Skip to content

[CONS-6524] Standardize example OpenShift values #1506

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 3 commits into from
Aug 29, 2024
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
20 changes: 4 additions & 16 deletions examples/datadog/agent_on_openshift_values.yaml
Original file line number Diff line number Diff line change
@@ -1,11 +1,10 @@
# Datadog Agent with Logs, APM, Processes, and System Probe enabled
# Datadog Agent with Logs, APM, Processes
# with specific configurations to work on OpenShift 4.
# When installing the chart, install onto a non-default namespace with
# `helm install --namespace <your_ns>` due to existing SecurityContextConstraints
# on the default namespace. For more details about setting appropriate security
# constraints, see https://docs.datadoghq.com/integrations/openshift/ and
# https://www.datadoghq.com/blog/openshift-monitoring-with-datadog/

targetSystem: "linux"
datadog:
# apiKey: <DATADOG_API_KEY>
Expand All @@ -15,20 +14,15 @@ datadog:
appKeyExistingSecret: <DATADOG_APP_KEY_SECRET>
clusterName: <CLUSTER_NAME>
tags: []
criSocketPath: /var/run/crio/crio.sock
# Depending on your DNS/SSL setup, it might not be possible to verify the Kubelet cert properly
# If you have proper CA, you can switch it to true
kubelet:
tlsVerify: false
confd:
cri.yaml: |-
init_config:
instances:
- collect_disk: true
logs:
enabled: false
apm:
portEnabled: false
portEnabled: true
socketEnabled: false
processAgent:
enabled: true
processCollection: false
Expand All @@ -49,10 +43,4 @@ agents:
clusterAgent:
podSecurity:
securityContextConstraints:
create: true
clusterChecksRunner:
enabled: true
replicas: 2
kube-state-metrics:
securityContext:
enabled: false
create: true