mirror of
https://github.com/ChristianLempa/boilerplates.git
synced 2024-11-25 01:34:36 +01:00
update traefik values
This commit is contained in:
parent
efc2d235a3
commit
3456dd6c3a
@ -1,12 +1,12 @@
|
||||
# Portainer Helm Chart Template
|
||||
# Portainer Helm Chart Values Template
|
||||
# ---
|
||||
replicas: 1 # Number of replicas
|
||||
|
||||
image:
|
||||
repository: portainer/portainer-ce
|
||||
tag: 2.22.0
|
||||
pullPolicy: IfNotPresent
|
||||
|
||||
replicas: 1 # Number of replicas
|
||||
|
||||
# (Choice) LoadBalancer or ClusterIP with optional Ingress
|
||||
service:
|
||||
type: LoadBalancer
|
||||
|
@ -1,97 +1,54 @@
|
||||
additionalArguments:
|
||||
# Configure your CertificateResolver here...
|
||||
#
|
||||
# HTTP Challenge
|
||||
# Traefik Helm Chart Values Template
|
||||
# ---
|
||||
# Generic Example:
|
||||
# - --certificatesresolvers.generic.acme.email=your-email@example.com
|
||||
# - --certificatesresolvers.generic.acme.caServer=https://acme-v02.api.letsencrypt.org/directory
|
||||
# - --certificatesresolvers.generic.acme.httpChallenge.entryPoint=web
|
||||
# - --certificatesresolvers.generic.acme.storage=/ssl-certs/acme-generic.json
|
||||
#
|
||||
# Prod / Staging Example:
|
||||
# - --certificatesresolvers.staging.acme.email=your-email@example.com
|
||||
# - --certificatesresolvers.staging.acme.caServer=https://acme-staging-v02.api.letsencrypt.org/directory
|
||||
# - --certificatesresolvers.staging.acme.httpChallenge.entryPoint=web
|
||||
# - --certificatesresolvers.staging.acme.storage=/ssl-certs/acme-staging.json
|
||||
# - --certificatesresolvers.production.acme.email=your-email@example.com
|
||||
# - --certificatesresolvers.production.acme.caServer=https://acme-v02.api.letsencrypt.org/directory
|
||||
# - --certificatesresolvers.production.acme.httpChallenge.entryPoint=web
|
||||
# - --certificatesresolvers.production.acme.storage=/ssl-certs/acme-production.json
|
||||
#
|
||||
# DNS Challenge
|
||||
# ---
|
||||
# Cloudflare Example:
|
||||
# - --certificatesresolvers.cloudflare.acme.dnschallenge.provider=cloudflare
|
||||
# - --certificatesresolvers.cloudflare.acme.email=your-email@example.com
|
||||
# - --certificatesresolvers.cloudflare.acme.dnschallenge.resolvers=1.1.1.1
|
||||
# - --certificatesresolvers.cloudflare.acme.storage=/ssl-certs/acme-cloudflare.json
|
||||
#
|
||||
# Generic (replace with your DNS provider):
|
||||
# - --certificatesresolvers.generic.acme.dnschallenge.provider=generic
|
||||
# - --certificatesresolvers.generic.acme.email=your-email@example.com
|
||||
# - --certificatesresolvers.generic.acme.storage=/ssl-certs/acme-generic.json
|
||||
image:
|
||||
repository: traefik
|
||||
version: v3.1.4
|
||||
pullPolicy: IfNotPresent
|
||||
|
||||
logs:
|
||||
# Configure log settings here...
|
||||
general:
|
||||
level: ERROR
|
||||
# (Optional) Log settings
|
||||
# logs:
|
||||
# general:
|
||||
# level: ERROR
|
||||
# access:
|
||||
# enabled: false
|
||||
|
||||
# (Optional) Change number of replicas
|
||||
# deployment:
|
||||
# replicas: 1
|
||||
|
||||
# (Optional) Enable Prometheus Metrics, requires metrics port to be exposed!
|
||||
# metrics:
|
||||
# prometheus:
|
||||
# entryPoint: metrics
|
||||
|
||||
# Configure EntryPoints
|
||||
ports:
|
||||
# Configure your entrypoints here...
|
||||
web:
|
||||
# (optional) Permanent Redirect to HTTPS
|
||||
# StandardHTTP
|
||||
port: 8000
|
||||
exposed: true
|
||||
exposedPort: 80
|
||||
# (Optional) Redirect HTTP to HTTPs by default
|
||||
# redirectTo:
|
||||
# port: websecure
|
||||
websecure:
|
||||
# Standard HTTPS
|
||||
port: 8443
|
||||
exposed: true
|
||||
exposedPort: 443
|
||||
tls:
|
||||
enabled: true
|
||||
# (optional) Set a Default CertResolver
|
||||
# certResolver: cloudflare
|
||||
# (Optional) Enable HTTP3
|
||||
# http3:
|
||||
# enabled: false
|
||||
# (Optional) When enabled Prometheus Metrics will be exposed on this port
|
||||
# metrics:
|
||||
# Prometheus Metrics
|
||||
# port: 9100
|
||||
# exposed: false
|
||||
# exposedPort: 9100
|
||||
|
||||
|
||||
env:
|
||||
# Set your environment variables here...
|
||||
#
|
||||
# DNS Challenge Credentials
|
||||
# ---
|
||||
# Cloudflare Example:
|
||||
# - name: CF_API_EMAIL
|
||||
# valueFrom:
|
||||
# secretKeyRef:
|
||||
# key: email
|
||||
# name: cloudflare-credentials
|
||||
# - name: CF_API_KEY
|
||||
# valueFrom:
|
||||
# secretKeyRef:
|
||||
# key: apiKey
|
||||
# name: cloudflare-credentials
|
||||
|
||||
# Disable Dashboard
|
||||
ingressRoute:
|
||||
dashboard:
|
||||
enabled: false
|
||||
|
||||
# Persistent Storage
|
||||
persistence:
|
||||
enabled: true
|
||||
name: ssl-certs
|
||||
size: 1Gi
|
||||
path: /ssl-certs
|
||||
|
||||
deployment:
|
||||
initContainers:
|
||||
# The "volume-permissions" init container is required if you run into permission issues.
|
||||
# Related issue: https://github.com/containous/traefik/issues/6972
|
||||
- name: volume-permissions
|
||||
image: busybox:1.37.0
|
||||
command: ["sh", "-c", "chmod -Rv 600 /ssl-certs/*"]
|
||||
volumeMounts:
|
||||
- name: ssl-certs
|
||||
mountPath: /ssl-certs
|
||||
|
||||
# Set Traefik as your default Ingress Controller, according to Kubernetes 1.19+ changes.
|
||||
# Create a default IngressClass
|
||||
ingressClass:
|
||||
enabled: true
|
||||
isDefaultClass: true
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user