netpol-values.yaml 1.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253
  1. extraPorts:
  2. syslog:
  3. name: tcp-syslog
  4. containerPort: 1514
  5. service:
  6. port: 1234
  7. type: NodePort
  8. httpPush:
  9. name: http-push
  10. containerPort: 3500
  11. grpcPush:
  12. name: grpc-push
  13. containerPort: 3600
  14. config:
  15. snippets:
  16. extraScrapeConfigs: |
  17. - job_name: syslog
  18. syslog:
  19. listen_address: 0.0.0.0:{{ .Values.extraPorts.syslog.containerPort }}
  20. labels:
  21. job: syslog
  22. relabel_configs:
  23. - source_labels:
  24. - __syslog_message_hostname
  25. target_label: host
  26. - job_name: push1
  27. loki_push_api:
  28. server:
  29. http_listen_port: {{ .Values.extraPorts.httpPush.containerPort }}
  30. grpc_listen_port: {{ .Values.extraPorts.grpcPush.containerPort }}
  31. labels:
  32. pushserver: push1
  33. networkPolicy:
  34. # -- Specifies whether Network Policies should be created
  35. enabled: true
  36. metrics:
  37. # -- Specifies the Pods which are allowed to access the metrics port.
  38. # As this is cross-namespace communication, you also neeed the namespaceSelector.
  39. podSelector: {}
  40. # -- Specifies the namespaces which are allowed to access the metrics port
  41. namespaceSelector: {}
  42. # -- Specifies specific network CIDRs which are allowed to access the metrics port.
  43. # In case you use namespaceSelector, you also have to specify your kubelet networks here.
  44. # The metrics ports are also used for probes.
  45. cidrs: []
  46. k8sApi:
  47. # -- Specify the k8s API endpoint port
  48. port: 8443
  49. # -- Specifies specific network CIDRs you want to limit access to
  50. cidrs: []