Compare commits
No commits in common. "c388a9c8e310785bdd1bc609c0a5db34b7da57a0" and "a1ec506af983a122339a2b67870306fdcfdf40d6" have entirely different histories.
c388a9c8e3
...
a1ec506af9
@ -1,48 +0,0 @@
|
||||
apiVersion: postgresql.cnpg.io/v1
|
||||
kind: Cluster
|
||||
metadata:
|
||||
name: gitea-db
|
||||
namespace: gitea
|
||||
|
||||
spec:
|
||||
instances: 2
|
||||
|
||||
storage:
|
||||
size: 1Gi
|
||||
storageClass: local-path
|
||||
|
||||
bootstrap:
|
||||
recovery:
|
||||
source: gitea-db
|
||||
|
||||
postgresql:
|
||||
pg_hba:
|
||||
- host all all all md5
|
||||
|
||||
externalClusters:
|
||||
- name: gitea-db
|
||||
barmanObjectStore:
|
||||
serverName: gitea-db
|
||||
destinationPath: "s3://halis/cloudnativepg"
|
||||
endpointURL: https://s3.halia.dev
|
||||
s3Credentials:
|
||||
accessKeyId:
|
||||
name: s3-secret
|
||||
key: AWS_ACCESS_KEY_ID
|
||||
secretAccessKey:
|
||||
name: s3-secret
|
||||
key: AWS_SECRET_ACCESS_KEY
|
||||
region:
|
||||
name: s3-secret
|
||||
key: AWS_REGION
|
||||
wal:
|
||||
compression: gzip
|
||||
maxParallel: 8
|
||||
|
||||
resources:
|
||||
requests:
|
||||
cpu: 100m
|
||||
memory: 100Mi
|
||||
limits:
|
||||
cpu: 500m
|
||||
memory: 500Mi
|
@ -9,7 +9,7 @@ spec:
|
||||
|
||||
storage:
|
||||
size: 1Gi
|
||||
storageClass: local-path
|
||||
storageClass: redundant-storage-class
|
||||
|
||||
bootstrap:
|
||||
initdb:
|
||||
|
@ -1,28 +1,32 @@
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: replace-regex
|
||||
namespace: gitea
|
||||
spec:
|
||||
replacePathRegex:
|
||||
regex: "^/metrics"
|
||||
replacement: "/"
|
||||
|
||||
---
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: gitea-ingress
|
||||
namespace: gitea
|
||||
annotations:
|
||||
cert-manager.io/cluster-issuer: letsencrypt-production
|
||||
kubernetes.io/ingress.class: nginx-external
|
||||
acme.cert-manager.io/http01-edit-in-place: "true"
|
||||
nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||
rewrite ^/metrics(/?)$ https://git.halis.io/$1 permanent;
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
cert-manager.io/cluster-issuer: "letsencrypt-production"
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`git.halis.io`) && PathPrefix(`/`)
|
||||
kind: Rule
|
||||
middlewares:
|
||||
- name: replace-regex
|
||||
services:
|
||||
- name: gitea-svc
|
||||
port: 80
|
||||
tls:
|
||||
- hosts:
|
||||
- git.halis.io
|
||||
secretName: git-halis-io-tls
|
||||
ingressClassName: nginx-external
|
||||
rules:
|
||||
- host: git.halis.io
|
||||
http:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
backend:
|
||||
service:
|
||||
name: gitea-svc
|
||||
port:
|
||||
number: 80
|
||||
|
@ -9,6 +9,7 @@ resources:
|
||||
- service.yaml
|
||||
- servicemonitor.yaml
|
||||
- ingress.yaml
|
||||
- certificate.yaml
|
||||
- configmap.yaml
|
||||
- admin-creator.yaml
|
||||
- pvc.yaml
|
||||
|
@ -3,9 +3,6 @@ kind: PersistentVolumeClaim
|
||||
metadata:
|
||||
name: gitea-pvc
|
||||
namespace: gitea
|
||||
labels:
|
||||
recurring-job.longhorn.io/source: enabled
|
||||
recurring-job-group.longhorn.io/standard-pvc: enabled
|
||||
spec:
|
||||
accessModes:
|
||||
- ReadWriteMany
|
||||
|
Loading…
Reference in New Issue
Block a user