clear-onprem #5
|
@ -7,13 +7,13 @@ global:
|
||||||
POSTGRES_PASSWORD: wsGZ6kXhr5
|
POSTGRES_PASSWORD: wsGZ6kXhr5
|
||||||
AWS_ACCESS_KEY_ID: "" # Ваш идентификатор ключа доступа к AWS. Поведение в SelfHosted: устанавливает логин сервис аккаунта для доступа приложения к Minio S3 хранилищу
|
AWS_ACCESS_KEY_ID: "" # Ваш идентификатор ключа доступа к AWS. Поведение в SelfHosted: устанавливает логин сервис аккаунта для доступа приложения к Minio S3 хранилищу
|
||||||
AWS_SECRET_ACCESS_KEY: "minioadmin" # Ваш секретный ключ доступа AWS. Поведение в SelfHosted: устанавливает пароль сервис аккаунта для доступа приложения к Minio S3 хранилищу
|
AWS_SECRET_ACCESS_KEY: "minioadmin" # Ваш секретный ключ доступа AWS. Поведение в SelfHosted: устанавливает пароль сервис аккаунта для доступа приложения к Minio S3 хранилищу
|
||||||
OIDC_CLIENT_SECRET: "minioadminsecret"
|
OIDC_CLIENT_SECRET: "Kdq8rk5Pv5RW1c5kHXpnyfrmMRzI9xSD"
|
||||||
SECRET_KEY: "659a8881b186198c3146e316f6dab67df25496534d1fa156d624b037260df688" # Сгенерируйте 32-байтовый случайный ключ в шестнадцатеричном коде. Вам следует использовать `openssl rand -hex 32` в вашем терминале для генерации случайного значения.
|
SECRET_KEY: "659a8881b186198c3146e316f6dab67df25496534d1fa156d624b037260df688" # Сгенерируйте 32-байтовый случайный ключ в шестнадцатеричном коде. Вам следует использовать `openssl rand -hex 32` в вашем терминале для генерации случайного значения.
|
||||||
SMTP_PASSWORD: "1234"
|
SMTP_PASSWORD: "1234"
|
||||||
UTILS_SECRET: "7bd5e9ac4415dd0dbf6b7721e2a21e9427b268cd0140c7516d13dece5024d479" # Сгенерируйте уникальный случайный ключ. Формат не важен, но вы все равно можете использовать`openssl rand -hex 32` в вашем терминале, чтобы создать это.
|
UTILS_SECRET: "7bd5e9ac4415dd0dbf6b7721e2a21e9427b268cd0140c7516d13dece5024d479" # Сгенерируйте уникальный случайный ключ. Формат не важен, но вы все равно можете использовать`openssl rand -hex 32` в вашем терминале, чтобы создать это.
|
||||||
TELEGRAM_BOT_TOKEN: "1234"
|
TELEGRAM_BOT_TOKEN: "1234"
|
||||||
UNSPLASH_API_ACCESS_KEY: "a-yGo6HpRP6jNfravx4Bz-oiPrRnH_5-24Xa9ZPlePE"
|
UNSPLASH_API_ACCESS_KEY: "a-yGo6HpRP6jNfravx4Bz-oiPrRnH_5-24Xa9ZPlePE"
|
||||||
LICENSE_KEY: "" # Обратитесь в отдел продаж для получения
|
LICENSE_KEY: "eyJhbGciOiJSUzUxMiIsInR5cCI6IkpXVCJ9.eyJkdW1teSI6ImRhdGEiLCJkYXRhIjoiZHVtbXkiLCJpYXQiOjE2NjQ4OTUyNjUsImV4cCI6MTgyMjY4MzI2NX0.Qudc2d-MKc4DT-UBAVydgowiYQnzzWolvbJTjPB5dwEI32Wb64sgkXOfXKsRf9_wP3UK0-65QYVkMHM76ImhM9HCHv9LWJBQeD0q2rF243cMkMUNfKXAX8-SmLu9kMZzm0fL02IBnv5TCHIF7u6GgGRk3US6WbVhzqHGxrdJ2b3HwD_cI3mcLKCtTfO_GDiUfAv7u5Ddi-6tCfFRvH633BLPKIMO5cePh_AdHykO_2p7z_ypUfsVgqxHkq8KwNuuaI6CpwE48P-7mXuM9xEWu3-prSZpaI4rIZA6JFpGMWyiGs4GDvjRFssq4GUPvYJnkZ2w_W_liSMdC5hg0PFxcw" # Обратитесь в отдел продаж для получения
|
||||||
SERVICE_WORKER_PUBLIC_KEY: "1234"
|
SERVICE_WORKER_PUBLIC_KEY: "1234"
|
||||||
SERVICE_WORKER_PRIVATE_KEY: "1234"
|
SERVICE_WORKER_PRIVATE_KEY: "1234"
|
||||||
# Генерация ключей (web-push) Service Worker
|
# Генерация ключей (web-push) Service Worker
|
||||||
|
|
30
yonote-chart/templates/ingress.yaml
Normal file
30
yonote-chart/templates/ingress.yaml
Normal file
|
@ -0,0 +1,30 @@
|
||||||
|
apiVersion: networking.k8s.io/v1
|
||||||
|
kind: Ingress
|
||||||
|
metadata:
|
||||||
|
name: {{ .Values.ingress.name }}
|
||||||
|
namespace: {{ .Values.ingress.namespace }}
|
||||||
|
annotations:
|
||||||
|
{{- range $key, $value := .Values.ingress.annotations }}
|
||||||
|
{{ $key }}: "{{ $value }}"
|
||||||
|
{{- end }}
|
||||||
|
spec:
|
||||||
|
ingressClassName: {{ .Values.ingress.ingressClassName }}
|
||||||
|
tls:
|
||||||
|
- secretName: "{{ .Values.ingress.tls.secretName }}"
|
||||||
|
hosts:
|
||||||
|
{{- range .Values.ingress.tls.hosts }}
|
||||||
|
- "{{ . }}"
|
||||||
|
{{- end }}
|
||||||
|
rules:
|
||||||
|
- host: "{{ .Values.ingress.hostname }}"
|
||||||
|
http:
|
||||||
|
paths:
|
||||||
|
{{- range .Values.ingress.rules.paths }}
|
||||||
|
- path: {{ .path }}
|
||||||
|
pathType: {{ .pathType }}
|
||||||
|
backend:
|
||||||
|
service:
|
||||||
|
name: {{ .service.name }}
|
||||||
|
port:
|
||||||
|
number: {{ .service.port | int }}
|
||||||
|
{{- end }}
|
|
@ -2,7 +2,7 @@
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
kind: Middleware
|
kind: Middleware
|
||||||
metadata:
|
metadata:
|
||||||
name: redirect-https
|
name: yonote-onprem-redirect-https
|
||||||
spec:
|
spec:
|
||||||
redirectScheme:
|
redirectScheme:
|
||||||
scheme: https
|
scheme: https
|
|
@ -2,7 +2,7 @@
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
kind: Middleware
|
kind: Middleware
|
||||||
metadata:
|
metadata:
|
||||||
name: wss-headers
|
name: yonote-onprem-wss-headers
|
||||||
spec:
|
spec:
|
||||||
headers:
|
headers:
|
||||||
customRequestHeaders:
|
customRequestHeaders:
|
|
@ -6,12 +6,12 @@ global:
|
||||||
username: yonote
|
username: yonote
|
||||||
|
|
||||||
yonote:
|
yonote:
|
||||||
ingress:
|
# ingress:
|
||||||
ingressClassName: nginx
|
# ingressClassName: traefik
|
||||||
|
|
||||||
dbMigrationEnv: production-ssl-disabled # Режим подключения к базе данных при выполнении миграций. При использовании SSL подключения, установите значение `production`
|
dbMigrationEnv: production-ssl-disabled # Режим подключения к базе данных при выполнении миграций. При использовании SSL подключения, установите значение `production`
|
||||||
|
|
||||||
baseListenAddress: example.com
|
baseListenAddress: onprem-test.stands.wilix.dev
|
||||||
|
|
||||||
config:
|
config:
|
||||||
plain:
|
plain:
|
||||||
|
@ -30,17 +30,18 @@ global:
|
||||||
|
|
||||||
AI_URL: "1234"
|
AI_URL: "1234"
|
||||||
AI_API_KEY: "1234"
|
AI_API_KEY: "1234"
|
||||||
|
WEB_CONCURRENCY: "1"
|
||||||
|
|
||||||
URL: 'http://app.{{ .Values.global.yonote.baseListenAddress }}' # Базовый url приложения
|
URL: 'https://app.{{ .Values.global.yonote.baseListenAddress }}' # Базовый url приложения
|
||||||
COLLABORATION_URL: 'wss://app.{{ .Values.global.yonote.baseListenAddress }}' # Cервер, для нормальной работы это не нужно устанавливать
|
COLLABORATION_URL: 'wss://app.{{ .Values.global.yonote.baseListenAddress }}' # Cервер, для нормальной работы это не нужно устанавливать
|
||||||
|
|
||||||
OIDC_DISPLAY_NAME: email
|
OIDC_DISPLAY_NAME: email
|
||||||
OIDC_SCOPES: openid email
|
OIDC_SCOPES: openid email
|
||||||
OIDC_CLIENT_ID: yonote
|
OIDC_CLIENT_ID: yonote-local
|
||||||
OIDC_AUTH_URI: 'yonote-keycloak:8080/realms/yonote/protocol/openid-connect/auth'
|
OIDC_AUTH_URI: 'https://auth.yonote.ru/realms/yonote-test/protocol/openid-connect/auth'
|
||||||
OIDC_LOGOUT_URI: 'yonote-keycloak:8080/realms/yonote/protocol/openid-connect/logout'
|
OIDC_LOGOUT_URI: 'https://auth.yonote.ru/realms/yonote-test/protocol/openid-connect/logout'
|
||||||
OIDC_TOKEN_URI: 'yonote-keycloak:8080/realms/yonote/protocol/openid-connect/token'
|
OIDC_TOKEN_URI: 'https://auth.yonote.ru/realms/yonote-test/protocol/openid-connect/token'
|
||||||
OIDC_USERINFO_URI: 'yonote-keycloak:8080/realms/yonote/protocol/openid-connect/userinfo'
|
OIDC_USERINFO_URI: 'https://auth.yonote.ru/realms/yonote-test/protocol/openid-connect/userinfo'
|
||||||
|
|
||||||
AWS_S3_ACL: private
|
AWS_S3_ACL: private
|
||||||
AWS_S3_UPLOAD_BUCKET_URL: yonote-minio:9000 # Адрес S3 хранилища
|
AWS_S3_UPLOAD_BUCKET_URL: yonote-minio:9000 # Адрес S3 хранилища
|
||||||
|
@ -77,6 +78,61 @@ global:
|
||||||
cron_enabled: "true"
|
cron_enabled: "true"
|
||||||
url: http://yonote-web/api/cron.schedule
|
url: http://yonote-web/api/cron.schedule
|
||||||
|
|
||||||
|
# ingress:
|
||||||
|
# enabled: true
|
||||||
|
# hostname: 'app.onprem-test.stands.wilix.dev'
|
||||||
|
# ingressClassName: traefik
|
||||||
|
# path: '/'
|
||||||
|
# pathType: Prefix
|
||||||
|
# annotations:
|
||||||
|
# cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
|
||||||
|
# traefik.ingress.kubernetes.io/router.middlewares: '{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{.Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd'
|
||||||
|
# # nginx.ingress.kubernetes.io/force-ssl-redirect: "false"
|
||||||
|
# # nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||||
|
# # more_set_headers "Host $http_host";
|
||||||
|
# # more_set_headers "X-Real-IP $remote_addr";
|
||||||
|
# # more_set_headers "X-Forwarded-Proto $scheme";
|
||||||
|
# # more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
|
||||||
|
# extraTls:
|
||||||
|
# - hosts:
|
||||||
|
# - "app.onprem-test.stands.wilix.dev"
|
||||||
|
# secretName: "app.onprem-test.stands.wilix.dev"
|
||||||
|
ingress:
|
||||||
|
enabled: true
|
||||||
|
name: yonote-ingress
|
||||||
|
namespace: yonote-onprem
|
||||||
|
ingressClassName: traefik
|
||||||
|
hostname: 'app.onprem-test.stands.wilix.dev'
|
||||||
|
tls:
|
||||||
|
secretName: "app.onprem-test.stands.wilix.dev"
|
||||||
|
hosts:
|
||||||
|
- "app.onprem-test.stands.wilix.dev"
|
||||||
|
rules:
|
||||||
|
paths:
|
||||||
|
- path: /
|
||||||
|
pathType: Prefix
|
||||||
|
service:
|
||||||
|
name: yonote-web
|
||||||
|
port: 80
|
||||||
|
- path: /realtime
|
||||||
|
pathType: Prefix
|
||||||
|
service:
|
||||||
|
name: yonote-websockets
|
||||||
|
port: 80
|
||||||
|
- path: /whiteboard
|
||||||
|
pathType: Prefix
|
||||||
|
service:
|
||||||
|
name: yonote-whiteboard
|
||||||
|
port: 80
|
||||||
|
- path: /collaboration
|
||||||
|
pathType: Prefix
|
||||||
|
service:
|
||||||
|
name: yonote-collaboration
|
||||||
|
port: 80
|
||||||
|
annotations:
|
||||||
|
cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
|
||||||
|
traefik.ingress.kubernetes.io/router.middlewares: '{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{.Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd'
|
||||||
|
|
||||||
yonote-web:
|
yonote-web:
|
||||||
fullnameOverride: yonote-web
|
fullnameOverride: yonote-web
|
||||||
nameOverride: yonote-web
|
nameOverride: yonote-web
|
||||||
|
@ -110,8 +166,8 @@ yonote-web:
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
cpu: 350m
|
cpu: 1
|
||||||
memory: 512Mi
|
memory: 1Gi
|
||||||
requests:
|
requests:
|
||||||
cpu: 200m
|
cpu: 200m
|
||||||
memory: 128Mi
|
memory: 128Mi
|
||||||
|
@ -132,16 +188,25 @@ yonote-web:
|
||||||
- secretRef:
|
- secretRef:
|
||||||
name: yonote-secrets
|
name: yonote-secrets
|
||||||
|
|
||||||
ingress:
|
# ingress:
|
||||||
hostname: '"*.example.com"'
|
# enabled: true
|
||||||
ingressClassName: nginx
|
# hostname: 'app.onprem-test.stands.wilix.dev'
|
||||||
annotations:
|
# ingressClassName: traefik
|
||||||
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
# path: '/'
|
||||||
nginx.ingress.kubernetes.io/configuration-snippet: |
|
# pathType: Prefix
|
||||||
more_set_headers "Host $http_host";
|
# annotations:
|
||||||
more_set_headers "X-Real-IP $remote_addr";
|
# cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
|
||||||
more_set_headers "X-Forwarded-Proto $scheme";
|
# traefik.ingress.kubernetes.io/router.middlewares: '{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{.Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd'
|
||||||
more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
|
# # nginx.ingress.kubernetes.io/force-ssl-redirect: "false"
|
||||||
|
# # nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||||
|
# # more_set_headers "Host $http_host";
|
||||||
|
# # more_set_headers "X-Real-IP $remote_addr";
|
||||||
|
# # more_set_headers "X-Forwarded-Proto $scheme";
|
||||||
|
# # more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
|
||||||
|
# extraTls:
|
||||||
|
# - hosts:
|
||||||
|
# - "app.onprem-test.stands.wilix.dev"
|
||||||
|
# secretName: "app.onprem-test.stands.wilix.dev"
|
||||||
|
|
||||||
podLabels:
|
podLabels:
|
||||||
redis-client: 'true'
|
redis-client: 'true'
|
||||||
|
@ -212,16 +277,25 @@ yonote-websocket:
|
||||||
port: 80
|
port: 80
|
||||||
targetPort: app
|
targetPort: app
|
||||||
|
|
||||||
ingress:
|
# ingress:
|
||||||
hostname: '"*.example.com"'
|
# enabled: true
|
||||||
ingressClassName: nginx
|
# hostname: 'app.onprem-test.stands.wilix.dev'
|
||||||
annotations:
|
# ingressClassName: traefik
|
||||||
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
# path: '/realtime'
|
||||||
nginx.ingress.kubernetes.io/configuration-snippet: |
|
# pathType: Prefix
|
||||||
more_set_headers "Host $http_host";
|
# annotations:
|
||||||
more_set_headers "X-Real-IP $remote_addr";
|
# cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
|
||||||
more_set_headers "X-Forwarded-Proto $scheme";
|
# traefik.ingress.kubernetes.io/router.middlewares: '{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{.Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd'
|
||||||
more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
|
# # nginx.ingress.kubernetes.io/force-ssl-redirect: "false"
|
||||||
|
# # nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||||
|
# # more_set_headers "Host $http_host";
|
||||||
|
# # more_set_headers "X-Real-IP $remote_addr";
|
||||||
|
# # more_set_headers "X-Forwarded-Proto $scheme";
|
||||||
|
# # more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
|
||||||
|
# extraTls:
|
||||||
|
# - hosts:
|
||||||
|
# - "app.onprem-test.stands.wilix.dev"
|
||||||
|
# secretName: "app.onprem-test.stands.wilix.dev"
|
||||||
|
|
||||||
podLabels:
|
podLabels:
|
||||||
redis-client: 'true'
|
redis-client: 'true'
|
||||||
|
@ -292,16 +366,26 @@ yonote-whiteboard:
|
||||||
port: 80
|
port: 80
|
||||||
targetPort: app
|
targetPort: app
|
||||||
|
|
||||||
ingress:
|
# ingress:
|
||||||
hostname: '"*.example.com"'
|
# enabled: true
|
||||||
ingressClassName: nginx
|
# hostname: 'app.onprem-test.stands.wilix.dev'
|
||||||
annotations:
|
# ingressClassName: traefik
|
||||||
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
# path: '/whiteboard'
|
||||||
nginx.ingress.kubernetes.io/configuration-snippet: |
|
# pathType: Prefix
|
||||||
more_set_headers "Host $http_host";
|
# annotations:
|
||||||
more_set_headers "X-Real-IP $remote_addr";
|
# cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
|
||||||
more_set_headers "X-Forwarded-Proto $scheme";
|
