Get started with Grafana Mimir and GEM using the Helm chart
The mimir-distributed Helm chart allows you to install, configure, and upgrade Grafana Mimir and Grafana Enterprise Metrics (GEM) within a Kubernetes cluster.
Before you begin
The instructions that follow are common across any flavor of Kubernetes. If you don’t have experience with Kubernetes, you can install a lightweight flavor of Kubernetes such as kind.
Experience with the following is recommended, but not essential:
- General knowledge about using a Kubernetes cluster.
- Understanding of what the
kubectl
command does. - Understanding of what the
helm
command does.
Caution: This procedure is primarily aimed at local or development setups. To set up in a production environment, see Run Grafana Mimir in production using the Helm chart.
Hardware requirements
- A single Kubernetes node with a minimum of 4 cores and 16GiB RAM
Software requirements
Kubernetes 1.20 or higher
The
kubectl
command for your version of KubernetesRun the following command to get both the Kubernetes and
kubectl
version:kubectl version
. The command prints out the server and client versions, where the server is the Kubernetes itself and client meanskubectl
.The
helm
command version 3.8 or higherRun the following command to get the Helm version:
helm version
.
Verify that you have
Access to the Kubernetes cluster
For example by running the command
kubectl get ns
, which lists all namespaces.Persistent storage is enabled in the Kubernetes cluster, which has a default storage class set up. You can change the default StorageClass.
Note: If you are using
kind
or you are unsure, assume it is enabled and continue.DNS service works in the Kubernetes cluster
Note: If you are using
kind
or you are unsure, assume it works and continue.
Security setup
If you are using kind
or similar local Kubernetes setup and haven’t set security policies, you can safely skip this section.
This installation will not succeed if you have enabled the PodSecurityPolicy admission controller or if you are enforcing the Restricted policy with Pod Security admission controller. The reason is that the installation includes a deployment of MinIO. The minio/minio chart is not compatible with running under a Restricted policy or the PodSecurityPolicy that the mimir-distributed chart provides.
If you are using the PodSecurityPolicy admission controller, then it is not possible to deploy the mimir-distributed chart with MinIO.
Refer to Run Grafana Mimir in production using the Helm chart for instructions on
setting up an external object storage and disable the built-in MinIO deployment with minio.enabled: false
in the Helm values file.
If you are using the Pod Security admission controller, then MinIO and the mimir-distributed chart can successfully deploy under the baseline pod security level.
Install the Helm chart in a custom namespace
Using a custom namespace solves problems later on because you do not have to overwrite the default namespace.
Create a unique Kubernetes namespace, for example
mimir-test
:kubectl create namespace mimir-test
For more details, see the Kubernetes documentation about Creating a new namespace.
Set up a Helm repository using the following commands:
helm repo add grafana https://grafana.github.io/helm-charts helm repo update
Note: The Helm chart at https://grafana.github.io/helm-charts is a publication of the source code at grafana/mimir.
Install Grafana Mimir using the Helm chart:
helm -n mimir-test install mimir grafana/mimir-distributed
Note: The output of the command contains the write and read URLs necessary for the following steps.
Check the statuses of the Mimir pods:
kubectl -n mimir-test get pods
The results look similar to this:
NAME READY STATUS RESTARTS AGE mimir-minio-7bd89b757d-q5hp6 1/1 Running 0 2m44s mimir-rollout-operator-76c67c7d56-v6xtl 1/1 Running 0 2m44s mimir-nginx-858455979c-hjvhx 1/1 Running 0 2m44s mimir-make-minio-buckets-svgvd 0/1 Completed 1 2m44s mimir-ruler-64b9d59b94-tvj7z 1/1 Running 0 2m44s mimir-query-frontend-c444b56f9-jrmwl 1/1 Running 0 2m44s mimir-overrides-exporter-86c4d54645-zktkm 1/1 Running 0 2m44s mimir-querier-5d9c55d6d9-l6fdc 1/1 Running 0 2m44s mimir-distributor-7796db494f-rsvdx 1/1 Running 0 2m44s mimir-query-scheduler-d5dccfff7-5c5rw 1/1 Running 0 2m44s mimir-querier-5d9c55d6d9-xghl6 1/1 Running 0 2m44s mimir-query-scheduler-d5dccfff7-vz4vf 1/1 Running 0 2m44s mimir-alertmanager-0 1/1 Running 0 2m44s mimir-store-gateway-zone-b-0 1/1 Running 0 2m44s mimir-store-gateway-zone-c-0 1/1 Running 0 2m43s mimir-ingester-zone-b-0 1/1 Running 0 2m43s mimir-compactor-0 1/1 Running 0 2m44s mimir-ingester-zone-a-0 1/1 Running 0 2m43s mimir-store-gateway-zone-a-0 1/1 Running 0 2m44s mimir-ingester-zone-c-0 1/1 Running 0 2m44s
Wait until all of the pods have a status of
Running
orCompleted
, which might take a few minutes.
Generate test metrics
Caution
Grafana Alloy is the new name for our distribution of the OTel collector. Grafana Agent has been deprecated and is in Long-Term Support (LTS) through October 31, 2025. Grafana Agent will reach an End-of-Life (EOL) on November 1, 2025. Read more about why we recommend migrating to Grafana Alloy.
The Grafana Mimir Helm chart can collect metrics, logs, or both, about Grafana Mimir itself. This is called metamonitoring. In the example that follows, metamonitoring scrapes metrics about Grafana Mimir itself, and then writes those metrics to the same Grafana Mimir instance.
Deploy the Grafana Agent Operator Custom Resource Definitions (CRDs). For more information, refer to Deploy the Agent Operator Custom Resource Definitions (CRDs) in the Grafana Agent documentation.
Create a YAML file called
custom.yaml
for your Helm values overrides. Add the following YAML snippet tocustom.yaml
to enable metamonitoring in Mimir:metaMonitoring: serviceMonitor: enabled: true grafanaAgent: enabled: true installOperator: true metrics: additionalRemoteWriteConfigs: - url: "http://mimir-nginx.mimir-test.svc:80/api/v1/push"
Note
In a production environment theurl
above would point to an external system, independent of your Grafana Mimir instance, such as an instance of Grafana Cloud Metrics.Upgrade Grafana Mimir by using the
helm
command:helm -n mimir-test upgrade mimir grafana/mimir-distributed -f custom.yaml
Start Grafana in Kubernetes and query metrics
Install Grafana in the same Kubernetes cluster.
For details, see Deploy Grafana on Kubernetes.
If you haven’t done it as part of the previous step, port-forward Grafana to
localhost
, by using thekubectl
command:kubectl port-forward service/grafana 3000:3000
In a browser, go to the Grafana server at http://localhost:3000.
Sign in using the default username
admin
and passwordadmin
.On the left-hand side, go to Configuration > Data sources.
Configure a new Prometheus data source to query the local Grafana Mimir server, by using the following settings:
Field Value Name Mimir URL http://mimir-nginx.mimir-test.svc:80/prometheus To add a data source, see Add a data source.
Verify success:
You should be able to query metrics in Grafana Explore, as well as create dashboard panels by using your newly configured
Mimir
data source.
Deploy Grafana Enterprise Metrics
For additional GEM-specific configurations, refer to Deploy Grafana Enterprise Metrics.
Enable external access to Grafana Mimir
To enable write and query access to Grafana Mimir from outside the Kubernetes cluster, refer to Enable external access to Grafana Mimir.