
and management of Loki and related logging components.
|
|
operators.operatorframework.io/builder: operator-sdk-unknown
|
|
operators.operatorframework.io/project_layout: go.kubebuilder.io/v4
|
|
repository: https://github.com/grafana/loki/tree/main/operator
|
|
support: Grafana Loki SIG Operator
|
|
labels:
|
|
operatorframework.io/arch.amd64: supported
|
|
operatorframework.io/arch.arm64: supported
|
|
name: loki-operator.v0.7.1
|
|
namespace: placeholder
|
|
spec:
|
|
apiservicedefinitions: {}
|
|
customresourcedefinitions:
|
|
owned:
|
|
- description: AlertingRule is the Schema for the alertingrules API
|
|
displayName: AlertingRule
|
|
kind: AlertingRule
|
|
name: alertingrules.loki.grafana.com
|
|
resources:
|
|
- kind: LokiStack
|
|
name: ""
|
|
version: v1
|
|
specDescriptors:
|
|
- description: List of groups for alerting rules.
|
|
displayName: Groups
|
|
path: groups
|
|
- description: |-
|
|
Interval defines the time interval between evaluation of the given
|
|
alerting rule.
|
|
displayName: Evaluation Interval
|
|
path: groups[0].interval
|
|
- description: Limit defines the number of alerts an alerting rule can produce.
|
|
0 is no limit.
|
|
displayName: Limit of firing alerts
|
|
path: groups[0].limit
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: Name of the alerting rule group. Must be unique within all alerting
|
|
rules.
|
|
displayName: Name
|
|
path: groups[0].name
|
|
- description: Rules defines a list of alerting rules
|
|
displayName: Rules
|
|
path: groups[0].rules
|
|
- description: The name of the alert. Must be a valid label value.
|
|
displayName: Name
|
|
path: groups[0].rules[0].alert
|
|
- description: Annotations to add to each alert.
|
|
displayName: Annotations
|
|
path: groups[0].rules[0].annotations
|
|
- description: |-
|
|
The LogQL expression to evaluate. Every evaluation cycle this is
|
|
evaluated at the current time, and all resultant time series become
|
|
pending/firing alerts.
|
|
displayName: LogQL Expression
|
|
path: groups[0].rules[0].expr
|
|
- description: |-
|
|
Alerts are considered firing once they have been returned for this long.
|
|
Alerts which have not yet fired for long enough are considered pending.
|
|
displayName: Firing Threshold
|
|
path: groups[0].rules[0].for
|
|
- description: Labels to add to each alert.
|
|
displayName: Labels
|
|
path: groups[0].rules[0].labels
|
|
- description: TenantID of tenant where the alerting rules are evaluated in.
|
|
displayName: Tenant ID
|
|
path: tenantID
|
|
statusDescriptors:
|
|
- description: Conditions of the AlertingRule generation health.
|
|
displayName: Conditions
|
|
path: conditions
|
|
x-descriptors:
|
|
- urn:alm:descriptor:io.kubernetes.conditions
|
|
version: v1
|
|
- description: LokiStack is the Schema for the lokistacks API
|
|
displayName: LokiStack
|
|
kind: LokiStack
|
|
name: lokistacks.loki.grafana.com
|
|
resources:
|
|
- kind: ConfigMap
|
|
name: ""
|
|
version: v1
|
|
- kind: Deployment
|
|
name: ""
|
|
version: v1
|
|
- kind: Ingress
|
|
name: ""
|
|
version: v1
|
|
- kind: PersistentVolumeClaims
|
|
name: ""
|
|
version: v1
|
|
- kind: Route
|
|
name: ""
|
|
version: v1
|
|
- kind: Service
|
|
name: ""
|
|
version: v1
|
|
- kind: ServiceAccount
|
|
name: ""
|
|
version: v1
|
|
- kind: ServiceMonitor
|
|
name: ""
|
|
version: v1
|
|
- kind: StatefulSet
|
|
name: ""
|
|
version: v1
|
|
specDescriptors:
|
|
- description: HashRing defines the spec for the distributed hash ring configuration.
|
|
displayName: Hash Ring
|
|
path: hashRing
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: MemberList configuration spec
|
|
displayName: Memberlist Config
|
|
path: hashRing.memberlist
|
|
- description: |-
|
|
EnableIPv6 enables IPv6 support for the memberlist based hash ring.
|
|
|
|
|
|
Currently this also forces the instanceAddrType to podIP to avoid local address lookup
|
|
for the memberlist.
|
|
displayName: Enable IPv6
|
|
path: hashRing.memberlist.enableIPv6
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:booleanSwitch
|
|
- description: |-
|
|
InstanceAddrType defines the type of address to use to advertise to the ring.
|
|
Defaults to the first address from any private network interfaces of the current pod.
|
|
Alternatively the public pod IP can be used in case private networks (RFC 1918 and RFC 6598)
|
|
are not available.
|
|
displayName: Instance Address
|
|
path: hashRing.memberlist.instanceAddrType
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:select:default
|
|
- urn:alm:descriptor:com.tectonic.ui:select:podIP
|
|
- description: Type of hash ring implementation that should be used
|
|
displayName: Type
|
|
path: hashRing.type
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:select:memberlist
|
|
- description: Limits defines the limits to be applied to log stream processing.
|
|
displayName: Rate Limiting
|
|
path: limits
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: Global defines the limits applied globally across the cluster.
|
|
displayName: Global Limits
|
|
path: limits.global
|
|
- description: |-
|
|
IngestionBurstSize defines the local rate-limited sample size per
|
|
distributor replica. It should be set to the set at least to the
|
|
maximum logs size expected in a single push request.
|
|
displayName: Ingestion Burst Size (in MB)
|
|
path: limits.global.ingestion.ingestionBurstSize
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: IngestionRate defines the sample size per second. Units MB.
|
|
displayName: Ingestion Rate (in MB)
|
|
path: limits.global.ingestion.ingestionRate
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
MaxGlobalStreamsPerTenant defines the maximum number of active streams
|
|
per tenant, across the cluster.
|
|
displayName: Max Global Streams per Tenant
|
|
path: limits.global.ingestion.maxGlobalStreamsPerTenant
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
MaxLabelNameLength defines the maximum number of characters allowed
|
|
for label keys in log streams.
|
|
displayName: Max Label Name Length
|
|
path: limits.global.ingestion.maxLabelNameLength
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
MaxLabelNamesPerSeries defines the maximum number of label names per series
|
|
in each log stream.
|
|
displayName: Max Labels Names per Series
|
|
path: limits.global.ingestion.maxLabelNamesPerSeries
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
MaxLabelValueLength defines the maximum number of characters allowed
|
|
for label values in log streams.
|
|
displayName: Max Label Value Length
|
|
path: limits.global.ingestion.maxLabelValueLength
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: MaxLineSize defines the maximum line size on ingestion path.
|
|
Units in Bytes.
|
|
displayName: Max Line Size
|
|
path: limits.global.ingestion.maxLineSize
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
PerStreamDesiredRate defines the desired ingestion rate per second that LokiStack should
|
|
target applying automatic stream sharding. Units MB.
|
|
displayName: Per Stream Desired Rate (in MB)
|
|
path: limits.global.ingestion.perStreamDesiredRate
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: PerStreamRateLimit defines the maximum byte rate per second per
|
|
stream. Units MB.
|
|
displayName: Maximum byte rate per second per stream (in MB)
|
|
path: limits.global.ingestion.perStreamRateLimit
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: PerStreamRateLimitBurst defines the maximum burst bytes per stream.
|
|
Units MB.
|
|
displayName: Maximum burst bytes per stream (in MB)
|
|
path: limits.global.ingestion.perStreamRateLimitBurst
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: StreamLabels configures which resource attributes are converted
|
|
to Loki stream labels.
|
|
displayName: Stream Labels
|
|
path: limits.global.otlp.streamLabels
|
|
- description: ResourceAttributes lists the names of the resource attributes
|
|
that should be converted into Loki stream labels.
|
|
displayName: Resource Attributes
|
|
path: limits.global.otlp.streamLabels.resourceAttributes
|
|
- description: Name contains either a verbatim name of an attribute or a regular
|
|
expression matching many attributes.
|
|
displayName: Name
|
|
path: limits.global.otlp.streamLabels.resourceAttributes[0].name
|
|
- description: If Regex is true, then Name is treated as a regular expression
|
|
instead of as a verbatim attribute name.
|
|
displayName: Treat name as regular expression
|
|
path: limits.global.otlp.streamLabels.resourceAttributes[0].regex
|
|
- description: StructuredMetadata configures which attributes are saved in structured
|
|
metadata.
|
|
displayName: Structured Metadata
|
|
path: limits.global.otlp.structuredMetadata
|
|
- description: LogAttributes lists the names of log attributes that should be
|
|
included in structured metadata.
|
|
displayName: Log Attributes
|
|
path: limits.global.otlp.structuredMetadata.logAttributes
|
|
- description: Name contains either a verbatim name of an attribute or a regular
|
|
expression matching many attributes.
|
|
displayName: Name
|
|
path: limits.global.otlp.structuredMetadata.logAttributes[0].name
|
|
- description: If Regex is true, then Name is treated as a regular expression
|
|
instead of as a verbatim attribute name.
|
|
displayName: Treat name as regular expression
|
|
path: limits.global.otlp.structuredMetadata.logAttributes[0].regex
|
|
- description: ResourceAttributes lists the names of resource attributes that
|
|
should be included in structured metadata.
|
|
displayName: Resource Attributes
|
|
path: limits.global.otlp.structuredMetadata.resourceAttributes
|
|
- description: Name contains either a verbatim name of an attribute or a regular
|
|
expression matching many attributes.
|
|
displayName: Name
|
|
path: limits.global.otlp.structuredMetadata.resourceAttributes[0].name
|
|
- description: If Regex is true, then Name is treated as a regular expression
|
|
instead of as a verbatim attribute name.
|
|
displayName: Treat name as regular expression
|
|
path: limits.global.otlp.structuredMetadata.resourceAttributes[0].regex
|
|
- description: ScopeAttributes lists the names of scope attributes that should
|
|
be included in structured metadata.
|
|
displayName: Scope Attributes
|
|
path: limits.global.otlp.structuredMetadata.scopeAttributes
|
|
- description: Name contains either a verbatim name of an attribute or a regular
|
|
expression matching many attributes.
|
|
displayName: Name
|
|
path: limits.global.otlp.structuredMetadata.scopeAttributes[0].name
|
|
- description: If Regex is true, then Name is treated as a regular expression
|
|
instead of as a verbatim attribute name.
|
|
displayName: Treat name as regular expression
|
|
path: limits.global.otlp.structuredMetadata.scopeAttributes[0].regex
|
|
- description: CardinalityLimit defines the cardinality limit for index queries.
|
|
displayName: Cardinality Limit
|
|
path: limits.global.queries.cardinalityLimit
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
MaxChunksPerQuery defines the maximum number of chunks
|
|
that can be fetched by a single query.
|
|
displayName: Max Chunk per Query
|
|
path: limits.global.queries.maxChunksPerQuery
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
MaxEntriesLimitsPerQuery defines the maximum number of log entries
|
|
that will be returned for a query.
|
|
displayName: Max Entries Limit per Query
|
|
path: limits.global.queries.maxEntriesLimitPerQuery
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
MaxQuerySeries defines the maximum of unique series
|
|
that is returned by a metric query.
|
|
displayName: Max Query Series
|
|
path: limits.global.queries.maxQuerySeries
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: MaxVolumeSeries defines the maximum number of aggregated series
|
|
in a log-volume response
|
|
displayName: Max Volume Series
|
|
path: limits.global.queries.maxVolumeSeries
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: Timeout when querying ingesters or storage during the execution
|
|
of a query request.
|
|
displayName: Query Timeout
|
|
path: limits.global.queries.queryTimeout
|
|
- description: Tenants defines the limits applied per tenant.
|
|
displayName: Limits per Tenant
|
|
path: limits.tenants
|
|
- description: |-
|
|
IngestionBurstSize defines the local rate-limited sample size per
|
|
distributor replica. It should be set to the set at least to the
|
|
maximum logs size expected in a single push request.
|
|
displayName: Ingestion Burst Size (in MB)
|
|
path: limits.tenants.ingestion.ingestionBurstSize
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: IngestionRate defines the sample size per second. Units MB.
|
|
displayName: Ingestion Rate (in MB)
|
|
path: limits.tenants.ingestion.ingestionRate
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
MaxGlobalStreamsPerTenant defines the maximum number of active streams
|
|
per tenant, across the cluster.
|
|
displayName: Max Global Streams per Tenant
|
|
path: limits.tenants.ingestion.maxGlobalStreamsPerTenant
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
MaxLabelNameLength defines the maximum number of characters allowed
|
|
for label keys in log streams.
|
|
displayName: Max Label Name Length
|
|
path: limits.tenants.ingestion.maxLabelNameLength
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
MaxLabelNamesPerSeries defines the maximum number of label names per series
|
|
in each log stream.
|
|
displayName: Max Labels Names per Series
|
|
path: limits.tenants.ingestion.maxLabelNamesPerSeries
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
MaxLabelValueLength defines the maximum number of characters allowed
|
|
for label values in log streams.
|
|
displayName: Max Label Value Length
|
|
path: limits.tenants.ingestion.maxLabelValueLength
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: MaxLineSize defines the maximum line size on ingestion path.
|
|
Units in Bytes.
|
|
displayName: Max Line Size
|
|
path: limits.tenants.ingestion.maxLineSize
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
PerStreamDesiredRate defines the desired ingestion rate per second that LokiStack should
|
|
target applying automatic stream sharding. Units MB.
|
|
displayName: Per Stream Desired Rate (in MB)
|
|
path: limits.tenants.ingestion.perStreamDesiredRate
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: PerStreamRateLimit defines the maximum byte rate per second per
|
|
stream. Units MB.
|
|
displayName: Maximum byte rate per second per stream (in MB)
|
|
path: limits.tenants.ingestion.perStreamRateLimit
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: PerStreamRateLimitBurst defines the maximum burst bytes per stream.
|
|
Units MB.
|
|
displayName: Maximum burst bytes per stream (in MB)
|
|
path: limits.tenants.ingestion.perStreamRateLimitBurst
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: StreamLabels configures which resource attributes are converted
|
|
to Loki stream labels.
|
|
displayName: Stream Labels
|
|
path: limits.tenants.otlp.streamLabels
|
|
- description: ResourceAttributes lists the names of the resource attributes
|
|
that should be converted into Loki stream labels.
|
|
displayName: Resource Attributes
|
|
path: limits.tenants.otlp.streamLabels.resourceAttributes
|
|
- description: Name contains either a verbatim name of an attribute or a regular
|
|
expression matching many attributes.
|
|
displayName: Name
|
|
path: limits.tenants.otlp.streamLabels.resourceAttributes[0].name
|
|
- description: If Regex is true, then Name is treated as a regular expression
|
|
instead of as a verbatim attribute name.
|
|
displayName: Treat name as regular expression
|
|
path: limits.tenants.otlp.streamLabels.resourceAttributes[0].regex
|
|
- description: StructuredMetadata configures which attributes are saved in structured
|
|
metadata.
|
|
displayName: Structured Metadata
|
|
path: limits.tenants.otlp.structuredMetadata
|
|
- description: LogAttributes lists the names of log attributes that should be
|
|
included in structured metadata.
|
|
displayName: Log Attributes
|
|
path: limits.tenants.otlp.structuredMetadata.logAttributes
|
|
- description: Name contains either a verbatim name of an attribute or a regular
|
|
expression matching many attributes.
|
|
displayName: Name
|
|
path: limits.tenants.otlp.structuredMetadata.logAttributes[0].name
|
|
- description: If Regex is true, then Name is treated as a regular expression
|
|
instead of as a verbatim attribute name.
|
|
displayName: Treat name as regular expression
|
|
path: limits.tenants.otlp.structuredMetadata.logAttributes[0].regex
|
|
- description: ResourceAttributes lists the names of resource attributes that
|
|
should be included in structured metadata.
|
|
displayName: Resource Attributes
|
|
path: limits.tenants.otlp.structuredMetadata.resourceAttributes
|
|
- description: Name contains either a verbatim name of an attribute or a regular
|
|
expression matching many attributes.
|
|
displayName: Name
|
|
path: limits.tenants.otlp.structuredMetadata.resourceAttributes[0].name
|
|
- description: If Regex is true, then Name is treated as a regular expression
|
|
instead of as a verbatim attribute name.
|
|
displayName: Treat name as regular expression
|
|
path: limits.tenants.otlp.structuredMetadata.resourceAttributes[0].regex
|
|
- description: ScopeAttributes lists the names of scope attributes that should
|
|
be included in structured metadata.
|
|
displayName: Scope Attributes
|
|
path: limits.tenants.otlp.structuredMetadata.scopeAttributes
|
|
- description: Name contains either a verbatim name of an attribute or a regular
|
|
expression matching many attributes.
|
|
displayName: Name
|
|
path: limits.tenants.otlp.structuredMetadata.scopeAttributes[0].name
|
|
- description: If Regex is true, then Name is treated as a regular expression
|
|
instead of as a verbatim attribute name.
|
|
displayName: Treat name as regular expression
|
|
path: limits.tenants.otlp.structuredMetadata.scopeAttributes[0].regex
|
|
- description: Blocked defines the list of rules to block matching queries.
|
|
displayName: Blocked
|
|
path: limits.tenants.queries.blocked
|
|
- description: Hash is a 32-bit FNV-1 hash of the query string.
|
|
displayName: Query Hash
|
|
path: limits.tenants.queries.blocked[0].hash
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: Pattern defines the pattern matching the queries to be blocked.
|
|
displayName: Query Pattern
|
|
path: limits.tenants.queries.blocked[0].pattern
|
|
- description: Regex defines if the pattern is a regular expression. If false
|
|
the pattern will be used only for exact matches.
|
|
displayName: Regex
|
|
path: limits.tenants.queries.blocked[0].regex
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:booleanSwitch
|
|
- description: Types defines the list of query types that should be considered
|
|
for blocking.
|
|
displayName: Query Types
|
|
path: limits.tenants.queries.blocked[0].types
|
|
- description: CardinalityLimit defines the cardinality limit for index queries.
|
|
displayName: Cardinality Limit
|
|
path: limits.tenants.queries.cardinalityLimit
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
MaxChunksPerQuery defines the maximum number of chunks
|
|
that can be fetched by a single query.
|
|
displayName: Max Chunk per Query
|
|
path: limits.tenants.queries.maxChunksPerQuery
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
MaxEntriesLimitsPerQuery defines the maximum number of log entries
|
|
that will be returned for a query.
|
|
displayName: Max Entries Limit per Query
|
|
path: limits.tenants.queries.maxEntriesLimitPerQuery
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
MaxQuerySeries defines the maximum of unique series
|
|
that is returned by a metric query.
