Chapter 8. Probe [monitoring.coreos.com/v1]
- Description
The
Probecustom resource definition (CRD) defines how to scrape metrics from prober exporters such as the [blackbox exporter](https://github.com/prometheus/blackbox_exporter).The
Proberesource needs 2 pieces of information: * The list of probed addresses which can be defined statically or by discovering Kubernetes Ingress objects. * The prober which exposes the availability of probed endpoints (over various protocols such HTTP, TCP, ICMP, …) as Prometheus metrics.PrometheusandPrometheusAgentobjects selectProbeobjects using label and namespace selectors.- Type
-
object - Required
-
spec
-
8.1. Specification Copy linkLink copied to clipboard!
| Property | Type | Description |
|---|---|---|
|
|
| APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources |
|
|
| Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds |
|
| Standard object’s metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata | |
|
|
| spec defines the specification of desired Ingress selection for target discovery by Prometheus. |
|
|
| status defines the status subresource. It is under active development and is updated only when the "StatusForConfigurationResources" feature gate is enabled. Most recent observed status of the Probe. Read-only. More info: https://github.com/kubernetes/community/blob/master/contributors/devel/sig-architecture/api-conventions.md#spec-and-status |
8.1.1. .spec Copy linkLink copied to clipboard!
- Description
- spec defines the specification of desired Ingress selection for target discovery by Prometheus.
- Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| authorization section for this endpoint |
|
|
| basicAuth allow an endpoint to authenticate over basic authentication. More info: https://prometheus.io/docs/operating/configuration/#endpoint |
|
|
| bearerTokenSecret defines the secret to mount to read bearer token for scraping targets. The secret needs to be in the same namespace as the probe and accessible by the Prometheus Operator. |
|
|
| convertClassicHistogramsToNHCB defines whether to convert all scraped classic histograms into a native histogram with custom buckets. It requires Prometheus >= v3.0.0. |
|
|
| fallbackScrapeProtocol defines the protocol to use if a scrape returns blank, unparseable, or otherwise invalid Content-Type. It requires Prometheus >= v3.0.0. |
|
|
| interval at which targets are probed using the configured prober. If not specified Prometheus' global scrape interval is used. |
|
|
| jobName assigned to scraped metrics by default. |
|
|
| keepDroppedTargets defines the per-scrape limit on the number of targets dropped by relabeling that will be kept in memory. 0 means no limit. It requires Prometheus >= v2.47.0. |
|
|
| labelLimit defines the per-scrape limit on number of labels that will be accepted for a sample. Only valid in Prometheus versions 2.27.0 and newer. |
|
|
| labelNameLengthLimit defines the per-scrape limit on length of labels name that will be accepted for a sample. Only valid in Prometheus versions 2.27.0 and newer. |
|
|
| labelValueLengthLimit defines the per-scrape limit on length of labels value that will be accepted for a sample. Only valid in Prometheus versions 2.27.0 and newer. |
|
|
| metricRelabelings defines the RelabelConfig to apply to samples before ingestion. |
|
|
| RelabelConfig allows dynamic rewriting of the label set for targets, alerts, scraped samples and remote write samples. More info: https://prometheus.io/docs/prometheus/latest/configuration/configuration/#relabel_config |
|
|
| module to use for probing specifying how to probe the target. Example module configuring in the blackbox exporter: https://github.com/prometheus/blackbox_exporter/blob/master/example.yml |
|
|
| nativeHistogramBucketLimit defines ff there are more than this many buckets in a native histogram, buckets will be merged to stay within the limit. It requires Prometheus >= v2.45.0. |
|
|
| nativeHistogramMinBucketFactor defines if the growth factor of one bucket to the next is smaller than this, buckets will be merged to increase the factor sufficiently. It requires Prometheus >= v2.50.0. |
|
|
| oauth2 for the URL. Only valid in Prometheus versions 2.27.0 and newer. |
|
|
|
params defines the list of HTTP query parameters for the scrape. Please note that the |
|
|
| ProbeParam defines specification of extra parameters for a Probe. |
|
|
| prober defines the specification for the prober to use for probing targets. The prober.URL parameter is required. Targets cannot be probed if left empty. |
|
|
| sampleLimit defines per-scrape limit on number of scraped samples that will be accepted. |
|
|
| scrapeClass defines the scrape class to apply. |
|
|
| scrapeClassicHistograms defines whether to scrape a classic histogram that is also exposed as a native histogram. It requires Prometheus >= v2.45.0.
Notice: |
|
|
| scrapeProtocols defines the protocols to negotiate during a scrape. It tells clients the protocols supported by Prometheus in order of preference (from most to least preferred). If unset, Prometheus uses its default value. It requires Prometheus >= v2.49.0. |
|
|
| scrapeTimeout defines the timeout for scraping metrics from the Prometheus exporter. If not specified, the Prometheus global scrape timeout is used. The value cannot be greater than the scrape interval otherwise the operator will reject the resource. |
|
|
| targetLimit defines a limit on the number of scraped targets that will be accepted. |
|
|
| targets defines a set of static or dynamically discovered targets to probe. |
|
|
| tlsConfig defines the TLS configuration to use when scraping the endpoint. |
8.1.2. .spec.authorization Copy linkLink copied to clipboard!
- Description
- authorization section for this endpoint
- Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| credentials defines a key of a Secret in the namespace that contains the credentials for authentication. |
|
|
| type defines the authentication type. The value is case-insensitive. "Basic" is not a supported value. Default: "Bearer" |
8.1.3. .spec.authorization.credentials Copy linkLink copied to clipboard!
- Description
- credentials defines a key of a Secret in the namespace that contains the credentials for authentication.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key of the secret to select from. Must be a valid secret key. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the Secret or its key must be defined |
8.1.4. .spec.basicAuth Copy linkLink copied to clipboard!
- Description
- basicAuth allow an endpoint to authenticate over basic authentication. More info: https://prometheus.io/docs/operating/configuration/#endpoint
- Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| password defines a key of a Secret containing the password for authentication. |
|
|
| username defines a key of a Secret containing the username for authentication. |
8.1.5. .spec.basicAuth.password Copy linkLink copied to clipboard!
- Description
- password defines a key of a Secret containing the password for authentication.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key of the secret to select from. Must be a valid secret key. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the Secret or its key must be defined |
8.1.6. .spec.basicAuth.username Copy linkLink copied to clipboard!
- Description
- username defines a key of a Secret containing the username for authentication.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key of the secret to select from. Must be a valid secret key. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the Secret or its key must be defined |
8.1.7. .spec.bearerTokenSecret Copy linkLink copied to clipboard!
- Description
- bearerTokenSecret defines the secret to mount to read bearer token for scraping targets. The secret needs to be in the same namespace as the probe and accessible by the Prometheus Operator.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key of the secret to select from. Must be a valid secret key. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the Secret or its key must be defined |
8.1.8. .spec.metricRelabelings Copy linkLink copied to clipboard!
- Description
- metricRelabelings defines the RelabelConfig to apply to samples before ingestion.
- Type
-
array
8.1.9. .spec.metricRelabelings[] Copy linkLink copied to clipboard!
- Description
RelabelConfig allows dynamic rewriting of the label set for targets, alerts, scraped samples and remote write samples.
More info: https://prometheus.io/docs/prometheus/latest/configuration/configuration/#relabel_config
- Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| action to perform based on the regex matching.
Default: "Replace" |
|
|
| modulus to take of the hash of the source label values.
Only applicable when the action is |
|
|
| regex defines the regular expression against which the extracted value is matched. |
|
|
| replacement value against which a Replace action is performed if the regular expression matches. Regex capture groups are available. |
|
|
| separator defines the string between concatenated SourceLabels. |
|
|
| sourceLabels defines the source labels select values from existing labels. Their content is concatenated using the configured Separator and matched against the configured regular expression. |
|
|
| targetLabel defines the label to which the resulting string is written in a replacement.
It is mandatory for Regex capture groups are available. |
8.1.10. .spec.oauth2 Copy linkLink copied to clipboard!
- Description
- oauth2 for the URL. Only valid in Prometheus versions 2.27.0 and newer.
- Type
-
object - Required
-
clientId -
clientSecret -
tokenUrl
-
| Property | Type | Description |
|---|---|---|
|
|
| clientId defines a key of a Secret or ConfigMap containing the OAuth2 client’s ID. |
|
|
| clientSecret defines a key of a Secret containing the OAuth2 client’s secret. |
|
|
| endpointParams configures the HTTP parameters to append to the token URL. |
|
|
| noProxy defines a comma-separated string that can contain IPs, CIDR notation, domain names that should be excluded from proxying. IP and domain names can contain port numbers. It requires Prometheus >= v2.43.0, Alertmanager >= v0.25.0 or Thanos >= v0.32.0. |
|
|
| proxyConnectHeader optionally specifies headers to send to proxies during CONNECT requests. It requires Prometheus >= v2.43.0, Alertmanager >= v0.25.0 or Thanos >= v0.32.0. |
|
|
| |
|
|
| SecretKeySelector selects a key of a Secret. |
|
|
| proxyFromEnvironment defines whether to use the proxy configuration defined by environment variables (HTTP_PROXY, HTTPS_PROXY, and NO_PROXY). It requires Prometheus >= v2.43.0, Alertmanager >= v0.25.0 or Thanos >= v0.32.0. |
|
|
| proxyUrl defines the HTTP proxy server to use. |
|
|
| scopes defines the OAuth2 scopes used for the token request. |
|
|
| tlsConfig defines the TLS configuration to use when connecting to the OAuth2 server. It requires Prometheus >= v2.43.0. |
|
|
| tokenUrl defines the URL to fetch the token from. |
8.1.11. .spec.oauth2.clientId Copy linkLink copied to clipboard!
- Description
- clientId defines a key of a Secret or ConfigMap containing the OAuth2 client’s ID.
- Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| configMap defines the ConfigMap containing data to use for the targets. |
|
|
| secret defines the Secret containing data to use for the targets. |
8.1.12. .spec.oauth2.clientId.configMap Copy linkLink copied to clipboard!
- Description
- configMap defines the ConfigMap containing data to use for the targets.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key to select. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the ConfigMap or its key must be defined |
8.1.13. .spec.oauth2.clientId.secret Copy linkLink copied to clipboard!
- Description
- secret defines the Secret containing data to use for the targets.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key of the secret to select from. Must be a valid secret key. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the Secret or its key must be defined |
8.1.14. .spec.oauth2.clientSecret Copy linkLink copied to clipboard!
- Description
- clientSecret defines a key of a Secret containing the OAuth2 client’s secret.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key of the secret to select from. Must be a valid secret key. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the Secret or its key must be defined |
8.1.15. .spec.oauth2.proxyConnectHeader Copy linkLink copied to clipboard!
- Description
proxyConnectHeader optionally specifies headers to send to proxies during CONNECT requests.
It requires Prometheus >= v2.43.0, Alertmanager >= v0.25.0 or Thanos >= v0.32.0.
- Type
-
object
8.1.16. .spec.oauth2.proxyConnectHeader{} Copy linkLink copied to clipboard!
- Description
- Type
-
array
8.1.17. .spec.oauth2.proxyConnectHeader{}[] Copy linkLink copied to clipboard!
- Description
- SecretKeySelector selects a key of a Secret.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key of the secret to select from. Must be a valid secret key. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the Secret or its key must be defined |
8.1.18. .spec.oauth2.tlsConfig Copy linkLink copied to clipboard!
- Description
- tlsConfig defines the TLS configuration to use when connecting to the OAuth2 server. It requires Prometheus >= v2.43.0.
- Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| ca defines the Certificate authority used when verifying server certificates. |
|
|
| cert defines the Client certificate to present when doing client-authentication. |
|
|
| insecureSkipVerify defines how to disable target certificate validation. |
|
|
| keySecret defines the Secret containing the client key file for the targets. |
|
|
| maxVersion defines the maximum acceptable TLS version. It requires Prometheus >= v2.41.0 or Thanos >= v0.31.0. |
|
|
| minVersion defines the minimum acceptable TLS version. It requires Prometheus >= v2.35.0 or Thanos >= v0.28.0. |
|
|
| serverName is used to verify the hostname for the targets. |
8.1.19. .spec.oauth2.tlsConfig.ca Copy linkLink copied to clipboard!
- Description
- ca defines the Certificate authority used when verifying server certificates.
- Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| configMap defines the ConfigMap containing data to use for the targets. |
|
|
| secret defines the Secret containing data to use for the targets. |
8.1.20. .spec.oauth2.tlsConfig.ca.configMap Copy linkLink copied to clipboard!
- Description
- configMap defines the ConfigMap containing data to use for the targets.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key to select. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the ConfigMap or its key must be defined |
8.1.21. .spec.oauth2.tlsConfig.ca.secret Copy linkLink copied to clipboard!
- Description
- secret defines the Secret containing data to use for the targets.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key of the secret to select from. Must be a valid secret key. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the Secret or its key must be defined |
8.1.22. .spec.oauth2.tlsConfig.cert Copy linkLink copied to clipboard!
