Traefik Integration
Appears in
.Values.service.$name.integration.traefik
enabled
Enables or Disables the traefik integration
| Key | service.$name.integrations.traefik.enabled |
| Type | bool |
| Required | ❌ |
Helm tpl | ❌ |
| Default | false |
Example
service: service-name: integrations: traefik: enabled: trueforceTLS
Force TLS when talking to the backend service
| Key | service.$name.integrations.traefik.forceTLS |
| Type | bool |
| Required | ❌ |
Helm tpl | ❌ |
| Default | false |
Example
service: service-name: integrations: traefik: forceTLS: trueinsecureSkipVerify
Skip TLS verification when taling to an HTTPS backend service
| Key | service.$name.integrations.traefik.insecureSkipVerify |
| Type | bool |
| Required | ❌ |
Helm tpl | ❌ |
| Default | false |
Example
service: service-name: integrations: traefik: insecureSkipVerify: falseserverName
Set the hostname to use when talking to a backend service
| Key | service.$name.integrations.traefik.serverName |
| Type | string |
| Required | ❌ |
Helm tpl | ❌ |
| Default | "" |
Example
service: service-name: integrations: traefik: serverName: "my.service.com"rootCAs
List of kubernetes secrets (in the same namespace) containing certificate authorities to use when performing TLS verification of the backend service.
| Key | service.$name.integrations.traefik.rootCAs |
| Type | list of map |
| Required | ❌ |
Helm tpl | ❌ |
| Default | [] |
Example
service: service-name: integrations: traefik: rootCAs: []rootCAs.secretRef
Define the secretRef
| Key | service.$name.integrations.traefik.rootCAs[].secretRef |
| Type | map |
| Required | ❌ |
Helm tpl | ❌ |
| Default | {} |
Example
service: service-name: integrations: traefik: rootCAs: - secretRef: {}rootCAs.secretRef.name
Define the secret name
| Key | service.$name.integrations.traefik.rootCAs[].secretRef.name |
| Type | string |
| Required | ✅ |
Helm tpl | ✅ |
| Default | "" |
Example
service: service-name: integrations: traefik: rootCAs: - secretRef: name: secret-namerootCAs.secretRef.expandObjectName
Whether to expand (adding the fullname as prefix) the secret name
| Key | service.$name.integrations.traefik.rootCAs[].secretRef.expandObjectName |
| Type | bool |
| Required | ❌ |
Helm tpl | ❌ |
| Default | true |
Example
service: service-name: integrations: traefik: rootCAs: - secretRef: name: secret-name expandObjectName: falserootCAs.configMapRef
Define the configMapRef
| Key | service.$name.integrations.traefik.rootCAs[].configMapRef |
| Type | map |
| Required | ❌ |
Helm tpl | ❌ |
| Default | {} |
Example
service: service-name: integrations: traefik: rootCAs: - configMapRef: {}rootCAs.configMapRef.name
Define the configmap name
| Key | service.$name.integrations.traefik.rootCAs[].configMapRef.name |
| Type | string |
| Required | ✅ |
Helm tpl | ✅ |
| Default | "" |
Example
service: service-name: integrations: traefik: rootCAs: - configMapRef: name: configmap-namerootCAs.configMapRef.expandObjectName
Whether to expand (adding the fullname as prefix) the configmap name
| Key | service.$name.integrations.traefik.rootCAs[].configMapRef.expandObjectName |
| Type | bool |
| Required | ❌ |
Helm tpl | ❌ |
| Default | true |
Example
service: service-name: integrations: traefik: rootCAs: - configMapRef: name: configmap-name expandObjectName: falseFull Examples
service: service-name: integrations: traefik: enabled: true forceTLS: true insecureSkipVerify: false serverName: "my.service.com" rootCAs: - configMapRef: name: configmap-name expandObjectName: false - secretRef: name: secret-name expandObjectName: true