From 5283a0913a0c4f521d0942ad10a667326cbd72b6 Mon Sep 17 00:00:00 2001 From: Priyanshu Raj Shrivastava Date: Mon, 12 Sep 2022 18:09:39 +0530 Subject: [PATCH 1/6] updating --- .DS_Store | Bin 0 -> 8196 bytes 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 .DS_Store diff --git a/.DS_Store b/.DS_Store new file mode 100644 index 0000000000000000000000000000000000000000..600eb926edfeb77ad71d651654259c23f85393cc GIT binary patch literal 8196 zcmeHM-EPw`82!AKHC+J}G{km+6p7nyY!#X`anp615Fi9vC%6C<(l+bD(xhrqDl`rC z8s33d;Fc%hUAThtIiZT(PNFx6AA5>F$3DkD$Di#wBO=ilcD9ICh{(djwpu|nBXBuC zQ(+;?S%nqgQ`Bw+Q44R?DXhsb3K#{90!9I&fKlMjPylB(2kU}!KP@$}QNSqhUn;=+ zgN=u6J+tG~%B=&DyaK=$ku3w#^2a}{%^9%u%#Krw90ZY4VN6xzzOi@Ar)(^j~eSTb%5)Ev5sCd^9|nHlxVzf z8gGgAfo;>NY=!%W_EgS7SK}xJ;){cl+$jJ zy5MZcUUxJsD>w@qbE_&=DwxL>=>$E(m^2(~md9NK&ck?n6U{i)g?cV#%Ef40tp-+a z&Kg>yxSxIh`O@kKew=J>eiaLa;-$rsRkAA9tL8~GY9?+nj2rIY1-~6dQPBFCc3aPU zZ{$>$_o6Uy{m>gog5U7~dHLKAJJF~S4Z}_>xy`h|DqCfzx^i|_+umHWx9)DAui0li zHKey|JLl(R>&ERn_YR%Ypch6TFe(I*9U^okeV@dv+b?MKwmArcC}eNpnr_0UhFBdQ zo(TT2F6TLfpCou6z=qIzU6x@MRHfNh#MPXy%vsw%qWYYp)@ERp9w{^6(0yt`?>(&2 zr*edq z=mqa~yq~a-II0h+?Fsm$!Y^S|hxCLVVh7rzBMptUtDwvIol5RP`X0nS_&(=@OA4bl zlfxS1IoB1AGc`iq{j_#jb)~0E^bU&jFiW;PLHI<_&jZ#n-|l4bn#7z66jJ<31@_?L z@BeewYT!lzqrl&!fGF-a_Z#Rj|CpH-_^xf^d5wny Date: Mon, 12 Sep 2022 18:33:02 +0530 Subject: [PATCH 2/6] added filebeat helm .yaml --- kubebot-monitoring-otel/Chart.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/kubebot-monitoring-otel/Chart.yaml b/kubebot-monitoring-otel/Chart.yaml index 97f2ccf6..877628be 100644 --- a/kubebot-monitoring-otel/Chart.yaml +++ b/kubebot-monitoring-otel/Chart.yaml @@ -32,3 +32,7 @@ dependencies: condition: opentelemetry-operator.enabled version: 0.9.4 repository: https://open-telemetry.github.io/opentelemetry-helm-charts + - name: filebeat + condition: filebeat.enabled + version: 7.17.3 + repository: https://helm.elastic.co \ No newline at end of file From 3b091ad94ac1c9965a5dae42373c3f9b6620142d Mon Sep 17 00:00:00 2001 From: priyanshu raj shrivastava Date: Mon, 12 Sep 2022 18:38:34 +0530 Subject: [PATCH 3/6] filebeat helm yaml --- kubebot-monitoring-otel/Chart.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/kubebot-monitoring-otel/Chart.yaml b/kubebot-monitoring-otel/Chart.yaml index 877628be..df4de148 100644 --- a/kubebot-monitoring-otel/Chart.yaml +++ b/kubebot-monitoring-otel/Chart.yaml @@ -35,4 +35,5 @@ dependencies: - name: filebeat condition: filebeat.enabled version: 7.17.3 - repository: https://helm.elastic.co \ No newline at end of file + repository: https://helm.elastic.co + fvvf \ No newline at end of file From 91f9e42c273e70a1b76dbbfb1601394f17c6c5d1 Mon Sep 17 00:00:00 2001 From: priyanshu raj shrivastava Date: Mon, 12 Sep 2022 18:39:41 +0530 Subject: [PATCH 4/6] filebeat helm yaml --- kubebot-monitoring-otel/Chart.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/kubebot-monitoring-otel/Chart.yaml b/kubebot-monitoring-otel/Chart.yaml index df4de148..877628be 100644 --- a/kubebot-monitoring-otel/Chart.yaml +++ b/kubebot-monitoring-otel/Chart.yaml @@ -35,5 +35,4 @@ dependencies: - name: filebeat condition: filebeat.enabled version: 7.17.3 - repository: https://helm.elastic.co - fvvf \ No newline at end of file + repository: https://helm.elastic.co \ No newline at end of file From 8f5c8152477045b697b2ca6c09b14e17e4775bcd Mon Sep 17 00:00:00 2001 From: priyanshu raj shrivastava Date: Mon, 12 Sep 2022 18:43:37 +0530 Subject: [PATCH 5/6] fetched dependency files --- kubebot-monitoring-otel/.DS_Store | Bin 0 -> 6148 bytes kubebot-monitoring-otel/Chart.lock | 7 +++++-- .../charts/filebeat-7.17.3.tgz | Bin 0 -> 12400 bytes 3 files changed, 5 insertions(+), 2 deletions(-) create mode 100644 kubebot-monitoring-otel/.DS_Store create mode 100644 kubebot-monitoring-otel/charts/filebeat-7.17.3.tgz diff --git a/kubebot-monitoring-otel/.DS_Store b/kubebot-monitoring-otel/.DS_Store new file mode 100644 index 0000000000000000000000000000000000000000..cabe1167fe3fc711e2980eeee8b8d66fd8b07294 GIT binary patch literal 6148 zcmeHKL2uJA6n^f?maal75=grsMdDhGwnCLAE}`2FTnT~$ppvvVo{QQ`Z2p2$I%$PoRU9G;;Z{!jvI z9rF?B5hZJwFKd`x>FzK+wOob}{19p(z_>kg;p z)cTEs`MlF@HQn};?xN|=k2qQtU^LjCv!xf}dF2ks6{S?7|osI8gRF$KTfwZH$&8 zK2Z5Oq9M81p9uI7tY3TO(g(~cK~E091VYb^BYDIKqh**SVA+gqnA#3exTnr>m3`28)S(A+8!dNodc zt5#(fV;Qgv{0#;;Ke#BYJ)@UetJHx?T>+r0a4Uh$zYC0UjrNRQYKscU3qEPitFS1}p<*26l9_!RP NiUwO*2L34nKLHk>*YyAZ literal 0 HcmV?d00001 diff --git a/kubebot-monitoring-otel/Chart.lock b/kubebot-monitoring-otel/Chart.lock index dadf666a..41b283f2 100644 --- a/kubebot-monitoring-otel/Chart.lock +++ b/kubebot-monitoring-otel/Chart.lock @@ -5,5 +5,8 @@ dependencies: - name: opentelemetry-operator repository: https://open-telemetry.github.io/opentelemetry-helm-charts version: 0.9.4 -digest: sha256:c903110582a4d585f87bddec1e44fa391defa0c2a3027fa68c97c1c9d5263265 -generated: "2022-07-23T17:31:40.230397413+05:30" +- name: filebeat + repository: https://helm.elastic.co + version: 7.17.3 +digest: sha256:daff205d35bfb25c066f4f6cbc2669eee2395cec11f7faa0d63dacef2cd58189 +generated: "2022-09-12T18:42:32.12894+05:30" diff --git a/kubebot-monitoring-otel/charts/filebeat-7.17.3.tgz b/kubebot-monitoring-otel/charts/filebeat-7.17.3.tgz new file mode 100644 index 0000000000000000000000000000000000000000..85f03b63d6ea5130a8eb2866740bfe3c198b4b3b GIT binary patch literal 12400 zcmV-$Fptk4iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKBxbK5wQ`22hP6ut87C7BB;$Y{G!Rp8`2T(z>xElb(+lq;lsQagml!zs$x@A^kqfnkx;-kg~gXZ7Yjn#6kl0W zKxILi47?E{2}dNs8S8jH;1MEm2ON0+TU7P{5+r(}`|GJ+hUz^=^DM*?&YZr=w!Lu$ zF^@fUYe{zfk5Qas_8<&k{`zn4?;adh*8kpa>u|gNH<5hb_acNxG+~%`Jb)cIP7=zI zSnmut1(c@oMEt>r7;I4w02Spr@ac=Ji=v2#927H%Q4hz=1O10CgZh1v5I(V0-Xvk1 zM|cW6PEaq#Q3rUIV_EX#BhL`vWK1%ejBvtXj4~ohu@duvkZJ}INI2tPGCJzO)wP7; zi_d*Bc#G0=+*d;uNpS}C&1X2wR4+uEC&`%E`rzxLZ~yV( zfhE^cM~vu${PV+rV)kK(Gi)IKoyPe{@EuWH0#;p9kYy33GXd}@<&#$=(_9VTS(6P>hMSc_8Aj1r5>G7Fhm`SC%x`ISLy|!U`Y2{#M$OW$O*nuBEou0iq`EYvt_T)?H^9b>9h%;8Mpc?1SiQ`GZKsCur1l zz2WI9H0No~&5p`2%0dU6>ev&vXHQBWnf!Y4>+!|qo0k_S$LB9!e|UX%ae2`xLG(w6 zah!GjyxVF?2sSMbOp?KSS)kzwbbNfD zpfMt`Slu0Hi+!9%_yWf`NwY}6q_#Z>X)LHg5~B3nCPv<#4X`NlDHcb zvwZF>#mU8x^m(8NMNY~~H79B@W_fbV1mZf-@)Wl*-6_~^hONXZ>)_vW%nE)Nrg;Y% z?N)2l&^aSKqS-`cz9lL*CL>Z)r>4@bsl;iFGqcxUU3*@H)0j@g7?%(lY}p5r8eI5R zY$$fB??Z05-;P_7I*K7xB!#7$I zGl;0(E^q`W6wm~yzgamEPHBXJBphdg@9BcG_# z91iJ|=kR2RCr_?5@1X9Z6rYgCBTBk-ec@}tr`v^8Iy42CC59xVc zlrYU+1zXtxnyQJAm@uPCBFdSkwm-dRHFg^k=5b5}`71Q|KvFT^yGKDQXa#M7cggnz z7zNXZMxW9^ve$;r=%LJH=;>%gG`zu?YZa6>IlJO@$xAfoKttK*bk@5(j^ELkgo4K2 z^iL^&mtlqz?tH&c{8CX{OvX6DjJ?Zf4|n7ah(krdh7#;{!iM%wKeT^-wmg3450X3e zNYcc~7MzWH zRZ|NwUKr)`9 zxdWK_8iisaU*?R{QFWGpj&YVL!9{Q7g6~PbnKSIM%FHwx0#;Qsi6WzylxI=_6@-&v zIr~H^!cc~)_#F_IJdwI|P-(S()cA(gjM_(8(gE>5bjvyfjXIsSlRBbI^X5-1(3lYf z5?Cq;bi*1sVyLg_EyOe#hymUrQa+NABWzQw`itGb~gPk-uXyL(!s_y6r3ZP)u>zuGE2&HA$f5%#h7k8%7c|5@G~mDGoVP z77xQQJZ-na5#ibpLi$qYx=H9Q+zKL@(ELe;A)+K1$P*>gg6xpM>Qtt;1Fufrou9ls zzC3y5mDE{R(JZTtQ%YOCGIk%$aE|WPqkLGHVDlGUMZiDub+xhR{C~H-TRH#R-`_jfp8stk zwFCG~Y}tU~*focSbc7*Kg$DT}2u>dISnT?07x8_&4ZZmE34(JRW5jT9YI5Pr7w}_1 zX)3-O+Jc5xi3;FA=;7zwn5L)?L%nqR(nqLg>?G1Ue|sjBFMA|*8io-XHWS)XCm*5V7r<~5$-h+xUrNCp zkZnWCxA1$8V$vr#66{EJJ@9_R3c4)MMH^xm40N9~B&;q`As8B?kT0mQI24xVCX}WfXe=XMDl3=V zs8kJiVSf4I7dd*2w$2b|gi8~&E9PqSz-Rb9r(CXoWk!>q%Vkg1;gCh?^>1vS_hSQ#$bb?oXC{Oc8i_&qMk{QGh+HnWfFkg`?d>1@G6r71lH9WVN zW)wGg@*I9tR_xlnqFPf{k?cYItt!^^Lhu9kr?ycq*ZP{;G(Trz#kmNgN}{ss)ZH*O z1#OkCJ3m;eoFbX=XOX4lHN9UQYP~zXE=^DswLokT zohiJQ3(c5tb*sXuU+I-BX7HmiS-B-SHTlaCK-tgG^k?bWuNjNVYW}1=-}*EQF#}|r ztIa`_)sbO{q~lmJz>zvDb>Wge&ABrr)Q6KwR*RA~?yL?Aovv7Jql9e7pR{It=Ih+C*+MhMRW|dU-rXQ9=e^d| z*gEk$!>=zn6V1gq$^i?C3QoSgcqmeoFmpXbo8EsR8RNeZK76gJ%tCs#3+CobQNq1U zGj-lql%GjQ^O|!m+svI;w_FJs_NGo9$*cl>&VncnWbDSiaM@DfYEgIu&uzU_(8Bi% zBkNzV2wO9xB-j#cqf6aNp7hcc69HYB}Flv96Z3 zgW4tYHFm$oTv$63_M#o)s1N}3awWAVcZ*V@a0Q$scy|W%JNI?8;SUpx$1Y8 zDc`h8r^hIZNl)EvD|~O47>2p8*Hm?zQ{$F$V)aga} zPO8q8_e7-nqOOC=E0pqba>@Y#lnOvuh9&|0 zhM!~@ZZJ;O*}SSMy(5vR(L>?QEy^P4Tb?3Lgg&V>r{}6Y83)3ti(*Cr!7Y-vuv5fX z(M!biAgtXIIJGrL=mwk1JEJtlBb*o&F{BA2jN?S!j#kB&3scu5jOCa$_y61~PYM1V z8me0jt&H`d@yE-?yt#U2=s1n%PH8ZkIIQPkmA>lWEKOpijBtvE3}a{%H*d}IH+OX% z9xJni@=(pYM1zvbHhopMTBG<_s)({dDHv13$Boj@lhRKy)5f&y0FHal} zFV#PJS-KY4000TCQd5xK$=HE`>1@& z+;`g!hI|y)4ZU95nMOjrf-?spvvr>(c-(a9@{Y7FsMQT>CWY6HrmTq6$+q=!ZN1** z{Q1~tVPI8wqj(lYUU3O;gdT>`OLe`$#tq<<@>~5Rxo@&nj)))9sr$zDq4)&_=Kkpyz z9c|D5HjzF(O#H9=2mZTfz`tznBOD>6S)^@iCJYwTKZGHz*zOw`aMc)K-gpiT^-zTP zOWk*ETz`8Jt!AwM^#uOYX;J*Y_Ca<1AGVLS@jo|`9&r7yCGg+(AMkJ0NPpW1f7^8b zRKx$v?+UG93s@xo9Zki5Jrr46{=b2=3jeoUzQRTB!{}$Z>f91ObWBMzp4xK#ZjAZV zF#QEDv2gwGRpbBe?r-0J*i166i9yiR&ptInIvUX=7~O2y z!1tf*`aeH8e)aYw7)9%EWB&R-+&gGh<9~|3x9fisX{UG}_BD=2AVpWtyZXb`&pC-B zxZsHA?E0y3d?BMjz=rZ6tbowwKXGzH64qo*S)du=F-@5t68DbYKWWc+$^4h&CG%e+ z#5m3ZHXb}H8dw2B^BG+I;p#Z!q>n-luiyVXv%ffrQc4p3mpqGKm@-J$9OgYyriY>d zZf00MpiZ-iY1!#yrACUv8#IurGs?o@Uqsy(rk3YP2X%>E^(Hl8fFLG=A-~1q|Hg00 zTvx<0jB}PJK=TY}zfVGfV(-e%)GK-MP`ScfUtI^D_uqf;eTeWF$21)YmFE^^2}uT! z#wf%?8b>$--~S(7^5XLN{1PG>avH(_CpeQY9$%ilgjA{;(mPAO2QGj~M=wqR#WB5= zcQ|!)N(oXze06sEvX}~FK+Yn`auy!a`DTTzvS1K?iJVTr#q!9ue#T-aGK#z%<%Qooyh)>^?y13 zzw4(vee}C7`JQ-8UB zx-+D=KBs=pux}6l1r#5y9(kX>Jxu}xo;r(5|XbV z`MQ=uzU--mRF7-rj9GDBlUD=PBmWF;ha?V0;TE6=3{6 z&3p~Umtg#eCfwIhd=14=KhH=n*I+~E=QGXfPEKE~mC>oE35k43U4Oegd)X-ps9WKZ zefxek0-td3$MECR^fr3dQ9dnM2>+zn0HY+zP=uPggTAl)N;Om5*#Va+dfrbiwf)Zv zXb0_m?$vP2mH_{)|M(x%mi0pFR-o;|Q-`fqL954- z@7h8Mj|=x3G1`|gP1LiQ1Hu*3pez0i<%a>`|68~%cWT_0g8|_ZZ}RdQ&E@;|x&bh- z%qKDL-4$^hl$@m<#0Z{hynbIO%DNw}@79uB0d^<$ymyL4p!gO|m>N1&2@;O zd-Ch?#pRoq7bnN(FJFIneRgqq(FL50Nk$X398gANXmXNxUF)OU6+NTonN^7$Gh&d8 zFCu;QVz0q)x9qei0C;+vlhu28h{l9w!5wBs2>LOjmH7x!%JU3+)@2@II$)BHaFU5_ zlMnGok-Wq2&FKpCCScJfS+tlKPeU!gG?y)MKELB9-h z8JMMLQc|0_mO)~|CtijTqX{c^h7tOwyi_N|uNy}^%IKIxI8#GqAx=<6C=1|%j<8eE zD+&sVNGR9)u@pr_ce;+W)0NPaXQcRMWhFB)o_w*MDjYDu9TFOexe=mCN*R;aOJwKE za9`6~JjPiu!x6>I%dip_B0wQ0W26Ju1n{O06QQrwj99HndzD4B9QrSwpiC$zK|q6B(a@SDg(>MnL4XE+J5AXGe&FK5dIA&MBX6jIhm zN@ZHIQxA(90@b{+r000vXLyG)G{PKbP@6u(E6l=-q;fTW^+|MBt*?27ywCoEw6MU} zm6q!6XYVs~tFPmBE9kTIAr{z`309KP7=v^L6htd`CcBJsCU1htn`(@?oVK_H^I)^h zgm_+Ff;F=Z-P#9Ey0eDulrbW{6?rVAhZ@x4^clLJzH}EADi2#7($Al5RYuBUX&Mv7 zJ4*tmWtkv1gUzN@hHdWccS~?8v#rZ~jZ?kiu(h$FTZZ$dFZZqI+N$xDjBiHz3|+O! z&Mj0Ow!G_A8MclRB8RN+veG_uZDCHuZkr;;6vd0p6s}y^SgMFdK$Z(cZPZed?_sfA za1yE7eMgSf!lNLnV&yCx_SN-WXS*x`3}KbD^03{jJKfo{?I>j3aj8n( z?00z@ccGsrq0&JfZ1DFSww>_hhyB}=Ckt3u&YJ{1?O0(uS_ayTv;zsGSNDeM26JSyEXS6yTI~r z2#6K-iC{7kB>!MEvWjq8ekINf`*Miks{BcSQW21p)e6f)lZdb^SDIQcj|P|r@N;2t z;Ks%QX@ccME8NOdLLw(S`u7UFaW`>8G?nf~* zJU+8qX|`(=?hWYM>qOQagwy(Pyq3uCqIf>~bg#5;*Jz$AE1m@gzEZ`rCM=)3f!$pL zd&D_kiO5-1+ny$Jwn*77N#q;WwpSc>jplhL#q-gZ_8o}aym?SxSeX!Y8Bll8joq;D z%6a_p+U_oELaano>sH|`6jzFHtINnM51T$ix6xQ?wrj%8cK;2AZ2}0KX@A73H-pJn zK6s+Eyhfn>pm5=iB7Mvf$}O{(rKE~tZRHdi&@BZF=zk zusvPjGyIar@x=cqK8bMp=%!3 zn>~0r>`Dyc>9sw??g7SCrF?Nh@-?K-(0$WCrTkrn8BS`Z5vGQ%LzT~T*|8ebRke!r zIHhXpwPT}lUWPPN-i>y?MSbaQsp3XIz_6Fxz>E+1ybY{hcW)0k8mztF_e`Imt6kye z6|%#gS!&*}zrrNMFZGn8bLF)Bo@7@IyA;xUYWR**DzkCuIkl0(;Ywa`lK!*uc_2x~ zN;tH7CnqCJbFP#QKFly1()dAa$;%6;wNZf_GsAB~tRn1-J(yKWu_4XlNU(7Y26_{9 zraQD(0)#%r?X@an*(3?jED~_3uB+BOy-nQ zxfQOjt^+uwc1j78*B&JLRIH;6m@diVVQqw^D$mtyJAcvitj4@(Rb8;RlC^sn zB3U958-I@Ccp`>RDAp{Ex1wTE}8pWmmYaX!`aP5H#%um7`q z{-AE{Ye0IX=Nt7^mff#e-^-1ovO-rl?0&3N!TC4jFZ=8or(T%hNHl?B1~e;^nwWnRVnD_VVAv8}VMElarblxw zNxKv)K=xVP=f;taH8fl95ry?G9C+Sw;kcpW81!kL$g3kZ@CQL_P!3i*qtMt)A*LWAeHrhCON5je#WdY%jsR4_hWM-aDM zidTO_{TrmSMQ$w^#aukAoydG$sViduin&t#kgQ0VGz(@W_n5-;EiK=H-WJ6oW2IHb zAj}XO8lzzki!O-TlOj}7p9*14US7nEp#koA-Sct-&_^W3Q3r0EG0Ip(HACzMilD`0 z>$#THq1dXN@*BbK#1d106a_e;vT${Tp23WqMjYN0qdb21Ms9r=MetNE1;h$zz@B?b zFwX+d>vp?d^~Gb5lD~R}L$_4CzQ%_3Pd~JOezuQW?)*V2qCJu{aWaOUz_(vK02=05 z48AWg2<_dYpcS-&c1Nr@*%cF6$OetHA>T}_x3kmB^EW@gzkGB0*HTC~qZI3!VkghE z|K|jL&&6cWgn6h(b1tL!x)J;&E;UJNt8w6YS4Tnn=(@A)6XQCxBJ*lv&n*q67t>x- zhf%HpUSUZrz&X1)q0NYftQpcozDnOLi5*SE7#Sog0xOMh zbH_lF0cTOdiEnbe(s}1{jfu52Ciu2l3bRVplUz*)Uel`!Tr{^48)2)dHfb3#HM2dp<$a*qQchdZ%uE8tUb2{j@S)rl0;y` zj}S+`)Txvb(u{DQB-nT0`Ub9VjgrkB6|=dn6!Vo1?9;wKp?PK=9G+*VU827>qMt-S z(UYnCJ{gQq+T1BVpg8t#@WhvboS!0+i9Y(MDD5LwfUF-?A)zn7fOv*+Q!tt0HDv>& zBJi&RqyXgAXijT^ZJ>EqMbINx4=NhDy}fn4dImX(a1$pL_a4;PAE}0#UP&8SuGv(2LN*m|(V@U~-i`!rRTbtHUZYD6iPH=Xa8qmk z3Sf%((3|qaTzW6jKFLi9fHimI$)}hWmElc$I^KiDq%8@IQo&-@Qx|?as&nkPds@wF8jcpxUtOC{as507-J{C;PX|Zs?fd^5 zNqV+B(jeh^&U0|;Kl3P@J((HZc;5NRuP4VBC(wBzeYlHPPBb(DN1lgty#J6+-YNh- z2H%%%biS`WLSOv&^zzNyle71i&%ihDvcQi|bpy|IKRi$Lu47MG211PX(mWer(?W#Z zdf)Vt+-RD;{@3>)+=BJr-aBYj*Z;xZ_Wjq5q#fgLsLj~s=ujOO7M5Q9%!@u#HOCif z7gPs?_5};i`$-?x!_}-eAXF7wu3}=h=J9en9q7uVEX@YwQzie<_rwxWw#Hb@c)ownn70Nrla0~xYEcYveOrqO$Fw3qHbp~9ma3B0Rz`c+wCu#(r;SDY|DaWU|NE$Qbgq~rfXysVn%ZK@ zXn0d!NME_u1sz*kZE*maa#nORqceKt`ll`n$;%neM2@LEqhd~?4zycxj{q3hU!GuO zqK^ExS-ZDP?;@%ZCSPIgz^;a>#b=qJa(XnHIP+sAaJIX4|G96l*3vkPsQEnId}rab zI33q+Qynnaee6}ddaC39#!+ltCV++d|3Ov%Kioe!-17fTq;>26hIa000`Pr(h18MZ zwswIBNORZ!noIzT< z`-fHe?`XHRmH#%9irJQ)`0BEWw)=S2kD~NVM(0unrQ-UyYZ#MeB<-Yc^GK5Bu0@Sc zQrv-<4#0Zrr-%=22~nobRu$7h;f>}gQ(cXj$$*gp7(Ds$)9Kl(lMkoIZ%@8FaXvBm zt>%&O&P-1D<;i2u**a6L-|iZHKYm!s{xfy{+dA5w|869$*Zw2zFI&UUH*Ie*Le>@T1cr`EPf(y8aIi+xy$~zlkI-5_Vuw{ClO@mFz*&_MdtS&_WxKb?TaB z2$H5C=?O*$?sdzbf|w49N-B~9%}OSu8BR(raAPELZA7KdBgDfY&RDsU4>29E52CN- z50Zh}Ptd6Ax^X6&XS$keyt3x2d0teeC`lsxu~T7WfBbZ%0vBlk{`!mm$4~z?nM@|Z z+qXd!eKGZ=P#utX6jV%r?q{w7UaFu;PE(EgQYqpbXGyhBKYcfR^;=1^@7Ax+2)Nk( zS3UnbZ0~RFe;Y~bwg1_;3|k}MHt_#OFEo_9c`Kofn^0pa^mEW6T1N%J8)0h)`&NC# z=9vI3|9DtCplzn=9=3*yW7Ca%w{BufBlaF`ER_Ear|y64?QZ%1Mv`ks6N{z7$sW%4 zOXQ!Y9FyH*gWW<`vw~?&xs(}pWzBa5yP7I%7*$a=qnw5`))GzGd+n-G$FUpN#_Y!8 zz=^W|K?v?NBb?xcj&>?|Q&ZGtMsV^SSV4+Mp65PMAt3soP*79B7ZsE(P}DhHSWZpH zqP}^aefG%hz?1qJP)L=m?U#&>I@UZXy7V_ZImi71F_obdj~CbyH+a&q6F<9kGp7&H zx*?_2HnnN~uT3=@jQ@1luG;?&j&`^HKO0Fa+5cX?K0d#M&I`LQ%(e(>YVvmAZ-2Ug zcCfoU6}lWHlM&4@WIYrHnnC?b>Wjh6pJeQ}al3~(YO9FsB!Q#g&q2%k<^1feXz(a# zw}O^ya-8bD?nS_c;48fketarN@eF)lhthT}jJ_{p0{{3_H1f>*52N{KG>&P`wfqbA zK+LJ@7tYDwfPHfI`rlmqr`DAH|KMPM>;J!zv;*(;3N4%e^!wCxwl-}7On}Cb&eBJS z&pj?58_>pnGIjU!IEtiKpEmM2<~;@(PH6|aa$ShO<=b<5_bbOTE>5YtOIi*MT(cC* zW-wzFD&@MMQ4-lft?H<_K0BU3>I2`tG(2GIX!pIRW#|4rZ7kyddq-3EzuK*>{cj^_ z8~^FC;y>wi_U{z=>G7gE)gXIo1^!_!|6iXE=py~UJstmLe{UQAc_Yd9{d)UZ&7Ii7 ic-4WL1+`sI+q6yFv`ybo`u_m{0RR7EL>n3aTmb-bv|e5S literal 0 HcmV?d00001 From a11e8c797f3595ace888ec61fc9416b395a76e60 Mon Sep 17 00:00:00 2001 From: priyanshu raj shrivastava Date: Mon, 12 Sep 2022 18:45:52 +0530 Subject: [PATCH 6/6] unpakced files --- kubebot-monitoring-otel/.DS_Store | Bin 6148 -> 8196 bytes .../unpacked filebeat/.DS_Store | Bin 0 -> 6148 bytes .../unpacked filebeat/filebeat/.helmignore | 2 + .../unpacked filebeat/filebeat/Chart.yaml | 12 + .../unpacked filebeat/filebeat/Makefile | 1 + .../unpacked filebeat/filebeat/README.md | 271 ++++++++++++++++++ .../filebeat/examples/default/Makefile | 13 + .../filebeat/examples/default/README.md | 27 ++ .../filebeat/examples/default/test/goss.yaml | 47 +++ .../filebeat/examples/deployment/Makefile | 13 + .../filebeat/examples/deployment/README.md | 27 ++ .../examples/deployment/test/goss.yaml | 6 + .../filebeat/examples/deployment/values.yaml | 16 ++ .../filebeat/examples/oss/Makefile | 13 + .../filebeat/examples/oss/README.md | 27 ++ .../filebeat/examples/oss/test/goss.yaml | 22 ++ .../filebeat/examples/oss/values.yaml | 22 ++ .../filebeat/examples/security/Makefile | 13 + .../filebeat/examples/security/README.md | 28 ++ .../filebeat/examples/security/test/goss.yaml | 9 + .../filebeat/examples/security/values.yaml | 37 +++ .../filebeat/examples/upgrade/Makefile | 17 ++ .../filebeat/examples/upgrade/README.md | 21 ++ .../filebeat/examples/upgrade/test/goss.yaml | 45 +++ .../filebeat/examples/upgrade/values.yaml | 4 + .../filebeat/templates/NOTES.txt | 2 + .../filebeat/templates/_helpers.tpl | 32 +++ .../filebeat/templates/clusterrole.yaml | 12 + .../templates/clusterrolebinding.yaml | 19 ++ .../filebeat/templates/configmap.yaml | 53 ++++ .../filebeat/templates/daemonset.yaml | 201 +++++++++++++ .../filebeat/templates/deployment.yaml | 157 ++++++++++ .../filebeat/templates/role.yaml | 14 + .../filebeat/templates/rolebinding.yaml | 19 ++ .../filebeat/templates/serviceaccount.yaml | 15 + .../unpacked filebeat/filebeat/values.yaml | 243 ++++++++++++++++ 36 files changed, 1460 insertions(+) create mode 100644 kubebot-monitoring-otel/unpacked filebeat/.DS_Store create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/.helmignore create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/Chart.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/Makefile create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/README.md create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/default/Makefile create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/default/README.md create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/default/test/goss.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/deployment/Makefile create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/deployment/README.md create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/deployment/test/goss.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/deployment/values.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/oss/Makefile create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/oss/README.md create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/oss/test/goss.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/oss/values.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/security/Makefile create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/security/README.md create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/security/test/goss.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/security/values.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/upgrade/Makefile create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/upgrade/README.md create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/upgrade/test/goss.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/upgrade/values.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/NOTES.txt create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/_helpers.tpl create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/clusterrole.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/clusterrolebinding.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/configmap.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/daemonset.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/deployment.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/role.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/rolebinding.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/serviceaccount.yaml create mode 100644 kubebot-monitoring-otel/unpacked filebeat/filebeat/values.yaml diff --git a/kubebot-monitoring-otel/.DS_Store b/kubebot-monitoring-otel/.DS_Store index cabe1167fe3fc711e2980eeee8b8d66fd8b07294..e5a60573369d7c4752dbaffc5f97f366ace787f9 100644 GIT binary patch delta 574 zcmZoMXmOBWU|?W$DortDU;r^WfEYvza8E20o2aMAD7-OXH}hr%jz7$c**Q2SHn1=X zZ{}h7&6q04P|A?UP{5GLkj#+Hkjjw4pumvEkjan(WG4Y}B14I1PJVJyPJR-|JfJPI zKziPPFaWX`7>F=o@&=aU^+c%4NjD5m&d)6Xn+qX`(3P9-;sSLaM}(HP`j+$~j+pMM z$L6)%{1hUzV$)fWL84Pd!C_ezT$GoSpO+4FA0rSOPVQneoovhIGnt(&85By4FcDoI zWTl(i*curpHmC_QLqbJ@8%Vo?;&-zk$9Lw*{34!{{dqVzfM$ZCo?&u4&s3nXx`d5X F1^|5_e-Qux delta 113 zcmZp1XfcprU|?W$DortDU=RQ@Ie-{Mvv5r;6q~50$jG%ZU^g=(*Jd7p-;9%wizH88 zAtJvyS*(t6F*^r`ATv-Y5D0Js30IJ=jfLNtC-cjAg3MrGf|v)gf?;z!&m3j|tdA4q diff --git a/kubebot-monitoring-otel/unpacked filebeat/.DS_Store b/kubebot-monitoring-otel/unpacked filebeat/.DS_Store new file mode 100644 index 0000000000000000000000000000000000000000..bb97bda23e32dab20d3c5b8d15b69d5d6575462c GIT binary patch literal 6148 zcmeHKyH3ME5S)b+mS`f;P~Hy^DME<$h(bZl4}f_@NS4xshRPjZ!MDQf17u@pDPULH zoqO!;*;CvDfUKVGmcSf9Ls!I$hN z6yTYy)*LuyOa)SbRNzwq-5&~Fu?F^zwskP*^+Ju%k!u(IBsAn|U>`cQiW3jZVyqfa;Q# I3jBrw@604C1^@s6 literal 0 HcmV?d00001 diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/.helmignore b/kubebot-monitoring-otel/unpacked filebeat/filebeat/.helmignore new file mode 100644 index 00000000..e12c0b4b --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/.helmignore @@ -0,0 +1,2 @@ +tests/ +.pytest_cache/ diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/Chart.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/Chart.yaml new file mode 100644 index 00000000..b8f69ce7 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/Chart.yaml @@ -0,0 +1,12 @@ +apiVersion: v1 +appVersion: 7.17.3 +description: Official Elastic helm chart for Filebeat +home: https://github.com/elastic/helm-charts +icon: https://helm.elastic.co/icons/beats.png +maintainers: +- email: helm-charts@elastic.co + name: Elastic +name: filebeat +sources: +- https://github.com/elastic/beats +version: 7.17.3 diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/Makefile b/kubebot-monitoring-otel/unpacked filebeat/filebeat/Makefile new file mode 100644 index 00000000..22218a1f --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/Makefile @@ -0,0 +1 @@ +include ../helpers/common.mk diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/README.md b/kubebot-monitoring-otel/unpacked filebeat/filebeat/README.md new file mode 100644 index 00000000..f494ab83 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/README.md @@ -0,0 +1,271 @@ +# Filebeat Helm Chart + +[![Build Status](https://img.shields.io/jenkins/s/https/devops-ci.elastic.co/job/elastic+helm-charts+master.svg)](https://devops-ci.elastic.co/job/elastic+helm-charts+master/) [![Artifact HUB](https://img.shields.io/endpoint?url=https://artifacthub.io/badge/repository/elastic)](https://artifacthub.io/packages/search?repo=elastic) + +This Helm chart is a lightweight way to configure and run our official +[Filebeat Docker image][]. + + + + + + + +- [Requirements](#requirements) +- [Installing](#installing) + - [Install released version using Helm repository](#install-released-version-using-helm-repository) + - [Install development version from a branch](#install-development-version-from-a-branch) +- [Upgrading](#upgrading) +- [Usage notes](#usage-notes) +- [Configuration](#configuration) + - [Deprecated](#deprecated) +- [FAQ](#faq) + - [How to use Filebeat with Elasticsearch with security (authentication and TLS) enabled?](#how-to-use-filebeat-with-elasticsearch-with-security-authentication-and-tls-enabled) + - [How to install OSS version of Filebeat?](#how-to-install-oss-version-of-filebeat) + - [Why is Filebeat host.name field set to Kubernetes pod name?](#why-is-filebeat-hostname-field-set-to-kubernetes-pod-name) + - [How do I get multiple beats agents working with hostNetworking enabled?](#how-do-i-get-multiple-beats-agents-working-with-hostnetworking-enabled) + - [How to change readinessProbe for outputs which don't support testing](#how-to-change-readinessprobe-for-outputs-which-dont-support-testing) +- [Contributing](#contributing) + + + + + + +## Requirements + +* Kubernetes >= 1.14 +* [Helm][] >= 2.17.0 + +See [supported configurations][] for more details. + + +## Installing + +This chart is tested with the latest 7.17.3 version. + +### Install released version using Helm repository + +* Add the Elastic Helm charts repo: +`helm repo add elastic https://helm.elastic.co` + +* Install it: + - with Helm 3: `helm install filebeat --version elastic/filebeat` + - with Helm 2 (deprecated): `helm install --name filebeat --version elastic/filebeat` + +### Install development version from a branch + +* Clone the git repo: `git clone git@github.com:elastic/helm-charts.git` + +* Checkout the branch : `git checkout 7.17` +* Install it: + - with Helm 3: `helm install filebeat ./helm-charts/filebeat --set imageTag=7.17.3` + - with Helm 2 (deprecated): `helm install --name filebeat ./helm-charts/filebeat --set imageTag=7.17.3` + + +## Upgrading + +Please always check [CHANGELOG.md][] and [BREAKING_CHANGES.md][] before +upgrading to a new chart version. + + +## Usage notes + +* The default Filebeat configuration file for this chart is configured to use an +Elasticsearch endpoint. Without any additional changes, Filebeat will send +documents to the service URL that the Elasticsearch Helm chart sets up by +default. You may either set the `ELASTICSEARCH_HOSTS` environment variable in +`extraEnvs` to override this endpoint or modify the default `filebeatConfig` to +change this behavior. +* The default Filebeat configuration file is also configured to capture +container logs and enrich them with Kubernetes metadata by default. This will +capture all container logs in the cluster. +* This chart disables the [HostNetwork][] setting by default for compatibility +reasons with the majority of kubernetes providers and scenarios. Some kubernetes +providers may not allow enabling `hostNetwork` and deploying multiple Filebeat +pods on the same node isn't possible with `hostNetwork` However Filebeat does +recommend activating it. If your kubernetes provider is compatible with +`hostNetwork` and you don't need to run multiple Filebeat DaemonSets, you can +activate it by setting `hostNetworking: true` in [values.yaml][]. +* This repo includes a number of [examples][] configurations which can be used +as a reference. They are also used in the automated testing of this chart. + + +## Configuration + +| Parameter | Description | Default | +|--------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------| +| `clusterRoleRules` | Configurable [cluster role rules][] that Filebeat uses to access Kubernetes resources | see [values.yaml][] | +| `daemonset.annotations` | Configurable [annotations][] for filebeat daemonset | `{}` | +| `daemonset.labels` | Configurable [labels][] applied to all filebeat DaemonSet pods | `{}` | +| `daemonset.affinity` | Configurable [affinity][] for filebeat daemonset | `{}` | +| `daemonset.enabled` | If true, enable daemonset | `true` | +| `daemonset.envFrom` | Templatable string of `envFrom` to be passed to the [environment from variables][] which will be appended to filebeat container for DaemonSet | `[]` | +| `daemonset.extraEnvs` | Extra [environment variables][] which will be appended to filebeat container for DaemonSet | `[]` | +| `daemonset.extraVolumeMounts` | Templatable string of additional `volumeMounts` to be passed to the `tpl` function for DaemonSet | `[]` | +| `daemonset.extraVolumes` | Templatable string of additional `volumes` to be passed to the `tpl` function for DaemonSet | `[]` | +| `daemonset.hostAliases` | Configurable [hostAliases][] for filebeat DaemonSet | `[]` | +| `daemonset.hostNetworking` | Enable filebeat DaemonSet to use `hostNetwork` | `false` | +| `daemonset.filebeatConfig` | Allows you to add any config files in `/usr/share/filebeat` such as `filebeat.yml` for filebeat DaemonSet | see [values.yaml][] | +| `daemonset.maxUnavailable` | The [maxUnavailable][] value for the pod disruption budget. By default this will prevent Kubernetes from having more than 1 unhealthy pod in the node group | `1` | +| `daemonset.nodeSelector` | Configurable [nodeSelector][] for filebeat DaemonSet | `{}` | +| `daemonset.secretMounts` | Allows you easily mount a secret as a file inside the DaemonSet. Useful for mounting certificates and other secrets. See [values.yaml][] for an example | `[]` | +| `daemonset.podSecurityContext` | Configurable [podSecurityContext][] for filebeat DaemonSet pod execution environment | see [values.yaml][] | +| `daemonset.resources` | Allows you to set the [resources][] for filebeat DaemonSet | see [values.yaml][] | +| `daemonset.tolerations` | Configurable [tolerations][] for filebeat DaemonSet | `[]` | +| `deployment.annotations` | Configurable [annotations][] for filebeat Deployment | `{}` | +| `deployment.labels` | Configurable [labels][] applied to all filebeat Deployment pods | `{}` | +| `deployment.affinity` | Configurable [affinity][] for filebeat Deployment | `{}` | +| `deployment.enabled` | If true, enable deployment | `false` | +| `deployment.envFrom` | Templatable string of `envFrom` to be passed to the [environment from variables][] which will be appended to filebeat container for Deployment | `[]` | +| `deployment.extraEnvs` | Extra [environment variables][] which will be appended to filebeat container for Deployment | `[]` | +| `deployment.extraVolumeMounts` | Templatable string of additional `volumeMounts` to be passed to the `tpl` function for DaemonSet | `[]` | +| `deployment.extraVolumes` | Templatable string of additional `volumes` to be passed to the `tpl` function for Deployment | `[]` | +| `daemonset.hostAliases` | Configurable [hostAliases][] for filebeat Deployment | `[]` | +| `deployment.filebeatConfig` | Allows you to add any config files in `/usr/share/filebeat` such as `filebeat.yml` for filebeat Deployment | see [values.yaml][] | +| `deployment.nodeSelector` | Configurable [nodeSelector][] for filebeat Deployment | `{}` | +| `deployment.secretMounts` | Allows you easily mount a secret as a file inside the Deployment Useful for mounting certificates and other secrets. See [values.yaml][] for an example | `[]` | +| `deployment.resources` | Allows you to set the [resources][] for filebeat Deployment | see [values.yaml][] | +| `deployment.securityContext` | Configurable [securityContext][] for filebeat Deployment pod execution environment | see [values.yaml][] | +| `deployment.tolerations` | Configurable [tolerations][] for filebeat Deployment | `[]` | +| `replicas` | The replica count for the Filebeat deployment | `1` | +| `extraContainers` | Templatable string of additional containers to be passed to the `tpl` function | `""` | +| `extraInitContainers` | Templatable string of additional containers to be passed to the `tpl` function | `""` | +| `fullnameOverride` | Overrides the full name of the resources. If not set the name will default to " `.Release.Name` - `.Values.nameOverride or .Chart.Name` " | `""` | +| `hostPathRoot` | Fully-qualified [hostPath][] that will be used to persist filebeat registry data | `/var/lib` | +| `imagePullPolicy` | The Kubernetes [imagePullPolicy][] value | `IfNotPresent` | +| `imagePullSecrets` | Configuration for [imagePullSecrets][] so that you can use a private registry for your image | `[]` | +| `imageTag` | The filebeat Docker image tag | `7.17.3` | +| `image` | The filebeat Docker image | `docker.elastic.co/beats/filebeat` | +| `livenessProbe` | Parameters to pass to liveness [probe][] checks for values such as timeouts and thresholds | see [values.yaml][] | +| `managedServiceAccount` | Whether the `serviceAccount` should be managed by this helm chart. Set this to `false` in order to manage your own service account and related roles | `true` | +| `nameOverride` | Overrides the chart name for resources. If not set the name will default to `.Chart.Name` | `""` | +| `podAnnotations` | Configurable [annotations][] applied to all filebeat pods | `{}` | +| `priorityClassName` | The name of the [PriorityClass][]. No default is supplied as the PriorityClass must be created first | `""` | +| `readinessProbe` | Parameters to pass to readiness [probe][] checks for values such as timeouts and thresholds | see [values.yaml][] | +| `serviceAccount` | Custom [serviceAccount][] that filebeat will use during execution. By default will use the service account created by this chart | `""` | +| `serviceAccountAnnotations` | Annotations to be added to the ServiceAccount that is created by this chart. | `{}` | +| `terminationGracePeriod` | Termination period (in seconds) to wait before killing filebeat pod process on pod shutdown | `30` | +| `updateStrategy` | The [updateStrategy][] for the DaemonSet By default Kubernetes will kill and recreate pods on updates. Setting this to `OnDelete` will require that pods be deleted manually | `RollingUpdate` | + +### Deprecated + +| Parameter | Description | Default | +|----------------------|------------------------------------------------------------------------------------------------------------------------------------------------------|---------| +| `affinity` | Configurable [affinity][] for filebeat DaemonSet | `{}` | +| `envFrom` | Templatable string to be passed to the [environment from variables][] which will be appended to filebeat container for both DaemonSet and Deployment | `[]` | +| `extraEnvs` | Extra [environment variables][] which will be appended to filebeat container for both DaemonSet and Deployment | `[]` | +| `extraVolumeMounts` | Templatable string of additional `volumeMounts` to be passed to the `tpl` function for both DaemonSet and Deployment | `[]` | +| `extraVolumes` | Templatable string of additional `volumes` to be passed to the `tpl` function for both DaemonSet and Deployment | `[]` | +| `filebeatConfig` | Allows you to add any config files in `/usr/share/filebeat` such as `filebeat.yml` for both filebeat DaemonSet and Deployment | `{}` | +| `hostAliases` | Configurable [hostAliases][] | `[]` | +| `nodeSelector` | Configurable [nodeSelector][] for filebeat DaemonSet | `{}` | +| `podSecurityContext` | Configurable [securityContext][] for filebeat DaemonSet and Deployment pod execution environment | `{}` | +| `resources` | Allows you to set the [resources][] for both filebeat DaemonSet and Deployment | `{}` | +| `secretMounts` | Allows you easily mount a secret as a file inside DaemonSet and Deployment Useful for mounting certificates and other secrets | `[]` | +| `tolerations` | Configurable [tolerations][] for both filebeat DaemonSet and Deployment | `[]` | +| `labels` | Configurable [labels][] applied to all filebeat pods | `{}` | + +## FAQ + +### How to use Filebeat with Elasticsearch with security (authentication and TLS) enabled? + +This Helm chart can use existing [Kubernetes secrets][] to setup +credentials or certificates for examples. These secrets should be created +outside of this chart and accessed using [environment variables][] and volumes. + +An example can be found in [examples/security][]. + +### How to install OSS version of Filebeat? + +Deploying OSS version of Filebeat can be done by setting `image` value to +[Filebeat OSS Docker image][] + +An example of Filebeat deployment using OSS version can be found in +[examples/oss][]. + +### Why is Filebeat host.name field set to Kubernetes pod name? + +The default Filebeat configuration is using Filebeat pod name for +`agent.hostname` and `host.name` fields. The `hostname` of the Kubernetes nodes +can be find in `kubernetes.node.name` field. If you would like to have +`agent.hostname` and `host.name` fields set to the hostname of the nodes, you'll +need to set `hostNetworking` value to true. + +Note that enabling [hostNetwork][] make Filebeat pod use the host network +namespace which gives it access to the host loopback device, services listening +on localhost, could be used to snoop on network activity of other pods on the +same node. + +### How do I get multiple beats agents working with hostNetworking enabled? + +The default http port for multiple beats agents may be on the same port, for +example, Filebeats and Metricbeats both default to 5066. When `hostNetworking` +is enabled this will cause collisions when standing up the http server. The work +around for this is to set `http.port` in the config file for one of the beats agent +to use a different port. + +### How to change readinessProbe for outputs which don't support testing + +Some [Filebeat outputs][] like [Kafka output][] don't support testing using +`filebeat test output` command which is used by Filebeat chart readiness probe. + +This makes Filebeat pods crash before being ready with the following message: +`Readiness probe failed: kafka output doesn't support testing`. + +The workaround when using this kind of output is to override the readiness probe +command to check Filebeat API instead (same as existing liveness probe). + +``` +readinessProbe: + exec: + command: + - sh + - -c + - | + #!/usr/bin/env bash -e + curl --fail 127.0.0.1:5066 +``` + + +## Contributing + +Please check [CONTRIBUTING.md][] before any contribution or for any questions +about our development and testing process. + +[7.17]: https://github.com/elastic/helm-charts/releases +[BREAKING_CHANGES.md]: https://github.com/elastic/helm-charts/blob/master/BREAKING_CHANGES.md +[CHANGELOG.md]: https://github.com/elastic/helm-charts/blob/master/CHANGELOG.md +[CONTRIBUTING.md]: https://github.com/elastic/helm-charts/blob/master/CONTRIBUTING.md +[affinity]: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity +[annotations]: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/ +[cluster role rules]: https://kubernetes.io/docs/reference/access-authn-authz/rbac/#role-and-clusterrole +[dnsConfig]: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/ +[environment variables]: https://kubernetes.io/docs/tasks/inject-data-application/define-environment-variable-container/#using-environment-variables-inside-of-your-config +[environment from variables]: https://kubernetes.io/docs/tasks/configure-pod-container/configure-pod-configmap/#configure-all-key-value-pairs-in-a-configmap-as-container-environment-variables +[examples]: https://github.com/elastic/helm-charts/tree/7.17/filebeat/examples +[examples/oss]: https://github.com/elastic/helm-charts/tree/7.17/filebeat/examples/oss +[examples/security]: https://github.com/elastic/helm-charts/tree/7.17/filebeat/examples/security +[filebeat docker image]: https://www.elastic.co/guide/en/beats/filebeat/7.17/running-on-docker.html +[filebeat oss docker image]: https://www.docker.elastic.co/r/beats/filebeat-oss +[filebeat outputs]: https://www.elastic.co/guide/en/beats/filebeat/7.17/configuring-output.html +[helm]: https://helm.sh +[hostAliases]: https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/ +[hostNetwork]: https://kubernetes.io/docs/concepts/policy/pod-security-policy/#host-namespaces +[hostPath]: https://kubernetes.io/docs/concepts/storage/volumes/#hostpath +[imagePullPolicy]: https://kubernetes.io/docs/concepts/containers/images/#updating-images +[imagePullSecrets]: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/#create-a-pod-that-uses-your-secret +[kafka output]: https://www.elastic.co/guide/en/beats/filebeat/7.17/kafka-output.html +[kubernetes secrets]: https://kubernetes.io/docs/concepts/configuration/secret/ +[labels]: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ +[maxUnavailable]: https://kubernetes.io/docs/tasks/run-application/configure-pdb/#specifying-a-poddisruptionbudget +[nodeSelector]: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector +[podSecurityContext]: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ +[priorityClass]: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass +[probe]: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/ +[resources]: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/ +[supported configurations]: https://github.com/elastic/helm-charts/tree/7.17/README.md#supported-configurations +[serviceAccount]: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ +[tolerations]: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ +[updateStrategy]: https://kubernetes.io/docs/tasks/manage-daemon/update-daemon-set/#daemonset-update-strategy +[values.yaml]: https://github.com/elastic/helm-charts/tree/7.17/filebeat/values.yaml diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/default/Makefile b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/default/Makefile new file mode 100644 index 00000000..b39ece96 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/default/Makefile @@ -0,0 +1,13 @@ +default: test + +include ../../../helpers/examples.mk + +RELEASE := helm-filebeat-default + +install: + helm upgrade --wait --timeout=$(TIMEOUT) --install $(RELEASE) ../../ + +test: install goss + +purge: + helm del $(RELEASE) diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/default/README.md b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/default/README.md new file mode 100644 index 00000000..5e42f3a2 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/default/README.md @@ -0,0 +1,27 @@ +# Default + +This example deploy Filebeat 7.17.3 using [default values][]. + + +## Usage + +* Deploy [Elasticsearch Helm chart][]. + +* Deploy Filebeat chart with the default values: `make install` + +* You can now setup a port forward to query Filebeat indices: + + ``` + kubectl port-forward svc/elasticsearch-master 9200 + curl localhost:9200/_cat/indices + ``` + + +## Testing + +You can also run [goss integration tests][] using `make test` + + +[elasticsearch helm chart]: https://github.com/elastic/helm-charts/tree/7.17/elasticsearch/examples/default/ +[goss integration tests]: https://github.com/elastic/helm-charts/tree/7.17/filebeat/examples/default/test/goss.yaml +[default values]: https://github.com/elastic/helm-charts/tree/7.17/filebeat/values.yaml diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/default/test/goss.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/default/test/goss.yaml new file mode 100644 index 00000000..057a29d9 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/default/test/goss.yaml @@ -0,0 +1,47 @@ +port: + tcp:5066: + listening: true + ip: + - "127.0.0.1" + +mount: + /usr/share/filebeat/data: + exists: true + /run/docker.sock: + exists: true + /var/lib/docker/containers: + exists: true + opts: + - ro + /usr/share/filebeat/filebeat.yml: + exists: true + opts: + - ro + +user: + filebeat: + exists: true + uid: 1000 + gid: 1000 + +http: + http://elasticsearch-master:9200/_cat/indices: + status: 200 + timeout: 2000 + body: + - "filebeat-7.17.3" + +file: + /usr/share/filebeat/filebeat.yml: + exists: true + contains: + - "add_kubernetes_metadata" + - "output.elasticsearch" + - "elasticsearch-master:9200" + +command: + cd /usr/share/filebeat && filebeat test output: + exit-status: 0 + stdout: + - "elasticsearch: http://elasticsearch-master:9200" + - "version: 7.17.3" diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/deployment/Makefile b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/deployment/Makefile new file mode 100644 index 00000000..0bc28537 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/deployment/Makefile @@ -0,0 +1,13 @@ +default: test + +include ../../../helpers/examples.mk + +RELEASE := helm-filebeat-deployment + +install: + helm upgrade --wait --timeout=$(TIMEOUT) --install --values values.yaml $(RELEASE) ../../ + +test: install goss + +purge: + helm del $(RELEASE) diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/deployment/README.md b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/deployment/README.md new file mode 100644 index 00000000..e3dbc907 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/deployment/README.md @@ -0,0 +1,27 @@ +# Default + +This example deploy Filebeat 7.17.3 using [default values][] as a Kubernetes Deployment. + + +## Usage + +* Deploy [Elasticsearch Helm chart][]. + +* Deploy Filebeat chart with the default values: `make install` + +* You can now setup a port forward to query Filebeat indices: + + ``` + kubectl port-forward svc/elasticsearch-master 9200 + curl localhost:9200/_cat/indices + ``` + + +## Testing + +You can also run [goss integration tests][] using `make test` + + +[elasticsearch helm chart]: https://github.com/elastic/helm-charts/tree/master/elasticsearch/examples/default/ +[goss integration tests]: https://github.com/elastic/helm-charts/tree/master/filebeat/examples/deployment/test/goss.yaml +[default values]: https://github.com/elastic/helm-charts/tree/master/filebeat/values.yaml diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/deployment/test/goss.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/deployment/test/goss.yaml new file mode 100644 index 00000000..801ec157 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/deployment/test/goss.yaml @@ -0,0 +1,6 @@ +http: + http://elasticsearch-master:9200/_cat/indices: + status: 200 + timeout: 2000 + body: + - "filebeat-7.17.3" diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/deployment/values.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/deployment/values.yaml new file mode 100644 index 00000000..bf1cf06c --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/deployment/values.yaml @@ -0,0 +1,16 @@ +deployment: + enabled: true + +daemonset: + enabled: false + +filebeatConfig: + filebeat.yml: | + filebeat.inputs: + - type: log + paths: + - /usr/share/filebeat/logs/filebeat + + output.elasticsearch: + host: '${NODE_NAME}' + hosts: '${ELASTICSEARCH_HOSTS:elasticsearch-master:9200}' \ No newline at end of file diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/oss/Makefile b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/oss/Makefile new file mode 100644 index 00000000..3caa17af --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/oss/Makefile @@ -0,0 +1,13 @@ +default: test + +include ../../../helpers/examples.mk + +RELEASE := helm-filebeat-oss + +install: + helm upgrade --wait --timeout=$(TIMEOUT) --install --values values.yaml $(RELEASE) ../../ + +test: install goss + +purge: + helm del $(RELEASE) diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/oss/README.md b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/oss/README.md new file mode 100644 index 00000000..6d1243d4 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/oss/README.md @@ -0,0 +1,27 @@ +# OSS + +This example deploy Filebeat 7.17.3 using [Filebeat OSS][] version. + + +## Usage + +* Deploy [Elasticsearch Helm chart][]. + +* Deploy Filebeat chart with the default values: `make install` + +* You can now setup a port forward to query Filebeat indices: + + ``` + kubectl port-forward svc/oss-master 9200 + curl localhost:9200/_cat/indices + ``` + + +## Testing + +You can also run [goss integration tests][] using `make test` + + +[filebeat oss]: https://www.elastic.co/downloads/beats/filebeat-oss +[elasticsearch helm chart]: https://github.com/elastic/helm-charts/tree/7.17/elasticsearch/examples/oss/ +[goss integration tests]: https://github.com/elastic/helm-charts/tree/7.17/filebeat/examples/oss/test/goss.yaml diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/oss/test/goss.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/oss/test/goss.yaml new file mode 100644 index 00000000..2ec0f9bb --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/oss/test/goss.yaml @@ -0,0 +1,22 @@ +port: + tcp:5066: + listening: true + ip: + - "127.0.0.1" + +mount: + /usr/share/filebeat/data: + exists: true + +user: + filebeat: + exists: true + uid: 1000 + gid: 1000 + +http: + http://elasticsearch-master:9200/_cat/indices: + status: 200 + timeout: 2000 + body: + - "filebeat-oss-7.17.3" diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/oss/values.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/oss/values.yaml new file mode 100644 index 00000000..7f713fed --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/oss/values.yaml @@ -0,0 +1,22 @@ +image: docker.elastic.co/beats/filebeat-oss + +daemonset: + filebeatConfig: + filebeat.yml: | + filebeat.inputs: + - type: container + paths: + - /var/log/containers/*.log + processors: + - add_kubernetes_metadata: + host: ${NODE_NAME} + matchers: + - logs_path: + logs_path: "/var/log/containers/" + output.elasticsearch: + host: '${NODE_NAME}' + hosts: "elasticsearch-master:9200" + index: "filebeat-oss-%{[agent.version]}-%{+yyyy.MM.dd}" + setup.ilm.enabled: false + setup.template.name: "filebeat" + setup.template.pattern: "filebeat-oss-*" diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/security/Makefile b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/security/Makefile new file mode 100644 index 00000000..7bec9abe --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/security/Makefile @@ -0,0 +1,13 @@ +default: test + +include ../../../helpers/examples.mk + +RELEASE := helm-filebeat-security + +install: + helm upgrade --wait --timeout=$(TIMEOUT) --install --values values.yaml $(RELEASE) ../../ + +test: install goss + +purge: + helm del $(RELEASE) diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/security/README.md b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/security/README.md new file mode 100644 index 00000000..497ea1f2 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/security/README.md @@ -0,0 +1,28 @@ +# Security + +This example deploy Filebeat 7.17.3 using authentication and TLS to connect to +Elasticsearch (see [values][]). + + +## Usage + +* Deploy [Elasticsearch Helm chart][]. + +* Deploy Filebeat chart with security: `make install` + +* You can now setup a port forward to query Filebeat indices: + + ``` + kubectl port-forward svc/security-master 9200 + curl -u elastic:changeme https://localhost:9200/_cat/indices + ``` + + +## Testing + +You can also run [goss integration tests][] using `make test` + + +[elasticsearch helm chart]: https://github.com/elastic/helm-charts/tree/7.17/elasticsearch/examples/security/ +[goss integration tests]: https://github.com/elastic/helm-charts/tree/7.17/filebeat/examples/security/test/goss.yaml +[values]: https://github.com/elastic/helm-charts/tree/7.17/filebeat/examples/security/values.yaml diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/security/test/goss.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/security/test/goss.yaml new file mode 100644 index 00000000..814726cf --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/security/test/goss.yaml @@ -0,0 +1,9 @@ +http: + https://security-master:9200/_cat/indices: + status: 200 + timeout: 2000 + body: + - "filebeat-7.17.3" + allow-insecure: true + username: "{{ .Env.ELASTICSEARCH_USERNAME }}" + password: "{{ .Env.ELASTICSEARCH_PASSWORD }}" diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/security/values.