diff --git a/swarm.yml b/swarm.yml index f3facc3..e6d04cc 100644 --- a/swarm.yml +++ b/swarm.yml @@ -231,62 +231,62 @@ - "traefik.http.middlewares.privatevpn.ipwhitelist.sourcerange=100.96.0.0/16" - "io.portainer.accesscontrol.public" - "traefik.http.routers.dashboard.middlewares=privatevpn" - agent: - image: portainer/agent:latest - environment: - # REQUIRED: Should be equal to the service name prefixed by "tasks." when - # deployed inside an overlay network - AGENT_CLUSTER_ADDR: tasks.agent - AGENT_PORT: 9001 - LOG_LEVEL: DEBUG - volumes: - - /var/run/docker.sock:/var/run/docker.sock - - /var/lib/docker/volumes:/var/lib/docker/volumes - networks: - - agent_network - labels: - - "io.portainer.accesscontrol.public" - deploy: - mode: global - placement: - constraints: [node.platform.os == linux] - labels: - - "io.portainer.accesscontrol.public" - # Frontend - - "traefik.enable=false" + # agent: + # image: portainer/agent:latest + # environment: + # # REQUIRED: Should be equal to the service name prefixed by "tasks." when + # # deployed inside an overlay network + # AGENT_CLUSTER_ADDR: tasks.agent + # AGENT_PORT: 9001 + # LOG_LEVEL: DEBUG + # volumes: + # - /var/run/docker.sock:/var/run/docker.sock + # - /var/lib/docker/volumes:/var/lib/docker/volumes + # networks: + # - agent_network + # labels: + # - "io.portainer.accesscontrol.public" + # deploy: + # mode: global + # placement: + # constraints: [node.platform.os == linux] + # labels: + # - "io.portainer.accesscontrol.public" + # # Frontend + # - "traefik.enable=false" - portainer: - image: portainer/portainer-ce:latest - command: -H tcp://tasks.agent:9001 --tlsskipverify - volumes: - - portainer_data:/data - - /var/run/docker.sock:/var/run/docker.sock:ro - networks: - - public - - agent_network - deploy: - mode: replicated - replicas: 1 - placement: - constraints: [node.role == manager] - labels: - - "io.portainer.accesscontrol.public" - # Frontend - - "traefik.enable=true" - - "traefik.docker.network=public" - - "traefik.http.routers.frontend.rule=Host(`portainer.jingoh.private`)" - - "traefik.http.routers.frontend.entrypoints=websecure" - - "traefik.http.services.frontend.loadbalancer.server.port=9000" - - "traefik.http.routers.frontend.service=frontend" - - "traefik.http.routers.frontend.tls=true" - - "traefik.http.routers.frontend.middlewares=privatevpn" - # Edge - - "traefik.http.routers.edge.rule=Host(`edge.jingoh.private`)" - - "traefik.http.routers.edge.entrypoints=websecure" - - "traefik.http.services.edge.loadbalancer.server.port=8000" - - "traefik.http.routers.edge.service=edge" - - "traefik.http.routers.edge.tls=true" - - "traefik.http.routers.edge.middlewares=privatevpn" + # portainer: + # image: portainer/portainer-ce:latest + # command: -H tcp://tasks.agent:9001 --tlsskipverify + # volumes: + # - portainer_data:/data + # - /var/run/docker.sock:/var/run/docker.sock:ro + # networks: + # - public + # - agent_network + # deploy: + # mode: replicated + # replicas: 1 + # placement: + # constraints: [node.role == manager] + # labels: + # - "io.portainer.accesscontrol.public" + # # Frontend + # - "traefik.enable=true" + # - "traefik.docker.network=public" + # - "traefik.http.routers.frontend.rule=Host(`portainer.jingoh.private`)" + # - "traefik.http.routers.frontend.entrypoints=websecure" + # - "traefik.http.services.frontend.loadbalancer.server.port=9000" + # - "traefik.http.routers.frontend.service=frontend" + # - "traefik.http.routers.frontend.tls=true" + # - "traefik.http.routers.frontend.middlewares=privatevpn" + # # Edge + # - "traefik.http.routers.edge.rule=Host(`edge.jingoh.private`)" + # - "traefik.http.routers.edge.entrypoints=websecure" + # - "traefik.http.services.edge.loadbalancer.server.port=8000" + # - "traefik.http.routers.edge.service=edge" + # - "traefik.http.routers.edge.tls=true" + # - "traefik.http.routers.edge.middlewares=privatevpn" whoami: image: "traefik/whoami" deploy: