infra-ingress

infra-ingress

Version: 0.1.1 Type: application

Setup an ingress

Maintainers

NameEmailUrl
WrenIXhttps://wrenix.eu

Values

Commons Monitoring

KeyTypeDefaultDescription
commons.grafana.allowCrossNamespaceImportboolfalsejust for Grafana-Operator resources
commons.grafana.dashboards.folderstring""just for Grafana-Operator resources
commons.grafana.dashboards.folderRefstring""just for Grafana-Operator resources
commons.grafana.dashboards.labelsobject{"grafana_dashboard":"1"}labels of grafana dashboard configmap
commons.grafana.instanceSelectorobject{}if defined and grafana-operator deployed it setup instatt an GrafanaDashboard resource
commons.prometheus.monitor.labelsobject{}labels on Pod- and Service-Monitor

Commons helm release

KeyTypeDefaultDescription
commons.helm.release.driftDetectionobject{}driftDetection of FluxCD HelmRelease
commons.helm.release.installobject{}install of FluxCD HelmRelease
commons.helm.release.testobject{}test of FluxCD HelmRelease
commons.helm.release.upgradeobject{}upgrade of FluxCD HelmRelease

Commons Ingress

KeyTypeDefaultDescription
commons.ingress.annotationsobject{"cert-manager.io/cluster-issuer":"letsencrypt-prod"}annotations for all ingress objects
commons.ingress.domainstring"wrenix.eu"top domain for all services
commons.ingress.tls.enabledbooltruetls on every ingress
commons.ingress.tls.overridelist[]use own definition of tls (e.g. for own or wildcard certificate)

Commons Tracing

KeyTypeDefaultDescription
commons.tracing.enabledboolfalseenable tracing on all components
commons.tracing.grpc.enabledbooltrueprefer grpc over http
commons.tracing.grpc.endpointstring"tempo.monitoring.svc:4317"grpc endpoint
commons.tracing.grpc.insecurebooltrueallow insecure connection per grpc
commons.tracing.http.endpointstring"http://tempo.monitoring.svc:4318/v1/traces"http endpoint

Other Values

KeyTypeDefaultDescription
anubis.enabledboolfalse
anubis.env.SERVE_ROBOTS_TXTbooltrue
anubis.image.pullPolicystring"IfNotPresent"
anubis.image.registrystring"ghcr.io"
anubis.image.repositorystring"techarohq/anubis"
anubis.image.tagstring"v1.24.0"
anubis.ingress.annotationsobject{}
anubis.ingress.hostslist[]
anubis.podAnnotationsobject{}
anubis.policyobject{}
controllerstring"traefik"
externalbooltrue
grafana.dashboards.annotationsobject{}annotations of grafana dashboard configmap
hostNetworkbooltrue
init.namespacestring"bases"
init.versionint0
logs.accessboolfalse
traefik.additionalArgumentslist[]
traefik.hostPathstring"/srv/k8s/pv/pvc-traefik-certs"
traefik.logs.additionalMetricslist[]
traefik.logs.additionalSinksobject{}
traefik.logs.additionalTransformsobject{}you could use the source otlp.logs to recieve access-logs and work with them
traefik.logs.geoip.enabledboolfalse
traefik.logs.geoip.urlstring"https://raw.githubusercontent.com/P3TERX/GeoLite.mmdb/download/GeoLite2-City.mmdb"
traefik.logs.metricsboolfalseanalyse logs to metrics
traefik.portsobject{}

Autogenerated from chart metadata using helm-docs