Created
October 9, 2019 16:09
-
-
Save davideagle/dd2844807df904331f23bec045697451 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
fluentd-elasticsearch: | |
image: | |
repository: quay.io/fluentd_elasticsearch/fluentd | |
## Specify an imagePullPolicy (Required) | |
## It's recommended to change this to 'Always' if the image tag is 'latest' | |
## ref: http://kubernetes.io/docs/user-guide/images/#updating-images | |
tag: v2.7.0 | |
pullPolicy: IfNotPresent | |
## Optionally specify an array of imagePullSecrets. | |
## Secrets must be manually created in the namespace. | |
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ | |
## | |
# pullSecrets: | |
# - myRegistrKeySecretName | |
elasticsearch: | |
auth: | |
enabled: false | |
user: "yourUser" | |
password: "yourPass" | |
bufferChunkLimit: "2M" | |
bufferQueueLimit: 8 | |
host: "es-host.eu-west-1.es.amazonaws.com" | |
port: 443 | |
path: "" | |
scheme: "https" | |
sslVerify: true | |
sslVersion: "TLSv1_2" | |
typeName: "_doc" | |
logLevel: "debug" | |
## If using AWS Elasticsearch, all requests to ES need to be signed regardless of whether | |
## one is using Cognito or not. By setting this to true, this chart will install a sidecar | |
## proxy that takes care of signing all requests being sent to the AWS ES Domain. | |
awsSigningSidecar: | |
enabled: false | |
image: | |
repository: abutaha/aws-es-proxy | |
tag: 0.9 | |
# Specify to use specific priorityClass for pods | |
# ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ | |
# If a Pod cannot be scheduled, the scheduler tries to preempt (evict) lower priority | |
# Pods to make scheduling of the pending Pod possible. | |
priorityClassName: "" | |
# Specify where fluentd can find logs | |
hostLogDir: | |
varLog: /var/log | |
dockerContainers: /var/lib/docker/containers | |
libSystemdDir: /usr/lib64 | |
## Configure resource requests and limits | |
## ref: http://kubernetes.io/docs/user-guide/compute-resources/ | |
## | |
resources: | |
{} | |
# limits: | |
# cpu: 100m | |
# memory: 500Mi | |
# requests: | |
# cpu: 100m | |
# memory: 200Mi | |
# If you want to change args of fluentd process | |
# by example you can add -vv to launch with trace log | |
fluentdArgs: "--no-supervisor -q" | |
# If you want to add custom environment variables, use the env dict | |
# You can then reference these in your config file e.g.: | |
# user "#{ENV['OUTPUT_USER']}" | |
env: | |
# OUTPUT_USER: my_user | |
# LIVENESS_THRESHOLD_SECONDS: 300 | |
# STUCK_THRESHOLD_SECONDS: 900 | |
# If you want to add custom environment variables from secrets, use the secret list | |
secret: | |
# - name: ELASTICSEARCH_PASSWORD | |
# secret_name: elasticsearch | |
# secret_key: password | |
rbac: | |
create: true | |
serviceAccount: | |
# Specifies whether a ServiceAccount should be created | |
create: true | |
# The name of the ServiceAccount to use. | |
# If not set and create is true, a name is generated using the fullname template | |
name: "" | |
## Specify if a Pod Security Policy for node-exporter must be created | |
## Ref: https://kubernetes.io/docs/concepts/policy/pod-security-policy/ | |
## | |
podSecurityPolicy: | |
enabled: false | |
annotations: | |
{} | |
## Specify pod annotations | |
## Ref: https://kubernetes.io/docs/concepts/policy/pod-security-policy/#apparmor | |
## Ref: https://kubernetes.io/docs/concepts/policy/pod-security-policy/#seccomp | |
## Ref: https://kubernetes.io/docs/concepts/policy/pod-security-policy/#sysctl | |
## | |
# seccomp.security.alpha.kubernetes.io/allowedProfileNames: '*' | |
# seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default' | |
# apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default' | |
livenessProbe: | |
enabled: true | |
annotations: {} | |
podAnnotations: | |
{} | |
# prometheus.io/scrape: "true" | |
# prometheus.io/port: "24231" | |
## DaemonSet update strategy | |
## Ref: https://kubernetes.io/docs/tasks/manage-daemon/update-daemon-set/ | |
updateStrategy: | |
type: RollingUpdate | |
tolerations: | |
{} | |
# - key: node-role.kubernetes.io/master | |
# operator: Exists | |
# effect: NoSchedule | |
affinity: | |
{} | |
# nodeAffinity: | |
# requiredDuringSchedulingIgnoredDuringExecution: | |
# nodeSelectorTerms: | |
# - matchExpressions: | |
# - key: node-role.kubernetes.io/master | |
# operator: DoesNotExist | |
nodeSelector: {} | |
service: | |
{} | |
# ports: | |
# - name: "monitor-agent" | |
# type: ClusterIP | |
# port: 24231 | |
serviceMonitor: | |
## If true, a ServiceMonitor CRD is created for a prometheus operator | |
## https://github.com/coreos/prometheus-operator | |
## | |
enabled: false | |
interval: 10s | |
path: /metrics | |
port: 24231 | |
labels: {} | |
prometheusRule: | |
## If true, a PrometheusRule CRD is created for a prometheus operator | |
## https://github.com/coreos/prometheus-operator | |
## | |
enabled: false | |
prometheusNamespace: monitoring | |
labels: {} | |
# role: alert-rules | |
configMaps: | |
useDefaults: | |
systemConf: true | |
containersInputConf: true | |
systemInputConf: true | |
forwardInputConf: true | |
monitoringConf: true | |
outputConf: true | |
# can be used to add new config or overwrite the default configmaps completely after the configmaps default has been disabled above | |
extraConfigMaps: | |
output.conf: |- | |
<match **> | |
@id xlogstash | |
@type elasticsearch | |
@log_level "#{ENV['OUTPUT_LOG_LEVEL']}" | |
include_tag_key true | |
host "#{ENV['OUTPUT_HOST']}" | |
port "#{ENV['OUTPUT_PORT']}" | |
path "#{ENV['OUTPUT_PATH']}" | |
scheme "#{ENV['OUTPUT_SCHEME']}" | |
ssl_verify "#{ENV['OUTPUT_SSL_VERIFY']}" | |
ssl_version "#{ENV['OUTPUT_SSL_VERSION']}" | |
logstash_format true | |
logstash_prefix "x-logstash" | |
type_name _doc | |
reconnect_on_error true | |
<buffer> | |
@type file | |
path /var/log/fluentd-buffers/kubernetes.xlogstash.buffer | |
flush_mode interval | |
retry_type exponential_backoff | |
flush_thread_count 2 | |
flush_interval 5s | |
retry_forever | |
retry_max_interval 30 | |
chunk_limit_size "#{ENV['OUTPUT_BUFFER_CHUNK_LIMIT']}" | |
queue_limit_length "#{ENV['OUTPUT_BUFFER_QUEUE_LIMIT']}" | |
overflow_action block | |
</buffer> | |
</match> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment