Update file values.yaml

This commit is contained in:
2023-04-09 23:41:42 +00:00
parent 2e49f806d3
commit b677027536

View File

@@ -1,15 +1,16 @@
# Default values for Traefik traefik:
image: # Default values for Traefik
image:
registry: docker.io registry: docker.io
repository: traefik repository: traefik
# defaults to appVersion # defaults to appVersion
tag: "" tag: ""
pullPolicy: IfNotPresent pullPolicy: IfNotPresent
# #
# Configure integration with Traefik Hub # Configure integration with Traefik Hub
# #
hub: hub:
## Enabling Hub will: ## Enabling Hub will:
# * enable Traefik Hub integration on Traefik # * enable Traefik Hub integration on Traefik
# * add `traefikhub-tunl` endpoint # * add `traefikhub-tunl` endpoint
@@ -17,7 +18,7 @@ hub:
# * enable allowExternalNameServices on KubernetesIngress provider # * enable allowExternalNameServices on KubernetesIngress provider
# * enable allowCrossNamespace on KubernetesCRD provider # * enable allowCrossNamespace on KubernetesCRD provider
# * add an internal (ClusterIP) Service, dedicated for Traefik Hub # * add an internal (ClusterIP) Service, dedicated for Traefik Hub
enabled: false enabled: true
## Default port can be changed ## Default port can be changed
# tunnelPort: 9901 # tunnelPort: 9901
## TLS is optional. Insecure is mutually exclusive with any other options ## TLS is optional. Insecure is mutually exclusive with any other options
@@ -27,10 +28,10 @@ hub:
# cert: "/path/to/cert.pem" # cert: "/path/to/cert.pem"
# key: "/path/to/key.pem" # key: "/path/to/key.pem"
# #
# Configure the deployment # Configure the deployment
# #
deployment: deployment:
enabled: true enabled: true
# Can be either Deployment or DaemonSet # Can be either Deployment or DaemonSet
kind: Deployment kind: Deployment
@@ -97,21 +98,21 @@ deployment:
# host: localhost # host: localhost
# scheme: HTTP # scheme: HTTP
# Pod disruption budget # Pod disruption budget
podDisruptionBudget: podDisruptionBudget:
enabled: false enabled: false
# maxUnavailable: 1 # maxUnavailable: 1
# maxUnavailable: 33% # maxUnavailable: 33%
# minAvailable: 0 # minAvailable: 0
# minAvailable: 25% # minAvailable: 25%
# Create a default IngressClass for Traefik # Create a default IngressClass for Traefik
ingressClass: ingressClass:
enabled: true enabled: true
isDefaultClass: true isDefaultClass: true
# Enable experimental features # Enable experimental features
experimental: experimental:
v3: v3:
enabled: false enabled: false
plugins: plugins:
@@ -131,8 +132,8 @@ experimental:
# annotations: # annotations:
# cert-manager.io/issuer: letsencrypt # cert-manager.io/issuer: letsencrypt
# Create an IngressRoute for the dashboard # Create an IngressRoute for the dashboard
ingressRoute: ingressRoute:
dashboard: dashboard:
enabled: true enabled: true
# Additional ingressRoute annotations (e.g. for kubernetes.io/ingress.class) # Additional ingressRoute annotations (e.g. for kubernetes.io/ingress.class)
@@ -150,32 +151,32 @@ ingressRoute:
# TLS options (e.g. secret containing certificate) # TLS options (e.g. secret containing certificate)
tls: {} tls: {}
# Customize updateStrategy of traefik pods # Customize updateStrategy of traefik pods
updateStrategy: updateStrategy:
type: RollingUpdate type: RollingUpdate
rollingUpdate: rollingUpdate:
maxUnavailable: 0 maxUnavailable: 0
maxSurge: 1 maxSurge: 1
# Customize liveness and readiness probe values. # Customize liveness and readiness probe values.
readinessProbe: readinessProbe:
failureThreshold: 1 failureThreshold: 1
initialDelaySeconds: 2 initialDelaySeconds: 2
periodSeconds: 10 periodSeconds: 10
successThreshold: 1 successThreshold: 1
timeoutSeconds: 2 timeoutSeconds: 2
livenessProbe: livenessProbe:
failureThreshold: 3 failureThreshold: 3
initialDelaySeconds: 2 initialDelaySeconds: 2
periodSeconds: 10 periodSeconds: 10
successThreshold: 1 successThreshold: 1
timeoutSeconds: 2 timeoutSeconds: 2
# #
# Configure providers # Configure providers
# #
providers: providers:
kubernetesCRD: kubernetesCRD:
enabled: true enabled: true
allowCrossNamespace: false allowCrossNamespace: false
@@ -201,31 +202,31 @@ providers:
# By default this Traefik service # By default this Traefik service
# pathOverride: "" # pathOverride: ""
# #
# Add volumes to the traefik pod. The volume name will be passed to tpl. # Add volumes to the traefik pod. The volume name will be passed to tpl.
# This can be used to mount a cert pair or a configmap that holds a config.toml file. # This can be used to mount a cert pair or a configmap that holds a config.toml file.
# After the volume has been mounted, add the configs into traefik by using the `additionalArguments` list below, eg: # After the volume has been mounted, add the configs into traefik by using the `additionalArguments` list below, eg:
# additionalArguments: # additionalArguments:
# - "--providers.file.filename=/config/dynamic.toml" # - "--providers.file.filename=/config/dynamic.toml"
# - "--ping" # - "--ping"
# - "--ping.entrypoint=web" # - "--ping.entrypoint=web"
volumes: [] volumes: []
# - name: public-cert # - name: public-cert
# mountPath: "/certs" # mountPath: "/certs"
# type: secret # type: secret
# - name: '{{ printf "%s-configs" .Release.Name }}' # - name: '{{ printf "%s-configs" .Release.Name }}'
# mountPath: "/config" # mountPath: "/config"
# type: configMap # type: configMap
# Additional volumeMounts to add to the Traefik container # Additional volumeMounts to add to the Traefik container
additionalVolumeMounts: [] additionalVolumeMounts: []
# For instance when using a logshipper for access logs # For instance when using a logshipper for access logs
# - name: traefik-logs # - name: traefik-logs
# mountPath: /var/log/traefik # mountPath: /var/log/traefik
## Logs ## Logs
## https://docs.traefik.io/observability/logs/ ## https://docs.traefik.io/observability/logs/
logs: logs:
## Traefik logs concern everything that happens to Traefik itself (startup, configuration, events, shutdown, and so on). ## Traefik logs concern everything that happens to Traefik itself (startup, configuration, events, shutdown, and so on).
general: general:
# By default, the logs use a text format (common), but you can # By default, the logs use a text format (common), but you can
@@ -267,7 +268,7 @@ logs:
# Authorization: drop # Authorization: drop
# Content-Type: keep # Content-Type: keep
metrics: metrics:
## Prometheus is enabled by default. ## Prometheus is enabled by default.
## It can be disabled by setting "prometheus: null" ## It can be disabled by setting "prometheus: null"
prometheus: prometheus:
@@ -284,119 +285,119 @@ metrics:
## When manualRouting is true, it disables the default internal router in ## When manualRouting is true, it disables the default internal router in
## order to allow creating a custom router for prometheus@internal service. ## order to allow creating a custom router for prometheus@internal service.
# manualRouting: true # manualRouting: true
# datadog: # datadog:
# ## Address instructs exporter to send metrics to datadog-agent at this address. # ## Address instructs exporter to send metrics to datadog-agent at this address.
# address: "127.0.0.1:8125" # address: "127.0.0.1:8125"
# ## The interval used by the exporter to push metrics to datadog-agent. Default=10s # ## The interval used by the exporter to push metrics to datadog-agent. Default=10s
# # pushInterval: 30s # # pushInterval: 30s
# ## The prefix to use for metrics collection. Default="traefik" # ## The prefix to use for metrics collection. Default="traefik"
# # prefix: traefik # # prefix: traefik
# ## Enable metrics on entry points. Default=true # ## Enable metrics on entry points. Default=true
# # addEntryPointsLabels: false # # addEntryPointsLabels: false
# ## Enable metrics on routers. Default=false # ## Enable metrics on routers. Default=false
# # addRoutersLabels: true # # addRoutersLabels: true
# ## Enable metrics on services. Default=true # ## Enable metrics on services. Default=true
# # addServicesLabels: false # # addServicesLabels: false
# influxdb: # influxdb:
# ## Address instructs exporter to send metrics to influxdb at this address. # ## Address instructs exporter to send metrics to influxdb at this address.
# address: localhost:8089 # address: localhost:8089
# ## InfluxDB's address protocol (udp or http). Default="udp" # ## InfluxDB's address protocol (udp or http). Default="udp"
# protocol: udp # protocol: udp
# ## InfluxDB database used when protocol is http. Default="" # ## InfluxDB database used when protocol is http. Default=""
# # database: "" # # database: ""
# ## InfluxDB retention policy used when protocol is http. Default="" # ## InfluxDB retention policy used when protocol is http. Default=""
# # retentionPolicy: "" # # retentionPolicy: ""
# ## InfluxDB username (only with http). Default="" # ## InfluxDB username (only with http). Default=""
# # username: "" # # username: ""
# ## InfluxDB password (only with http). Default="" # ## InfluxDB password (only with http). Default=""
# # password: "" # # password: ""
# ## The interval used by the exporter to push metrics to influxdb. Default=10s # ## The interval used by the exporter to push metrics to influxdb. Default=10s
# # pushInterval: 30s # # pushInterval: 30s
# ## Additional labels (influxdb tags) on all metrics. # ## Additional labels (influxdb tags) on all metrics.
# # additionalLabels: # # additionalLabels:
# # env: production # # env: production
# # foo: bar # # foo: bar
# ## Enable metrics on entry points. Default=true # ## Enable metrics on entry points. Default=true
# # addEntryPointsLabels: false # # addEntryPointsLabels: false
# ## Enable metrics on routers. Default=false # ## Enable metrics on routers. Default=false
# # addRoutersLabels: true # # addRoutersLabels: true
# ## Enable metrics on services. Default=true # ## Enable metrics on services. Default=true
# # addServicesLabels: false # # addServicesLabels: false
# influxdb2: # influxdb2:
# ## Address instructs exporter to send metrics to influxdb v2 at this address. # ## Address instructs exporter to send metrics to influxdb v2 at this address.
# address: localhost:8086 # address: localhost:8086
# ## Token with which to connect to InfluxDB v2. # ## Token with which to connect to InfluxDB v2.
# token: xxx # token: xxx
# ## Organisation where metrics will be stored. # ## Organisation where metrics will be stored.
# org: "" # org: ""
# ## Bucket where metrics will be stored. # ## Bucket where metrics will be stored.
# bucket: "" # bucket: ""
# ## The interval used by the exporter to push metrics to influxdb. Default=10s # ## The interval used by the exporter to push metrics to influxdb. Default=10s
# # pushInterval: 30s # # pushInterval: 30s
# ## Additional labels (influxdb tags) on all metrics. # ## Additional labels (influxdb tags) on all metrics.
# # additionalLabels: # # additionalLabels:
# # env: production # # env: production
# # foo: bar # # foo: bar
# ## Enable metrics on entry points. Default=true # ## Enable metrics on entry points. Default=true
# # addEntryPointsLabels: false # # addEntryPointsLabels: false
# ## Enable metrics on routers. Default=false # ## Enable metrics on routers. Default=false
# # addRoutersLabels: true # # addRoutersLabels: true
# ## Enable metrics on services. Default=true # ## Enable metrics on services. Default=true
# # addServicesLabels: false # # addServicesLabels: false
# statsd: # statsd:
# ## Address instructs exporter to send metrics to statsd at this address. # ## Address instructs exporter to send metrics to statsd at this address.
# address: localhost:8125 # address: localhost:8125
# ## The interval used by the exporter to push metrics to influxdb. Default=10s # ## The interval used by the exporter to push metrics to influxdb. Default=10s
# # pushInterval: 30s # # pushInterval: 30s
# ## The prefix to use for metrics collection. Default="traefik" # ## The prefix to use for metrics collection. Default="traefik"
# # prefix: traefik # # prefix: traefik
# ## Enable metrics on entry points. Default=true # ## Enable metrics on entry points. Default=true
# # addEntryPointsLabels: false # # addEntryPointsLabels: false
# ## Enable metrics on routers. Default=false # ## Enable metrics on routers. Default=false
# # addRoutersLabels: true # # addRoutersLabels: true
# ## Enable metrics on services. Default=true # ## Enable metrics on services. Default=true
# # addServicesLabels: false # # addServicesLabels: false
# openTelemetry: # openTelemetry:
# ## Address of the OpenTelemetry Collector to send metrics to. # ## Address of the OpenTelemetry Collector to send metrics to.
# address: "localhost:4318" # address: "localhost:4318"
# ## Enable metrics on entry points. # ## Enable metrics on entry points.
# addEntryPointsLabels: true # addEntryPointsLabels: true
# ## Enable metrics on routers. # ## Enable metrics on routers.
# addRoutersLabels: true # addRoutersLabels: true
# ## Enable metrics on services. # ## Enable metrics on services.
# addServicesLabels: true # addServicesLabels: true
# ## Explicit boundaries for Histogram data points. # ## Explicit boundaries for Histogram data points.
# explicitBoundaries: # explicitBoundaries:
# - "0.1" # - "0.1"
# - "0.3" # - "0.3"
# - "1.2" # - "1.2"
# - "5.0" # - "5.0"
# ## Additional headers sent with metrics by the reporter to the OpenTelemetry Collector. # ## Additional headers sent with metrics by the reporter to the OpenTelemetry Collector.
# headers: # headers:
# foo: bar # foo: bar
# test: test # test: test
# ## Allows reporter to send metrics to the OpenTelemetry Collector without using a secured protocol. # ## Allows reporter to send metrics to the OpenTelemetry Collector without using a secured protocol.
# insecure: true # insecure: true
# ## Interval at which metrics are sent to the OpenTelemetry Collector. # ## Interval at which metrics are sent to the OpenTelemetry Collector.
# pushInterval: 10s # pushInterval: 10s
# ## Allows to override the default URL path used for sending metrics. This option has no effect when using gRPC transport. # ## Allows to override the default URL path used for sending metrics. This option has no effect when using gRPC transport.
# path: /foo/v1/traces # path: /foo/v1/traces
# ## Defines the TLS configuration used by the reporter to send metrics to the OpenTelemetry Collector. # ## Defines the TLS configuration used by the reporter to send metrics to the OpenTelemetry Collector.
# tls: # tls:
# ## The path to the certificate authority, it defaults to the system bundle. # ## The path to the certificate authority, it defaults to the system bundle.
# ca: path/to/ca.crt # ca: path/to/ca.crt
# ## The path to the public certificate. When using this option, setting the key option is required. # ## The path to the public certificate. When using this option, setting the key option is required.
# cert: path/to/foo.cert # cert: path/to/foo.cert
# ## The path to the private key. When using this option, setting the cert option is required. # ## The path to the private key. When using this option, setting the cert option is required.
# key: path/to/key.key # key: path/to/key.key
# ## If set to true, the TLS connection accepts any certificate presented by the server regardless of the hostnames it covers. # ## If set to true, the TLS connection accepts any certificate presented by the server regardless of the hostnames it covers.
# insecureSkipVerify: true # insecureSkipVerify: true
# ## This instructs the reporter to send metrics to the OpenTelemetry Collector using gRPC. # ## This instructs the reporter to send metrics to the OpenTelemetry Collector using gRPC.
# grpc: true # grpc: true
## ##
## enable optional CRDs for Prometheus Operator ## enable optional CRDs for Prometheus Operator
## ##
## Create a dedicated metrics service for use with ServiceMonitor ## Create a dedicated metrics service for use with ServiceMonitor
## When hub.enabled is set to true, it's not needed: it will use hub service. ## When hub.enabled is set to true, it's not needed: it will use hub service.
# service: # service:
@@ -445,7 +446,7 @@ metrics:
# summary: "Traefik Down" # summary: "Traefik Down"
# description: "{{ $labels.pod }} on {{ $labels.nodename }} is down" # description: "{{ $labels.pod }} on {{ $labels.nodename }} is down"
tracing: {} tracing: {}
# instana: # instana:
# localAgentHost: 127.0.0.1 # localAgentHost: 127.0.0.1
# localAgentPort: 42699 # localAgentPort: 42699
@@ -487,42 +488,42 @@ tracing: {}
# secretToken: "" # secretToken: ""
# serviceEnvironment: "" # serviceEnvironment: ""
globalArguments: globalArguments:
- "--global.checknewversion" - "--global.checknewversion"
- "--global.sendanonymoususage" - "--global.sendanonymoususage"
# #
# Configure Traefik static configuration # Configure Traefik static configuration
# Additional arguments to be passed at Traefik's binary # Additional arguments to be passed at Traefik's binary
# All available options available on https://docs.traefik.io/reference/static-configuration/cli/ # All available options available on https://docs.traefik.io/reference/static-configuration/cli/
## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress.ingressclass=traefik-internal,--log.level=DEBUG}"` ## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress.ingressclass=traefik-internal,--log.level=DEBUG}"`
additionalArguments: [] additionalArguments: []
# - "--providers.kubernetesingress.ingressclass=traefik-internal" # - "--providers.kubernetesingress.ingressclass=traefik-internal"
# - "--log.level=DEBUG" # - "--log.level=DEBUG"
# Environment variables to be passed to Traefik's binary # Environment variables to be passed to Traefik's binary
env: [] env: []
# - name: SOME_VAR # - name: SOME_VAR
# value: some-var-value # value: some-var-value
# - name: SOME_VAR_FROM_CONFIG_MAP # - name: SOME_VAR_FROM_CONFIG_MAP
# valueFrom: # valueFrom:
# configMapRef: # configMapRef:
# name: configmap-name # name: configmap-name
# key: config-key # key: config-key
# - name: SOME_SECRET # - name: SOME_SECRET
# valueFrom: # valueFrom:
# secretKeyRef: # secretKeyRef:
# name: secret-name # name: secret-name
# key: secret-key # key: secret-key
envFrom: [] envFrom: []
# - configMapRef: # - configMapRef:
# name: config-map-name # name: config-map-name
# - secretRef: # - secretRef:
# name: secret-name # name: secret-name
# Configure ports # Configure ports
ports: ports:
# The name of this one can't be changed as it is used for the readiness and # The name of this one can't be changed as it is used for the readiness and
# liveness probes, but you can adjust its config to your liking # liveness probes, but you can adjust its config to your liking
traefik: traefik:
@@ -652,34 +653,34 @@ ports:
# The port protocol (TCP/UDP) # The port protocol (TCP/UDP)
protocol: TCP protocol: TCP
# TLS Options are created as TLSOption CRDs # TLS Options are created as TLSOption CRDs
# https://doc.traefik.io/traefik/https/tls/#tls-options # https://doc.traefik.io/traefik/https/tls/#tls-options
# When using `labelSelector`, you'll need to set labels on tlsOption accordingly. # When using `labelSelector`, you'll need to set labels on tlsOption accordingly.
# Example: # Example:
# tlsOptions: # tlsOptions:
# default: # default:
# labels: {} # labels: {}
# sniStrict: true # sniStrict: true
# preferServerCipherSuites: true # preferServerCipherSuites: true
# customOptions: # customOptions:
# labels: {} # labels: {}
# curvePreferences: # curvePreferences:
# - CurveP521 # - CurveP521
# - CurveP384 # - CurveP384
tlsOptions: {} tlsOptions: {}
# TLS Store are created as TLSStore CRDs. This is useful if you want to set a default certificate # TLS Store are created as TLSStore CRDs. This is useful if you want to set a default certificate
# https://doc.traefik.io/traefik/https/tls/#default-certificate # https://doc.traefik.io/traefik/https/tls/#default-certificate
# Example: # Example:
# tlsStore: # tlsStore:
# default: # default:
# defaultCertificate: # defaultCertificate:
# secretName: tls-cert # secretName: tls-cert
tlsStore: {} tlsStore: {}
# Options for the main traefik service, where the entrypoints traffic comes # Options for the main traefik service, where the entrypoints traffic comes
# from. # from.
service: service:
enabled: true enabled: true
## Single service is using `MixedProtocolLBService` feature gate. ## Single service is using `MixedProtocolLBService` feature gate.
## When set to false, it will create two Service, one for TCP and one for UDP. ## When set to false, it will create two Service, one for TCP and one for UDP.
@@ -723,40 +724,40 @@ service:
# # externalIPs: [] # # externalIPs: []
# # ipFamilies: [ "IPv4","IPv6" ] # # ipFamilies: [ "IPv4","IPv6" ]
## Create HorizontalPodAutoscaler object. ## Create HorizontalPodAutoscaler object.
## ##
autoscaling: autoscaling:
enabled: false enabled: false
# minReplicas: 1 # minReplicas: 1
# maxReplicas: 10 # maxReplicas: 10
# metrics: # metrics:
# - type: Resource # - type: Resource
# resource: # resource:
# name: cpu # name: cpu
# target: # target:
# type: Utilization # type: Utilization
# averageUtilization: 60 # averageUtilization: 60
# - type: Resource # - type: Resource
# resource: # resource:
# name: memory # name: memory
# target: # target:
# type: Utilization # type: Utilization
# averageUtilization: 60 # averageUtilization: 60
# behavior: # behavior:
# scaleDown: # scaleDown:
# stabilizationWindowSeconds: 300 # stabilizationWindowSeconds: 300
# policies: # policies:
# - type: Pods # - type: Pods
# value: 1 # value: 1
# periodSeconds: 60 # periodSeconds: 60
# Enable persistence using Persistent Volume Claims # Enable persistence using Persistent Volume Claims
# ref: http://kubernetes.io/docs/user-guide/persistent-volumes/ # ref: http://kubernetes.io/docs/user-guide/persistent-volumes/
# It can be used to store TLS certificates, see `storage` in certResolvers # It can be used to store TLS certificates, see `storage` in certResolvers
persistence: persistence:
enabled: false enabled: false
name: data name: data
# existingClaim: "" # existingClaim: ""
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 128Mi size: 128Mi
# storageClass: "" # storageClass: ""
@@ -765,35 +766,35 @@ persistence:
annotations: {} annotations: {}
# subPath: "" # only mount a subpath of the Volume into the pod # subPath: "" # only mount a subpath of the Volume into the pod
certResolvers: {} certResolvers: {}
# letsencrypt: # letsencrypt:
# # for challenge options cf. https://doc.traefik.io/traefik/https/acme/ # # for challenge options cf. https://doc.traefik.io/traefik/https/acme/
# email: email@example.com # email: email@example.com
# dnsChallenge: # dnsChallenge:
# # also add the provider's required configuration under env # # also add the provider's required configuration under env
# # or expand then from secrets/configmaps with envfrom # # or expand then from secrets/configmaps with envfrom
# # cf. https://doc.traefik.io/traefik/https/acme/#providers # # cf. https://doc.traefik.io/traefik/https/acme/#providers
# provider: digitalocean # provider: digitalocean
# # add futher options for the dns challenge as needed # # add futher options for the dns challenge as needed
# # cf. https://doc.traefik.io/traefik/https/acme/#dnschallenge # # cf. https://doc.traefik.io/traefik/https/acme/#dnschallenge
# delayBeforeCheck: 30 # delayBeforeCheck: 30
# resolvers: # resolvers:
# - 1.1.1.1 # - 1.1.1.1
# - 8.8.8.8 # - 8.8.8.8
# tlsChallenge: true # tlsChallenge: true
# httpChallenge: # httpChallenge:
# entryPoint: "web" # entryPoint: "web"
# # It has to match the path with a persistent volume # # It has to match the path with a persistent volume
# storage: /data/acme.json # storage: /data/acme.json
# If hostNetwork is true, runs traefik in the host network namespace # If hostNetwork is true, runs traefik in the host network namespace
# To prevent unschedulabel pods due to port collisions, if hostNetwork=true # To prevent unschedulabel pods due to port collisions, if hostNetwork=true
# and replicas>1, a pod anti-affinity is recommended and will be set if the # and replicas>1, a pod anti-affinity is recommended and will be set if the
# affinity is left as default. # affinity is left as default.
hostNetwork: false hostNetwork: false
# Whether Role Based Access Control objects like roles and rolebindings should be created # Whether Role Based Access Control objects like roles and rolebindings should be created
rbac: rbac:
enabled: true enabled: true
# If set to false, installs ClusterRole and ClusterRoleBinding so Traefik can be used across namespaces. # If set to false, installs ClusterRole and ClusterRoleBinding so Traefik can be used across namespaces.
# If set to true, installs Role and RoleBinding. Providers will only watch target namespace. # If set to true, installs Role and RoleBinding. Providers will only watch target namespace.
@@ -802,20 +803,20 @@ rbac:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles # https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
# aggregateTo: [ "admin" ] # aggregateTo: [ "admin" ]
# Enable to create a PodSecurityPolicy and assign it to the Service Account via RoleBinding or ClusterRoleBinding # Enable to create a PodSecurityPolicy and assign it to the Service Account via RoleBinding or ClusterRoleBinding
podSecurityPolicy: podSecurityPolicy:
enabled: false enabled: false
# The service account the pods will use to interact with the Kubernetes API # The service account the pods will use to interact with the Kubernetes API
serviceAccount: serviceAccount:
# If set, an existing service account is used # If set, an existing service account is used
# If not set, a service account is created automatically using the fullname template # If not set, a service account is created automatically using the fullname template
name: "" name: ""
# Additional serviceAccount annotations (e.g. for oidc authentication) # Additional serviceAccount annotations (e.g. for oidc authentication)
serviceAccountAnnotations: {} serviceAccountAnnotations: {}
resources: {} resources: {}
# requests: # requests:
# cpu: "100m" # cpu: "100m"
# memory: "50Mi" # memory: "50Mi"
@@ -823,61 +824,61 @@ resources: {}
# cpu: "300m" # cpu: "300m"
# memory: "150Mi" # memory: "150Mi"
# This example pod anti-affinity forces the scheduler to put traefik pods # This example pod anti-affinity forces the scheduler to put traefik pods
# on nodes where no other traefik pods are scheduled. # on nodes where no other traefik pods are scheduled.
# It should be used when hostNetwork: true to prevent port conflicts # It should be used when hostNetwork: true to prevent port conflicts
affinity: {} affinity: {}
# podAntiAffinity: # podAntiAffinity:
# requiredDuringSchedulingIgnoredDuringExecution: # requiredDuringSchedulingIgnoredDuringExecution:
# - labelSelector: # - labelSelector:
# matchLabels: # matchLabels:
# app.kubernetes.io/name: '{{ template "traefik.name" . }}' # app.kubernetes.io/name: '{{ template "traefik.name" . }}'
# app.kubernetes.io/instance: '{{ .Release.Name }}-{{ .Release.Namespace }}' # app.kubernetes.io/instance: '{{ .Release.Name }}-{{ .Release.Namespace }}'
# topologyKey: kubernetes.io/hostname # topologyKey: kubernetes.io/hostname
nodeSelector: {} nodeSelector: {}
tolerations: [] tolerations: []
topologySpreadConstraints: [] topologySpreadConstraints: []
# # This example topologySpreadConstraints forces the scheduler to put traefik pods # # This example topologySpreadConstraints forces the scheduler to put traefik pods
# # on nodes where no other traefik pods are scheduled. # # on nodes where no other traefik pods are scheduled.
# - labelSelector: # - labelSelector:
# matchLabels: # matchLabels:
# app: '{{ template "traefik.name" . }}' # app: '{{ template "traefik.name" . }}'
# maxSkew: 1 # maxSkew: 1
# topologyKey: kubernetes.io/hostname # topologyKey: kubernetes.io/hostname
# whenUnsatisfiable: DoNotSchedule # whenUnsatisfiable: DoNotSchedule
# Pods can have priority. # Pods can have priority.
# Priority indicates the importance of a Pod relative to other Pods. # Priority indicates the importance of a Pod relative to other Pods.
priorityClassName: "" priorityClassName: ""
# Set the container security context # Set the container security context
# To run the container with ports below 1024 this will need to be adjust to run as root # To run the container with ports below 1024 this will need to be adjust to run as root
securityContext: securityContext:
capabilities: capabilities:
drop: [ALL] drop: [ALL]
readOnlyRootFilesystem: true readOnlyRootFilesystem: true
podSecurityContext: podSecurityContext:
# # /!\ When setting fsGroup, Kubernetes will recursively changes ownership and # # /!\ When setting fsGroup, Kubernetes will recursively changes ownership and
# # permissions for the contents of each volume to match the fsGroup. This can # # permissions for the contents of each volume to match the fsGroup. This can
# # be an issue when storing sensitive content like TLS Certificates /!\ # # be an issue when storing sensitive content like TLS Certificates /!\
# fsGroup: 65532 # fsGroup: 65532
fsGroupChangePolicy: "OnRootMismatch" fsGroupChangePolicy: "OnRootMismatch"
runAsGroup: 65532 runAsGroup: 65532
runAsNonRoot: true runAsNonRoot: true
runAsUser: 65532 runAsUser: 65532
# #
# Extra objects to deploy (value evaluated as a template) # Extra objects to deploy (value evaluated as a template)
# #
# In some cases, it can avoid the need for additional, extended or adhoc deployments. # In some cases, it can avoid the need for additional, extended or adhoc deployments.
# See #595 for more details and traefik/tests/values/extra.yaml for example. # See #595 for more details and traefik/tests/values/extra.yaml for example.
extraObjects: [] extraObjects: []
# This will override the default Release Namespace for Helm. # This will override the default Release Namespace for Helm.
# It will not affect optional CRDs such as `ServiceMonitor` and `PrometheusRules` # It will not affect optional CRDs such as `ServiceMonitor` and `PrometheusRules`
# namespaceOverride: traefik # namespaceOverride: traefik
# #
## This will override the default app.kubernetes.io/instance label for all Objects. ## This will override the default app.kubernetes.io/instance label for all Objects.
# instanceLabelOverride: traefik # instanceLabelOverride: traefik