|
|
displayName: Max Query Series
|
|
path: limits.tenants.queries.maxQuerySeries
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: MaxVolumeSeries defines the maximum number of aggregated series
|
|
in a log-volume response
|
|
displayName: Max Volume Series
|
|
path: limits.tenants.queries.maxVolumeSeries
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: Timeout when querying ingesters or storage during the execution
|
|
of a query request.
|
|
displayName: Query Timeout
|
|
path: limits.tenants.queries.queryTimeout
|
|
- description: |-
|
|
ManagementState defines if the CR should be managed by the operator or not.
|
|
Default is managed.
|
|
displayName: Management State
|
|
path: managementState
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:select:Managed
|
|
- urn:alm:descriptor:com.tectonic.ui:select:Unmanaged
|
|
- description: Proxy defines the spec for the object proxy to configure cluster
|
|
proxy information.
|
|
displayName: Cluster Proxy
|
|
path: proxy
|
|
- description: HTTPProxy configures the HTTP_PROXY/http_proxy env variable.
|
|
displayName: HTTPProxy
|
|
path: proxy.httpProxy
|
|
- description: HTTPSProxy configures the HTTPS_PROXY/https_proxy env variable.
|
|
displayName: HTTPSProxy
|
|
path: proxy.httpsProxy
|
|
- description: NoProxy configures the NO_PROXY/no_proxy env variable.
|
|
displayName: NoProxy
|
|
path: proxy.noProxy
|
|
- description: Replication defines the configuration for Loki data replication.
|
|
displayName: Replication Spec
|
|
path: replication
|
|
- description: Factor defines the policy for log stream replication.
|
|
displayName: Replication Factor
|
|
path: replication.factor
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
Zones defines an array of ZoneSpec that the scheduler will try to satisfy.
|
|
IMPORTANT: Make sure that the replication factor defined is less than or equal to the number of available zones.
|
|
displayName: Zones Spec
|
|
path: replication.zones
|
|
- description: MaxSkew describes the maximum degree to which Pods can be unevenly
|
|
distributed.
|
|
displayName: Max Skew
|
|
path: replication.zones[0].maxSkew
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: TopologyKey is the key that defines a topology in the Nodes'
|
|
labels.
|
|
displayName: Topology Key
|
|
path: replication.zones[0].topologyKey
|
|
- description: |-
|
|
Deprecated: Please use replication.factor instead. This field will be removed in future versions of this CRD.
|
|
ReplicationFactor defines the policy for log stream replication.
|
|
displayName: Replication Factor
|
|
path: replicationFactor
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: Rules defines the spec for the ruler component.
|
|
displayName: Rules
|
|
path: rules
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: Enabled defines a flag to enable/disable the ruler component
|
|
displayName: Enable
|
|
path: rules.enabled
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:booleanSwitch
|
|
- description: |-
|
|
Namespaces to be selected for PrometheusRules discovery. If unspecified, only
|
|
the same namespace as the LokiStack object is in is used.
|
|
displayName: Namespace Selector
|
|
path: rules.namespaceSelector
|
|
- description: |-
|
|
A selector to select which LokiRules to mount for loading alerting/recording
|
|
rules from.
|
|
displayName: Selector
|
|
path: rules.selector
|
|
- description: Size defines one of the support Loki deployment scale out sizes.
|
|
displayName: LokiStack Size
|
|
path: size
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:select:1x.pico
|
|
- urn:alm:descriptor:com.tectonic.ui:select:1x.extra-small
|
|
- urn:alm:descriptor:com.tectonic.ui:select:1x.small
|
|
- urn:alm:descriptor:com.tectonic.ui:select:1x.medium
|
|
- description: Storage defines the spec for the object storage endpoint to store
|
|
logs.
|
|
displayName: Object Storage
|
|
path: storage
|
|
- description: Version for writing and reading logs.
|
|
displayName: Version
|
|
path: storage.schemas[0].version
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:select:v11
|
|
- urn:alm:descriptor:com.tectonic.ui:select:v12
|
|
- urn:alm:descriptor:com.tectonic.ui:select:v13
|
|
- description: Name of a secret in the namespace configured for object storage
|
|
secrets.
|
|
displayName: Object Storage Secret Name
|
|
path: storage.secret.name
|
|
x-descriptors:
|
|
- urn:alm:descriptor:io.kubernetes:Secret
|
|
- description: Type of object storage that should be used
|
|
displayName: Object Storage Secret Type
|
|
path: storage.secret.type
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:select:azure
|
|
- urn:alm:descriptor:com.tectonic.ui:select:gcs
|
|
- urn:alm:descriptor:com.tectonic.ui:select:s3
|
|
- urn:alm:descriptor:com.tectonic.ui:select:swift
|
|
- urn:alm:descriptor:com.tectonic.ui:select:alibabacloud
|
|
- description: TLS configuration for reaching the object storage endpoint.
|
|
displayName: TLS Config
|
|
path: storage.tls
|
|
- description: |-
|
|
Key is the data key of a ConfigMap containing a CA certificate.
|
|
It needs to be in the same namespace as the LokiStack custom resource.
|
|
If empty, it defaults to "service-ca.crt".
|
|
displayName: CA ConfigMap Key
|
|
path: storage.tls.caKey
|
|
- description: |-
|
|
CA is the name of a ConfigMap containing a CA certificate.
|
|
It needs to be in the same namespace as the LokiStack custom resource.
|
|
displayName: CA ConfigMap Name
|
|
path: storage.tls.caName
|
|
x-descriptors:
|
|
- urn:alm:descriptor:io.kubernetes:ConfigMap
|
|
- description: Storage class name defines the storage class for ingester/querier
|
|
PVCs.
|
|
displayName: Storage Class Name
|
|
path: storageClassName
|
|
x-descriptors:
|
|
- urn:alm:descriptor:io.kubernetes:StorageClass
|
|
- description: Template defines the resource/limits/tolerations/nodeselectors
|
|
per component.
|
|
displayName: Node Placement
|
|
path: template
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: Compactor defines the compaction component spec.
|
|
displayName: Compactor pods
|
|
path: template.compactor
|
|
- description: |-
|
|
PodAntiAffinity defines the pod anti affinity scheduling rules to schedule pods
|
|
of a component.
|
|
displayName: PodAntiAffinity
|
|
path: template.compactor.podAntiAffinity
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:podAntiAffinity
|
|
- description: Replicas defines the number of replica pods of the component.
|
|
displayName: Replicas
|
|
path: template.compactor.replicas
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:hidden
|
|
- description: Distributor defines the distributor component spec.
|
|
displayName: Distributor pods
|
|
path: template.distributor
|
|
- description: |-
|
|
PodAntiAffinity defines the pod anti affinity scheduling rules to schedule pods
|
|
of a component.
|
|
displayName: PodAntiAffinity
|
|
path: template.distributor.podAntiAffinity
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:podAntiAffinity
|
|
- description: Replicas defines the number of replica pods of the component.
|
|
displayName: Replicas
|
|
path: template.distributor.replicas
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:hidden
|
|
- description: Gateway defines the lokistack gateway component spec.
|
|
displayName: Gateway pods
|
|
path: template.gateway
|
|
- description: |-
|
|
PodAntiAffinity defines the pod anti affinity scheduling rules to schedule pods
|
|
of a component.
|
|
displayName: PodAntiAffinity
|
|
path: template.gateway.podAntiAffinity
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:podAntiAffinity
|
|
- description: Replicas defines the number of replica pods of the component.
|
|
displayName: Replicas
|
|
path: template.gateway.replicas
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:hidden
|
|
- description: IndexGateway defines the index gateway component spec.
|
|
displayName: Index Gateway pods
|
|
path: template.indexGateway
|
|
- description: |-
|
|
PodAntiAffinity defines the pod anti affinity scheduling rules to schedule pods
|
|
of a component.
|
|
displayName: PodAntiAffinity
|
|
path: template.indexGateway.podAntiAffinity
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:podAntiAffinity
|
|
- description: Replicas defines the number of replica pods of the component.
|
|
displayName: Replicas
|
|
path: template.indexGateway.replicas
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:hidden
|
|
- description: Ingester defines the ingester component spec.
|
|
displayName: Ingester pods
|
|
path: template.ingester
|
|
- description: |-
|
|
PodAntiAffinity defines the pod anti affinity scheduling rules to schedule pods
|
|
of a component.
|
|
displayName: PodAntiAffinity
|
|
path: template.ingester.podAntiAffinity
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:podAntiAffinity
|
|
- description: Replicas defines the number of replica pods of the component.
|
|
displayName: Replicas
|
|
path: template.ingester.replicas
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:hidden
|
|
- description: Querier defines the querier component spec.
|
|
displayName: Querier pods
|
|
path: template.querier
|
|
- description: |-
|
|
PodAntiAffinity defines the pod anti affinity scheduling rules to schedule pods
|
|
of a component.
|
|
displayName: PodAntiAffinity
|
|
path: template.querier.podAntiAffinity
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:podAntiAffinity
|
|
- description: Replicas defines the number of replica pods of the component.
|
|
displayName: Replicas
|
|
path: template.querier.replicas
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:hidden
|
|
- description: QueryFrontend defines the query frontend component spec.
|
|
displayName: Query Frontend pods
|
|
path: template.queryFrontend
|
|
- description: |-
|
|
PodAntiAffinity defines the pod anti affinity scheduling rules to schedule pods
|
|
of a component.
|
|
displayName: PodAntiAffinity
|
|
path: template.queryFrontend.podAntiAffinity
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:podAntiAffinity
|
|
- description: Replicas defines the number of replica pods of the component.
