k8s-manifests/argocd/ingresses.yaml

31 lines
1.2 KiB
YAML

apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
annotations:
cert-manager.io/cluster-issuer: letsencrypt-prod
kubectl.kubernetes.io/last-applied-configuration: '{"apiVersion":"networking.k8s.io/v1","kind":"Ingress","metadata":{"annotations":{"cert-manager.io/cluster-issuer":"letsencrypt-prod","traefik.ingress.kubernetes.io/router.entrypoints":"web,websecure","traefik.ingress.kubernetes.io/router.tls":"true"},"name":"argocd-server","namespace":"argocd"},"spec":{"ingressClassName":"traefik","rules":[{"host":"argocd.chemavx.xyz","http":{"paths":[{"backend":{"service":{"name":"argocd-server","port":{"number":80}}},"path":"/","pathType":"Prefix"}]}}],"tls":[{"hosts":["argocd.chemavx.xyz"],"secretName":"argocd-tls"}]}}
'
traefik.ingress.kubernetes.io/router.entrypoints: web,websecure
traefik.ingress.kubernetes.io/router.tls: 'true'
name: argocd-server
namespace: argocd
spec:
ingressClassName: traefik
rules:
- host: argocd.chemavx.xyz
http:
paths:
- backend:
service:
name: argocd-server
port:
number: 80
path: /
pathType: Prefix
tls:
- hosts:
- argocd.chemavx.xyz
secretName: argocd-tls