Traefik Integration
Appears in
Section titled “Appears in”.Values.service.$name.integration.traefik
enabled
Section titled “enabled”Enables or Disables the traefik integration
Key | service.$name.integrations.traefik.enabled |
Type | bool |
Required | ❌ |
Helm tpl | ❌ |
Default | false |
Example
service: service-name: integrations: traefik: enabled: true
forceTLS
Section titled “forceTLS”Force TLS when talking to the backend service
Key | service.$name.integrations.traefik.forceTLS |
Type | bool |
Required | ❌ |
Helm tpl | ❌ |
Default | false |
Example
service: service-name: integrations: traefik: forceTLS: true
insecureSkipVerify
Section titled “insecureSkipVerify”Skip TLS verification when taling to an HTTPS backend service
Key | service.$name.integrations.traefik.insecureSkipVerify |
Type | bool |
Required | ❌ |
Helm tpl | ❌ |
Default | false |
Example
service: service-name: integrations: traefik: insecureSkipVerify: false
serverName
Section titled “serverName”Set the hostname to use when talking to a backend service
Key | service.$name.integrations.traefik.serverName |
Type | string |
Required | ❌ |
Helm tpl | ❌ |
Default | "" |
Example
service: service-name: integrations: traefik: serverName: "my.service.com"
rootCAs
Section titled “rootCAs”List of kubernetes secrets (in the same namespace) containing certificate authorities to use when performing TLS verification of the backend service.
Key | service.$name.integrations.traefik.rootCAs |
Type | list of map |
Required | ❌ |
Helm tpl | ❌ |
Default | [] |
Example
service: service-name: integrations: traefik: rootCAs: []
rootCAs.secretRef
Section titled “rootCAs.secretRef”Define the secretRef
Key | service.$name.integrations.traefik.rootCAs[].secretRef |
Type | map |
Required | ❌ |
Helm tpl | ❌ |
Default | {} |
Example
service: service-name: integrations: traefik: rootCAs: - secretRef: {}
rootCAs.secretRef.name
Section titled “rootCAs.secretRef.name”Define the secret name
Key | service.$name.integrations.traefik.rootCAs[].secretRef.name |
Type | string |
Required | ✅ |
Helm tpl | ✅ |
Default | "" |
Example
service: service-name: integrations: traefik: rootCAs: - secretRef: name: secret-name
rootCAs.secretRef.expandObjectName
Section titled “rootCAs.secretRef.expandObjectName”Whether to expand (adding the fullname as prefix) the secret name
Key | service.$name.integrations.traefik.rootCAs[].secretRef.expandObjectName |
Type | bool |
Required | ❌ |
Helm tpl | ❌ |
Default | true |
Example
service: service-name: integrations: traefik: rootCAs: - secretRef: name: secret-name expandObjectName: false
rootCAs.configMapRef
Section titled “rootCAs.configMapRef”Define the configMapRef
Key | service.$name.integrations.traefik.rootCAs[].configMapRef |
Type | map |
Required | ❌ |
Helm tpl | ❌ |
Default | {} |
Example
service: service-name: integrations: traefik: rootCAs: - configMapRef: {}
rootCAs.configMapRef.name
Section titled “rootCAs.configMapRef.name”Define the configmap name
Key | service.$name.integrations.traefik.rootCAs[].configMapRef.name |
Type | string |
Required | ✅ |
Helm tpl | ✅ |
Default | "" |
Example
service: service-name: integrations: traefik: rootCAs: - configMapRef: name: configmap-name
rootCAs.configMapRef.expandObjectName
Section titled “rootCAs.configMapRef.expandObjectName”Whether to expand (adding the fullname as prefix) the configmap name
Key | service.$name.integrations.traefik.rootCAs[].configMapRef.expandObjectName |
Type | bool |
Required | ❌ |
Helm tpl | ❌ |
Default | true |
Example
service: service-name: integrations: traefik: rootCAs: - configMapRef: name: configmap-name expandObjectName: false
Full Examples
Section titled “Full Examples”service: service-name: integrations: traefik: enabled: true forceTLS: true insecureSkipVerify: false serverName: "my.service.com" rootCAs: - configMapRef: name: configmap-name expandObjectName: false - secretRef: name: secret-name expandObjectName: true