# traefik.ingress.kubernetes.io/router.middlewares: '{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{.Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd'
|
||||||
more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
|
# # nginx.ingress.kubernetes.io/force-ssl-redirect: "false"
|
||||||
|
# # nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||||
|
# # more_set_headers "Host $http_host";
|
||||||
|
# # more_set_headers "X-Real-IP $remote_addr";
|
||||||
|
# # more_set_headers "X-Forwarded-Proto $scheme";
|
||||||
|
# # more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
|
||||||
|
# extraTls:
|
||||||
|
# - hosts:
|
||||||
|
# - "app.onprem-test.stands.wilix.dev"
|
||||||
|
# secretName: "app.onprem-test.stands.wilix.dev"
|
||||||
|
|
||||||
|
|
||||||
podLabels:
|
podLabels:
|
||||||
redis-client: 'true'
|
redis-client: 'true'
|
||||||
|
@ -348,11 +432,11 @@ yonote-worker:
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
cpu: 500m
|
cpu: 1
|
||||||
memory: 1Gi
|
memory: 1Gi
|
||||||
requests:
|
requests:
|
||||||
cpu: 250m
|
cpu: 50m
|
||||||
memory: 256Mi
|
memory: 128Mi
|
||||||
|
|
||||||
checksums: null
|
checksums: null
|
||||||
|
|
||||||
|
@ -427,16 +511,25 @@ yonote-collaboration:
|
||||||
port: 80
|
port: 80
|
||||||
targetPort: app
|
targetPort: app
|
||||||
|
|
||||||
ingress:
|
# ingress:
|
||||||
hostname: '"*.example.com"'
|
# enabled: true
|
||||||
ingressClassName: nginx
|
# hostname: 'app.onprem-test.stands.wilix.dev'
|
||||||
annotations:
|
# ingressClassName: traefik
|
||||||
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
# path: '/collaboration'
|
||||||
nginx.ingress.kubernetes.io/configuration-snippet: |
|
# pathType: Prefix
|
||||||
more_set_headers "Host $http_host";
|
# annotations:
|
||||||
more_set_headers "X-Real-IP $remote_addr";
|
# cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
|
||||||
more_set_headers "X-Forwarded-Proto $scheme";
|
# traefik.ingress.kubernetes.io/router.middlewares: '{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{.Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd'
|
||||||
more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
|
# # nginx.ingress.kubernetes.io/force-ssl-redirect: "false"
|
||||||
|
# # nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||||
|
# # more_set_headers "Host $http_host";
|
||||||
|
# # more_set_headers "X-Real-IP $remote_addr";
|
||||||
|
# # more_set_headers "X-Forwarded-Proto $scheme";
|
||||||
|
# # more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
|
||||||
|
# extraTls:
|
||||||
|
# - hosts:
|
||||||
|
# - "app.onprem-test.stands.wilix.dev"
|
||||||
|
# secretName: "app.onprem-test.stands.wilix.dev"
|
||||||
|
|
||||||
envFrom:
|
envFrom:
|
||||||
- configMapRef:
|
- configMapRef:
|
||||||
|
@ -523,13 +616,18 @@ minio:
|
||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
enabled: true
|
enabled: true
|
||||||
|
hostname: 's3.onprem-test.stands.wilix.dev'
|
||||||
|
ingressClassName: traefik
|
||||||
|
path: '/'
|
||||||
|
pathType: ImplementationSpecific
|
||||||
annotations:
|
annotations:
|
||||||
kubernetes.io/ingress.class: nginx
|
kubernetes.io/ingress.class: traefik
|
||||||
hosts:
|
cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
|
||||||
- host: s3.example.com
|
extraTls:
|
||||||
paths:
|
- hosts:
|
||||||
- path: /
|
- "s3.onprem-test.stands.wilix.dev"
|
||||||
pathType: ImplementationSpecific
|
secretName: "s3.onprem-test.stands.wilix.dev"
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
memory: 512Mi
|
memory: 512Mi
|
||||||
|
|
Loading…
Reference in New Issue
Block a user