- Description
- cert defines the Client certificate to present when doing client-authentication.
- Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| configMap defines the ConfigMap containing data to use for the targets. |
|
|
| secret defines the Secret containing data to use for the targets. |
8.1.23. .spec.oauth2.tlsConfig.cert.configMap Copy linkLink copied to clipboard!
- Description
- configMap defines the ConfigMap containing data to use for the targets.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key to select. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the ConfigMap or its key must be defined |
8.1.24. .spec.oauth2.tlsConfig.cert.secret Copy linkLink copied to clipboard!
- Description
- secret defines the Secret containing data to use for the targets.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key of the secret to select from. Must be a valid secret key. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the Secret or its key must be defined |
8.1.25. .spec.oauth2.tlsConfig.keySecret Copy linkLink copied to clipboard!
- Description
- keySecret defines the Secret containing the client key file for the targets.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key of the secret to select from. Must be a valid secret key. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the Secret or its key must be defined |
8.1.26. .spec.params Copy linkLink copied to clipboard!
- Description
-
params defines the list of HTTP query parameters for the scrape. Please note that the
.spec.modulefield takes precedence over themoduleparameter from this list when both are defined. The module name must be added using Module under ProbeSpec. - Type
-
array
8.1.27. .spec.params[] Copy linkLink copied to clipboard!
- Description
- ProbeParam defines specification of extra parameters for a Probe.
- Type
-
object - Required
-
name
-
| Property | Type | Description |
|---|---|---|
|
|
| name defines the parameter name |
|
|
| values defines the parameter values |
8.1.28. .spec.prober Copy linkLink copied to clipboard!
- Description
- prober defines the specification for the prober to use for probing targets. The prober.URL parameter is required. Targets cannot be probed if left empty.
- Type
-
object - Required
-
url
-
| Property | Type | Description |
|---|---|---|
|
|
| noProxy defines a comma-separated string that can contain IPs, CIDR notation, domain names that should be excluded from proxying. IP and domain names can contain port numbers. It requires Prometheus >= v2.43.0, Alertmanager >= v0.25.0 or Thanos >= v0.32.0. |
|
|
|
path to collect metrics from. Defaults to |
|
|
| proxyConnectHeader optionally specifies headers to send to proxies during CONNECT requests. It requires Prometheus >= v2.43.0, Alertmanager >= v0.25.0 or Thanos >= v0.32.0. |
|
|
| |
|
|
| SecretKeySelector selects a key of a Secret. |
|
|
| proxyFromEnvironment defines whether to use the proxy configuration defined by environment variables (HTTP_PROXY, HTTPS_PROXY, and NO_PROXY). It requires Prometheus >= v2.43.0, Alertmanager >= v0.25.0 or Thanos >= v0.32.0. |
|
|
| proxyUrl defines the HTTP proxy server to use. |
|
|
| scheme defines the HTTP scheme to use when scraping the prober. |
|
|
| url defines the address of the prober.
Unlike what the name indicates, the value should be in the form of |
8.1.29. .spec.prober.proxyConnectHeader Copy linkLink copied to clipboard!
- Description
proxyConnectHeader optionally specifies headers to send to proxies during CONNECT requests.
It requires Prometheus >= v2.43.0, Alertmanager >= v0.25.0 or Thanos >= v0.32.0.
- Type
-
object
8.1.30. .spec.prober.proxyConnectHeader{} Copy linkLink copied to clipboard!
- Description
- Type
-
array
8.1.31. .spec.prober.proxyConnectHeader{}[] Copy linkLink copied to clipboard!
- Description
- SecretKeySelector selects a key of a Secret.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key of the secret to select from. Must be a valid secret key. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the Secret or its key must be defined |
8.1.32. .spec.targets Copy linkLink copied to clipboard!
- Description
- targets defines a set of static or dynamically discovered targets to probe.
- Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
|
ingress defines the Ingress objects to probe and the relabeling configuration. If |
|
|
|
staticConfig defines the static list of targets to probe and the relabeling configuration. If |
8.1.33. .spec.targets.ingress Copy linkLink copied to clipboard!
- Description
-
ingress defines the Ingress objects to probe and the relabeling configuration. If
staticConfigis also defined,staticConfigtakes precedence. - Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| namespaceSelector defines from which namespaces to select Ingress objects. |
|
|
|
relabelingConfigs to apply to the label set of the target before it gets scraped. The original ingress address is available via the |
|
|
| RelabelConfig allows dynamic rewriting of the label set for targets, alerts, scraped samples and remote write samples. More info: https://prometheus.io/docs/prometheus/latest/configuration/configuration/#relabel_config |
|
|
| selector to select the Ingress objects. |
8.1.34. .spec.targets.ingress.namespaceSelector Copy linkLink copied to clipboard!
- Description
- namespaceSelector defines from which namespaces to select Ingress objects.
- Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| any defines the boolean describing whether all namespaces are selected in contrast to a list restricting them. |
|
|
| matchNames defines the list of namespace names to select from. |
8.1.35. .spec.targets.ingress.relabelingConfigs Copy linkLink copied to clipboard!
- Description
-
relabelingConfigs to apply to the label set of the target before it gets scraped. The original ingress address is available via the
__tmp_prometheus_ingress_addresslabel. It can be used to customize the probed URL. The original scrape job’s name is available via the\__tmp_prometheus_job_namelabel. More info: https://prometheus.io/docs/prometheus/latest/configuration/configuration/#relabel_config - Type
-
array
8.1.36. .spec.targets.ingress.relabelingConfigs[] Copy linkLink copied to clipboard!
- Description
RelabelConfig allows dynamic rewriting of the label set for targets, alerts, scraped samples and remote write samples.
More info: https://prometheus.io/docs/prometheus/latest/configuration/configuration/#relabel_config
- Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| action to perform based on the regex matching.
Default: "Replace" |
|
|
| modulus to take of the hash of the source label values.
Only applicable when the action is |
|
|
| regex defines the regular expression against which the extracted value is matched. |
|
|
| replacement value against which a Replace action is performed if the regular expression matches. Regex capture groups are available. |
|
|
| separator defines the string between concatenated SourceLabels. |
|
|
| sourceLabels defines the source labels select values from existing labels. Their content is concatenated using the configured Separator and matched against the configured regular expression. |
|
|
| targetLabel defines the label to which the resulting string is written in a replacement.
It is mandatory for Regex capture groups are available. |
8.1.37. .spec.targets.ingress.selector Copy linkLink copied to clipboard!
- Description
- selector to select the Ingress objects.
- Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| matchExpressions is a list of label selector requirements. The requirements are ANDed. |
|
|
| A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. |
|
|
| matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. |
8.1.38. .spec.targets.ingress.selector.matchExpressions Copy linkLink copied to clipboard!
- Description
- matchExpressions is a list of label selector requirements. The requirements are ANDed.
- Type
-
array
8.1.39. .spec.targets.ingress.selector.matchExpressions[] Copy linkLink copied to clipboard!
- Description
- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values.
- Type
-
object - Required
-
key -
operator
-
| Property | Type | Description |
|---|---|---|
|
|
| key is the label key that the selector applies to. |
|
|
| operator represents a key’s relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. |
|
|
| values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. |
8.1.40. .spec.targets.staticConfig Copy linkLink copied to clipboard!
- Description
-
staticConfig defines the static list of targets to probe and the relabeling configuration. If
ingressis also defined,staticConfigtakes precedence. More info: https://prometheus.io/docs/prometheus/latest/configuration/configuration/#static_config. - Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| labels defines all labels assigned to all metrics scraped from the targets. |
|
|
| relabelingConfigs defines relabelings to be apply to the label set of the targets before it gets scraped. More info: https://prometheus.io/docs/prometheus/latest/configuration/configuration/#relabel_config |
|
|
| RelabelConfig allows dynamic rewriting of the label set for targets, alerts, scraped samples and remote write samples. More info: https://prometheus.io/docs/prometheus/latest/configuration/configuration/#relabel_config |
|
|
| static defines the list of hosts to probe. |
8.1.41. .spec.targets.staticConfig.relabelingConfigs Copy linkLink copied to clipboard!
- Description
- relabelingConfigs defines relabelings to be apply to the label set of the targets before it gets scraped. More info: https://prometheus.io/docs/prometheus/latest/configuration/configuration/#relabel_config
- Type
-
array
8.1.42. .spec.targets.staticConfig.relabelingConfigs[] Copy linkLink copied to clipboard!
- Description
RelabelConfig allows dynamic rewriting of the label set for targets, alerts, scraped samples and remote write samples.
More info: https://prometheus.io/docs/prometheus/latest/configuration/configuration/#relabel_config
- Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| action to perform based on the regex matching.
Default: "Replace" |
|
|
| modulus to take of the hash of the source label values.
Only applicable when the action is |
|
|
| regex defines the regular expression against which the extracted value is matched. |
|
|
| replacement value against which a Replace action is performed if the regular expression matches. Regex capture groups are available. |
|
|
| separator defines the string between concatenated SourceLabels. |
|
|
| sourceLabels defines the source labels select values from existing labels. Their content is concatenated using the configured Separator and matched against the configured regular expression. |
|
|
| targetLabel defines the label to which the resulting string is written in a replacement.
It is mandatory for Regex capture groups are available. |
8.1.43. .spec.tlsConfig Copy linkLink copied to clipboard!
- Description
- tlsConfig defines the TLS configuration to use when scraping the endpoint.
- Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| ca defines the Certificate authority used when verifying server certificates. |
|
|
| cert defines the Client certificate to present when doing client-authentication. |
|
|
| insecureSkipVerify defines how to disable target certificate validation. |
|
|
| keySecret defines the Secret containing the client key file for the targets. |
|
|
| maxVersion defines the maximum acceptable TLS version. It requires Prometheus >= v2.41.0 or Thanos >= v0.31.0. |
|
|
| minVersion defines the minimum acceptable TLS version. It requires Prometheus >= v2.35.0 or Thanos >= v0.28.0. |
|
|
| serverName is used to verify the hostname for the targets. |
8.1.44. .spec.tlsConfig.ca Copy linkLink copied to clipboard!
- Description
- ca defines the Certificate authority used when verifying server certificates.
- Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| configMap defines the ConfigMap containing data to use for the targets. |
|
|
| secret defines the Secret containing data to use for the targets. |
8.1.45. .spec.tlsConfig.ca.configMap Copy linkLink copied to clipboard!
- Description
- configMap defines the ConfigMap containing data to use for the targets.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key to select. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the ConfigMap or its key must be defined |
8.1.46. .spec.tlsConfig.ca.secret Copy linkLink copied to clipboard!
- Description
- secret defines the Secret containing data to use for the targets.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key of the secret to select from. Must be a valid secret key. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the Secret or its key must be defined |
8.1.47. .spec.tlsConfig.cert Copy linkLink copied to clipboard!
- Description
- cert defines the Client certificate to present when doing client-authentication.
- Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| configMap defines the ConfigMap containing data to use for the targets. |
|
|
| secret defines the Secret containing data to use for the targets. |
8.1.48. .spec.tlsConfig.cert.configMap Copy linkLink copied to clipboard!
- Description
- configMap defines the ConfigMap containing data to use for the targets.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key to select. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the ConfigMap or its key must be defined |
8.1.49. .spec.tlsConfig.cert.secret Copy linkLink copied to clipboard!
- Description
- secret defines the Secret containing data to use for the targets.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key of the secret to select from. Must be a valid secret key. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the Secret or its key must be defined |
8.1.50. .spec.tlsConfig.keySecret Copy linkLink copied to clipboard!
- Description
- keySecret defines the Secret containing the client key file for the targets.
- Type
-
object - Required
-
key
-
| Property | Type | Description |
|---|---|---|
|
|
| The key of the secret to select from. Must be a valid secret key. |
|
|
| Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names |
|
|
| Specify whether the Secret or its key must be defined |
8.1.51. .status Copy linkLink copied to clipboard!
- Description
status defines the status subresource. It is under active development and is updated only when the "StatusForConfigurationResources" feature gate is enabled.
Most recent observed status of the Probe. Read-only. More info: https://github.com/kubernetes/community/blob/master/contributors/devel/sig-architecture/api-conventions.md#spec-and-status
- Type
-
object
| Property | Type | Description |
|---|---|---|
|
|
| bindings defines the list of workload resources (Prometheus, PrometheusAgent, ThanosRuler or Alertmanager) which select the configuration resource. |
|
|
| WorkloadBinding is a link between a configuration resource and a workload resource. |
8.1.52. .status.bindings Copy linkLink copied to clipboard!
- Description
- bindings defines the list of workload resources (Prometheus, PrometheusAgent, ThanosRuler or Alertmanager) which select the configuration resource.
- Type
-
array
8.1.53. .status.bindings[] Copy linkLink copied to clipboard!
- Description
- WorkloadBinding is a link between a configuration resource and a workload resource.
