Name: kube-prometheus-stack-grafana Namespace: monitoring Labels: app.kubernetes.io/instance=kube-prometheus-stack app.kubernetes.io/managed-by=Helm app.kubernetes.io/name=grafana app.kubernetes.io/version=10.4.0 helm.sh/chart=grafana-7.3.8 Annotations: meta.helm.sh/release-name: kube-prometheus-stack meta.helm.sh/release-namespace: monitoring Data ==== grafana.ini: ---- [analytics] check_for_updates = true [auth] disable_login_form = true oauth_allow_insecure_email_lookup = true oauth_skip_org_role_update_sync = false signout_redirect_url = https://keycloak.199-204-45-74.nip.io/realms/atmosphere/protocol/openid-connect/logout?post_logout_redirect_uri=https://grafana.199-204-45-74.nip.io/login [auth.generic_oauth] allow_sign_up = true api_url = https://keycloak.199-204-45-74.nip.io/realms/atmosphere/protocol/openid-connect/userinfo auth_url = https://keycloak.199-204-45-74.nip.io/realms/atmosphere/protocol/openid-connect/auth client_id = grafana client_secret = $__file{/etc/secrets/auth_generic_oauth/password} email_attribute_path = email enabled = true login_attribute_path = username name = Atmosphere name_attribute_path = full_name role_attribute_path = contains(resource_access.grafana.roles[*], 'admin') && 'Admin' || contains(resource_access.grafana.roles[*], 'editor') && 'Editor' || contains(resource_access.grafana.roles[*], 'viewer') && 'Viewer' role_attribute_strict = true scopes = openid email profile offline_access roles skip_org_role_sync = false tls_skip_verify_insecure = true token_url = https://keycloak.199-204-45-74.nip.io/realms/atmosphere/protocol/openid-connect/token [grafana_net] url = https://grafana.net [log] mode = console [paths] data = /var/lib/grafana/ logs = /var/log/grafana plugins = /var/lib/grafana/plugins provisioning = /etc/grafana/provisioning [server] domain = grafana.199-204-45-74.nip.io root_url = https://grafana.199-204-45-74.nip.io BinaryData ==== Events: