Created
August 16, 2019 14:01
-
-
Save Tekcraft/1e6ac1cf828cd8b2203839a060ae4708 to your computer and use it in GitHub Desktop.
Helm get kibana
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
REVISION: 1 | |
RELEASED: Fri Aug 16 12:55:10 2019 | |
CHART: kibana-7.1.1 | |
USER-SUPPLIED VALUES: | |
affinity: {} | |
antiAffinity: hard | |
antiAffinityTopologyKey: kubernetes.io/hostname | |
elasticsearchHosts: http://elasticsearch-master:9200 | |
extraEnvs: | |
- name: ELASTICSEARCH_USERNAME | |
valueFrom: | |
secretKeyRef: | |
key: username | |
name: elastic-credentials | |
- name: ELASTICSEARCH_PASSWORD | |
valueFrom: | |
secretKeyRef: | |
key: password | |
name: elastic-credentials | |
fullnameOverride: "" | |
healthCheckPath: /app/kibana | |
httpPort: 5601 | |
image: docker.elastic.co/kibana/kibana | |
imagePullPolicy: IfNotPresent | |
imagePullSecrets: [] | |
imageTag: 7.1.1 | |
ingress: | |
annotations: | |
kubernetes.io/ingress.class: nginx-internal | |
enabled: false | |
hosts: | |
- elastic.dominiog.lan | |
path: / | |
tls: [] | |
kibanaConfig: | |
kibana.yml: "server.rewriteBasePath: false\nxpack.security.enabled: true\nlogging.verbose: | |
true\n# server.ssl:\n# enabled: true\n# key: /usr/share/kibana/config/certs/kibana/tls.key\n# | |
\ certificate: /usr/share/kibana/config/certs/kibana/tls.crt\n# xpack.security.encryptionKey: | |
ajskfiejknckskspwu5r930128fgjvklnkdpajfe\n# elasticsearch.ssl: \n# certificateAuthorities: | |
/usr/share/kibana/config/certs/elastic-certificate.pem\n# verificationMode: | |
certificate\n# server.host: \"0.0.0.0\"\n# server.port: 5601\n# elasticsearch.hosts: | |
\"https://elasticsearch-master:9200\"\nxpack.monitoring.elasticsearch.username: | |
\"kibana\"\nxpack.monitoring.elasticsearch.password: \"citsale1\"\n\n #nestedkey: | |
value\n" | |
labels: {} | |
maxUnavailable: 1 | |
nameOverride: "" | |
nodeSelector: {} | |
podAnnotations: {} | |
podSecurityContext: | |
fsGroup: 1000 | |
priorityClassName: "" | |
protocol: http | |
readinessProbe: | |
failureThreshold: 3 | |
initialDelaySeconds: 10 | |
periodSeconds: 10 | |
successThreshold: 3 | |
timeoutSeconds: 5 | |
replicas: 1 | |
resources: | |
limits: | |
cpu: 1000m | |
memory: 1Gi | |
requests: | |
cpu: 100m | |
memory: 500m | |
secretMounts: [] | |
securityContext: | |
capabilities: | |
drop: | |
- ALL | |
runAsNonRoot: true | |
runAsUser: 1000 | |
serverHost: 0.0.0.0 | |
service: | |
annotations: {} | |
nodePort: null | |
port: 5601 | |
type: ClusterIP | |
serviceAccount: "" | |
tolerations: [] | |
updateStrategy: | |
type: Recreate | |
COMPUTED VALUES: | |
affinity: {} | |
antiAffinity: hard | |
antiAffinityTopologyKey: kubernetes.io/hostname | |
elasticsearchHosts: http://elasticsearch-master:9200 | |
elasticsearchURL: "" | |
extraEnvs: | |
- name: ELASTICSEARCH_USERNAME | |
valueFrom: | |
secretKeyRef: | |
key: username | |
name: elastic-credentials | |
- name: ELASTICSEARCH_PASSWORD | |
valueFrom: | |
secretKeyRef: | |
key: password | |
name: elastic-credentials | |
fullnameOverride: "" | |
healthCheckPath: /app/kibana | |
httpPort: 5601 | |
image: docker.elastic.co/kibana/kibana | |
imagePullPolicy: IfNotPresent | |
imagePullSecrets: [] | |
imageTag: 7.1.1 | |
ingress: | |
annotations: | |
kubernetes.io/ingress.class: nginx-internal | |
enabled: false | |
hosts: | |
- elastic.dominiog.lan | |
path: / | |
tls: [] | |
kibanaConfig: | |
kibana.yml: "server.rewriteBasePath: false\nxpack.security.enabled: true\nlogging.verbose: | |
true\n# server.ssl:\n# enabled: true\n# key: /usr/share/kibana/config/certs/kibana/tls.key\n# | |
\ certificate: /usr/share/kibana/config/certs/kibana/tls.crt\n# xpack.security.encryptionKey: | |
ajskfiejknckskspwu5r930128fgjvklnkdpajfe\n# elasticsearch.ssl: \n# certificateAuthorities: | |
/usr/share/kibana/config/certs/elastic-certificate.pem\n# verificationMode: | |
certificate\n# server.host: \"0.0.0.0\"\n# server.port: 5601\n# elasticsearch.hosts: | |
\"https://elasticsearch-master:9200\"\nxpack.monitoring.elasticsearch.username: | |
