onprem-yonote-v2 #2
|
@ -95,47 +95,47 @@ yonote-web:
|
||||||
memory: 256Mi
|
memory: 256Mi
|
||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
enabled: true
|
|
||||||
ingressClassName: traefik
|
|
||||||
hosts: "'*.example.com'"
|
|
||||||
annotations:
|
|
||||||
cert-manager.io/cluster-issuer: ""
|
|
||||||
traefik.ingress.kubernetes.io/router.middlewares: "{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{ .Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd"
|
|
||||||
extraTls:
|
|
||||||
- hosts:
|
|
||||||
- "'*.example.com'"
|
|
||||||
secretName: "'*.example.com'"
|
|
||||||
|
|
||||||
# enabled: true
|
# enabled: true
|
||||||
# hostname: "'*.example.com'"
|
# ingressClassName: traefik
|
||||||
# ingressClassName: nginx
|
# hosts: "'*.example.com'"
|
||||||
# path: '/'
|
|
||||||
# pathType: Prefix
|
|
||||||
# annotations:
|
# annotations:
|
||||||
# nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
|
||||||
# nginx.ingress.kubernetes.io/server-snippets: |
|
|
||||||
# location /realtime {
|
|
||||||
# proxy_set_header Upgrade $http_upgrade;
|
|
||||||
# proxy_http_version 1.1;
|
|
||||||
# proxy_set_header X-Forwarded-Host $http_host;
|
|
||||||
# proxy_set_header X-Forwarded-Proto $scheme;
|
|
||||||
# proxy_set_header X-Forwarded-For $remote_addr;
|
|
||||||
# proxy_set_header Host $host;
|
|
||||||
# proxy_set_header Connection "upgrade";
|
|
||||||
# proxy_cache_bypass $http_upgrade;
|
|
||||||
# }
|
|
||||||
|
|
||||||
# nginx.ingress.kubernetes.io/configuration-snippet: |
|
|
||||||
# more_set_headers "Host $http_host";
|
|
||||||
# more_set_headers "X-Real-IP $remote_addr";
|
|
||||||
# more_set_headers "X-Forwarded-Proto $scheme";
|
|
||||||
# more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
|
|
||||||
# cert-manager.io/cluster-issuer: ""
|
# cert-manager.io/cluster-issuer: ""
|
||||||
|
# traefik.ingress.kubernetes.io/router.middlewares: "{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{ .Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd"
|
||||||
# extraTls:
|
# extraTls:
|
||||||
# - hosts:
|
# - hosts:
|
||||||
# - "'*.example.com'"
|
# - "'*.example.com'"
|
||||||
# secretName: "'*.example.com'"
|
# secretName: "'*.example.com'"
|
||||||
|
|
||||||
|
enabled: true
|
||||||
|
hostname: "'*.example.com'"
|
||||||
|
ingressClassName: nginx
|
||||||
|
path: '/'
|
||||||
|
pathType: Prefix
|
||||||
|
annotations:
|
||||||
|
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
||||||
|
nginx.ingress.kubernetes.io/server-snippets: |
|
||||||
|
location /realtime {
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header X-Forwarded-Host $http_host;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_set_header X-Forwarded-For $remote_addr;
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
proxy_cache_bypass $http_upgrade;
|
||||||
|
}
|
||||||
|
|
||||||
|
nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||||
|
more_set_headers "Host $http_host";
|
||||||
|
more_set_headers "X-Real-IP $remote_addr";
|
||||||
|
more_set_headers "X-Forwarded-Proto $scheme";
|
||||||
|
more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
|
||||||
|
cert-manager.io/cluster-issuer: ""
|
||||||
|
extraTls:
|
||||||
|
- hosts:
|
||||||
|
|||||||
|
- "'*.example.com'"
|
||||||
|
secretName: "'*.example.com'"
|
||||||
|
|
||||||
containerPorts:
|
containerPorts:
|
||||||
- containerPort: 3000
|
- containerPort: 3000
|
||||||
name: app
|
name: app
|
||||||
|
@ -224,32 +224,32 @@ minio:
|
||||||
enabled: true
|
enabled: true
|
||||||
size: 500Mi
|
size: 500Mi
|
||||||
|
|
||||||
ingress:
|
|
||||||
enabled: true
|
|
||||||
hostname: '"s3.example.com"'
|
|
||||||
annotations:
|
|
||||||
cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
|
|
||||||
traefik.ingress.kubernetes.io/router.middlewares: "{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{ .Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd"
|
|
||||||
extraTls:
|
|
||||||
- hosts:
|
|
||||||
- s3.example.com
|
|
||||||
secretName: s3.example.com
|
|
||||||
|
|
||||||
# ingress:
|
# ingress:
|
||||||
# enabled: true
|
# enabled: true
|
||||||
# ingressClassName: nginx
|
# hostname: '"s3.example.com"'
|
||||||
# annotations:
|
# annotations:
|
||||||
# nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
# cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
|
||||||
# nginx.ingress.kubernetes.io/configuration-snippet: |
|
# traefik.ingress.kubernetes.io/router.middlewares: "{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{ .Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd"
|
||||||
# more_set_headers "Host $http_host";
|
# extraTls:
|
||||||
# more_set_headers "X-Real-IP $remote_addr";
|
# - hosts:
|
||||||
# more_set_headers "X-Forwarded-Proto $scheme";
|
# - s3.example.com
|
||||||
# more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
|
# secretName: s3.example.com
|
||||||
# hosts:
|
|
||||||
# - host: s3.onprem-test.stands.wilix.dev
|
ingress:
|
||||||
# paths:
|
enabled: true
|
||||||
# - path: /
|
ingressClassName: nginx
|
||||||
# pathType: ImplementationSpecific
|
annotations:
|
||||||
|
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
||||||
|
nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||||
|
more_set_headers "Host $http_host";
|
||||||
|
more_set_headers "X-Real-IP $remote_addr";
|
||||||
|
more_set_headers "X-Forwarded-Proto $scheme";
|
||||||
|
more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
|
||||||
|
hosts:
|
||||||
|
- host: s3.onprem-test.stands.wilix.dev
|
||||||
|
paths:
|
||||||
|
- path: /
|
||||||
|
pathType: ImplementationSpecific
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
|
|
Loading…
Reference in New Issue
Block a user
This should be tls: