ingress
This commit is contained in:
@@ -45,11 +45,11 @@ longhorn:
|
||||
loadBalancerSourceRanges: ""
|
||||
|
||||
persistence:
|
||||
defaultClass: true
|
||||
defaultClass: false
|
||||
defaultFsType: ext4
|
||||
defaultClassReplicaCount: 3
|
||||
defaultClassReplicaCount: 1
|
||||
defaultDataLocality: disabled # best-effort otherwise
|
||||
reclaimPolicy: Delete
|
||||
reclaimPolicy: Retain
|
||||
migratable: false
|
||||
recurringJobSelector:
|
||||
enable: false
|
||||
@@ -175,20 +175,23 @@ longhorn:
|
||||
|
||||
ingress:
|
||||
## Set to true to enable ingress record generation
|
||||
enabled: false
|
||||
enabled: true
|
||||
|
||||
## Add ingressClassName to the Ingress
|
||||
## Can replace the kubernetes.io/ingress.class annotation on v1.18+
|
||||
ingressClassName: ~
|
||||
ingressClassName: nginx
|
||||
|
||||
host: sslip.io
|
||||
host: longhorn.internal.durp.info
|
||||
|
||||
## Set this to true in order to enable TLS on the ingress record
|
||||
## A side effect of this will be that the backend service will be connected at port 443
|
||||
tls: false
|
||||
tls:
|
||||
- secretName: longhorn-tls
|
||||
hosts:
|
||||
- longhorn.internal.durp.info
|
||||
|
||||
## If TLS is set to true, you must declare what secret will store the key/certificate for TLS
|
||||
tlsSecret: longhorn.local-tls
|
||||
tlsSecret: longhorn-tls
|
||||
|
||||
## If ingress is enabled you can set the default ingress path
|
||||
## then you can access the UI by using the following full path {{host}}+{{path}}
|
||||
@@ -203,8 +206,7 @@ longhorn:
|
||||
##
|
||||
## If tls is set to true, annotation ingress.kubernetes.io/secure-backends: "true" will automatically be set
|
||||
annotations:
|
||||
# kubernetes.io/ingress.class: nginx
|
||||
# kubernetes.io/tls-acme: true
|
||||
cert-manager.io/cluster-issuer: letsencrypt-production
|
||||
|
||||
secrets:
|
||||
## If you're providing your own certificates, please use this to add the certificates as secrets
|
||||
|
||||
Reference in New Issue
Block a user