- Type
-
object - Required
-
group -
name -
namespace -
resource
-
| Property | Type | Description |
|---|---|---|
|
|
| conditions defines the current state of the configuration resource when bound to the referenced Workload object. |
|
|
| ConfigResourceCondition describes the status of configuration resources linked to Prometheus, PrometheusAgent, Alertmanager or ThanosRuler. |
|
|
| group defines the group of the referenced resource. |
|
|
| name defines the name of the referenced object. |
|
|
| namespace defines the namespace of the referenced object. |
|
|
| resource defines the type of resource being referenced (e.g. Prometheus, PrometheusAgent, ThanosRuler or Alertmanager). |
8.1.54. .status.bindings[].conditions Copy linkLink copied to clipboard!
- Description
- conditions defines the current state of the configuration resource when bound to the referenced Workload object.
- Type
-
array
8.1.55. .status.bindings[].conditions[] Copy linkLink copied to clipboard!
- Description
- ConfigResourceCondition describes the status of configuration resources linked to Prometheus, PrometheusAgent, Alertmanager or ThanosRuler.
- Type
-
object - Required
-
lastTransitionTime -
status -
type
-
| Property | Type | Description |
|---|---|---|
|
|
| lastTransitionTime defines the time of the last update to the current status property. |
|
|
| message defines the human-readable message indicating details for the condition’s last transition. |
|
|
|
observedGeneration defines the .metadata.generation that the condition was set based upon. For instance, if |
|
|
| reason for the condition’s last transition. |
|
|
| status of the condition. |
|
|
| type of the condition being reported. Currently, only "Accepted" is supported. |
8.2. API endpoints Copy linkLink copied to clipboard!
The following API endpoints are available:
/apis/monitoring.coreos.com/v1/probes-
GET: list objects of kind Probe
-
/apis/monitoring.coreos.com/v1/namespaces/{namespace}/probes-
DELETE: delete collection of Probe -
GET: list objects of kind Probe -
POST: create a Probe
-
/apis/monitoring.coreos.com/v1/namespaces/{namespace}/probes/{name}-
DELETE: delete a Probe -
GET: read the specified Probe -
PATCH: partially update the specified Probe -
PUT: replace the specified Probe
-
/apis/monitoring.coreos.com/v1/namespaces/{namespace}/probes/{name}/status-
GET: read status of the specified Probe -
PATCH: partially update status of the specified Probe -
PUT: replace status of the specified Probe
-
8.2.1. /apis/monitoring.coreos.com/v1/probes Copy linkLink copied to clipboard!
- HTTP method
-
GET - Description
- list objects of kind Probe
| HTTP code | Reponse body |
|---|---|
| 200 - OK |
|
| 401 - Unauthorized | Empty |
8.2.2. /apis/monitoring.coreos.com/v1/namespaces/{namespace}/probes Copy linkLink copied to clipboard!
- HTTP method
-
DELETE - Description
- delete collection of Probe
| HTTP code | Reponse body |
|---|---|
| 200 - OK |
|
| 401 - Unauthorized | Empty |
- HTTP method
-
GET - Description
- list objects of kind Probe
| HTTP code | Reponse body |
|---|---|
| 200 - OK |
|
| 401 - Unauthorized | Empty |
- HTTP method
-
POST - Description
- create a Probe
| Parameter | Type | Description |
|---|---|---|
|
|
| When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
|
|
| fieldValidation instructs the server on how to handle objects in the request (POST/PUT/PATCH) containing unknown or duplicate fields. Valid values are: - Ignore: This will ignore any unknown fields that are silently dropped from the object, and will ignore all but the last duplicate field that the decoder encounters. This is the default behavior prior to v1.23. - Warn: This will send a warning via the standard warning response header for each unknown field that is dropped from the object, and for each duplicate field that is encountered. The request will still succeed if there are no other errors, and will only persist the last of any duplicate fields. This is the default in v1.23+ - Strict: This will fail the request with a BadRequest error if any unknown fields would be dropped from the object, or if any duplicate fields are present. The error returned from the server will contain all unknown and duplicate fields encountered. |
| Parameter | Type | Description |
|---|---|---|
|
|
|
8.2.3. /apis/monitoring.coreos.com/v1/namespaces/{namespace}/probes/{name} Copy linkLink copied to clipboard!
| Parameter | Type | Description |
|---|---|---|
|
|
| name of the Probe |
- HTTP method
-
DELETE - Description
- delete a Probe
| Parameter | Type | Description |
|---|---|---|
|
|
| When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
| HTTP code | Reponse body |
|---|---|
| 200 - OK |
|
| 202 - Accepted |
|
| 401 - Unauthorized | Empty |
- HTTP method
-
GET - Description
- read the specified Probe
| HTTP code | Reponse body |
|---|---|
| 200 - OK |
|
| 401 - Unauthorized | Empty |
- HTTP method
-
PATCH - Description
- partially update the specified Probe
| Parameter | Type | Description |
|---|---|---|
|
|
| When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
|
|
| fieldValidation instructs the server on how to handle objects in the request (POST/PUT/PATCH) containing unknown or duplicate fields. Valid values are: - Ignore: This will ignore any unknown fields that are silently dropped from the object, and will ignore all but the last duplicate field that the decoder encounters. This is the default behavior prior to v1.23. - Warn: This will send a warning via the standard warning response header for each unknown field that is dropped from the object, and for each duplicate field that is encountered. The request will still succeed if there are no other errors, and will only persist the last of any duplicate fields. This is the default in v1.23+ - Strict: This will fail the request with a BadRequest error if any unknown fields would be dropped from the object, or if any duplicate fields are present. The error returned from the server will contain all unknown and duplicate fields encountered. |
| HTTP code | Reponse body |
|---|---|
| 200 - OK |
|
| 401 - Unauthorized | Empty |
- HTTP method
-
PUT - Description
- replace the specified Probe
| Parameter | Type | Description |
|---|---|---|
|
|
| When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
|
|
| fieldValidation instructs the server on how to handle objects in the request (POST/PUT/PATCH) containing unknown or duplicate fields. Valid values are: - Ignore: This will ignore any unknown fields that are silently dropped from the object, and will ignore all but the last duplicate field that the decoder encounters. This is the default behavior prior to v1.23. - Warn: This will send a warning via the standard warning response header for each unknown field that is dropped from the object, and for each duplicate field that is encountered. The request will still succeed if there are no other errors, and will only persist the last of any duplicate fields. This is the default in v1.23+ - Strict: This will fail the request with a BadRequest error if any unknown fields would be dropped from the object, or if any duplicate fields are present. The error returned from the server will contain all unknown and duplicate fields encountered. |
| Parameter | Type | Description |
|---|---|---|
|
|
|
8.2.4. /apis/monitoring.coreos.com/v1/namespaces/{namespace}/probes/{name}/status Copy linkLink copied to clipboard!
| Parameter | Type | Description |
|---|---|---|
|
|
| name of the Probe |
- HTTP method
-
GET - Description
- read status of the specified Probe
| HTTP code | Reponse body |
|---|---|
| 200 - OK |
|
| 401 - Unauthorized | Empty |
- HTTP method
-
PATCH - Description
- partially update status of the specified Probe
| Parameter | Type | Description |
|---|---|---|
|
|
| When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
|
|
| fieldValidation instructs the server on how to handle objects in the request (POST/PUT/PATCH) containing unknown or duplicate fields. Valid values are: - Ignore: This will ignore any unknown fields that are silently dropped from the object, and will ignore all but the last duplicate field that the decoder encounters. This is the default behavior prior to v1.23. - Warn: This will send a warning via the standard warning response header for each unknown field that is dropped from the object, and for each duplicate field that is encountered. The request will still succeed if there are no other errors, and will only persist the last of any duplicate fields. This is the default in v1.23+ - Strict: This will fail the request with a BadRequest error if any unknown fields would be dropped from the object, or if any duplicate fields are present. The error returned from the server will contain all unknown and duplicate fields encountered. |
| HTTP code | Reponse body |
|---|---|
| 200 - OK |
|
| 401 - Unauthorized | Empty |
- HTTP method
-
PUT - Description
- replace status of the specified Probe
| Parameter | Type | Description |
|---|---|---|
|
|
| When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
|
|
| fieldValidation instructs the server on how to handle objects in the request (POST/PUT/PATCH) containing unknown or duplicate fields. Valid values are: - Ignore: This will ignore any unknown fields that are silently dropped from the object, and will ignore all but the last duplicate field that the decoder encounters. This is the default behavior prior to v1.23. - Warn: This will send a warning via the standard warning response header for each unknown field that is dropped from the object, and for each duplicate field that is encountered. The request will still succeed if there are no other errors, and will only persist the last of any duplicate fields. This is the default in v1.23+ - Strict: This will fail the request with a BadRequest error if any unknown fields would be dropped from the object, or if any duplicate fields are present. The error returned from the server will contain all unknown and duplicate fields encountered. |
| Parameter | Type | Description |
|---|---|---|
|
|
|