Без опису

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
  1. apiVersion: argoproj.io/v1alpha1
  2. kind: Application
  3. metadata:
  4. name: "longhorn"
  5. namespace: {{ .Values.spec.namespace }}
  6. finalizers:
  7. - resources-finalizer.argocd.argoproj.io
  8. spec:
  9. destination:
  10. namespace: "longhorn-system"
  11. name: {{ .Values.spec.destination.name }}
  12. project: {{ .Values.spec.project }}
  13. syncPolicy:
  14. automated:
  15. prune: true
  16. selfHeal: true
  17. source:
  18. chart: "longhorn"
  19. repoURL: "https://charts.longhorn.io"
  20. targetRevision: "1.2.4"
  21. helm:
  22. releaseName: "longhorn"
  23. values: |
  24. defaultSettings:
  25. defaultSettings.defaultDataPath: /opt/longhorn
  26. ingress:
  27. ## Set to true to enable ingress record generation
  28. enabled: true
  29. host: "longhorn.kaisers.info"
  30. ## Set this to true in order to enable TLS on the ingress record
  31. ## A side effect of this will be that the backend service will be connected at port 443
  32. tls: true
  33. ## If TLS is set to true, you must declare what secret will store the key/certificate for TLS
  34. tlsSecret: longhorn-kaisers-info-tls
  35. ## Ingress annotations done as key:value pairs
  36. ## If you're using kube-lego, you will want to add:
  37. ## kubernetes.io/tls-acme: true
  38. ##
  39. ## For a full list of possible ingress annotations, please see
  40. ## ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/annotations.md
  41. ##
  42. ## If tls is set to true, annotation ingress.kubernetes.io/secure-backends: "true" will automatically be set
  43. annotations:
  44. cert-manager.io/cluster-issuer: "letsencrypt-prod"
  45. traefik.ingress.kubernetes.io/redirect-entry-point: "https"