|
|
displayName: Replicas
|
|
path: template.queryFrontend.replicas
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:hidden
|
|
- description: Ruler defines the ruler component spec.
|
|
displayName: Ruler pods
|
|
path: template.ruler
|
|
- description: |-
|
|
PodAntiAffinity defines the pod anti affinity scheduling rules to schedule pods
|
|
of a component.
|
|
displayName: PodAntiAffinity
|
|
path: template.ruler.podAntiAffinity
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:podAntiAffinity
|
|
- description: Replicas defines the number of replica pods of the component.
|
|
displayName: Replicas
|
|
path: template.ruler.replicas
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:hidden
|
|
- description: Tenants defines the per-tenant authentication and authorization
|
|
spec for the lokistack-gateway component.
|
|
displayName: Tenants Configuration
|
|
path: tenants
|
|
- description: Authentication defines the lokistack-gateway component authentication
|
|
configuration spec per tenant.
|
|
displayName: Authentication
|
|
path: tenants.authentication
|
|
- description: TLSConfig defines the spec for the mTLS tenant's authentication.
|
|
displayName: mTLS Configuration
|
|
path: tenants.authentication[0].mTLS
|
|
- description: CA defines the spec for the custom CA for tenant's authentication.
|
|
displayName: CA ConfigMap
|
|
path: tenants.authentication[0].mTLS.ca
|
|
- description: |-
|
|
Key is the data key of a ConfigMap containing a CA certificate.
|
|
It needs to be in the same namespace as the LokiStack custom resource.
|
|
If empty, it defaults to "service-ca.crt".
|
|
displayName: CA ConfigMap Key
|
|
path: tenants.authentication[0].mTLS.ca.caKey
|
|
- description: |-
|
|
CA is the name of a ConfigMap containing a CA certificate.
|
|
It needs to be in the same namespace as the LokiStack custom resource.
|
|
displayName: CA ConfigMap Name
|
|
path: tenants.authentication[0].mTLS.ca.caName
|
|
x-descriptors:
|
|
- urn:alm:descriptor:io.kubernetes:ConfigMap
|
|
- description: OIDC defines the spec for the OIDC tenant's authentication.
|
|
displayName: OIDC Configuration
|
|
path: tenants.authentication[0].oidc
|
|
- description: IssuerCA defines the spec for the issuer CA for tenant's authentication.
|
|
displayName: IssuerCA ConfigMap
|
|
path: tenants.authentication[0].oidc.issuerCA
|
|
- description: |-
|
|
Key is the data key of a ConfigMap containing a CA certificate.
|
|
It needs to be in the same namespace as the LokiStack custom resource.
|
|
If empty, it defaults to "service-ca.crt".
|
|
displayName: CA ConfigMap Key
|
|
path: tenants.authentication[0].oidc.issuerCA.caKey
|
|
- description: |-
|
|
CA is the name of a ConfigMap containing a CA certificate.
|
|
It needs to be in the same namespace as the LokiStack custom resource.
|
|
displayName: CA ConfigMap Name
|
|
path: tenants.authentication[0].oidc.issuerCA.caName
|
|
x-descriptors:
|
|
- urn:alm:descriptor:io.kubernetes:ConfigMap
|
|
- description: IssuerURL defines the URL for issuer.
|
|
displayName: Issuer URL
|
|
path: tenants.authentication[0].oidc.issuerURL
|
|
- description: RedirectURL defines the URL for redirect.
|
|
displayName: Redirect URL
|
|
path: tenants.authentication[0].oidc.redirectURL
|
|
- description: Secret defines the spec for the clientID and clientSecret for
|
|
tenant's authentication.
|
|
displayName: Tenant Secret
|
|
path: tenants.authentication[0].oidc.secret
|
|
- description: Name of a secret in the namespace configured for tenant secrets.
|
|
displayName: Tenant Secret Name
|
|
path: tenants.authentication[0].oidc.secret.name
|
|
x-descriptors:
|
|
- urn:alm:descriptor:io.kubernetes:Secret
|
|
- description: TenantID defines the id of the tenant.
|
|
displayName: Tenant ID
|
|
path: tenants.authentication[0].tenantId
|
|
- description: TenantName defines the name of the tenant.
|
|
displayName: Tenant Name
|
|
path: tenants.authentication[0].tenantName
|
|
- description: Authorization defines the lokistack-gateway component authorization
|
|
configuration spec per tenant.
|
|
displayName: Authorization
|
|
path: tenants.authorization
|
|
- description: OPA defines the spec for the third-party endpoint for tenant's
|
|
authorization.
|
|
displayName: OPA Configuration
|
|
path: tenants.authorization.opa
|
|
- description: URL defines the third-party endpoint for authorization.
|
|
displayName: OpenPolicyAgent URL
|
|
path: tenants.authorization.opa.url
|
|
- description: RoleBindings defines configuration to bind a set of roles to
|
|
a set of subjects.
|
|
displayName: Static Role Bindings
|
|
path: tenants.authorization.roleBindings
|
|
- description: Roles defines a set of permissions to interact with a tenant.
|
|
displayName: Static Roles
|
|
path: tenants.authorization.roles
|
|
- description: Mode defines the mode in which lokistack-gateway component will
|
|
be configured.
|
|
displayName: Mode
|
|
path: tenants.mode
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:select:static
|
|
- urn:alm:descriptor:com.tectonic.ui:select:dynamic
|
|
- urn:alm:descriptor:com.tectonic.ui:select:openshift-logging
|
|
- urn:alm:descriptor:com.tectonic.ui:select:openshift-network
|
|
- description: Openshift defines the configuration specific to Openshift modes.
|
|
displayName: Openshift
|
|
path: tenants.openshift
|
|
- description: |-
|
|
AdminGroups defines a list of groups, whose members are considered to have admin-privileges by the Loki Operator.
|
|
Setting this to an empty array disables admin groups.
|
|
|
|
|
|
By default the following groups are considered admin-groups:
|
|
- system:cluster-admins
|
|
- cluster-admin
|
|
- dedicated-admin
|
|
displayName: Admin Groups
|
|
path: tenants.openshift.adminGroups
|
|
- description: OTLP contains settings for ingesting data using OTLP in the OpenShift
|
|
tenancy mode.
|
|
displayName: OpenTelemetry Protocol
|
|
path: tenants.openshift.otlp
|
|
- description: |-
|
|
DisableRecommendedAttributes can be used to reduce the number of attributes used for stream labels and structured
|
|
metadata.
|
|
|
|
|
|
Enabling this setting removes the "recommended attributes" from the generated Loki configuration. This will cause
|
|
meta information to not be available as stream labels or structured metadata, potentially making queries more
|
|
expensive and less performant.
|
|
|
|
|
|
Note that there is a set of "required attributes", needed for OpenShift Logging to work properly. Those will be
|
|
added to the configuration, even if this field is set to true.
|
|
|
|
|
|
This option is supposed to be combined with a custom label configuration customizing the labels for the specific
|
|
usecase.
|
|
displayName: Disable recommended OTLP attributes
|
|
path: tenants.openshift.otlp.disableRecommendedAttributes
|
|
statusDescriptors:
|
|
- description: Distributor is a map to the per pod status of the distributor
|
|
deployment
|
|
displayName: Distributor
|
|
path: components.distributor
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:podStatuses
|
|
- description: Ingester is a map to the per pod status of the ingester statefulset
|
|
displayName: Ingester
|
|
path: components.ingester
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:podStatuses
|
|
- description: Querier is a map to the per pod status of the querier deployment
|
|
displayName: Querier
|
|
path: components.querier
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:podStatuses
|
|
- description: QueryFrontend is a map to the per pod status of the query frontend
|
|
deployment
|
|
displayName: Query Frontend
|
|
path: components.queryFrontend
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:podStatuses
|
|
- description: Compactor is a map to the pod status of the compactor pod.
|
|
displayName: Compactor
|
|
path: components.compactor
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:podStatuses
|
|
- description: Gateway is a map to the per pod status of the lokistack gateway
|
|
deployment.
|
|
displayName: Gateway
|
|
path: components.gateway
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:podStatuses
|
|
- description: IndexGateway is a map to the per pod status of the index gateway
|
|
statefulset
|
|
displayName: IndexGateway
|
|
path: components.indexGateway
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:podStatuses
|
|
- description: Ruler is a map to the per pod status of the lokistack ruler statefulset.
|
|
displayName: Ruler
|
|
path: components.ruler
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:podStatuses
|
|
- description: Conditions of the Loki deployment health.
|
|
displayName: Conditions
|
|
path: conditions
|
|
x-descriptors:
|
|
- urn:alm:descriptor:io.kubernetes.conditions
|
|
version: v1
|
|
- description: RecordingRule is the Schema for the recordingrules API
|
|
displayName: RecordingRule
|
|
kind: RecordingRule
|
|
name: recordingrules.loki.grafana.com
|
|
resources:
|
|
- kind: LokiStack
|
|
name: ""
|
|
version: v1
|
|
specDescriptors:
|
|
- description: List of groups for recording rules.
|
|
displayName: Groups
|
|
path: groups
|
|
- description: |-
|
|
Interval defines the time interval between evaluation of the given
|
|
recoding rule.
|
|
displayName: Evaluation Interval
|
|
path: groups[0].interval
|
|
- description: Limit defines the number of series a recording rule can produce.
|
|
0 is no limit.
|
|
displayName: Limit of produced series
|
|
path: groups[0].limit
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: Name of the recording rule group. Must be unique within all recording
|
|
rules.
