Grafana Tempo Single Binary Mode
- Find upstream chart's release notes and CHANGELOG here
- Find upstream applications's release notes and CHANGELOG here
- Kubernetes Cluster deployed
- Kubernetes config installed in
~/.kube/config
- Helm installed
Install Helm
https://helm.sh/docs/intro/install/
- Clone down the repository
- cd into directory
helm install tempo chart/
Key | Type | Default | Description |
---|---|---|---|
global.commonLabels | object | {} |
Common labels for all object directly managed by this chart. |
nameOverride | string | "" |
Overrides the chart's name |
fullnameOverride | string | "" |
Overrides the chart's computed fullname |
replicas | int | 1 |
Define the amount of instances |
labels | object | {} |
labels for tempo |
annotations | object | {} |
Annotations for the StatefulSet |
tempo.repository | string | "registry1.dso.mil/ironbank/opensource/grafana/tempo" |
Docker image repository |
tempo.tag | string | "2.7.2" |
Docker image tag |
tempo.pullPolicy | string | "IfNotPresent" |
Docker image pull policy |
tempo.updateStrategy | string | "RollingUpdate" |
|
tempo.resources.limits.cpu | string | "500m" |
|
tempo.resources.limits.memory | string | "4Gi" |
|
tempo.resources.requests.cpu | string | "500m" |
|
tempo.resources.requests.memory | string | "4Gi" |
|
tempo.memBallastSizeMbs | int | 1024 |
|
tempo.multitenancyEnabled | bool | false |
|
tempo.reportingEnabled | bool | false |
If true, Tempo will report anonymous usage data about the shape of a deployment to Grafana Labs |
tempo.metricsGenerator.enabled | bool | false |
If true, enables Tempo's metrics generator (https://grafana.com/docs/tempo/next/metrics-generator/) |
tempo.metricsGenerator.remoteWriteUrl | string | "http://prometheus.monitoring:9090/api/v1/write" |
|
tempo.ingester | object | {"max_block_bytes":1000000,"max_block_duration":"5m","trace_idle_period":"10s"} |
Configuration options for the ingester |
tempo.querier | object | {} |
Configuration options for the querier |
tempo.queryFrontend | object | {} |
Configuration options for the query-fronted. Refers to: https://grafana.com/docs/tempo/latest/configuration/#query-frontend |
tempo.retention | string | "336h" |
|
tempo.overrides | object | {"defaults":{},"per_tenant_override_config":"/conf/overrides.yaml"} |
The standard overrides configuration section. This can include a defaults object for applying to all tenants (not to be confused with the global property of the same name, which overrides max_byte_per_trace for all tenants). For an example on how to enable the metrics generator using the overrides object, see the 'Activate metrics generator' section below. Refer to Standard overrides for more details. |
tempo.overrides.defaults | object | {} |
Default config values for all tenants, can be overridden by per-tenant overrides. If a tenant's specific overrides are not found in the per_tenant_overrides block, the values in this default block will be used. Configs inside this block should follow the new overrides indentation format |
tempo.overrides.per_tenant_override_config | string | "/conf/overrides.yaml" |
Path to the per tenant override config file. The values of the per_tenant_overrides config below will be written to the default path /conf/overrides.yaml . Users can set tenant-specific overrides settings in a separate file and point per_tenant_override_config to it if not using the per_tenant_overrides block below. |
tempo.per_tenant_overrides | object | {} |
The per tenant aka tenant-specific runtime overrides. This allows overriding values set in the configuration on a per-tenant basis. Note that all values must be given for each per-tenant configuration block. Refer to Runtime overrides and Tenant-Specific overrides documentation for more details. |
tempo.server.http_listen_port | int | 3100 |
HTTP server listen port |
tempo.livenessProbe.httpGet.path | string | "/ready" |
|
tempo.livenessProbe.httpGet.port | int | 3100 |
|
tempo.livenessProbe.initialDelaySeconds | int | 30 |
|
tempo.livenessProbe.periodSeconds | int | 10 |
|
tempo.livenessProbe.timeoutSeconds | int | 5 |
|
tempo.livenessProbe.failureThreshold | int | 3 |
|
tempo.livenessProbe.successThreshold | int | 1 |
|
tempo.readinessProbe.httpGet.path | string | "/ready" |
|
tempo.readinessProbe.httpGet.port | int | 3100 |
|
tempo.readinessProbe.initialDelaySeconds | int | 20 |
|
tempo.readinessProbe.periodSeconds | int | 10 |
|
tempo.readinessProbe.timeoutSeconds | int | 5 |
|
tempo.readinessProbe.failureThreshold | int | 3 |
|
tempo.readinessProbe.successThreshold | int | 1 |
|
tempo.storage.trace.backend | string | "local" |
|
tempo.storage.trace.local.path | string | "/var/tempo/traces" |
|
tempo.storage.trace.wal.path | string | "/var/tempo/wal" |
|
tempo.receivers.jaeger.protocols.grpc.endpoint | string | "0.0.0.0:14250" |
|
tempo.receivers.jaeger.protocols.thrift_binary.endpoint | string | "0.0.0.0:6832" |
|
tempo.receivers.jaeger.protocols.thrift_compact.endpoint | string | "0.0.0.0:6831" |
|
tempo.receivers.jaeger.protocols.thrift_http.endpoint | string | "0.0.0.0:14268" |
|
tempo.receivers.zipkin.endpoint | string | "0.0.0.0:9411" |
|
tempo.receivers.opencensus | string | nil |
|
tempo.receivers.otlp.protocols.grpc.endpoint | string | "0.0.0.0:4317" |
|
tempo.receivers.otlp.protocols.http.endpoint | string | "0.0.0.0:4318" |
|
tempo.securityContext.capabilities.drop[0] | string | "ALL" |
|
tempo.extraArgs | object | {} |
|
tempo.extraEnv | list | [] |
Environment variables to add |
tempo.extraEnvFrom | list | [] |
Environment variables from secrets or configmaps to add to the ingester pods |
tempo.extraVolumeMounts | list | [] |
Volume mounts to add |
config | string | Dynamically generated tempo configmap | Tempo configuration file contents |
tempoQuery.repository | string | "registry1.dso.mil/ironbank/opensource/grafana/tempo-query" |
Docker image repository |
tempoQuery.tag | string | "2.7.2" |
Docker image tag |
tempoQuery.pullPolicy | string | "IfNotPresent" |
Docker image pull policy |
tempoQuery.enabled | bool | false |
if False the tempo-query container is not deployed |
tempoQuery.service.port | int | 16686 |
|
tempoQuery.ingress.enabled | bool | false |
|
tempoQuery.ingress.annotations | object | {} |
|
tempoQuery.ingress.labels | object | {} |
|
tempoQuery.ingress.path | string | "/" |
|
tempoQuery.ingress.pathType | string | "Prefix" |
|
tempoQuery.ingress.hosts[0] | string | "query.tempo.example.com" |
|
tempoQuery.ingress.extraPaths | list | [] |
|
tempoQuery.ingress.tls | list | [] |
|
tempoQuery.resources | object | {"limits":{"cpu":"300m","memory":"256Mi"},"requests":{"cpu":"300m","memory":"256Mi"}} |
Resource for query container |
tempoQuery.extraArgs | object | {} |
|
tempoQuery.extraEnv | list | [] |
Environment variables to add |
tempoQuery.extraVolumeMounts | list | [] |
Volume mounts to add |
tempoQuery.securityContext.capabilities.drop[0] | string | "ALL" |
|
securityContext | object | {"fsGroup":1001,"runAsGroup":1001,"runAsNonRoot":true,"runAsUser":1001} |
securityContext for container |
serviceAccount.create | bool | true |
Specifies whether a ServiceAccount should be created |
serviceAccount.name | string | nil |
The name of the ServiceAccount to use. If not set and create is true, a name is generated using the fullname template |
serviceAccount.imagePullSecrets | list | [{"name":"private-registry"}] |
Image pull secrets for the service account |
serviceAccount.annotations | object | {} |
Annotations for the service account |
serviceAccount.labels | object | {} |
Labels for the service account |
serviceAccount.automountServiceAccountToken | bool | false |
|
service.type | string | "ClusterIP" |
|
service.clusterIP | string | "" |
|
service.loadBalancerIP | string | nil |
IP address, in case of 'type: LoadBalancer' |
service.protocol | string | "TCP" |
If service type is LoadBalancer, the exposed protocol can either be "UDP", "TCP" or "UDP,TCP" |
service.annotations | object | {} |
|
service.labels | object | {} |
|
service.targetPort | string | "" |
|
serviceMonitor.enabled | bool | false |
|
serviceMonitor.interval | string | "" |
|
serviceMonitor.additionalLabels | object | {} |
|
serviceMonitor.annotations | object | {} |
|
serviceMonitor.scheme | string | "" |
|
serviceMonitor.tlsConfig | object | {} |
|
persistence.enabled | bool | true |
|
persistence.enableStatefulSetAutoDeletePVC | bool | true |
Enable StatefulSetAutoDeletePVC feature |
persistence.accessModes[0] | string | "ReadWriteOnce" |
|
persistence.size | string | "15Gi" |
|
podAnnotations | object | {"traffic.sidecar.istio.io/includeInboundPorts":"3100,4317,4318"} |
Pod Annotations |
podLabels | object | {} |
Pod (extra) Labels |
extraLabels | object | {} |
|
extraVolumes | list | [] |
Volumes to add |
nodeSelector | object | {} |
Node labels for pod assignment. See: https://kubernetes.io/docs/user-guide/node-selection/ |
tolerations | list | [] |
Tolerations for pod assignment. See: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ |
affinity | object | {} |
Affinity for pod assignment. See: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity |
priorityClassName | string | nil |
The name of the PriorityClass |
hostAliases | list | [] |
hostAliases to add |
networkPolicy.enabled | bool | false |
|
networkPolicy.ingress | bool | true |
|
networkPolicy.allowExternal | bool | true |
|
networkPolicy.explicitNamespacesSelector | object | {} |
|
networkPolicy.egress.enabled | bool | false |
|
networkPolicy.egress.blockDNSResolution | bool | false |
|
networkPolicy.egress.ports | list | [] |
|
networkPolicy.egress.to | list | [] |
|
domain | string | "dev.bigbang.mil" |
Domain used for BigBang created exposed services |
istio | object | {"enabled":false,"hardened":{"customAuthorizationPolicies":[],"customServiceEntries":[],"enabled":false,"outboundTrafficPolicyMode":"REGISTRY_ONLY"},"mtls":{"mode":"STRICT"}} |
Toggle istio integration. Intended to be controlled via BigBang passthrough of istio package status |
istio.hardened | object | {"customAuthorizationPolicies":[],"customServiceEntries":[],"enabled":false,"outboundTrafficPolicyMode":"REGISTRY_ONLY"} |
Default peer authentication values |
istio.mtls.mode | string | "STRICT" |
STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic |
objectStorage.access_key_id | string | "" |
AWS access_key_id for External ObjectStorage configuration |
objectStorage.secret_access_key | string | "" |
AWS secret_access_key for External ObjectStorage configuration |
networkPolicies | object | {"additionalPolicies":[],"controlPlaneCidr":"0.0.0.0/0","enabled":false,"ingressLabels":{"app":"istio-ingressgateway","istio":"ingressgateway"}} |
Toggle for BigBang specific NetworkPolicies. If disabled no NetworkPolicies will be installed with package ref: https://kubernetes.io/docs/concepts/services-networking/network-policies/ |
networkPolicies.ingressLabels | object | {"app":"istio-ingressgateway","istio":"ingressgateway"} |
Istio IngressGateway labels for VirtualService external routing to app UI |
networkPolicies.controlPlaneCidr | string | "0.0.0.0/0" |
Use kubectl cluster-info and then resolve to IP for kube-api. Review value description in BigBang README.md |
monitoring | object | {"enabled":false} |
Toggle monitoring integration. Intended to be controlled via BigBang passthrough of monitoring package status |
sso | object | {"enabled":false} |
SSO toggle. Intended to be controlled via BigBang passthrough, only affects network/auth policies. |
bbtests.enabled | bool | false |
|
bbtests.cypress.artifacts | bool | true |
|
bbtests.cypress.envs.cypress_url | string | "http://{{ template \"tempo.fullname\" . }}.{{ .Release.Namespace }}.svc.cluster.local:16686" |
|
bbtests.cypress.envs.cypress_tempo_datasource | string | "http://{{ template \"tempo.fullname\" . }}.{{ .Release.Namespace }}.svc:3100" |
|
bbtests.cypress.envs.cypress_check_datasource | string | "false" |
|
bbtests.cypress.envs.cypress_grafana_url | string | "http://monitoring-grafana.monitoring.svc.cluster.local" |
|
bbtests.cypress.resources.requests.cpu | string | "1" |
|
bbtests.cypress.resources.requests.memory | string | "1Gi" |
|
bbtests.cypress.resources.limits.cpu | string | "2" |
|
bbtests.cypress.resources.limits.memory | string | "2Gi" |
|
bbtests.scripts.enabled | bool | true |
|
bbtests.scripts.image | string | "registry1.dso.mil/ironbank/big-bang/base:2.1.0" |
|
bbtests.scripts.envs.TEMPO_METRICS_URL | string | "http://{{ template \"tempo.fullname\" . }}.{{ .Release.Namespace }}.svc:3100" |
|
openshift | bool | false |
Toggle or openshift specific config |
Please see the contributing guide if you are interested in contributing.
This file is programatically generated using helm-docs
and some BigBang-specific templates. The gluon
repository has instructions for regenerating package READMEs.