Moved Traefik values.yaml inside ArgoCD Application

This commit is contained in:
Marco van Zijl 2025-05-03 12:36:40 +02:00
parent 5ef254034c
commit 768ee3b4f1
2 changed files with 77 additions and 77 deletions

View File

@ -5,13 +5,6 @@ metadata:
namespace: argocd namespace: argocd
spec: spec:
project: default project: default
source:
chart: traefik
repoURL: https://traefik.github.io/charts
targetRevision: 35.2.0
helm:
valueFiles:
- values/traefik.yaml
destination: destination:
server: {{ .Values.spec.destination.server }} server: {{ .Values.spec.destination.server }}
namespace: traefik namespace: traefik
@ -20,4 +13,80 @@ spec:
prune: true prune: true
selfHeal: true selfHeal: true
syncOptions: syncOptions:
- CreateNamespace=true - CreateNamespace=true
source:
chart: traefik
repoURL: https://traefik.github.io/charts
targetRevision: 35.2.0
helm:
valueObject:
ingressRoute:
dashboard:
enabled: true
matchRule: PathPrefix(`/dashboard`) || PathPrefix(`/api`)
entryPoints: ["traefik"]
healthcheck:
enabled: false
matchRule: PathPrefix(`/ping`)
entryPoints: ["traefik"]
metrics:
prometheus:
entryPoint: metrics
ports:
traefik:
port: 8080
# Defines whether the port is exposed if service.type is LoadBalancer or
# NodePort.
#
# -- You SHOULD NOT expose the traefik port on production deployments.
# If you want to access it from outside your cluster,
# use `kubectl port-forward` or create a secure ingress
expose: true
# -- The exposed port for this service
exposedPort: 8080
# -- The port protocol (TCP/UDP)
protocol: TCP
web:
port: 8000
expose: true
exposedPort: 80
protocol: TCP
websecure:
# asDefault: true
port: 8443
expose: true
exposedPort: 443
protocol: TCP
tls:
enabled: true
# -- One can apply Middlewares on an entrypoint
# https://doc.traefik.io/traefik/middlewares/overview/
# https://doc.traefik.io/traefik/routing/entrypoints/#middlewares
# -- /!\ It introduces here a link between your static configuration and your dynamic configuration /!\
# It follows the provider naming convention: https://doc.traefik.io/traefik/providers/overview/#provider-namespace
# - namespace-name1@kubernetescrd
# - namespace-name2@kubernetescrd
middlewares: []
metrics:
# -- When using hostNetwork, use another port to avoid conflict with node exporter:
# https://github.com/prometheus/prometheus/wiki/Default-port-allocations
port: 9100
# -- You may not want to expose the metrics port on production deployments.
# If you want to access it from outside your cluster,
# use `kubectl port-forward` or create a secure ingress
expose: true
exposedPort: 9100
protocol: TCP
service:
enabled: true
single: true
type: LoadBalancer
annotations:
io.cilium/lb-ipam-ips: "192.168.0.1"
spec:
externalTrafficPolicy: Local

View File

@ -1,69 +0,0 @@
ingressRoute:
dashboard:
enabled: true
matchRule: PathPrefix(`/dashboard`) || PathPrefix(`/api`)
entryPoints: ["traefik"]
healthcheck:
enabled: false
matchRule: PathPrefix(`/ping`)
entryPoints: ["traefik"]
metrics:
prometheus:
entryPoint: metrics
ports:
traefik:
port: 8080
# Defines whether the port is exposed if service.type is LoadBalancer or
# NodePort.
#
# -- You SHOULD NOT expose the traefik port on production deployments.
# If you want to access it from outside your cluster,
# use `kubectl port-forward` or create a secure ingress
expose: true
# -- The exposed port for this service
exposedPort: 8080
# -- The port protocol (TCP/UDP)
protocol: TCP
web:
port: 8000
expose: true
exposedPort: 80
protocol: TCP
websecure:
# asDefault: true
port: 8443
expose: true
exposedPort: 443
protocol: TCP
tls:
enabled: true
# -- One can apply Middlewares on an entrypoint
# https://doc.traefik.io/traefik/middlewares/overview/
# https://doc.traefik.io/traefik/routing/entrypoints/#middlewares
# -- /!\ It introduces here a link between your static configuration and your dynamic configuration /!\
# It follows the provider naming convention: https://doc.traefik.io/traefik/providers/overview/#provider-namespace
# - namespace-name1@kubernetescrd
# - namespace-name2@kubernetescrd
middlewares: []
metrics:
# -- When using hostNetwork, use another port to avoid conflict with node exporter:
# https://github.com/prometheus/prometheus/wiki/Default-port-allocations
port: 9100
# -- You may not want to expose the metrics port on production deployments.
# If you want to access it from outside your cluster,
# use `kubectl port-forward` or create a secure ingress
expose: true
exposedPort: 9100
protocol: TCP
service:
enabled: true
single: true
type: LoadBalancer
annotations:
io.cilium/lb-ipam-ips: "192.168.0.1"
spec:
externalTrafficPolicy: Local