|
|
@@ -0,0 +1,48 @@
|
|
|
1
|
+apiVersion: argoproj.io/v1alpha1
|
|
|
2
|
+kind: Application
|
|
|
3
|
+metadata:
|
|
|
4
|
+ name: "longhorn"
|
|
|
5
|
+ namespace: {{ .Values.spec.namespace }}
|
|
|
6
|
+ finalizers:
|
|
|
7
|
+ - resources-finalizer.argocd.argoproj.io
|
|
|
8
|
+spec:
|
|
|
9
|
+ destination:
|
|
|
10
|
+ namespace: "longhorn-system"
|
|
|
11
|
+ name: {{ .Values.spec.destination.name }}
|
|
|
12
|
+ project: {{ .Values.spec.project }}
|
|
|
13
|
+ syncPolicy:
|
|
|
14
|
+ automated:
|
|
|
15
|
+ prune: true
|
|
|
16
|
+ selfHeal: true
|
|
|
17
|
+ source:
|
|
|
18
|
+ chart: "longhorn"
|
|
|
19
|
+ repoURL: "https://charts.longhorn.io"
|
|
|
20
|
+ targetRevision: "1.2.4"
|
|
|
21
|
+ helm:
|
|
|
22
|
+ releaseName: "longhorn"
|
|
|
23
|
+ values: |
|
|
|
24
|
+
|
|
|
25
|
+ ingress:
|
|
|
26
|
+ ## Set to true to enable ingress record generation
|
|
|
27
|
+ enabled: true
|
|
|
28
|
+
|
|
|
29
|
+ host: "longhorn.kaisers.info"
|
|
|
30
|
+
|
|
|
31
|
+ ## Set this to true in order to enable TLS on the ingress record
|
|
|
32
|
+ ## A side effect of this will be that the backend service will be connected at port 443
|
|
|
33
|
+ tls: true
|
|
|
34
|
+
|
|
|
35
|
+ ## If TLS is set to true, you must declare what secret will store the key/certificate for TLS
|
|
|
36
|
+ tlsSecret: longhorn-kaisers-info-tls
|
|
|
37
|
+
|
|
|
38
|
+ ## Ingress annotations done as key:value pairs
|
|
|
39
|
+ ## If you're using kube-lego, you will want to add:
|
|
|
40
|
+ ## kubernetes.io/tls-acme: true
|
|
|
41
|
+ ##
|
|
|
42
|
+ ## For a full list of possible ingress annotations, please see
|
|
|
43
|
+ ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/annotations.md
|
|
|
44
|
+ ##
|
|
|
45
|
+ ## If tls is set to true, annotation ingress.kubernetes.io/secure-backends: "true" will automatically be set
|
|
|
46
|
+ annotations:
|
|
|
47
|
+ cert-manager.io/cluster-issuer: "letsencrypt-prod"
|
|
|
48
|
+ traefik.ingress.kubernetes.io/redirect-entry-point: "https"
|