Try to get traefik helm working

This commit is contained in:
SeanOMik 2023-04-02 14:20:08 -04:00
parent ca8f22db3f
commit 5dba3891d8
Signed by: SeanOMik
GPG Key ID: 568F326C7EB33ACB
1 changed files with 68 additions and 66 deletions

View File

@ -13,74 +13,76 @@ spec:
chart: chart:
spec: spec:
chart: traefik chart: traefik
version: '2.9.9' version: '2.9.x'
sourceRef: sourceRef:
kind: HelmRepository kind: HelmRepository
name: traefik-helm-repo name: traefik-helm-repo
namespace: flux-system namespace: flux-system
interval: 1m interval: 1m
values: valuesFiles:
additionalArguments: - ./traefik-values.yaml
- --certificatesresolvers.cloudflare.acme.dnschallenge.provider=cloudflare # values:
- --certificatesresolvers.cloudflare.acme.email=seanomik@gmail.com # additionalArguments:
- --certificatesresolvers.cloudflare.acme.dnschallenge.resolvers=1.1.1.1 # - --certificatesresolvers.cloudflare.acme.dnschallenge.provider=cloudflare
- --certificatesresolvers.cloudflare.acme.storage=/ssl-certs/acme-cloudflare.json # - --certificatesresolvers.cloudflare.acme.email=seanomik@gmail.com
# - --certificatesresolvers.cloudflare.acme.dnschallenge.resolvers=1.1.1.1
- --api.insecure # - --certificatesresolvers.cloudflare.acme.storage=/ssl-certs/acme-cloudflare.json
- --providers.kubernetesingress #
# - --api.insecure
logs: # - --providers.kubernetesingress
general: #
level: DEBUG # logs:
# general:
ports: # level: DEBUG
web: #
expose: true # ports:
exposedPort: 8080 # web:
# (optional) Permanent Redirect to HTTPS # expose: true
# redirectTo: websecure # exposedPort: 8080
websecure: # # (optional) Permanent Redirect to HTTPS
tls: # # redirectTo: websecure
exposed: true # websecure:
exposedPort: 8443 # tls:
# exposed: true
enabled: true # exposedPort: 8443
certResolver: cloudflare #
# enabled: true
# certResolver: cloudflare
env: #
- name: CF_DNS_API_TOKEN #
valueFrom: # env:
secretKeyRef: # - name: CF_DNS_API_TOKEN
key: apiToken # valueFrom:
name: cloudflare-credentials # secretKeyRef:
# key: apiToken
# Disable Dashboard # name: cloudflare-credentials
ingressRoute: #
dashboard: # # Disable Dashboard
enabled: false # ingressRoute:
# dashboard:
# Persistent Storage # enabled: false
persistence: #
enabled: true # # Persistent Storage
name: ssl-certs # persistence:
size: 1Gi # enabled: true
path: /ssl-certs # name: ssl-certs
# size: 1Gi
#deployment: # path: /ssl-certs
# initContainers: #
# The "volume-permissions" init container is required if you run into permission issues. # #deployment:
# Related issue: https://github.com/containous/traefik/issues/6972 # # initContainers:
# - name: volume-permissions # # The "volume-permissions" init container is required if you run into permission issues.
# image: busybox:1.31.1 # # Related issue: https://github.com/containous/traefik/issues/6972
# command: ["sh", "-c", "chmod -Rv 600 /ssl-certs"] # # - name: volume-permissions
# volumeMounts: # # image: busybox:1.31.1
# - name: ssl-certs # # command: ["sh", "-c", "chmod -Rv 600 /ssl-certs"]
# mountPath: /ssl-certs # # volumeMounts:
# # - name: ssl-certs
# Set Traefik as your default Ingress Controller, according to Kubernetes 1.19+ changes. # # mountPath: /ssl-certs
ingressClass: #
enabled: true # # Set Traefik as your default Ingress Controller, according to Kubernetes 1.19+ changes.
isDefaultClass: true # ingressClass:
# enabled: true
namespaceOverride: traefik # isDefaultClass: true
#
# namespaceOverride: traefik