apiVersion: argoproj.io/v1alpha1 kind: Application metadata: name: "longhorn" namespace: {{ .Values.spec.namespace }} finalizers: - resources-finalizer.argocd.argoproj.io spec: destination: namespace: "longhorn-system" name: {{ .Values.spec.destination.name }} project: {{ .Values.spec.project }} syncPolicy: automated: prune: true selfHeal: true source: chart: "longhorn" repoURL: "https://charts.longhorn.io" targetRevision: "1.2.4" helm: releaseName: "longhorn" values: | defaultSettings: defaultSettings.defaultDataPath: /opt/longhorn ingress: ## Set to true to enable ingress record generation enabled: true host: "longhorn.kaisers.info" ## Set this to true in order to enable TLS on the ingress record ## A side effect of this will be that the backend service will be connected at port 443 tls: true ## If TLS is set to true, you must declare what secret will store the key/certificate for TLS tlsSecret: longhorn-kaisers-info-tls ## Ingress annotations done as key:value pairs ## If you're using kube-lego, you will want to add: ## kubernetes.io/tls-acme: true ## ## For a full list of possible ingress annotations, please see ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/annotations.md ## ## If tls is set to true, annotation ingress.kubernetes.io/secure-backends: "true" will automatically be set annotations: cert-manager.io/cluster-issuer: "letsencrypt-prod" traefik.ingress.kubernetes.io/redirect-entry-point: "https"