|
|
displayName: Name
|
|
path: groups[0].name
|
|
- description: Rules defines a list of recording rules
|
|
displayName: Rules
|
|
path: groups[0].rules
|
|
- description: |-
|
|
The LogQL expression to evaluate. Every evaluation cycle this is
|
|
evaluated at the current time, and all resultant time series become
|
|
pending/firing alerts.
|
|
displayName: LogQL Expression
|
|
path: groups[0].rules[0].expr
|
|
- description: Labels to add to each recording rule.
|
|
displayName: Labels
|
|
path: groups[0].rules[0].labels
|
|
- description: The name of the time series to output to. Must be a valid metric
|
|
name.
|
|
displayName: Metric Name
|
|
path: groups[0].rules[0].record
|
|
- description: TenantID of tenant where the recording rules are evaluated in.
|
|
displayName: Tenant ID
|
|
path: tenantID
|
|
statusDescriptors:
|
|
- description: Conditions of the RecordingRule generation health.
|
|
displayName: Conditions
|
|
path: conditions
|
|
x-descriptors:
|
|
- urn:alm:descriptor:io.kubernetes.conditions
|
|
version: v1
|
|
- description: RulerConfig is the Schema for the rulerconfigs API
|
|
displayName: RulerConfig
|
|
kind: RulerConfig
|
|
name: rulerconfigs.loki.grafana.com
|
|
resources:
|
|
- kind: LokiStack
|
|
name: ""
|
|
version: v1
|
|
specDescriptors:
|
|
- description: Defines alert manager configuration to notify on firing alerts.
|
|
displayName: Alert Manager Configuration
|
|
path: alertmanager
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: Client configuration for reaching the alertmanager endpoint.
|
|
displayName: TLS Config
|
|
path: alertmanager.client
|
|
- description: Basic authentication configuration for reaching the alertmanager
|
|
endpoints.
|
|
displayName: Basic Authentication
|
|
path: alertmanager.client.basicAuth
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: The subject's password for the basic authentication configuration.
|
|
displayName: Password
|
|
path: alertmanager.client.basicAuth.password
|
|
- description: The subject's username for the basic authentication configuration.
|
|
displayName: Username
|
|
path: alertmanager.client.basicAuth.username
|
|
- description: Header authentication configuration for reaching the alertmanager
|
|
endpoints.
|
|
displayName: Header Authentication
|
|
path: alertmanager.client.headerAuth
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: The credentials for the header authentication configuration.
|
|
displayName: Credentials
|
|
path: alertmanager.client.headerAuth.credentials
|
|
- description: The credentials file for the Header authentication configuration.
|
|
It is mutually exclusive with `credentials`.
|
|
displayName: Credentials File
|
|
path: alertmanager.client.headerAuth.credentialsFile
|
|
- description: The authentication type for the header authentication configuration.
|
|
displayName: Type
|
|
path: alertmanager.client.headerAuth.type
|
|
- description: TLS configuration for reaching the alertmanager endpoints.
|
|
displayName: TLS
|
|
path: alertmanager.client.tls
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: The CA certificate file path for the TLS configuration.
|
|
displayName: CA Path
|
|
path: alertmanager.client.tls.caPath
|
|
- description: The client-side certificate file path for the TLS configuration.
|
|
displayName: Cert Path
|
|
path: alertmanager.client.tls.certPath
|
|
- description: Skip validating server certificate.
|
|
displayName: Skip validating server certificate
|
|
path: alertmanager.client.tls.insecureSkipVerify
|
|
- description: The client-side key file path for the TLS configuration.
|
|
displayName: Key Path
|
|
path: alertmanager.client.tls.keyPath
|
|
- description: The server name to validate in the alertmanager server certificates.
|
|
displayName: Server Name
|
|
path: alertmanager.client.tls.serverName
|
|
- description: Defines the configuration for DNS-based discovery of AlertManager
|
|
hosts.
|
|
displayName: DNS Discovery
|
|
path: alertmanager.discovery
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: Use DNS SRV records to discover Alertmanager hosts.
|
|
displayName: Enable SRV
|
|
path: alertmanager.discovery.enableSRV
|
|
- description: How long to wait between refreshing DNS resolutions of Alertmanager
|
|
hosts.
|
|
displayName: Refresh Interval
|
|
path: alertmanager.discovery.refreshInterval
|
|
- description: If enabled, then requests to Alertmanager use the v2 API.
|
|
displayName: Enable AlertManager V2 API
|
|
path: alertmanager.enableV2
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:booleanSwitch
|
|
- description: |-
|
|
List of AlertManager URLs to send notifications to. Each Alertmanager URL is treated as
|
|
a separate group in the configuration. Multiple Alertmanagers in HA per group can be
|
|
supported by using DNS resolution (See EnableDNSDiscovery).
|
|
displayName: AlertManager Endpoints
|
|
path: alertmanager.endpoints
|
|
- description: Additional labels to add to all alerts.
|
|
displayName: Extra Alert Labels
|
|
path: alertmanager.externalLabels
|
|
- description: URL for alerts return path.
|
|
displayName: Alert External URL
|
|
path: alertmanager.externalUrl
|
|
- description: Defines the configuration for the notification queue to AlertManager
|
|
hosts.
|
|
displayName: Notification Queue
|
|
path: alertmanager.notificationQueue
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: Capacity of the queue for notifications to be sent to the Alertmanager.
|
|
displayName: Notification Queue Capacity
|
|
path: alertmanager.notificationQueue.capacity
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
Minimum duration between alert and restored "for" state. This is maintained
|
|
only for alerts with configured "for" time greater than the grace period.
|
|
displayName: Firing Grace Period
|
|
path: alertmanager.notificationQueue.forGracePeriod
|
|
- description: Max time to tolerate outage for restoring "for" state of alert.
|
|
displayName: Outage Tolerance
|
|
path: alertmanager.notificationQueue.forOutageTolerance
|
|
- description: Minimum amount of time to wait before resending an alert to Alertmanager.
|
|
displayName: Resend Delay
|
|
path: alertmanager.notificationQueue.resendDelay
|
|
- description: HTTP timeout duration when sending notifications to the Alertmanager.
|
|
displayName: Timeout
|
|
path: alertmanager.notificationQueue.timeout
|
|
- description: List of alert relabel configurations.
|
|
displayName: Alert Relabel Configuration
|
|
path: alertmanager.relabelConfigs
|
|
- description: Action to perform based on regex matching. Default is 'replace'
|
|
displayName: Action
|
|
path: alertmanager.relabelConfigs[0].action
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:select:drop
|
|
- urn:alm:descriptor:com.tectonic.ui:select:hashmod
|
|
- urn:alm:descriptor:com.tectonic.ui:select:keep
|
|
- urn:alm:descriptor:com.tectonic.ui:select:labeldrop
|
|
- urn:alm:descriptor:com.tectonic.ui:select:labelkeep
|
|
- urn:alm:descriptor:com.tectonic.ui:select:labelmap
|
|
- urn:alm:descriptor:com.tectonic.ui:select:replace
|
|
- description: Modulus to take of the hash of the source label values.
|
|
displayName: Modulus
|
|
path: alertmanager.relabelConfigs[0].modulus
|
|
- description: Regular expression against which the extracted value is matched.
|
|
Default is '(.*)'
|
|
displayName: Regex
|
|
path: alertmanager.relabelConfigs[0].regex
|
|
- description: |-
|
|
Replacement value against which a regex replace is performed if the
|
|
regular expression matches. Regex capture groups are available. Default is '$1'
|
|
displayName: Replacement
|
|
path: alertmanager.relabelConfigs[0].replacement
|
|
- description: Separator placed between concatenated source label values. default
|
|
is ';'.
|
|
displayName: Separator
|
|
path: alertmanager.relabelConfigs[0].separator
|
|
- description: |-
|
|
The source labels select values from existing labels. Their content is concatenated
|
|
using the configured separator and matched against the configured regular expression
|
|
for the replace, keep, and drop actions.
|
|
displayName: Source Labels
|
|
path: alertmanager.relabelConfigs[0].sourceLabels
|
|
- description: |-
|
|
Label to which the resulting value is written in a replace action.
|
|
It is mandatory for replace actions. Regex capture groups are available.
|
|
displayName: Target Label
|
|
path: alertmanager.relabelConfigs[0].targetLabel
|
|
- description: Interval on how frequently to evaluate rules.
|
|
displayName: Evaluation Interval
|
|
path: evaluationInterval
|
|
- description: Overrides defines the config overrides to be applied per-tenant.
|
|
displayName: Rate Limiting
|
|
path: overrides
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: Client configuration for reaching the alertmanager endpoint.
|
|
displayName: TLS Config
|
|
path: overrides.alertmanager.client
|
|
- description: Basic authentication configuration for reaching the alertmanager
|
|
endpoints.
|
|
displayName: Basic Authentication
|
|
path: overrides.alertmanager.client.basicAuth
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: The subject's password for the basic authentication configuration.
|
|
displayName: Password
|
|
path: overrides.alertmanager.client.basicAuth.password
|
|
- description: The subject's username for the basic authentication configuration.
|
|
displayName: Username
|
|
path: overrides.alertmanager.client.basicAuth.username
|
|
- description: Header authentication configuration for reaching the alertmanager
|
|
endpoints.
|
|
displayName: Header Authentication
|
|
path: overrides.alertmanager.client.headerAuth
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: The credentials for the header authentication configuration.
|
|
displayName: Credentials
|
|
path: overrides.alertmanager.client.headerAuth.credentials
|
|
- description: The credentials file for the Header authentication configuration.
|
|
It is mutually exclusive with `credentials`.
|
|
displayName: Credentials File
|
|
path: overrides.alertmanager.client.headerAuth.credentialsFile
|
|
- description: The authentication type for the header authentication configuration.
|
|
displayName: Type
|
|
path: overrides.alertmanager.client.headerAuth.type
|
|
- description: TLS configuration for reaching the alertmanager endpoints.
|
|
displayName: TLS
|
|
path: overrides.alertmanager.client.tls
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: The CA certificate file path for the TLS configuration.
|
|
displayName: CA Path
|
|
path: overrides.alertmanager.client.tls.caPath
|
|
- description: The client-side certificate file path for the TLS configuration.
|
|
displayName: Cert Path
|
|
path: overrides.alertmanager.client.tls.certPath
|
|
- description: Skip validating server certificate.
|
|
displayName: Skip validating server certificate
|
|
path: overrides.alertmanager.client.tls.insecureSkipVerify
|
|
- description: The client-side key file path for the TLS configuration.
|
|
displayName: Key Path
|
|
path: overrides.alertmanager.client.tls.keyPath
|
|
- description: The server name to validate in the alertmanager server certificates.
|
|
displayName: Server Name
|
|
path: overrides.alertmanager.client.tls.serverName
|
|
- description: Defines the configuration for DNS-based discovery of AlertManager
|
|
hosts.
|
|
displayName: DNS Discovery
|
|
path: overrides.alertmanager.discovery
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: Use DNS SRV records to discover Alertmanager hosts.
|
|
displayName: Enable SRV
|
|
path: overrides.alertmanager.discovery.enableSRV
|
|
- description: How long to wait between refreshing DNS resolutions of Alertmanager
|
|
hosts.
|
|
displayName: Refresh Interval
|
|
path: overrides.alertmanager.discovery.refreshInterval
|
|
- description: If enabled, then requests to Alertmanager use the v2 API.
|
|
displayName: Enable AlertManager V2 API
|
|
path: overrides.alertmanager.enableV2
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:booleanSwitch
|
|
- description: |-
|
|
List of AlertManager URLs to send notifications to. Each Alertmanager URL is treated as
|
|
a separate group in the configuration. Multiple Alertmanagers in HA per group can be
|
|
supported by using DNS resolution (See EnableDNSDiscovery).
|
|
displayName: AlertManager Endpoints
|
|
path: overrides.alertmanager.endpoints
|
|
- description: Additional labels to add to all alerts.
|
|
displayName: Extra Alert Labels
|
|
path: overrides.alertmanager.externalLabels
|
|
- description: URL for alerts return path.
|
|
displayName: Alert External URL
|
|
path: overrides.alertmanager.externalUrl
|
|
- description: Defines the configuration for the notification queue to AlertManager
|
|
hosts.
|
|
displayName: Notification Queue
|
|
path: overrides.alertmanager.notificationQueue
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: Capacity of the queue for notifications to be sent to the Alertmanager.
|
|
displayName: Notification Queue Capacity
|
|
path: overrides.alertmanager.notificationQueue.capacity
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: |-
|
|
Minimum duration between alert and restored "for" state. This is maintained
|
|
only for alerts with configured "for" time greater than the grace period.
|
|
displayName: Firing Grace Period
|
|
path: overrides.alertmanager.notificationQueue.forGracePeriod
|
|
- description: Max time to tolerate outage for restoring "for" state of alert.
|
|
displayName: Outage Tolerance
|
|
path: overrides.alertmanager.notificationQueue.forOutageTolerance
|
|
- description: Minimum amount of time to wait before resending an alert to Alertmanager.
|
|
displayName: Resend Delay
|
|
path: overrides.alertmanager.notificationQueue.resendDelay
|
|
- description: HTTP timeout duration when sending notifications to the Alertmanager.
|
|
displayName: Timeout
|
|
path: overrides.alertmanager.notificationQueue.timeout
|
|
- description: List of alert relabel configurations.
|
|
displayName: Alert Relabel Configuration
|
|
path: overrides.alertmanager.relabelConfigs
|
|
- description: Action to perform based on regex matching. Default is 'replace'
|
|
displayName: Action
|
|
path: overrides.alertmanager.relabelConfigs[0].action
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:select:drop
|
|
- urn:alm:descriptor:com.tectonic.ui:select:hashmod
|
|
- urn:alm:descriptor:com.tectonic.ui:select:keep
|
|
- urn:alm:descriptor:com.tectonic.ui:select:labeldrop
|
|
- urn:alm:descriptor:com.tectonic.ui:select:labelkeep
|
|
- urn:alm:descriptor:com.tectonic.ui:select:labelmap
|
|
- urn:alm:descriptor:com.tectonic.ui:select:replace
|
|
- description: Modulus to take of the hash of the source label values.
|
|
displayName: Modulus
|
|
path: overrides.alertmanager.relabelConfigs[0].modulus
|
|
- description: Regular expression against which the extracted value is matched.
|
|
Default is '(.*)'
|
|
displayName: Regex
|
|
path: overrides.alertmanager.relabelConfigs[0].regex
|
|
- description: |-
|
|
Replacement value against which a regex replace is performed if the
|
|
regular expression matches. Regex capture groups are available. Default is '$1'
|
|
displayName: Replacement
|
|
path: overrides.alertmanager.relabelConfigs[0].replacement
|
|
- description: Separator placed between concatenated source label values. default
|
|
is ';'.
|
|
displayName: Separator
|
|
path: overrides.alertmanager.relabelConfigs[0].separator
|
|
- description: |-
|
|
The source labels select values from existing labels. Their content is concatenated
|
|
using the configured separator and matched against the configured regular expression
|
|
for the replace, keep, and drop actions.
|
|
displayName: Source Labels
|
|
path: overrides.alertmanager.relabelConfigs[0].sourceLabels
|
|
- description: |-
|
|
Label to which the resulting value is written in a replace action.
|
|
It is mandatory for replace actions. Regex capture groups are available.
|
|
displayName: Target Label
|
|
path: overrides.alertmanager.relabelConfigs[0].targetLabel
|
|
- description: Interval on how frequently to poll for new rule definitions.
|
|
displayName: Poll Interval
|
|
path: pollInterval
|
|
- description: Defines a remote write endpoint to write recording rule metrics.
|
|
displayName: Remote Write Configuration
|
|
path: remoteWrite
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: Defines the configuration for remote write client.
|
|
displayName: Client
|
|
path: remoteWrite.client
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: Type of authorzation to use to access the remote write endpoint
|
|
displayName: Authorization Type
|
|
path: remoteWrite.client.authorization
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:select:basic
|
|
- urn:alm:descriptor:com.tectonic.ui:select:header
|
|
- description: Name of a secret in the namespace configured for authorization
|
|
secrets.
|
|
displayName: Authorization Secret Name
|
|
path: remoteWrite.client.authorizationSecretName
|
|
x-descriptors:
|
|
- urn:alm:descriptor:io.kubernetes:Secret
|
|
- description: Configure whether HTTP requests follow HTTP 3xx redirects.
|
|
displayName: Follow HTTP Redirects
|
|
path: remoteWrite.client.followRedirects
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:booleanSwitch
|
|
- description: Name of the remote write config, which if specified must be unique
|
|
among remote write configs.
|
|
displayName: Name
|
|
path: remoteWrite.client.name
|
|
- description: Optional proxy URL.
|
|
displayName: HTTP Proxy URL
|
|
path: remoteWrite.client.proxyUrl
|
|
- description: List of remote write relabel configurations.
|
|
displayName: Metric Relabel Configuration
|
|
path: remoteWrite.client.relabelConfigs
|
|
- description: Action to perform based on regex matching. Default is 'replace'
|
|
displayName: Action
|
|
path: remoteWrite.client.relabelConfigs[0].action
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:select:drop
|
|
- urn:alm:descriptor:com.tectonic.ui:select:hashmod
|
|
- urn:alm:descriptor:com.tectonic.ui:select:keep
|
|
- urn:alm:descriptor:com.tectonic.ui:select:labeldrop
|
|
- urn:alm:descriptor:com.tectonic.ui:select:labelkeep
|
|
- urn:alm:descriptor:com.tectonic.ui:select:labelmap
|
|
- urn:alm:descriptor:com.tectonic.ui:select:replace
|
|
- description: Modulus to take of the hash of the source label values.
|
|
displayName: Modulus
|
|
path: remoteWrite.client.relabelConfigs[0].modulus
|
|
- description: Regular expression against which the extracted value is matched.
|
|
Default is '(.*)'
|
|
displayName: Regex
|
|
path: remoteWrite.client.relabelConfigs[0].regex
|
|
- description: |-
|
|
Replacement value against which a regex replace is performed if the
|
|
regular expression matches. Regex capture groups are available. Default is '$1'
|
|
displayName: Replacement
|
|
path: remoteWrite.client.relabelConfigs[0].replacement
|
|
- description: Separator placed between concatenated source label values. default
|
|
is ';'.
|
|
displayName: Separator
|
|
path: remoteWrite.client.relabelConfigs[0].separator
|
|
- description: |-
|
|
The source labels select values from existing labels. Their content is concatenated
|
|
using the configured separator and matched against the configured regular expression
|
|
for the replace, keep, and drop actions.
|
|
displayName: Source Labels
|
|
path: remoteWrite.client.relabelConfigs[0].sourceLabels
|
|
- description: |-
|
|
Label to which the resulting value is written in a replace action.
|
|
It is mandatory for replace actions. Regex capture groups are available.
|
|
displayName: Target Label
|
|
path: remoteWrite.client.relabelConfigs[0].targetLabel
|
|
- description: Timeout for requests to the remote write endpoint.