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/security/values.yaml new file mode 100644 index 00000000..606961fa --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/security/values.yaml @@ -0,0 +1,37 @@ +filebeatConfig: + filebeat.yml: | + filebeat.inputs: + - type: container + paths: + - /var/log/containers/*.log + processors: + - add_kubernetes_metadata: + host: ${NODE_NAME} + matchers: + - logs_path: + logs_path: "/var/log/containers/" + + output.elasticsearch: + username: '${ELASTICSEARCH_USERNAME}' + password: '${ELASTICSEARCH_PASSWORD}' + protocol: https + hosts: ["security-master:9200"] + ssl.certificate_authorities: + - /usr/share/filebeat/config/certs/elastic-certificate.pem + +secretMounts: + - name: elastic-certificate-pem + secretName: elastic-certificate-pem + path: /usr/share/filebeat/config/certs + +extraEnvs: + - name: 'ELASTICSEARCH_USERNAME' + valueFrom: + secretKeyRef: + name: elastic-credentials + key: username + - name: 'ELASTICSEARCH_PASSWORD' + valueFrom: + secretKeyRef: + name: elastic-credentials + key: password diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/upgrade/Makefile b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/upgrade/Makefile new file mode 100644 index 00000000..e98de687 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/upgrade/Makefile @@ -0,0 +1,17 @@ +default: test + +include ../../../helpers/examples.mk + +CHART := filebeat +RELEASE := helm-filebeat-upgrade +# K8S 1.22 doesn't support anymore rbac.authorization.k8s.io/v1beta1 used in 7.9.0 +FROM := 7.10.0 + +install: + ../../../helpers/upgrade.sh --chart $(CHART) --release $(RELEASE) --from $(FROM) + kubectl rollout status daemonset $(RELEASE)-filebeat + +test: install goss + +purge: + helm del $(RELEASE) diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/upgrade/README.md b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/upgrade/README.md new file mode 100644 index 00000000..fa3ee3b8 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/upgrade/README.md @@ -0,0 +1,21 @@ +# Upgrade + +This example will deploy Filebeat chart using an old chart version, +then upgrade it. + + +## Usage + +* Add the Elastic Helm charts repo: `helm repo add elastic https://helm.elastic.co` + +* Deploy [Elasticsearch Helm chart][]: `helm install elasticsearch elastic/elasticsearch` + +* Deploy and upgrade Filebeat chart with the default values: `make install` + + +## Testing + +You can also run [goss integration tests][] using `make test`. + + +[goss integration tests]: https://github.com/elastic/helm-charts/tree/master/filebeat/examples/upgrade/test/goss.yaml diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/upgrade/test/goss.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/upgrade/test/goss.yaml new file mode 100644 index 00000000..fc0f176b --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/upgrade/test/goss.yaml @@ -0,0 +1,45 @@ +port: + tcp:5066: + listening: true + ip: + - "127.0.0.1" + +mount: + /usr/share/filebeat/data: + exists: true + /run/docker.sock: + exists: true + /var/lib/docker/containers: + exists: true + opts: + - ro + /usr/share/filebeat/filebeat.yml: + exists: true + opts: + - ro + +user: + filebeat: + exists: true + uid: 1000 + gid: 1000 + +http: + http://upgrade-master:9200/_cat/indices: + status: 200 + timeout: 2000 + body: + - "filebeat-7.17.3" + +file: + /usr/share/filebeat/filebeat.yml: + exists: true + contains: + - "add_kubernetes_metadata" + - "output.elasticsearch" + +command: + cd /usr/share/filebeat && filebeat test output: + exit-status: 0 + stdout: + - "elasticsearch: http://upgrade-master:9200" diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/upgrade/values.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/upgrade/values.yaml new file mode 100644 index 00000000..8b230601 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/examples/upgrade/values.yaml @@ -0,0 +1,4 @@ +--- +extraEnvs: + - name: ELASTICSEARCH_HOSTS + value: upgrade-master:9200 diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/NOTES.txt b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/NOTES.txt new file mode 100644 index 00000000..d4cf00bf --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/NOTES.txt @@ -0,0 +1,2 @@ +1. Watch all containers come up. + $ kubectl get pods --namespace={{ .Release.Namespace }} -l app={{ template "filebeat.fullname" . }} -w diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/_helpers.tpl b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/_helpers.tpl new file mode 100644 index 00000000..a52a9378 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/_helpers.tpl @@ -0,0 +1,32 @@ +{{/* vim: set filetype=mustache: */}} +{{/* +Expand the name of the chart. +*/}} +{{- define "filebeat.name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +*/}} +{{- define "filebeat.fullname" -}} +{{- if .Values.fullnameOverride -}} +{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" -}} +{{- else -}} +{{- $name := default .Chart.Name .Values.nameOverride -}} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}} +{{- end -}} +{{- end -}} + +{{/* +Use the fullname if the serviceAccount value is not set +*/}} +{{- define "filebeat.serviceAccount" -}} +{{- if .Values.serviceAccount }} +{{- .Values.serviceAccount -}} +{{- else }} +{{- $name := default .Chart.Name .Values.nameOverride -}} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}} +{{- end -}} +{{- end -}} diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/clusterrole.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/clusterrole.yaml new file mode 100644 index 00000000..754dfd57 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/clusterrole.yaml @@ -0,0 +1,12 @@ +{{- if .Values.managedServiceAccount }} +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: {{ template "filebeat.serviceAccount" . }}-cluster-role + labels: + app: "{{ template "filebeat.fullname" . }}" + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + heritage: {{ .Release.Service | quote }} + release: {{ .Release.Name | quote }} +rules: {{ toYaml .Values.clusterRoleRules | nindent 2 -}} +{{- end -}} diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/clusterrolebinding.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/clusterrolebinding.yaml new file mode 100644 index 00000000..887775c2 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/clusterrolebinding.yaml @@ -0,0 +1,19 @@ +{{- if .Values.managedServiceAccount }} +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: {{ template "filebeat.serviceAccount" . }}-cluster-role-binding + labels: + app: "{{ template "filebeat.fullname" . }}" + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + heritage: {{ .Release.Service | quote }} + release: {{ .Release.Name | quote }} +roleRef: + kind: ClusterRole + name: {{ template "filebeat.serviceAccount" . }}-cluster-role + apiGroup: rbac.authorization.k8s.io +subjects: +- kind: ServiceAccount + name: {{ template "filebeat.serviceAccount" . }} + namespace: {{ .Release.Namespace }} +{{- end -}} diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/configmap.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/configmap.yaml new file mode 100644 index 00000000..559abe1e --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/configmap.yaml @@ -0,0 +1,53 @@ +{{- if .Values.filebeatConfig }} +--- +apiVersion: v1 +kind: ConfigMap +metadata: + name: {{ template "filebeat.fullname" . }}-config + labels: + app: "{{ template "filebeat.fullname" . }}" + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + heritage: {{ .Release.Service | quote }} + release: {{ .Release.Name | quote }} +data: +{{- range $path, $config := .Values.filebeatConfig }} + {{ $path }}: | +{{ $config | indent 4 -}} +{{- end -}} +{{- end -}} + +{{- if and .Values.daemonset.enabled .Values.daemonset.filebeatConfig }} +--- +apiVersion: v1 +kind: ConfigMap +metadata: + name: {{ template "filebeat.fullname" . }}-daemonset-config + labels: + app: "{{ template "filebeat.fullname" . }}" + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + heritage: {{ .Release.Service | quote }} + release: {{ .Release.Name | quote }} +data: +{{- range $path, $config := .Values.daemonset.filebeatConfig }} + {{ $path }}: | +{{ $config | indent 4 -}} +{{- end -}} +{{- end -}} + +{{- if and .Values.deployment.enabled .Values.deployment.filebeatConfig }} +--- +apiVersion: v1 +kind: ConfigMap +metadata: + name: {{ template "filebeat.fullname" . }}-deployment-config + labels: + app: "{{ template "filebeat.fullname" . }}" + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + heritage: {{ .Release.Service | quote }} + release: {{ .Release.Name | quote }} +data: +{{- range $path, $config := .Values.deployment.filebeatConfig }} + {{ $path }}: | +{{ $config | indent 4 -}} +{{- end -}} +{{- end -}} diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/daemonset.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/daemonset.yaml new file mode 100644 index 00000000..d6cd7610 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/daemonset.yaml @@ -0,0 +1,201 @@ +{{- if .Values.daemonset.enabled }} +--- +apiVersion: apps/v1 +kind: DaemonSet +metadata: + name: {{ template "filebeat.fullname" . }} + labels: + app: "{{ template "filebeat.fullname" . }}" + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + heritage: {{ .Release.Service | quote }} + release: {{ .Release.Name | quote }} + {{- if .Values.daemonset.labels }} + {{- range $key, $value := .Values.daemonset.labels }} + {{ $key }}: {{ $value | quote }} + {{- end }} + {{- else }} + {{- range $key, $value := .Values.labels }} + {{ $key }}: {{ $value | quote }} + {{- end }} + {{- end }} + {{- if .Values.daemonset.annotations }} + annotations: + {{- range $key, $value := .Values.daemonset.annotations }} + {{ $key }}: {{ $value | quote }} + {{- end }} + {{- end }} +spec: + selector: + matchLabels: + app: "{{ template "filebeat.fullname" . }}" + release: {{ .Release.Name | quote }} + updateStrategy: + {{- if eq .Values.updateStrategy "RollingUpdate" }} + rollingUpdate: + maxUnavailable: {{ .Values.daemonset.maxUnavailable }} + {{- end }} + type: {{ .Values.updateStrategy }} + template: + metadata: + annotations: + {{- range $key, $value := .Values.podAnnotations }} + {{ $key }}: {{ $value | quote }} + {{- end }} + {{/* This forces a restart if the configmap has changed */}} + {{- if or .Values.filebeatConfig .Values.daemonset.filebeatConfig }} + configChecksum: {{ include (print .Template.BasePath "/configmap.yaml") . | sha256sum | trunc 63 }} + {{- end }} + name: "{{ template "filebeat.fullname" . }}" + labels: + app: "{{ template "filebeat.fullname" . }}" + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + heritage: {{ .Release.Service | quote }} + release: {{ .Release.Name | quote }} + {{- if .Values.daemonset.labels }} + {{- range $key, $value := .Values.daemonset.labels }} + {{ $key }}: {{ $value | quote }} + {{- end }} + {{- else }} + {{- range $key, $value := .Values.labels }} + {{ $key }}: {{ $value | quote }} + {{- end }} + {{- end }} + spec: + tolerations: {{ toYaml ( .Values.tolerations | default .Values.daemonset.tolerations ) | nindent 8 }} + nodeSelector: {{ toYaml ( .Values.nodeSelector | default .Values.daemonset.nodeSelector ) | nindent 8 }} + {{- if .Values.priorityClassName }} + priorityClassName: {{ .Values.priorityClassName }} + {{- end }} + affinity: {{ toYaml ( .Values.affinity | default .Values.daemonset.affinity ) | nindent 8 }} + serviceAccountName: {{ template "filebeat.serviceAccount" . }} + terminationGracePeriodSeconds: {{ .Values.terminationGracePeriod }} + {{- if .Values.daemonset.hostNetworking }} + hostNetwork: true + dnsPolicy: ClusterFirstWithHostNet + {{- end }} + {{- if .Values.dnsConfig }} + dnsConfig: {{ toYaml .Values.dnsConfig | nindent 8 }} + {{- end }} + {{- if .Values.hostAliases | default .Values.daemonset.hostAliases }} + hostAliases: {{ toYaml ( .Values.hostAliases | default .Values.daemonset.hostAliases ) | nindent 8 }} + {{- end }} + volumes: + {{- range .Values.secretMounts | default .Values.daemonset.secretMounts }} + - name: {{ .name }} + secret: + secretName: {{ .secretName }} + {{- end }} + {{- if .Values.filebeatConfig }} + - name: filebeat-config + configMap: + defaultMode: 0600 + name: {{ template "filebeat.fullname" . }}-config + {{- else if .Values.daemonset.filebeatConfig }} + - name: filebeat-config + configMap: + defaultMode: 0600 + name: {{ template "filebeat.fullname" . }}-daemonset-config + {{- end }} + - name: data + hostPath: + path: {{ .Values.hostPathRoot }}/{{ template "filebeat.fullname" . }}-{{ .Release.Namespace }}-data + type: DirectoryOrCreate + - name: varlibdockercontainers + hostPath: + path: /var/lib/docker/containers + - name: varlog + hostPath: + path: /var/log + - name: varrundockersock + hostPath: + path: /var/run/docker.sock + {{- if .Values.extraVolumes | default .Values.daemonset.extraVolumes }} +{{ toYaml ( .Values.extraVolumes | default .Values.daemonset.extraVolumes ) | indent 6 }} + {{- end }} + {{- if .Values.imagePullSecrets }} + imagePullSecrets: +{{ toYaml .Values.imagePullSecrets | indent 8 }} + {{- end }} + {{- if .Values.extraInitContainers }} + initContainers: + # All the other beats accept a string here while + # filebeat accepts a valid yaml array. We're keeping + # this as a backwards compatible change, while adding + # also a way to pass a string as other templates to + # make these implementations consistent. + # https://github.com/elastic/helm-charts/issues/490 + {{- if eq "string" (printf "%T" .Values.extraInitContainers) }} +{{ tpl .Values.extraInitContainers . | indent 8 }} + {{- else }} +{{ toYaml .Values.extraInitContainers | indent 8 }} + {{- end }} + {{- end }} + containers: + - name: "filebeat" + image: "{{ .Values.image }}:{{ .Values.imageTag }}" + imagePullPolicy: "{{ .Values.imagePullPolicy }}" + args: + - "-e" + - "-E" + - "http.enabled=true" + livenessProbe: +{{ toYaml .Values.livenessProbe | indent 10 }} + readinessProbe: +{{ toYaml .Values.readinessProbe | indent 10 }} + resources: +{{ toYaml ( .Values.resources | default .Values.daemonset.resources ) | indent 10 }} + env: + - name: POD_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: NODE_NAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName +{{- if .Values.extraEnvs | default .Values.daemonset.extraEnvs }} +{{ toYaml ( .Values.extraEnvs | default .Values.daemonset.extraEnvs ) | indent 8 }} +{{- end }} + envFrom: {{ toYaml ( .Values.envFrom | default .Values.daemonset.envFrom ) | nindent 10 }} + securityContext: {{ toYaml ( .Values.podSecurityContext | default .Values.daemonset.securityContext ) | nindent 10 }} + volumeMounts: + {{- range .Values.secretMounts | default .Values.daemonset.secretMounts }} + - name: {{ .name }} + mountPath: {{ .path }} + {{- if .subPath }} + subPath: {{ .subPath }} + {{- end }} + {{- end }} + {{- range $path, $config := .Values.filebeatConfig }} + - name: filebeat-config + mountPath: /usr/share/filebeat/{{ $path }} + readOnly: true + subPath: {{ $path }} + {{ else }} + {{- range $path, $config := .Values.daemonset.filebeatConfig }} + - name: filebeat-config + mountPath: /usr/share/filebeat/{{ $path }} + readOnly: true + subPath: {{ $path }} + {{- end }} + {{- end }} + - name: data + mountPath: /usr/share/filebeat/data + - name: varlibdockercontainers + mountPath: /var/lib/docker/containers + readOnly: true + - name: varlog + mountPath: /var/log + readOnly: true + # Necessary when using autodiscovery; avoid mounting it otherwise + # See: https://www.elastic.co/guide/en/beats/filebeat/7.17/configuration-autodiscover.html + - name: varrundockersock + mountPath: /var/run/docker.sock + readOnly: true + {{- if .Values.extraVolumeMounts | default .Values.daemonset.extraVolumeMounts }} +{{ toYaml (.Values.extraVolumeMounts | default .Values.daemonset.extraVolumeMounts ) | indent 8 }} + {{- end }} + {{- if .Values.extraContainers }} +{{ tpl .Values.extraContainers . | indent 6 }} + {{- end }} +{{- end }} diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/deployment.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/deployment.yaml new file mode 100644 index 00000000..a8fd8264 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/deployment.yaml @@ -0,0 +1,157 @@ +# Deploy singleton instance in the whole cluster for some unique data sources, like aws input +{{- if .Values.deployment.enabled }} +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + name: {{ template "filebeat.fullname" . }} + labels: + app: "{{ template "filebeat.fullname" . }}" + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + heritage: '{{ .Release.Service }}' + release: {{ .Release.Name }} + {{- if .Values.deployment.labels }} + {{- range $key, $value := .Values.deployment.labels }} + {{ $key }}: {{ $value | quote }} + {{- end }} + {{- else }} + {{- range $key, $value := .Values.labels }} + {{ $key }}: {{ $value | quote }} + {{- end }} + {{- end }} + {{- if .Values.deployment.annotations }} + annotations: + {{- range $key, $value := .Values.deployment.annotations }} + {{ $key }}: {{ $value | quote }} + {{- end }} + {{- end }} +spec: + replicas: {{ .Values.replicas }} + selector: + matchLabels: + app: "{{ template "filebeat.fullname" . }}" + release: {{ .Release.Name | quote }} + template: + metadata: + annotations: + {{- range $key, $value := .Values.podAnnotations }} + {{ $key }}: {{ $value | quote }} + {{- end }} + {{/* This forces a restart if the configmap has changed */}} + {{- if or .Values.filebeatConfig .Values.deployment.filebeatConfig }} + configChecksum: {{ include (print .Template.BasePath "/configmap.yaml") . | sha256sum | trunc 63 }} + {{- end }} + labels: + app: '{{ template "filebeat.fullname" . }}' + chart: '{{ .Chart.Name }}-{{ .Chart.Version }}' + release: '{{ .Release.Name }}' + {{- if .Values.deployment.labels }} + {{- range $key, $value := .Values.deployment.labels }} + {{ $key }}: {{ $value | quote }} + {{- end }} + {{- else }} + {{- range $key, $value := .Values.labels }} + {{ $key }}: {{ $value | quote }} + {{- end }} + {{- end }} + spec: + affinity: {{ toYaml .Values.deployment.affinity | nindent 8 }} + nodeSelector: {{ toYaml .Values.deployment.nodeSelector | nindent 8 }} + tolerations: {{ toYaml ( .Values.tolerations | default .Values.deployment.tolerations ) | nindent 8 }} + {{- if .Values.priorityClassName }} + priorityClassName: {{ .Values.priorityClassName }} + {{- end }} + serviceAccountName: {{ template "filebeat.serviceAccount" . }} + terminationGracePeriodSeconds: {{ .Values.terminationGracePeriod }} + {{- if .Values.deployment.hostAliases }} + hostAliases: {{ toYaml .Values.deployment.hostAliases | nindent 8 }} + {{- end }} + volumes: + {{- range .Values.secretMounts | default .Values.deployment.secretMounts }} + - name: {{ .name }} + secret: + secretName: {{ .secretName }} + {{- end }} + {{- if .Values.filebeatConfig }} + - name: filebeat-config + configMap: + defaultMode: 0600 + name: {{ template "filebeat.fullname" . }}-config + {{- else if .Values.deployment.filebeatConfig }} + - name: filebeat-config + configMap: + defaultMode: 0600 + name: {{ template "filebeat.fullname" . }}-deployment-config + {{- end }} + {{- if .Values.extraVolumes | default .Values.deployment.extraVolumes }} +{{ toYaml ( .Values.extraVolumes | default .Values.deployment.extraVolumes ) | indent 6 }} + {{- end }} + {{- if .Values.imagePullSecrets }} + imagePullSecrets: +{{ toYaml .Values.imagePullSecrets | indent 8 }} + {{- end }} + {{- if .Values.extraInitContainers }} + initContainers: + # All the other beats accept a string here while + # filebeat accepts a valid yaml array. We're keeping + # this as a backwards compatible change, while adding + # also a way to pass a string as other templates to + # make these implementations consistent. + # https://github.com/elastic/helm-charts/issues/490 + {{- if eq "string" (printf "%T" .Values.extraInitContainers) }} +{{ tpl .Values.extraInitContainers . | indent 6 }} + {{- else }} +{{ toYaml .Values.extraInitContainers | indent 6 }} + {{- end }} + {{- end }} + containers: + - name: "filebeat" + image: "{{ .Values.image }}:{{ .Values.imageTag }}" + imagePullPolicy: "{{ .Values.imagePullPolicy }}" + args: + - "-e" + - "-E" + - "http.enabled=true" + livenessProbe: +{{ toYaml .Values.livenessProbe | indent 10 }} + readinessProbe: +{{ toYaml .Values.readinessProbe | indent 10 }} + resources: {{ toYaml ( .Values.resources | default .Values.deployment.resources ) | nindent 10 }} + env: + - name: POD_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace +{{- if .Values.extraEnvs | default .Values.deployment.extraEnvs }} +{{ toYaml ( .Values.extraEnvs | default .Values.deployment.extraEnvs ) | indent 8 }} +{{- end }} + envFrom: {{ toYaml ( .Values.envFrom | default .Values.deployment.envFrom ) | nindent 10 }} + securityContext: {{ toYaml ( .Values.podSecurityContext | default .Values.deployment.securityContext ) | nindent 10 }} + volumeMounts: + {{- range .Values.secretMounts | default .Values.deployment.secretMounts }} + - name: {{ .name }} + mountPath: {{ .path }} + {{- if .subPath }} + subPath: {{ .subPath }} + {{- end }} + {{- end }} + {{- range $path, $config := .Values.filebeatConfig }} + - name: filebeat-config + mountPath: /usr/share/filebeat/{{ $path }} + readOnly: true + subPath: {{ $path }} + {{ else }} + {{- range $path, $config := .Values.deployment.filebeatConfig }} + - name: filebeat-config + mountPath: /usr/share/filebeat/{{ $path }} + readOnly: true + subPath: {{ $path }} + {{- end }} + {{- end }} + {{- if .Values.extraVolumeMounts | default .Values.deployment.extraVolumeMounts }} +{{ toYaml ( .Values.extraVolumeMounts | default .Values.deployment.extraVolumeMounts ) | indent 8 }} + {{- end }} + {{- if .Values.extraContainers }} +{{ tpl .Values.extraContainers . | indent 6 }} + {{- end }} +{{- end }} diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/role.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/role.yaml new file mode 100644 index 00000000..fe3cf924 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/role.yaml @@ -0,0 +1,14 @@ +{{- if .Values.managedServiceAccount }} +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: {{ template "filebeat.serviceAccount" . }}-role + labels: + app: "{{ template "filebeat.fullname" . }}" +rules: + - apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: ["get", "create", "update"] +{{- end -}} diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/rolebinding.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/rolebinding.yaml new file mode 100644 index 00000000..ff121684 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/rolebinding.yaml @@ -0,0 +1,19 @@ +{{- if .Values.managedServiceAccount }} +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: {{ template "filebeat.serviceAccount" . }}-role-binding + labels: + app: "{{ template "filebeat.fullname" . }}" + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + heritage: {{ .Release.Service | quote }} + release: {{ .Release.Name | quote }} +roleRef: + kind: Role + name: {{ template "filebeat.serviceAccount" . }}-role + apiGroup: rbac.authorization.k8s.io +subjects: +- kind: ServiceAccount + name: {{ template "filebeat.serviceAccount" . }} + namespace: {{ .Release.Namespace }} +{{- end -}} diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/serviceaccount.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/serviceaccount.yaml new file mode 100644 index 00000000..8c0fcc60 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/templates/serviceaccount.yaml @@ -0,0 +1,15 @@ +{{- if .Values.managedServiceAccount }} +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ template "filebeat.serviceAccount" . }} + annotations: + {{- with .Values.serviceAccountAnnotations }} + {{- toYaml . | nindent 4 }} + {{- end }} + labels: + app: "{{ template "filebeat.fullname" . }}" + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" + heritage: {{ .Release.Service | quote }} + release: {{ .Release.Name | quote }} +{{- end -}} diff --git a/kubebot-monitoring-otel/unpacked filebeat/filebeat/values.yaml b/kubebot-monitoring-otel/unpacked filebeat/filebeat/values.yaml new file mode 100644 index 00000000..6d9b6b79 --- /dev/null +++ b/kubebot-monitoring-otel/unpacked filebeat/filebeat/values.yaml @@ -0,0 +1,243 @@ +--- +daemonset: + # Annotations to apply to the daemonset + annotations: {} + # additionals labels + labels: {} + affinity: {} + # Include the daemonset + enabled: true + # Extra environment variables for Filebeat container. + envFrom: [] + # - configMapRef: + # name: config-secret + extraEnvs: [] + # - name: MY_ENVIRONMENT_VAR + # value: the_value_goes_here + extraVolumes: + [] + # - name: extras + # emptyDir: {} + extraVolumeMounts: + [] + # - name: extras + # mountPath: /usr/share/extras + # readOnly: true + hostNetworking: false + # Allows you to add any config files in /usr/share/filebeat + # such as filebeat.yml for daemonset + filebeatConfig: + filebeat.yml: | + filebeat.inputs: + - type: container + paths: + - /var/log/containers/*.log + processors: + - add_kubernetes_metadata: + host: ${NODE_NAME} + matchers: + - logs_path: + logs_path: "/var/log/containers/" + + output.elasticsearch: + host: '${NODE_NAME}' + hosts: '${ELASTICSEARCH_HOSTS:elasticsearch-master:9200}' + # Only used when updateStrategy is set to "RollingUpdate" + maxUnavailable: 1 + nodeSelector: {} + # A list of secrets and their paths to mount inside the pod + # This is useful for mounting certificates for security other sensitive values + secretMounts: [] + # - name: filebeat-certificates + # secretName: filebeat-certificates + # path: /usr/share/filebeat/certs + # Various pod security context settings. Bear in mind that many of these have an impact on Filebeat functioning properly. + # + # - User that the container will execute as. Typically necessary to run as root (0) in order to properly collect host container logs. + # - Whether to execute the Filebeat containers as privileged containers. Typically not necessarily unless running within environments such as OpenShift. + securityContext: + runAsUser: 0 + privileged: false + resources: + requests: + cpu: "100m" + memory: "100Mi" + limits: + cpu: "1000m" + memory: "200Mi" + tolerations: [] + +deployment: + # Annotations to apply to the deployment + annotations: {} + # additionals labels + labels: {} + affinity: {} + # Include the deployment + enabled: false + # Extra environment variables for Filebeat container. + envFrom: [] + # - configMapRef: + # name: config-secret + extraEnvs: [] + # - name: MY_ENVIRONMENT_VAR + # value: the_value_goes_here + # Allows you to add any config files in /usr/share/filebeat + extraVolumes: [] + # - name: extras + # emptyDir: {} + extraVolumeMounts: [] + # - name: extras + # mountPath: /usr/share/extras + # readOnly: true + # such as filebeat.yml for deployment + filebeatConfig: + filebeat.yml: | + filebeat.inputs: + - type: tcp + max_message_size: 10MiB + host: "localhost:9000" + + output.elasticsearch: + host: '${NODE_NAME}' + hosts: '${ELASTICSEARCH_HOSTS:elasticsearch-master:9200}' + nodeSelector: {} + # A list of secrets and their paths to mount inside the pod + # This is useful for mounting certificates for security other sensitive values + secretMounts: [] + # - name: filebeat-certificates + # secretName: filebeat-certificates + # path: /usr/share/filebeat/certs + # + # - User that the container will execute as. + # Not necessary to run as root (0) as the Filebeat Deployment use cases do not need access to Kubernetes Node internals + # - Typically not necessarily unless running within environments such as OpenShift. + securityContext: + runAsUser: 0 + privileged: false + resources: + requests: + cpu: "100m" + memory: "100Mi" + limits: + cpu: "1000m" + memory: "200Mi" + tolerations: [] + +# Replicas being used for the filebeat deployment +replicas: 1 + +extraContainers: "" +# - name: dummy-init +# image: busybox +# command: ['echo', 'hey'] + +extraInitContainers: [] +# - name: dummy-init + +# Root directory where Filebeat will write data to in order to persist registry data across pod restarts (file position and other metadata). +hostPathRoot: /var/lib + +dnsConfig: {} +# options: +# - name: ndots +# value: "2" +hostAliases: [] +#- ip: "127.0.0.1" +# hostnames: +# - "foo.local" +# - "bar.local" +image: "docker.elastic.co/beats/filebeat" +imageTag: "7.17.3" +imagePullPolicy: "IfNotPresent" +imagePullSecrets: [] + +livenessProbe: + exec: + command: + - sh + - -c + - | + #!/usr/bin/env bash -e + curl --fail 127.0.0.1:5066 + failureThreshold: 3 + initialDelaySeconds: 10 + periodSeconds: 10 + timeoutSeconds: 5 + +readinessProbe: + exec: + command: + - sh + - -c + - | + #!/usr/bin/env bash -e + filebeat test output + failureThreshold: 3 + initialDelaySeconds: 10 + periodSeconds: 10 + timeoutSeconds: 5 + +# Whether this chart should self-manage its service account, role, and associated role binding. +managedServiceAccount: true + +clusterRoleRules: + - apiGroups: + - "" + resources: + - namespaces + - nodes + - pods + verbs: + - get + - list + - watch + - apiGroups: + - "apps" + resources: + - replicasets + verbs: + - get + - list + - watch + +podAnnotations: + {} + # iam.amazonaws.com/role: es-cluster + +# Custom service account override that the pod will use +serviceAccount: "" + +# Annotations to add to the ServiceAccount that is created if the serviceAccount value isn't set. +serviceAccountAnnotations: + {} + # eks.amazonaws.com/role-arn: arn:aws:iam::111111111111:role/k8s.clustername.namespace.serviceaccount + +# How long to wait for Filebeat pods to stop gracefully +terminationGracePeriod: 30 +# This is the PriorityClass settings as defined in +# https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass +priorityClassName: "" + +updateStrategy: RollingUpdate + +# Override various naming aspects of this chart +# Only edit these if you know what you're doing +nameOverride: "" +fullnameOverride: "" + +# DEPRECATED +affinity: {} +envFrom: [] +extraEnvs: [] +extraVolumes: [] +extraVolumeMounts: [] +# Allows you to add any config files in /usr/share/filebeat +# such as filebeat.yml for both daemonset and deployment +filebeatConfig: {} +nodeSelector: {} +podSecurityContext: {} +resources: {} +secretMounts: [] +tolerations: [] +labels: {}