onprem-yonote-v2 #2
|
@ -95,47 +95,47 @@ yonote-web:
|
|||
memory: 256Mi
|
||||
|
||||
ingress:
|
||||
# enabled: true
|
||||
# ingressClassName: traefik
|
||||
# hosts: "'*.example.com'"
|
||||
# annotations:
|
||||
# cert-manager.io/cluster-issuer: ""
|
||||
# traefik.ingress.kubernetes.io/router.middlewares: "{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{ .Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd"
|
||||
# extraTls:
|
||||
# - hosts:
|
||||
# - "'*.example.com'"
|
||||
# secretName: "'*.example.com'"
|
||||
|
||||
enabled: true
|
||||
ingressClassName: traefik
|
||||
hosts: "'*.example.com'"
|
||||
hostname: "'*.example.com'"
|
||||
ingressClassName: nginx
|
||||
path: '/'
|
||||
pathType: Prefix
|
||||
annotations:
|
||||
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
||||
nginx.ingress.kubernetes.io/server-snippets: |
|
||||
location /realtime {
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_http_version 1.1;
|
||||
proxy_set_header X-Forwarded-Host $http_host;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_set_header X-Forwarded-For $remote_addr;
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header Connection "upgrade";
|
||||
proxy_cache_bypass $http_upgrade;
|
||||
}
|
||||
|
||||
nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||
more_set_headers "Host $http_host";
|
||||
more_set_headers "X-Real-IP $remote_addr";
|
||||
more_set_headers "X-Forwarded-Proto $scheme";
|
||||
more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
|
||||
cert-manager.io/cluster-issuer: ""
|
||||
traefik.ingress.kubernetes.io/router.middlewares: "{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{ .Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd"
|
||||
extraTls:
|
||||
- hosts:
|
||||
|
||||
- "'*.example.com'"
|
||||
secretName: "'*.example.com'"
|
||||
|
||||
# enabled: true
|
||||
# hostname: "'*.example.com'"
|
||||
# ingressClassName: nginx
|
||||
# path: '/'
|
||||
# pathType: Prefix
|
||||
# annotations:
|
||||
# nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
||||
# nginx.ingress.kubernetes.io/server-snippets: |
|
||||
# location /realtime {
|
||||
# proxy_set_header Upgrade $http_upgrade;
|
||||
# proxy_http_version 1.1;
|
||||
# proxy_set_header X-Forwarded-Host $http_host;
|
||||
# proxy_set_header X-Forwarded-Proto $scheme;
|
||||
# proxy_set_header X-Forwarded-For $remote_addr;
|
||||
# proxy_set_header Host $host;
|
||||
# proxy_set_header Connection "upgrade";
|
||||
# proxy_cache_bypass $http_upgrade;
|
||||
# }
|
||||
|
||||
# nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||
# more_set_headers "Host $http_host";
|
||||
# more_set_headers "X-Real-IP $remote_addr";
|
||||
# more_set_headers "X-Forwarded-Proto $scheme";
|
||||
# more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
|
||||
# cert-manager.io/cluster-issuer: ""
|
||||
# extraTls:
|
||||
# - hosts:
|
||||
# - "'*.example.com'"
|
||||
# secretName: "'*.example.com'"
|
||||
|
||||
containerPorts:
|
||||
- containerPort: 3000
|
||||
name: app
|
||||
|
@ -224,32 +224,32 @@ minio:
|
|||
enabled: true
|
||||
size: 500Mi
|
||||
|
||||
ingress:
|
||||
enabled: true
|
||||
hostname: '"s3.example.com"'
|
||||
annotations:
|
||||
cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
|
||||
traefik.ingress.kubernetes.io/router.middlewares: "{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{ .Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd"
|
||||
extraTls:
|
||||
- hosts:
|
||||
- s3.example.com
|
||||
secretName: s3.example.com
|
||||
|
||||
# ingress:
|
||||
# enabled: true
|
||||
# ingressClassName: nginx
|
||||
# hostname: '"s3.example.com"'
|
||||
# annotations:
|
||||
# nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
||||
# nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||
# more_set_headers "Host $http_host";
|
||||
# more_set_headers "X-Real-IP $remote_addr";
|
||||
# more_set_headers "X-Forwarded-Proto $scheme";
|
||||
# more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
|
||||
# hosts:
|
||||
# - host: s3.onprem-test.stands.wilix.dev
|
||||
# paths:
|
||||
# - path: /
|
||||
# pathType: ImplementationSpecific
|
||||
# cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
|
||||
# traefik.ingress.kubernetes.io/router.middlewares: "{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{ .Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd"
|
||||
# extraTls:
|
||||
# - hosts:
|
||||
# - s3.example.com
|
||||
# secretName: s3.example.com
|
||||
|
||||
ingress:
|
||||
enabled: true
|
||||
ingressClassName: nginx
|
||||
annotations:
|
||||
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
||||
nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||
more_set_headers "Host $http_host";
|
||||
more_set_headers "X-Real-IP $remote_addr";
|
||||
more_set_headers "X-Forwarded-Proto $scheme";
|
||||
more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
|
||||
hosts:
|
||||
- host: s3.onprem-test.stands.wilix.dev
|
||||
paths:
|
||||
- path: /
|
||||
pathType: ImplementationSpecific
|
||||
|
||||
resources:
|
||||
requests:
|
||||
|
|
Loading…
Reference in New Issue
This should be tls: