image: tag: 7.2.0 daemonset: overrideModules: kubernetes: enabled: true config: - module: kubernetes metricsets: - node - system - pod - container - volume period: 10s host: ${NODE_NAME} hosts: ["https://${HOSTNAME}:10250"] bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token ssl.verification_mode: "none" # https://github.com/elastic/beats/issues/8773 labels.dedot: true annotations.dedot: true overrideConfig: metricbeat.config: modules: path: ${path.config}/modules.d/*.yml reload.enabled: false processors: - add_cloud_metadata: - drop_event.when.regexp: kubernetes.pod._module.namespace: '^(cattle-system|kube-system|elastic-system|ingress-nginx)$' setup.template: enabled: true overwrite: false name: "metricbeat" pattern: "metricbeat-*" settings: index.number_of_shards: 2 index.number_of_replicas: 1 index.number_of_routing_shards: 16 setup.ilm.enabled: auto setup.ilm.rollover_alias: "metricbeat" setup.ilm.pattern: "{now/d}-01" setup.ilm.policy_file: "/etc/ilm-policy/ilm-policy.json" setup.dashboards.enabled: false setup.kibana.host: "kibana-kb-http" setup.kibana.protocol: "https" setup.kibana.username: "elastic" setup.kibana.password: "****" setup.kibana.ssl.enabled: true setup.kibana.ssl.certificate_authorities: ["/etc/kibana-ca/tls.crt"] setup.kibana.ssl.certificate: "/etc/kibana-cert/tls.crt" setup.kibana.ssl.key: "/etc/kibana-cert/tls.key" logging.level: error logging.to_stderr: true output.elasticsearch: # separates kubernetes indexes per namespace indices: - index: "metricbeat-%{[kubernetes.pod._module.namespace]}-%{+yyyy.MM.dd}" when.has_fields: ['kubernetes.pod._module.namespace'] hosts: ["elasticsearch-es-http"] protocol: https index: "metricbeat-%{+yyyy.MM.dd}" ssl.certificate_authorities: ["/etc/elastic-ca/tls.crt"] ssl.certificate: "/etc/elastic-cert/tls.crt" ssl.key: "/etc/elastic-cert/tls.key" username: "elastic" password: "****" extraVolumes: - name: elastic-ca secret: secretName: "elasticsearch-es-http-ca-internal" - name: elastic-cert secret: secretName: "elasticsearch-es-http-certs-internal" - name: kibana-ca secret: secretName: "kibana-kb-http-ca-internal" - name: kibana-cert secret: secretName: "kibana-kb-http-certs-internal" - name: ilm-policy secret: secretName: "metric-metricbeat-ilm-policy" extraVolumeMounts: - name: elastic-cert mountPath: /etc/elastic-cert - name: elastic-ca mountPath: /etc/elastic-ca - name: kibana-ca mountPath: /etc/kibana-ca - name: kibana-cert mountPath: /etc/kibana-cert - name: ilm-policy mountPath: /etc/ilm-policy extraSecrets: - name: metric-metricbeat-ilm-policy data: ilm-policy.json: |- { "policy": { "phases": { "hot": { "min_age": "0ms", "actions": { "rollover": { "max_age": "1d", "max_size": "1gb" } } }, "delete": { "min_age": "1d", "actions": { "delete": {} } } } } }