Traefik Integration
Appears in
.Values.service.$name.integration.traefik
enabled
Enables or Disables the traefik integration
Key | service.$name.integrations.traefik.enabled |
Type | bool |
Required | ❌ |
Helm tpl | ❌ |
Default | false |
Example
service: service-name: integrations: traefik: enabled: true
forceTLS
Force TLS when talking to the backend service
Key | service.$name.integrations.traefik.forceTLS |
Type | bool |
Required | ❌ |
Helm tpl | ❌ |
Default | false |
Example
service: service-name: integrations: traefik: forceTLS: true
insecureSkipVerify
Skip TLS verification when taling to an HTTPS backend service
Key | service.$name.integrations.traefik.insecureSkipVerify |
Type | bool |
Required | ❌ |
Helm tpl | ❌ |
Default | false |
Example
service: service-name: integrations: traefik: insecureSkipVerify: false
serverName
Set the hostname to use when talking to a backend service
Key | service.$name.integrations.traefik.serverName |
Type | string |
Required | ❌ |
Helm tpl | ❌ |
Default | "" |
Example
service: service-name: integrations: traefik: serverName: "my.service.com"
rootCAs
List of kubernetes secrets (in the same namespace) containing certificate authorities to use when performing TLS verification of the backend service.
Key | service.$name.integrations.traefik.rootCAs |
Type | list of map |
Required | ❌ |
Helm tpl | ❌ |
Default | [] |
Example
service: service-name: integrations: traefik: rootCAs: []
rootCAs.secretRef
Define the secretRef
Key | service.$name.integrations.traefik.rootCAs[].secretRef |
Type | map |
Required | ❌ |
Helm tpl | ❌ |
Default | {} |
Example
service: service-name: integrations: traefik: rootCAs: - secretRef: {}
rootCAs.secretRef.name
Define the secret name
Key | service.$name.integrations.traefik.rootCAs[].secretRef.name |
Type | string |
Required | ✅ |
Helm tpl | ✅ |
Default | "" |
Example
service: service-name: integrations: traefik: rootCAs: - secretRef: name: secret-name
rootCAs.secretRef.expandObjectName
Whether to expand (adding the fullname as prefix) the secret name
Key | service.$name.integrations.traefik.rootCAs[].secretRef.expandObjectName |
Type | bool |
Required | ❌ |
Helm tpl | ❌ |
Default | true |
Example
service: service-name: integrations: traefik: rootCAs: - secretRef: name: secret-name expandObjectName: false
rootCAs.configMapRef
Define the configMapRef
Key | service.$name.integrations.traefik.rootCAs[].configMapRef |
Type | map |
Required | ❌ |
Helm tpl | ❌ |
Default | {} |
Example
service: service-name: integrations: traefik: rootCAs: - configMapRef: {}
rootCAs.configMapRef.name
Define the configmap name
Key | service.$name.integrations.traefik.rootCAs[].configMapRef.name |
Type | string |
Required | ✅ |
Helm tpl | ✅ |
Default | "" |
Example
service: service-name: integrations: traefik: rootCAs: - configMapRef: name: configmap-name
rootCAs.configMapRef.expandObjectName
Whether to expand (adding the fullname as prefix) the configmap name
Key | service.$name.integrations.traefik.rootCAs[].configMapRef.expandObjectName |
Type | bool |
Required | ❌ |
Helm tpl | ❌ |
Default | true |
Example
service: service-name: integrations: traefik: rootCAs: - configMapRef: name: configmap-name expandObjectName: false
Full Examples
service: service-name: integrations: traefik: enabled: true forceTLS: true insecureSkipVerify: false serverName: "my.service.com" rootCAs: - configMapRef: name: configmap-name expandObjectName: false - secretRef: name: secret-name expandObjectName: true