diff --git a/cost-analyzer/values.yaml b/cost-analyzer/values.yaml index 6e498e7b6..f87aff1f1 100644 --- a/cost-analyzer/values.yaml +++ b/cost-analyzer/values.yaml @@ -253,11 +253,11 @@ global: annotations: {} # Add annotations to the Route. # host: kubecost.apps.okd4.example.com # Add a custom host for your Route. - # OPTIONAL. The following configs only to be enabled when using a Prometheus instance already installed in the cluster. - createMonitoringClusterRoleBinding: false # Create a ClusterRoleBinding to grant the Kubecost serviceaccount access to query Prometheus. - createMonitoringResourceReaderRoleBinding: false # Create a Role and Role Binding to allow Prometheus to list and watch Kubecost resources. - monitoringServiceAccountName: prometheus-k8s # Name of the Prometheus serviceaccount to bind to the Resource Reader Role Binding. - monitoringServiceAccountNamespace: openshift-monitoring # Namespace of the Prometheus serviceaccount to bind to the Resource Reader Role Binding. + # OPTIONAL. The following configs only to be enabled when using a Prometheus instance already installed in the cluster. + createMonitoringClusterRoleBinding: false # Create a ClusterRoleBinding to grant the Kubecost serviceaccount access to query Prometheus. + createMonitoringResourceReaderRoleBinding: false # Create a Role and Role Binding to allow Prometheus to list and watch Kubecost resources. + monitoringServiceAccountName: prometheus-k8s # Name of the Prometheus serviceaccount to bind to the Resource Reader Role Binding. + monitoringServiceAccountNamespace: openshift-monitoring # Namespace of the Prometheus serviceaccount to bind to the Resource Reader Role Binding. # Create Security Context Constraint resources for the DaemonSets requiring additional privileges. scc: