# Default values for edgedelta. # Use either apiKey or secretApiKey but NOT both to provide API Key to Agent: apiKey: "" # secretApiKey: # name: "ed-api-key" # key: "ed-api-key" # Create secret api key command: # kubectl create secret generic ed-api-key --namespace=edgedelta --from-literal=ed-api-key="YOUR_API_KEY" # Predefined environment variables # See: https://docs.edgedelta.com/installation/environment-variables storePort: "" dataPort: "" httpProxy: "" httpsProxy: "" noProxy: "" edBackendDisabled: "" edTagOverride: "" edSuppressionMode: "" edSkipConfDownload: "" edWorkflows: "" edWorkflowPrefixes: "" edDisableLeaderElection: "" edTraceFiles: "" # custom tags are comma separated key:val pairs. these are going to be attached to all outgoing data from agent to configured destination(s). edCustomTags: "" # Persisting Cursor props constraints persistingCursorProps: enabled: false hostMountPath: "/var/lib/edgedelta" containerMountPath: "/var/lib/edgedelta" # Aggregator agent mode properties # Agents are deployed as daemonset. an extra aggregator agent is deployed to collect/aggregate metrics aggregatorProps: enabled: false port: 9191 # serviceDNSSuffix is "svc.cluster.local" by default. It's used to construct endpoint for aggregator agent service so that processor agents can communicate with aggregator. # Final endpoint looks like this: http://ed-aggregator-svc.my-namespace.svc.cluster.local:9191 serviceDNSSuffix: "svc.cluster.local" # aggregator agent needs a small amount of disk space to persist some internal source related information to be able to work smoothly after restarts/upgrades. # If your k8s cluster has specific storage classes you can set storageClassName accordingly. storageClassName: "" archiverProps: enabled: false port: 9292 # Final archiver endpoint looks like this: http://ed-archiver-svc.my-namespace.dns-suffix:9292 # HttpRecorder is a frontend layer which can consume logs with both http and tcp protocols # It is deployed as a sidecar for each ED agent. It dumps the incoming logs to filesystem (persisted via PVC) and agents grab from there. httpRecorderProps: enabled: false image: gcr.io/edgedelta/httprecorder:latest port: 8080 # Enable ingress if the k8s cluster already has nginx + cert-manager installed # Without ingress enabled you can directly send logs within cluster using http://ed-httprecorder-svc.{namespace}.svc.cluster.local:8080 ingress: enabled: false host: "" class: nginx # Custom environment variables: # envs: # - name: sample-var # value: sample-value # Custom secret environment variables: # Use only lowercase alphabetic and - characters in secretKeyRef name and key fields, otherwise helm deploys the release but throws an obscure error about DNS-1123 subdomain format # secrets: # - name: sampleSecretVar # secretKeyRef: # name: sample-k8-secret-name # key: sample-k8s-secret-subkey # Create secrets with below command: # kubectl create secret generic sample-k8-secret-name --namespace=edgedelta --from-literal=sample-k8s-secret-subkey="SECRET_VALUE" # Resource constraints annotations: {} resources: limits: memory: 2048Mi requests: cpu: 200m memory: 256Mi tolerations: {} nodeSelector: {} updateStrategy: type: RollingUpdate rollingUpdate: maxUnavailable: 1 # Helm overrides image: name: gcr.io/edgedelta/agent # Overrides the image tag whose default is the chart appVersion. tag: "" # Overrides full image (with url and version/tag) if not empty # example: gcr.io/edgedelta/agent@sha256:0180ff40f52528d7462200c40fae8aff3bdb83289ac19ce823a3fcb1c40c9ad9 fullPath: "" nameOverride: "" fullnameOverride: ""