This repository has been archived by the owner on Jun 7, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 9
/
Copy pathvalues.yaml
126 lines (113 loc) · 3.45 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
## Can be used to set number of Traefik Hub instances
## When using HPA, keep it empty in order to avoid conflicts
## between this value and HPA.
replicas:
maxSurge: 1
## On production system, you may want to set it to "system-cluster-critical"
priorityClassName: ""
imagePullPolicy: IfNotPresent
imagePullSecrets: []
image: ghcr.io/traefik/traefik-hub:{{ .Chart.AppVersion }}
serviceAccountName:
resources: {}
# requests:
# memory: 64Mi
# cpu: 250m
# limits:
# memory: 128Mi
# cpu: 500m
## configure your hubToken with --set hubTokenSecretName=mySecret
## kubectl create secret generic mySecret --namespace traefik --from-literal=token=xxx
hubTokenSecretName: "hub-agent-token"
additionalArguments: []
additionalEnvVars: []
additionalLabels: {}
## extra Volume to add on Deployment.
## See https://kubernetes.io/docs/concepts/storage/volumes/
extraVolumes: []
extraVolumeMounts: []
## Service used in front of Traefik Hub
## See https://kubernetes.io/docs/reference/kubernetes-api/service-resources/service-v1/
service:
type: LoadBalancer
annotations: {}
externalTrafficPolicy:
internalTrafficPolicy:
extraLabels: {}
loadBalancerClass:
loadBalancerIP:
clusterIP:
externalIPs: []
loadBalancerSourceRanges: []
allocateLoadBalancerNodePorts:
## Valid values: SingleStack, PreferDualStack, RequireDualStack
ipFamilyPolicy:
## Valid values: IPv4, IPv6
ipFamilies: []
## Can be customized with, for instance, specific nodePort
ports:
- port: 80
name: web
targetPort: web
- port: 443
name: websecure
targetPort: websecure
## Optional HPA on Traefik Hub. Created when required `maxReplicas` is set.
## See https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/
autoscaling:
minReplicas:
maxReplicas:
metrics:
behavior:
## use it to load plugins
plugins: []
# - name: crowdsec-bouncer-traefik-plugin
# moduleName: github.com/maxlerebourg/crowdsec-bouncer-traefik-plugin
# version: v1.1.15
## Create an IngressClass and use it on both k8s providers.
ingressClass:
enabled: false
name:
## Customize Traefik Providers
## - https://doc.traefik.io/traefik/providers/kubernetes-crd
## - https://doc.traefik.io/traefik/providers/kubernetes-ingress
## On Traefik Hub, `allowCrossNamespace`, `allowEmptyServices`
## and `allowExternalNameServices` are set to true.
providers:
kubernetesCRD:
endpoint:
token:
certAuthFilePath:
namespaces:
labelSelector:
ingressClass:
throttleDuration:
kubernetesIngress:
endpoint:
token:
certAuthFilePath:
namespaces:
labelSelector:
ingressClass:
ingressEndpoint:
hostname:
ip:
publishedService:
throttleDuration:
## Create an IngressRoute for the dashboard
ingressRoute:
dashboard:
# -- Create an IngressRoute for the dashboard
enabled: false
# -- Additional ingressRoute annotations (e.g. for kubernetes.io/ingress.class)
annotations: {}
# -- Additional ingressRoute labels (e.g. for filtering IngressRoute by custom labels)
labels: {}
# -- The router match rule used for the dashboard ingressRoute
matchRule: PathPrefix(`/dashboard`) || PathPrefix(`/api`)
# -- Specify the allowed entrypoints to use for the dashboard ingress route, (e.g. traefik, web, websecure).
entryPoints: ["web", "websecure"]
# -- Additional ingressRoute middlewares (e.g. for authentication)
middlewares: []
# -- TLS options (e.g. secret containing certificate)
tls: {}