| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950 |
- apiVersion: argoproj.io/v1alpha1
- kind: Application
- metadata:
- name: "longhorn"
- namespace: {{ .Values.spec.namespace }}
- finalizers:
- - resources-finalizer.argocd.argoproj.io
- spec:
- destination:
- namespace: "longhorn-system"
- name: {{ .Values.spec.destination.name }}
- project: {{ .Values.spec.project }}
- syncPolicy:
- automated:
- prune: true
- selfHeal: true
- source:
- chart: "longhorn"
- repoURL: "https://charts.longhorn.io"
- targetRevision: "1.2.4"
- helm:
- releaseName: "longhorn"
- values: |
- defaultSettings:
- defaultSettings.defaultDataPath: /opt/longhorn
-
- ingress:
- ## Set to true to enable ingress record generation
- enabled: true
-
- host: "longhorn.kaisers.info"
-
- ## Set this to true in order to enable TLS on the ingress record
- ## A side effect of this will be that the backend service will be connected at port 443
- tls: true
-
- ## If TLS is set to true, you must declare what secret will store the key/certificate for TLS
- tlsSecret: longhorn-kaisers-info-tls
-
- ## Ingress annotations done as key:value pairs
- ## If you're using kube-lego, you will want to add:
- ## kubernetes.io/tls-acme: true
- ##
- ## For a full list of possible ingress annotations, please see
- ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/annotations.md
- ##
- ## If tls is set to true, annotation ingress.kubernetes.io/secure-backends: "true" will automatically be set
- annotations:
- cert-manager.io/cluster-issuer: "letsencrypt-prod"
- traefik.ingress.kubernetes.io/redirect-entry-point: "https"
|