Christian Lempa 1 жил өмнө
parent
commit
3456dd6c3a

+ 3 - 3
kubernetes/portainer/values.yml

@@ -1,12 +1,12 @@
-# Portainer Helm Chart Template
+# Portainer Helm Chart Values Template
 # ---
-replicas: 1  # Number of replicas
-
 image:
   repository: portainer/portainer-ce
   tag: 2.22.0
   pullPolicy: IfNotPresent
 
+replicas: 1  # Number of replicas
+
 # (Choice) LoadBalancer or ClusterIP with optional Ingress
 service:
   type: LoadBalancer

+ 44 - 87
kubernetes/traefik/values.yml

@@ -1,97 +1,54 @@
-additionalArguments:
-# Configure your CertificateResolver here...
-# 
-# HTTP Challenge
+# Traefik Helm Chart Values Template
 # ---
-# Generic Example:
-#   - --certificatesresolvers.generic.acme.email=your-email@example.com
-#   - --certificatesresolvers.generic.acme.caServer=https://acme-v02.api.letsencrypt.org/directory
-#   - --certificatesresolvers.generic.acme.httpChallenge.entryPoint=web
-#   - --certificatesresolvers.generic.acme.storage=/ssl-certs/acme-generic.json
-#
-# Prod / Staging Example:
-#   - --certificatesresolvers.staging.acme.email=your-email@example.com
-#   - --certificatesresolvers.staging.acme.caServer=https://acme-staging-v02.api.letsencrypt.org/directory
-#   - --certificatesresolvers.staging.acme.httpChallenge.entryPoint=web
-#   - --certificatesresolvers.staging.acme.storage=/ssl-certs/acme-staging.json
-#   - --certificatesresolvers.production.acme.email=your-email@example.com
-#   - --certificatesresolvers.production.acme.caServer=https://acme-v02.api.letsencrypt.org/directory
-#   - --certificatesresolvers.production.acme.httpChallenge.entryPoint=web
-#   - --certificatesresolvers.production.acme.storage=/ssl-certs/acme-production.json
-#
-# DNS Challenge
-# ---
-# Cloudflare Example:
-#  - --certificatesresolvers.cloudflare.acme.dnschallenge.provider=cloudflare
-#  - --certificatesresolvers.cloudflare.acme.email=your-email@example.com
-#  - --certificatesresolvers.cloudflare.acme.dnschallenge.resolvers=1.1.1.1
-#  - --certificatesresolvers.cloudflare.acme.storage=/ssl-certs/acme-cloudflare.json
-#
-# Generic (replace with your DNS provider):
-#  - --certificatesresolvers.generic.acme.dnschallenge.provider=generic
-#  - --certificatesresolvers.generic.acme.email=your-email@example.com
-#  - --certificatesresolvers.generic.acme.storage=/ssl-certs/acme-generic.json
-
-logs:
-# Configure log settings here...
-  general:
-    level: ERROR
-
+image:
+  repository: traefik
+  version: v3.1.4
+  pullPolicy: IfNotPresent
+
+# (Optional) Log settings
+# logs:
+#   general:
+#     level: ERROR
+#   access:
+#     enabled: false
+
+# (Optional) Change number of replicas
+# deployment:
+#   replicas: 1
+
+# (Optional) Enable Prometheus Metrics, requires metrics port to be exposed!
+# metrics:
+#   prometheus:
+#     entryPoint: metrics
+
+# Configure EntryPoints
 ports:
-# Configure your entrypoints here...
   web:
-    # (optional) Permanent Redirect to HTTPS
-    # redirectTo:
+    # StandardHTTP
+    port: 8000
+    exposed: true
+    exposedPort: 80
+    # (Optional) Redirect HTTP to HTTPs by default
+    # redirectTo: 
     #   port: websecure
   websecure:
+    # Standard HTTPS
+    port: 8443
+    exposed: true
+    exposedPort: 443
     tls:
       enabled: true
-      # (optional) Set a Default CertResolver
-      # certResolver: cloudflare
-  
-
-env:
-# Set your environment variables here...
-# 
-# DNS Challenge Credentials
-# ---
-# Cloudflare Example:
-#   - name: CF_API_EMAIL
-#     valueFrom:
-#       secretKeyRef:
-#         key: email
-#         name: cloudflare-credentials
-#   - name: CF_API_KEY
-#     valueFrom:
-#       secretKeyRef:
-#         key: apiKey
-#         name: cloudflare-credentials
-
-# Disable Dashboard
-ingressRoute:
-  dashboard:
-    enabled: false
-
-# Persistent Storage
-persistence:
-  enabled: true
-  name: ssl-certs
-  size: 1Gi
-  path: /ssl-certs
-
-deployment:
-  initContainers:
-    # The "volume-permissions" init container is required if you run into permission issues.
-    # Related issue: https://github.com/containous/traefik/issues/6972
-    - name: volume-permissions
-      image: busybox:1.37.0
-      command: ["sh", "-c", "chmod -Rv 600 /ssl-certs/*"]
-      volumeMounts:
-        - name: ssl-certs
-          mountPath: /ssl-certs
-
-# Set Traefik as your default Ingress Controller, according to Kubernetes 1.19+ changes.
+    # (Optional) Enable HTTP3
+    # http3:
+    #   enabled: false
+    # (Optional) When enabled Prometheus Metrics will be exposed on this port
+    # metrics:
+        # Prometheus Metrics
+    #   port: 9100
+    #   exposed: false
+    #   exposedPort: 9100
+
+# Create a default IngressClass
 ingressClass:
   enabled: true
   isDefaultClass: true
-