seaweedfs.yaml Korrektur 2
This commit is contained in:
BIN
argocd/apps/seaweedfs/.seaweedfs.bak.swp
Normal file
BIN
argocd/apps/seaweedfs/.seaweedfs.bak.swp
Normal file
Binary file not shown.
@@ -13,133 +13,132 @@ spec:
|
|||||||
helm:
|
helm:
|
||||||
values: |
|
values: |
|
||||||
# Global Konfiguration
|
# Global Konfiguration
|
||||||
global:
|
global:
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
enableSecurity: true
|
enableSecurity: true
|
||||||
monitoring:
|
monitoring:
|
||||||
enabled: true
|
enabled: true
|
||||||
|
|
||||||
master:
|
master:
|
||||||
enabled: true
|
enabled: true
|
||||||
replicas: 1
|
replicas: 1
|
||||||
data:
|
data:
|
||||||
type: "persistentVolumeClaim"
|
type: "persistentVolumeClaim"
|
||||||
size: "25Gi"
|
size: "25Gi"
|
||||||
storageClass: ""
|
storageClass: ""
|
||||||
logs:
|
logs:
|
||||||
type: "persistentVolumeClaim"
|
type: "persistentVolumeClaim"
|
||||||
size: „5Gi"
|
size: „5Gi"
|
||||||
storageClass: ""
|
storageClass: ""
|
||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
enabled: true
|
enabled: true
|
||||||
className: "traefik"
|
className: "traefik"
|
||||||
# host: false for "*" hostname
|
# host: false for "*" hostname
|
||||||
host: "seaweed.innovation-hub-niedersachsen.de"
|
host: "seaweed.innovation-hub-niedersachsen.de"
|
||||||
annotations:
|
annotations:
|
||||||
kubernetes.io/ingress.class: "traefik"
|
kubernetes.io/ingress.class: "traefik"
|
||||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||||
traefik.ingress.kubernetes.io/router.tls: "true"
|
traefik.ingress.kubernetes.io/router.tls: "true"
|
||||||
cert-manager.io/cluster-issuer: "lets-encrypt"
|
cert-manager.io/cluster-issuer: "lets-encrypt"
|
||||||
|
tls:
|
||||||
|
- secretName: "seaweed.innovation-hub-niedersachsen.de-tls"
|
||||||
|
hosts:
|
||||||
|
- "seaweed.innovation-hub-niedersachsen.de"
|
||||||
|
|
||||||
tls:
|
volume:
|
||||||
- secretName: "seaweed.innovation-hub-niedersachsen.de-tls"
|
enabled: true
|
||||||
hosts:
|
replicas: 1
|
||||||
- "seaweed.innovation-hub-niedersachsen.de"
|
dataDirs:
|
||||||
|
- name: data
|
||||||
|
type: "persistentVolumeClaim"
|
||||||
|
storageClass: ""
|
||||||
|
size: "100Gi"
|
||||||
|
idx:
|
||||||
|
type: "persistentVolumeClaim"
|
||||||
|
size: "10Gi"
|
||||||
|
storageClass: ""
|
||||||
|
|
||||||
volume:
|
filer:
|
||||||
enabled: true
|
enabled: true
|
||||||
replicas: 1
|
data:
|
||||||
dataDirs:
|
type: "persistentVolumeClaim"
|
||||||
- name: data
|
size: "25Gi"
|
||||||
type: "persistentVolumeClaim"
|
storageClass: ""
|
||||||
storageClass: ""
|
logs:
|
||||||
size: "100Gi"
|
type: "persistentVolumeClaim"
|
||||||
idx:
|
size: "5Gi"
|
||||||
type: "persistentVolumeClaim"
|
storageClass: ""
|
||||||
size: "10Gi"
|
|
||||||
storageClass: ""
|
|
||||||
|
|
||||||
filer:
|
# ingress:
|
||||||
enabled: true
|
# enabled: true
|
||||||
data:
|
# className: "traefik"
|
||||||
type: "persistentVolumeClaim"
|
# host: "sws3.innovation-hub-niedersachsen.de"
|
||||||
size: "25Gi"
|
# annotations:
|
||||||
storageClass: ""
|
# kubernetes.io/ingress.class: "traefik"
|
||||||
logs:
|
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||||
type: "persistentVolumeClaim"
|
# traefik.ingress.kubernetes.io/router.tls: "true"
|
||||||
size: "5Gi"
|
# cert-manager.io/cluster-issuer: "lets-encrypt"
|
||||||
storageClass: ""
|
# tls:
|
||||||
|
# - secretName: "sws3.innovation-hub-niedersachsen.de-tls"
|
||||||
|
# hosts:
|
||||||
|
# - "sws3.innovation-hub-niedersachsen.de"
|
||||||
|
# s3:
|
||||||
|
# enabled: true
|
||||||
|
# port: 8333
|
||||||
|
# httpsPort: 0
|
||||||
|
# allowEmptyFolder: false
|
||||||
|
# # Suffix of the host name, {bucket}.{domainName}
|
||||||
|
# domainName: ""
|
||||||
|
# # enable user & permission to s3 (need to inject to all services)
|
||||||
|
# enableAuth: true
|
||||||
|
# # set to the name of an existing kubernetes Secret with the s3 json config file
|
||||||
|
# # should have a secret key called seaweedfs_s3_config with an inline json configure
|
||||||
|
# existingConfigSecret: "admin-s3-secret"
|
||||||
|
|
||||||
# ingress:
|
s3:
|
||||||
# enabled: true
|
enabled: true
|
||||||
# className: "traefik"
|
imageOverride: null
|
||||||
# host: "sws3.innovation-hub-niedersachsen.de"
|
restartPolicy: null
|
||||||
# annotations:
|
replicas: 1
|
||||||
# kubernetes.io/ingress.class: "traefik"
|
bindAddress: 0.0.0.0
|
||||||
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
port: 8333
|
||||||
# traefik.ingress.kubernetes.io/router.tls: "true"
|
# add additional https port
|
||||||
# cert-manager.io/cluster-issuer: "lets-encrypt"
|
httpsPort: 0
|
||||||
# tls:
|
metricsPort: 9327
|
||||||
# - secretName: "sws3.innovation-hub-niedersachsen.de-tls"
|
loggingOverrideLevel: null
|
||||||
# hosts:
|
# allow empty folders
|
||||||
# - "sws3.innovation-hub-niedersachsen.de"
|
allowEmptyFolder: true
|
||||||
# s3:
|
# enable user & permission to s3 (need to inject to all services)
|
||||||
# enabled: true
|
enableAuth: true
|
||||||
# port: 8333
|
# set to the name of an existing kubernetes Secret with the s3 json config file
|
||||||
# httpsPort: 0
|
# should have a secret key called seaweedfs_s3_config with an inline json config
|
||||||
# allowEmptyFolder: false
|
existingConfigSecret: "admin-s3-secret"
|
||||||
# # Suffix of the host name, {bucket}.{domainName}
|
auditLogConfig: {}
|
||||||
# domainName: ""
|
|
||||||
# # enable user & permission to s3 (need to inject to all services)
|
|
||||||
# enableAuth: true
|
|
||||||
# # set to the name of an existing kubernetes Secret with the s3 json config file
|
|
||||||
# # should have a secret key called seaweedfs_s3_config with an inline json configure
|
|
||||||
# existingConfigSecret: "admin-s3-secret"
|
|
||||||
|
|
||||||
s3:
|
ingress:
|
||||||
enabled: true
|
enabled: true
|
||||||
imageOverride: null
|
className: "traefik"
|
||||||
restartPolicy: null
|
host: "sws3.innovation-hub-niedersachsen.de"
|
||||||
replicas: 1
|
# additional ingress annotations for the s3 endpoint
|
||||||
bindAddress: 0.0.0.0
|
annotations:
|
||||||
port: 8333
|
kubernetes.io/ingress.class: "traefik"
|
||||||
# add additional https port
|
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||||
httpsPort: 0
|
traefik.ingress.kubernetes.io/router.tls: "true"
|
||||||
metricsPort: 9327
|
cert-manager.io/cluster-issuer: "lets-encrypt"
|
||||||
loggingOverrideLevel: null
|
tls:
|
||||||
# allow empty folders
|
- secretName: "sws3.innovation-hub-niedersachsen.de-tls"
|
||||||
allowEmptyFolder: true
|
hosts:
|
||||||
# enable user & permission to s3 (need to inject to all services)
|
- "sws3.innovation-hub-niedersachsen.de"
|
||||||
enableAuth: true
|
|
||||||
# set to the name of an existing kubernetes Secret with the s3 json config file
|
|
||||||
# should have a secret key called seaweedfs_s3_config with an inline json config
|
|
||||||
existingConfigSecret: "admin-s3-secret"
|
|
||||||
auditLogConfig: {}
|
|
||||||
|
|
||||||
ingress:
|
# Resource management
|
||||||
enabled: true
|
resources:
|
||||||
className: "traefik"
|
limits:
|
||||||
host: "sws3.innovation-hub-niedersachsen.de"
|
cpu: "2"
|
||||||
# additional ingress annotations for the s3 endpoint
|
memory: "2Gi"
|
||||||
annotations:
|
requests:
|
||||||
kubernetes.io/ingress.class: "traefik"
|
cpu: "500m"
|
||||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
memory: "1Gi"
|
||||||
traefik.ingress.kubernetes.io/router.tls: "true"
|
|
||||||
cert-manager.io/cluster-issuer: "lets-encrypt"
|
|
||||||
tls:
|
|
||||||
- secretName: "sws3.innovation-hub-niedersachsen.de-tls"
|
|
||||||
hosts:
|
|
||||||
- "sws3.innovation-hub-niedersachsen.de"
|
|
||||||
|
|
||||||
# Resource management
|
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
cpu: "2"
|
|
||||||
memory: "2Gi"
|
|
||||||
requests:
|
|
||||||
cpu: "500m"
|
|
||||||
memory: "1Gi"
|
|
||||||
|
|
||||||
destination:
|
destination:
|
||||||
server: 'https://kubernetes.default.svc'
|
server: 'https://kubernetes.default.svc'
|
||||||
|
|||||||
Reference in New Issue
Block a user