-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathexample.yaml
68 lines (63 loc) · 1.97 KB
/
example.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
mimir:
releaseName: mimir
ingress:
enabled: true
annotations:
# Custom ingress controller with
# internal ELB
kubernetes.io/ingress.class: nginx-mimir
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
nginx.ingress.kubernetes.io/ssl-redirect: "true"
defaultScope: "scope1metrics"
hosts:
- host: "mimir.example.com"
paths:
- /
tls:
- hosts:
- mimir.example.com
secretName: tls-name
alertmanager:
enabled: true
scopeIDs:
- scopeName: scope1
scopeID: "scope1metrics"
- scopeName: scope2
scopeID: "scope2metrics"
distributor:
enabled: true
# This allows us to have basic auth (even though its internal)
scopeIDs:
- scopeName: scope1
scopeID: "scope1metrics"
annotations:
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
nginx.ingress.kubernetes.io/ssl-redirect: "true"
kubernetes.io/ingress.class: nginx
nginx.ingress.kubernetes.io/auth-type: basic
nginx.ingress.kubernetes.io/auth-secret: mimir-basic-auth-prom-push
nginx.ingress.kubernetes.io/auth-secret-type: auth-map
host: mimir-scope1-push.example.com
paths:
- /api/prom/push
tls:
secretName: tls-name
host: mimir-scope1-push.example.com
- scopeName: scope2
scopeID: "scope2metrics"
annotations:
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
nginx.ingress.kubernetes.io/ssl-redirect: "true"
kubernetes.io/ingress.class: nginx
nginx.ingress.kubernetes.io/auth-type: basic
nginx.ingress.kubernetes.io/auth-secret: mimir-basic-auth-prom-push
nginx.ingress.kubernetes.io/auth-secret-type: auth-map
host: mimir-scope2-push.example.com
paths:
- /api/prom/push
tls:
secretName: tls-name
host: mimir-scope2-push.example.com
nginx:
enabled: true
replicas: 2