update traefik values

This commit is contained in:
Christian Lempa 2024-10-14 11:12:17 +02:00
parent efc2d235a3
commit 3456dd6c3a
2 changed files with 44 additions and 87 deletions

View File

@ -1,12 +1,12 @@
# Portainer Helm Chart Template # Portainer Helm Chart Values Template
# --- # ---
replicas: 1 # Number of replicas
image: image:
repository: portainer/portainer-ce repository: portainer/portainer-ce
tag: 2.22.0 tag: 2.22.0
pullPolicy: IfNotPresent pullPolicy: IfNotPresent
replicas: 1 # Number of replicas
# (Choice) LoadBalancer or ClusterIP with optional Ingress # (Choice) LoadBalancer or ClusterIP with optional Ingress
service: service:
type: LoadBalancer type: LoadBalancer

View File

@ -1,97 +1,54 @@
additionalArguments: # Traefik Helm Chart Values Template
# Configure your CertificateResolver here...
#
# HTTP Challenge
# --- # ---
# Generic Example: image:
# - --certificatesresolvers.generic.acme.email=your-email@example.com repository: traefik
# - --certificatesresolvers.generic.acme.caServer=https://acme-v02.api.letsencrypt.org/directory version: v3.1.4
# - --certificatesresolvers.generic.acme.httpChallenge.entryPoint=web pullPolicy: IfNotPresent
# - --certificatesresolvers.generic.acme.storage=/ssl-certs/acme-generic.json
#
# Prod / Staging Example:
# - --certificatesresolvers.staging.acme.email=your-email@example.com
# - --certificatesresolvers.staging.acme.caServer=https://acme-staging-v02.api.letsencrypt.org/directory
# - --certificatesresolvers.staging.acme.httpChallenge.entryPoint=web
# - --certificatesresolvers.staging.acme.storage=/ssl-certs/acme-staging.json
# - --certificatesresolvers.production.acme.email=your-email@example.com
# - --certificatesresolvers.production.acme.caServer=https://acme-v02.api.letsencrypt.org/directory
# - --certificatesresolvers.production.acme.httpChallenge.entryPoint=web
# - --certificatesresolvers.production.acme.storage=/ssl-certs/acme-production.json
#
# DNS Challenge
# ---
# Cloudflare Example:
# - --certificatesresolvers.cloudflare.acme.dnschallenge.provider=cloudflare
# - --certificatesresolvers.cloudflare.acme.email=your-email@example.com
# - --certificatesresolvers.cloudflare.acme.dnschallenge.resolvers=1.1.1.1
# - --certificatesresolvers.cloudflare.acme.storage=/ssl-certs/acme-cloudflare.json
#
# Generic (replace with your DNS provider):
# - --certificatesresolvers.generic.acme.dnschallenge.provider=generic
# - --certificatesresolvers.generic.acme.email=your-email@example.com
# - --certificatesresolvers.generic.acme.storage=/ssl-certs/acme-generic.json
logs: # (Optional) Log settings
# Configure log settings here... # logs:
general: # general:
level: ERROR # level: ERROR
# access:
# enabled: false
# (Optional) Change number of replicas
# deployment:
# replicas: 1
# (Optional) Enable Prometheus Metrics, requires metrics port to be exposed!
# metrics:
# prometheus:
# entryPoint: metrics
# Configure EntryPoints
ports: ports:
# Configure your entrypoints here...
web: web:
# (optional) Permanent Redirect to HTTPS # StandardHTTP
port: 8000
exposed: true
exposedPort: 80
# (Optional) Redirect HTTP to HTTPs by default
# redirectTo: # redirectTo:
# port: websecure # port: websecure
websecure: websecure:
# Standard HTTPS
port: 8443
exposed: true
exposedPort: 443
tls: tls:
enabled: true enabled: true
# (optional) Set a Default CertResolver # (Optional) Enable HTTP3
# certResolver: cloudflare # http3:
# enabled: false
# (Optional) When enabled Prometheus Metrics will be exposed on this port
# metrics:
# Prometheus Metrics
# port: 9100
# exposed: false
# exposedPort: 9100
# Create a default IngressClass
env:
# Set your environment variables here...
#
# DNS Challenge Credentials
# ---
# Cloudflare Example:
# - name: CF_API_EMAIL
# valueFrom:
# secretKeyRef:
# key: email
# name: cloudflare-credentials
# - name: CF_API_KEY
# valueFrom:
# secretKeyRef:
# key: apiKey
# name: cloudflare-credentials
# Disable Dashboard
ingressRoute:
dashboard:
enabled: false
# Persistent Storage
persistence:
enabled: true
name: ssl-certs
size: 1Gi
path: /ssl-certs
deployment:
initContainers:
# The "volume-permissions" init container is required if you run into permission issues.
# Related issue: https://github.com/containous/traefik/issues/6972
- name: volume-permissions
image: busybox:1.37.0
command: ["sh", "-c", "chmod -Rv 600 /ssl-certs/*"]
volumeMounts:
- name: ssl-certs
mountPath: /ssl-certs
# Set Traefik as your default Ingress Controller, according to Kubernetes 1.19+ changes.
ingressClass: ingressClass:
enabled: true enabled: true
isDefaultClass: true isDefaultClass: true