|
|
displayName: Remote Write Timeout
|
|
path: remoteWrite.client.timeout
|
|
- description: The URL of the endpoint to send samples to.
|
|
displayName: Endpoint
|
|
path: remoteWrite.client.url
|
|
- description: Enable remote-write functionality.
|
|
displayName: Enabled
|
|
path: remoteWrite.enabled
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:booleanSwitch
|
|
- description: Defines the configuration for remote write client queue.
|
|
displayName: Client Queue
|
|
path: remoteWrite.queue
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:advanced
|
|
- description: Maximum time a sample will wait in buffer.
|
|
displayName: Batch Send Deadline
|
|
path: remoteWrite.queue.batchSendDeadline
|
|
- description: Number of samples to buffer per shard before we block reading
|
|
of more
|
|
displayName: Queue Capacity
|
|
path: remoteWrite.queue.capacity
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: Maximum retry delay.
|
|
displayName: Max BackOff Period
|
|
path: remoteWrite.queue.maxBackOffPeriod
|
|
- description: Maximum number of samples per send.
|
|
displayName: Maximum Shards per Send
|
|
path: remoteWrite.queue.maxSamplesPerSend
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: Maximum number of shards, i.e. amount of concurrency.
|
|
displayName: Maximum Shards
|
|
path: remoteWrite.queue.maxShards
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: Initial retry delay. Gets doubled for every retry.
|
|
displayName: Min BackOff Period
|
|
path: remoteWrite.queue.minBackOffPeriod
|
|
- description: Minimum number of shards, i.e. amount of concurrency.
|
|
displayName: Minimum Shards
|
|
path: remoteWrite.queue.minShards
|
|
x-descriptors:
|
|
- urn:alm:descriptor:com.tectonic.ui:number
|
|
- description: Minimum period to wait between refreshing remote-write reconfigurations.
|
|
displayName: Min Refresh Period
|
|
path: remoteWrite.refreshPeriod
|
|
statusDescriptors:
|
|
- description: Conditions of the RulerConfig health.
|
|
displayName: Conditions
|
|
path: conditions
|
|
x-descriptors:
|
|
- urn:alm:descriptor:io.kubernetes.conditions
|
|
version: v1
|
|
description: |-
|
|
The Community Loki Operator provides Kubernetes native deployment and management of Loki and related logging components.
|
|
The purpose of this project is to simplify and automate the configuration of a Loki based logging stack for Kubernetes clusters.
|
|
|
|
### Operator features
|
|
|
|
The Loki operator includes, but is not limited to, the following features:
|
|
|
|
* Kubernetes Custom Resources: Use Kubernetes custom resources to deploy and manage Loki, Alerting rules, Recording rules, and related components.
|
|
* Simplified Deployment Configuration: Configure the fundamentals of Loki like tenants, limits, replication factor and storage from a native Kubernetes resource.
|
|
### Feature Gates
|
|
|
|
The Loki Operator Bundle provides a set of feature gates that enable/disable specific feature depending on the target Kubernetes distribution. The following feature gates are enabled by default:
|
|
* `lokiStackGateway`: Enables reconciling the reverse-proxy lokistack-gateway component for multi-tenant authentication/authorization traffic control to Loki.
|
|
* `runtimeSeccompProfile`: Enables the restricted seccomp profile on all Lokistack components.
|
|
* `lokiStackWebhook`: Enables the LokiStack CR validation and conversion webhooks.
|
|
* `alertingRuleWebhook`: Enables the AlertingRule CR validation webhook.
|
|
* `recordingRuleWebhook`: Enables the RecordingRule CR validation webhook.
|
|
* `rulerConfigWebhook`: Enables the RulerConfig CR validation webhook.
|
|
|
|
### Before you start
|
|
|
|
1. Ensure that [cert-manager](https://operatorhub.io/operator/cert-manager) is installed first.
|
|
2. Ensure that the appropriate object storage solution, that will be used by Loki, is avaliable and configured.
|
|
displayName: Community Loki Operator
|
|
icon:
|
|
- base64data: <?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!-- Created with Inkscape (http://www.inkscape.org/) -->

<svg
   version="1.1"
   id="svg48"
   width="500"
   height="500"
   viewBox="0 0 500 500"
   xmlns:xlink="http://www.w3.org/1999/xlink"
   xmlns="http://www.w3.org/2000/svg"
   xmlns:svg="http://www.w3.org/2000/svg">
  <defs
     id="defs52" />
  <g
     id="g54">
    <image
       width="500"
       height="500"
       preserveAspectRatio="none"
       xlink:href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAfQAAAH0CAYAAADL1t+KAAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJ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"
       id="image56" />
  </g>
</svg>

|
|
mediatype: image/svg+xml
|
|
install:
|
|
spec:
|
|
clusterPermissions:
|
|
- rules:
|
|
- nonResourceURLs:
|
|
- /api/v2/alerts
|
|
verbs:
|
|
- create
|
|
- apiGroups:
|
|
- ""
|
|
resources:
|
|
- configmaps
|
|
- endpoints
|
|
- nodes
|
|
- pods
|
|
- secrets
|
|
- serviceaccounts
|
|
- services
|
|
verbs:
|
|
- create
|
|
- delete
|
|
- get
|
|
- list
|
|
- patch
|
|
- update
|
|
- watch
|
|
- apiGroups:
|
|
- ""
|
|
resources:
|
|
- namespaces
|
|
verbs:
|
|
- get
|
|
- list
|
|
- watch
|
|
- apiGroups:
|
|
- apps
|
|
resources:
|
|
- deployments
|
|
- statefulsets
|
|
verbs:
|
|
- create
|
|
- delete
|
|
- get
|
|
- list
|
|
- patch
|
|
- update
|
|
- watch
|
|
- apiGroups:
|
|
- cloudcredential.openshift.io
|
|
resources:
|
|
- credentialsrequests
|
|
verbs:
|
|
- create
|
|
- delete
|
|
- get
|
|
- list
|
|
- update
|
|
- watch
|
|
- apiGroups:
|
|
- config.openshift.io
|
|
resources:
|
|
- apiservers
|
|
- dnses
|
|
- proxies
|
|
verbs:
|
|
- get
|
|
- list
|
|
- watch
|
|
- apiGroups:
|
|
- coordination.k8s.io
|
|
resources:
|
|
- leases
|
|
verbs:
|
|
- create
|
|
- get
|
|
- update
|
|
- apiGroups:
|
|
- loki.grafana.com
|
|
resources:
|
|
- alertingrules
|
|
- lokistacks
|
|
- recordingrules
|
|
- rulerconfigs
|
|
verbs:
|
|
- create
|
|
- delete
|
|
- get
|
|
- list
|
|
- patch
|
|
- update
|
|
- watch
|
|
- apiGroups:
|
|
- loki.grafana.com
|
|
resources:
|
|
- alertingrules/finalizers
|
|
- lokistacks/finalizers
|
|
- recordingrules/finalizers
|
|
- rulerconfigs/finalizers
|
|
verbs:
|
|
- update
|
|
- apiGroups:
|
|
- loki.grafana.com
|
|
resources:
|
|
- alertingrules/status
|
|
- lokistacks/status
|
|
- recordingrules/status
|
|
- rulerconfigs/status
|
|
verbs:
|
|
- get
|
|
- patch
|
|
- update
|
|
- apiGroups:
|
|
- monitoring.coreos.com
|
|
resources:
|
|
- alertmanagers
|
|
verbs:
|
|
- patch
|
|
- apiGroups:
|
|
- monitoring.coreos.com
|
|
resources:
|
|
- alertmanagers/api
|
|
verbs:
|
|
- create
|
|
- apiGroups:
|
|
- monitoring.coreos.com
|
|
resources:
|
|
- prometheusrules
|
|
- servicemonitors
|
|
verbs:
|
|
- create
|
|
- delete
|
|
- get
|
|
- list
|
|
- update
|
|
- watch
|
|
- apiGroups:
|
|
- networking.k8s.io
|
|
resources:
|
|
- ingresses
|
|
verbs:
|
|
- create
|
|
- get
|
|
- list
|
|
- update
|
|
- watch
|
|
- apiGroups:
|
|
- policy/v1
|
|
resources:
|
|
- poddisruptionbudgets
|
|
verbs:
|
|
- create
|
|
- get
|
|
- list
|
|
- update
|
|
- watch
|
|
- apiGroups:
|
|
- rbac.authorization.k8s.io
|
|
resources:
|
|
- clusterrolebindings
|
|
- clusterroles
|
|
- rolebindings
|
|
- roles
|
|
verbs:
|
|
- create
|
|
- delete
|
|
- get
|
|
- list
|
|
- patch
|
|
- update
|
|
- watch
|
|
- apiGroups:
|
|
- route.openshift.io
|
|
resources:
|
|
- routes
|
|
verbs:
|
|
- create
|
|
- delete
|
|
- get
|
|
- list
|
|
- update
|
|
- watch
|
|
- apiGroups:
|
|
- authentication.k8s.io
|
|
resources:
|
|
- tokenreviews
|
|
verbs:
|
|
- create
|
|
- apiGroups:
|
|
- authorization.k8s.io
|
|
resources:
|
|
- subjectaccessreviews
|
|
verbs:
|
|
- create
|
|
serviceAccountName: loki-operator-controller-manager
|
|
deployments:
|
|
- label:
|
|
app.kubernetes.io/instance: loki-operator-v0.7.1
|
|
app.kubernetes.io/managed-by: operator-lifecycle-manager
|
|
app.kubernetes.io/name: loki-operator
|
|
app.kubernetes.io/part-of: loki-operator
|
|
app.kubernetes.io/version: 0.7.1
|
|
control-plane: controller-manager
|
|
name: loki-operator-controller-manager
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/managed-by: operator-lifecycle-manager
|
|
app.kubernetes.io/name: loki-operator
|
|
app.kubernetes.io/part-of: loki-operator
|
|
name: loki-operator-controller-manager
|
|
strategy: {}
|
|
template:
|
|
metadata:
|
|
annotations:
|
|
kubectl.kubernetes.io/default-container: manager
|
|
labels:
|
|
app.kubernetes.io/managed-by: operator-lifecycle-manager
|
|
app.kubernetes.io/name: loki-operator
|
|
app.kubernetes.io/part-of: loki-operator
|
|
name: loki-operator-controller-manager
|
|
spec:
|
|
containers:
|
|
- args:
|
|
- --config=controller_manager_config.yaml
|
|
command:
|
|
- /manager
|
|
env:
|
|
- name: RELATED_IMAGE_LOKI
|
|
value: docker.io/grafana/loki:3.2.1
|
|
- name: RELATED_IMAGE_GATEWAY
|
|
value: quay.io/observatorium/api:latest
|
|
- name: RELATED_IMAGE_OPA
|
|
value: quay.io/observatorium/opa-openshift:latest
|
|
image: docker.io/grafana/loki-operator:0.7.1
|
|
imagePullPolicy: IfNotPresent
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /healthz
|
|
port: 8081
|
|
initialDelaySeconds: 15
|
|
periodSeconds: 20
|
|
name: manager
|
|
ports:
|
|
- containerPort: 9443
|
|
name: webhook-server
|
|
protocol: TCP
|
|
- containerPort: 8080
|
|
name: metrics
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /readyz
|
|
port: 8081
|
|
initialDelaySeconds: 5
|
|
periodSeconds: 10
|
|
resources:
|
|
requests:
|
|
cpu: 200m
|
|
memory: 256Mi
|
|
volumeMounts:
|
|
- mountPath: /tmp/k8s-webhook-server/serving-certs
|
|
name: webhook-cert
|
|
readOnly: true
|
|
- mountPath: /controller_manager_config.yaml
|
|
name: manager-config
|
|
subPath: controller_manager_config.yaml
|
|
- args:
|
|
- --secure-listen-address=0.0.0.0:8443
|
|
- --upstream=http://127.0.0.1:8080/
|
|
- --logtostderr=true
|
|
- --v=0
|
|
image: quay.io/brancz/kube-rbac-proxy:v0.18.1
|
|
name: kube-rbac-proxy
|
|
ports:
|
|
- containerPort: 8443
|
|
name: https
|
|
resources:
|
|
requests:
|
|
cpu: 200m
|
|
memory: 256Mi
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
capabilities:
|
|
drop:
|
|
- ALL
|
|
nodeSelector:
|
|
kubernetes.io/os: linux
|
|
securityContext:
|
|
runAsNonRoot: true
|
|
serviceAccountName: loki-operator-controller-manager
|
|
terminationGracePeriodSeconds: 10
|
|
volumes:
|
|
- name: webhook-cert
|
|
secret:
|
|
defaultMode: 420
|
|
secretName: loki-operator-controller-manager-service-cert
|
|
- configMap:
|
|
name: loki-operator-manager-config
|
|
name: manager-config
|
|
permissions:
|
|
- rules:
|
|
- apiGroups:
|
|
- ""
|
|
- coordination.k8s.io
|
|
resources:
|
|
- configmaps
|
|
- leases
|
|
verbs:
|
|
- get
|
|
- list
|
|
- watch
|
|
- create
|
|
- update
|
|
- patch
|
|
- delete
|
|
- apiGroups:
|
|
- ""
|
|
resources:
|
|
- events
|
|
verbs:
|
|
- create
|
|
- patch
|
|
serviceAccountName: loki-operator-controller-manager
|
|
strategy: deployment
|
|
installModes:
|
|
- supported: false
|
|
type: OwnNamespace
|
|
- supported: false
|
|
type: SingleNamespace
|
|
- supported: false
|
|
type: MultiNamespace
|
|
- supported: true
|
|
type: AllNamespaces
|
|
keywords:
|
|
- logging
|
|
- loki
|
|
links:
|
|
- name: Documentation
|
|
url: https://loki-operator.dev/
|
|
maintainers:
|
|
- email: loki-operator-team@googlegroups.com
|
|
name: Grafana Loki SIG Operator
|
|
maturity: alpha
|
|
minKubeVersion: 1.21.1
|
|
provider:
|
|
name: Grafana Loki SIG Operator
|
|
relatedImages:
|
|
- image: docker.io/grafana/loki:3.2.1
|
|
name: loki
|
|
- image: quay.io/observatorium/api:latest
|
|
name: gateway
|
|
- image: quay.io/observatorium/opa-openshift:latest
|
|
name: opa
|
|
replaces: loki-operator.v0.7.0
|
|
version: 0.7.1
|
|
webhookdefinitions:
|
|
- admissionReviewVersions:
|
|
- v1
|
|
- v1beta1
|
|
containerPort: 443
|
|
conversionCRDs:
|
|
- alertingrules.loki.grafana.com
|
|
deploymentName: loki-operator-controller-manager
|
|
generateName: calertingrules.kb.io
|
|
sideEffects: None
|
|
targetPort: 9443
|
|
type: ConversionWebhook
|
|
webhookPath: /convert
|
|
- admissionReviewVersions:
|
|
- v1
|
|
- v1beta1
|
|
containerPort: 443
|
|
conversionCRDs:
|
|
- lokistacks.loki.grafana.com
|
|
deploymentName: loki-operator-controller-manager
|
|
generateName: clokistacks.kb.io
|
|
sideEffects: None
|
|
targetPort: 9443
|
|
type: ConversionWebhook
|
|
webhookPath: /convert
|
|
- admissionReviewVersions:
|
|
- v1
|
|
- v1beta1
|
|
containerPort: 443
|
|
conversionCRDs:
|
|
- recordingrules.loki.grafana.com
|
|
deploymentName: loki-operator-controller-manager
|
|
generateName: crecordingrules.kb.io
|
|
sideEffects: None
|
|
targetPort: 9443
|
|
type: ConversionWebhook
|
|
webhookPath: /convert
|
|
- admissionReviewVersions:
|
|
- v1
|
|
- v1beta1
|
|
containerPort: 443
|
|
conversionCRDs:
|
|
- rulerconfigs.loki.grafana.com
|
|
deploymentName: loki-operator-controller-manager
|
|
generateName: crulerconfigs.kb.io
|
|
sideEffects: None
|
|
targetPort: 9443
|
|
type: ConversionWebhook
|
|
webhookPath: /convert
|
|
- admissionReviewVersions:
|
|
- v1
|
|
containerPort: 443
|
|
deploymentName: loki-operator-controller-manager
|
|
failurePolicy: Fail
|
|
generateName: valertingrule.loki.grafana.com
|
|
rules:
|
|
- apiGroups:
|
|
- loki.grafana.com
|
|
apiVersions:
|
|
- v1
|
|
operations:
|
|
- CREATE
|
|
- UPDATE
|
|
resources:
|
|
- alertingrules
|
|
sideEffects: None
|
|
targetPort: 9443
|
|
type: ValidatingAdmissionWebhook
|
|
webhookPath: /validate-loki-grafana-com-v1-alertingrule
|
|
- admissionReviewVersions:
|
|
- v1
|
|
containerPort: 443
|
|
deploymentName: loki-operator-controller-manager
|
|
failurePolicy: Fail
|
|
generateName: vlokistack.loki.grafana.com
|
|
rules:
|
|
- apiGroups:
|
|
- loki.grafana.com
|
|
apiVersions:
|
|
- v1
|
|
operations:
|
|
- CREATE
|
|
- UPDATE
|
|
resources:
|
|
- lokistacks
|
|
sideEffects: None
|
|
targetPort: 9443
|
|
type: ValidatingAdmissionWebhook
|
|
webhookPath: /validate-loki-grafana-com-v1-lokistack
|
|
- admissionReviewVersions:
|
|
- v1
|
|
containerPort: 443
|
|
deploymentName: loki-operator-controller-manager
|
|
failurePolicy: Fail
|
|
generateName: vrecordingrule.loki.grafana.com
|
|
rules:
|
|
- apiGroups:
|
|
- loki.grafana.com
|
|
apiVersions:
|
|
- v1
|
|
operations:
|
|
- CREATE
|
|
- UPDATE
|
|
resources:
|
|
- recordingrules
|
|
sideEffects: None
|
|
targetPort: 9443
|
|
type: ValidatingAdmissionWebhook
|
|
webhookPath: /validate-loki-grafana-com-v1-recordingrule
|
|
- admissionReviewVersions:
|
|
- v1
|
|
containerPort: 443
|
|
deploymentName: loki-operator-controller-manager
|
|
failurePolicy: Fail
|
|
generateName: vrulerconfig.loki.grafana.com
|
|
rules:
|
|
- apiGroups:
|
|
- loki.grafana.com
|
|
apiVersions:
|
|
- v1
|
|
operations:
|
|
- CREATE
|
|
- UPDATE
|
|
resources:
|
|
- rulerconfigs
|
|
sideEffects: None
|
|
targetPort: 9443
|
|
type: ValidatingAdmissionWebhook
|
|
webhookPath: /validate-loki-grafana-com-v1-rulerconfig
|
|
|