k3s-cluster/cluster/core/networking/traefik/helm-release.yaml

111 lines
2.7 KiB
YAML
Raw Normal View History

apiVersion: helm.toolkit.fluxcd.io/v2beta1
kind: HelmRelease
metadata:
2023-04-03 02:45:20 +00:00
name: traefik
namespace: traefik
spec:
interval: 5m
chart:
spec:
chart: traefik
2023-04-05 02:42:19 +00:00
version: '22.0.0'
sourceRef:
kind: HelmRepository
2023-04-02 18:26:12 +00:00
name: traefik-charts
namespace: flux-system
interval: 1m
2023-04-02 19:18:48 +00:00
# valuesFiles:
# - ./traefik-values.yaml
values:
additionalArguments:
2023-04-05 02:42:19 +00:00
# - --certificatesresolvers.cloudflare.acme.dnschallenge.provider=cloudflare
# - --certificatesresolvers.cloudflare.acme.email=seanomik@gmail.com
# - --certificatesresolvers.cloudflare.acme.dnschallenge.resolvers=1.1.1.1
# - --certificatesresolvers.cloudflare.acme.storage=/ssl-certs/acme-cloudflare.json
2023-04-02 19:18:48 +00:00
- --api.insecure
- --providers.kubernetesingress
2023-04-05 02:42:19 +00:00
- --providers.kubernetescrd
2023-04-02 19:18:48 +00:00
logs:
general:
level: DEBUG
ports:
2023-04-03 02:45:20 +00:00
traefik:
port: 9000
expose: true
exposedPort: 9000
# The port protocol (TCP/UDP)
protocol: TCP
2023-04-02 19:18:48 +00:00
web:
2023-04-03 02:45:20 +00:00
port: 8000
2023-04-02 19:18:48 +00:00
expose: true
2023-04-03 02:45:20 +00:00
exposedPort: 80
# (optional) Permanent Redirect to HTTPS
# redirectTo: websecure
protocol: TCP
2023-04-02 19:18:48 +00:00
websecure:
2023-04-03 02:45:20 +00:00
port: 8443
expose: true
exposedPort: 443
protocol: TCP
2023-04-02 19:18:48 +00:00
tls:
enabled: true
certResolver: cloudflare
2023-04-03 02:45:20 +00:00
metrics:
port: 9100
expose: true
exposedPort: 9100
protocol: TCP
2023-04-02 19:18:48 +00:00
# service:
# enabled: true
# single: true
# type: LoadBalancer
# externalIPs:
# - 192.168.87.10
2023-04-02 19:18:48 +00:00
2023-04-05 02:42:19 +00:00
# env:
# - name: CF_DNS_API_TOKEN
# valueFrom:
# secretKeyRef:
# key: apiToken
# name: cloudflare-credentials
2023-04-02 19:18:48 +00:00
# Disable Dashboard
ingressRoute:
dashboard:
2023-04-05 02:42:19 +00:00
enabled: false
# matchRule: Host(`k3st.***REMOVED***`) && (PathPrefix(`/dashboard/`) || PathPrefix(`/api`))
# entryPoints: ["websecure"]
2023-04-02 19:18:48 +00:00
# Persistent Storage
persistence:
enabled: true
name: ssl-certs
size: 1Gi
path: /ssl-certs
#deployment:
# initContainers:
# The "volume-permissions" init container is required if you run into permission issues.
# Related issue: https://github.com/containous/traefik/issues/6972
# - name: volume-permissions
# image: busybox:1.31.1
# command: ["sh", "-c", "chmod -Rv 600 /ssl-certs"]
# volumeMounts:
# - name: ssl-certs
# mountPath: /ssl-certs
# Set Traefik as your default Ingress Controller, according to Kubernetes 1.19+ changes.
ingressClass:
enabled: true
isDefaultClass: true
2023-04-03 02:45:20 +00:00
metrics:
prometheus:
entryPoint: metrics
2023-04-02 19:18:48 +00:00
namespaceOverride: traefik