\"kibana\"\nxpack.monitoring.elasticsearch.password: \"citsale1\"\n\n #nestedkey: | |
value\n" | |
labels: {} | |
maxUnavailable: 1 | |
nameOverride: "" | |
nodeSelector: {} | |
podAnnotations: {} | |
podSecurityContext: | |
fsGroup: 1000 | |
priorityClassName: "" | |
protocol: http | |
readinessProbe: | |
failureThreshold: 3 | |
initialDelaySeconds: 10 | |
periodSeconds: 10 | |
successThreshold: 3 | |
timeoutSeconds: 5 | |
replicas: 1 | |
resources: | |
limits: | |
cpu: 1000m | |
memory: 1Gi | |
requests: | |
cpu: 100m | |
memory: 500m | |
secretMounts: [] | |
securityContext: | |
capabilities: | |
drop: | |
- ALL | |
runAsNonRoot: true | |
runAsUser: 1000 | |
serverHost: 0.0.0.0 | |
service: | |
annotations: {} | |
nodePort: null | |
port: 5601 | |
type: ClusterIP | |
serviceAccount: "" | |
tolerations: [] | |
updateStrategy: | |
type: Recreate | |
HOOKS: | |
MANIFEST: | |
--- | |
# Source: kibana/templates/configmap.yaml | |
apiVersion: v1 | |
kind: ConfigMap | |
metadata: | |
name: kibana-kibana-config | |
labels: | |
app: kibana | |
release: "kibana" | |
data: | |
kibana.yml: | | |
server.rewriteBasePath: false | |
xpack.security.enabled: true | |
logging.verbose: true | |
# server.ssl: | |
# enabled: true | |
# key: /usr/share/kibana/config/certs/kibana/tls.key | |
# certificate: /usr/share/kibana/config/certs/kibana/tls.crt | |
# xpack.security.encryptionKey: ajskfiejknckskspwu5r930128fgjvklnkdpajfe | |
# elasticsearch.ssl: | |
# certificateAuthorities: /usr/share/kibana/config/certs/elastic-certificate.pem | |
# verificationMode: certificate | |
# server.host: "0.0.0.0" | |
# server.port: 5601 | |
# elasticsearch.hosts: "https://elasticsearch-master:9200" | |
xpack.monitoring.elasticsearch.username: "kibana" | |
xpack.monitoring.elasticsearch.password: "citsale1" | |
#nestedkey: value | |
--- | |
# Source: kibana/templates/service.yaml | |
apiVersion: v1 | |
kind: Service | |
metadata: | |
name: kibana-kibana | |
labels: | |
app: kibana | |
release: "kibana" | |
heritage: Tiller | |
spec: | |
type: ClusterIP | |
ports: | |
- port: 5601 | |
protocol: TCP | |
name: http | |
targetPort: 5601 | |
selector: | |
app: kibana | |
release: "kibana" | |
--- | |
# Source: kibana/templates/deployment.yaml | |
apiVersion: apps/v1 | |
kind: Deployment | |
metadata: | |
name: kibana-kibana | |
labels: | |
app: kibana | |
release: "kibana" | |
spec: | |
replicas: 1 | |
strategy: | |
type: Recreate | |
selector: | |
matchLabels: | |
app: kibana | |
release: "kibana" | |
template: | |
metadata: | |
labels: | |
app: kibana | |
release: "kibana" | |
annotations: | |
configchecksum: 56cfae955c8e6b228373de271f95aab8cf7359134c21bfd4f376e2d7c25c838 | |
spec: | |
securityContext: | |
fsGroup: 1000 | |
volumes: | |
- name: kibanaconfig | |
configMap: | |
name: kibana-kibana-config | |
containers: | |
- name: kibana | |
image: "docker.elastic.co/kibana/kibana:7.1.1" | |
env: | |
- name: ELASTICSEARCH_HOSTS | |
value: "http://elasticsearch-master:9200" | |
- name: ELASTICSEARCH_USERNAME | |
valueFrom: | |
secretKeyRef: | |
key: username | |
name: elastic-credentials | |
- name: ELASTICSEARCH_PASSWORD | |
valueFrom: | |
secretKeyRef: | |
key: password | |
name: elastic-credentials | |
readinessProbe: | |
failureThreshold: 3 | |
initialDelaySeconds: 10 | |
periodSeconds: 10 | |
successThreshold: 3 | |
timeoutSeconds: 5 | |
exec: | |
command: | |
- sh | |
- -c | |
- | | |
#!/usr/bin/env bash -e | |
http () { | |
local path="${1}" | |
set -- -XGET -s --fail | |
if [ -n "${ELASTIC_USERNAME}" ] && [ -n "${ELASTIC_PASSWORD}" ]; then | |
set -- "$@" -u "${ELASTIC_USERNAME}:${ELASTIC_PASSWORD}" | |
fi | |
curl -k "$@" "http://localhost:5601${path}" | |
} | |
http "/app/kibana" | |
ports: | |
- containerPort: 5601 | |
resources: | |
limits: | |
cpu: 1000m | |
memory: 1Gi | |
requests: | |
cpu: 100m | |
memory: 500m | |
volumeMounts: | |
- name: kibanaconfig | |
mountPath: /usr/share/kibana/config/kibana.yml | |
subPath: kibana.yml |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment