[add swarmpit]
This commit is contained in:
60
swarm.yml
60
swarm.yml
@@ -236,62 +236,6 @@
|
|||||||
- "traefik.http.middlewares.redirect-to-https.redirectscheme.scheme=https"
|
- "traefik.http.middlewares.redirect-to-https.redirectscheme.scheme=https"
|
||||||
- "traefik.http.middlewares.privatevpn.ipwhitelist.sourcerange=100.96.0.0/16"
|
- "traefik.http.middlewares.privatevpn.ipwhitelist.sourcerange=100.96.0.0/16"
|
||||||
- "traefik.http.routers.dashboard.middlewares=privatevpn"
|
- "traefik.http.routers.dashboard.middlewares=privatevpn"
|
||||||
# agent:
|
|
||||||
# image: portainer/agent:latest
|
|
||||||
# environment:
|
|
||||||
# # REQUIRED: Should be equal to the service name prefixed by "tasks." when
|
|
||||||
# # deployed inside an overlay network
|
|
||||||
# AGENT_CLUSTER_ADDR: tasks.agent
|
|
||||||
# AGENT_PORT: 9001
|
|
||||||
# LOG_LEVEL: DEBUG
|
|
||||||
# volumes:
|
|
||||||
# - /var/run/docker.sock:/var/run/docker.sock
|
|
||||||
# - /var/lib/docker/volumes:/var/lib/docker/volumes
|
|
||||||
# networks:
|
|
||||||
# - agent_network
|
|
||||||
# labels:
|
|
||||||
# - "io.portainer.accesscontrol.public"
|
|
||||||
# deploy:
|
|
||||||
# mode: global
|
|
||||||
# placement:
|
|
||||||
# constraints: [node.platform.os == linux]
|
|
||||||
# labels:
|
|
||||||
# - "io.portainer.accesscontrol.public"
|
|
||||||
# # Frontend
|
|
||||||
# - "traefik.enable=false"
|
|
||||||
|
|
||||||
# portainer:
|
|
||||||
# image: portainer/portainer-ce:latest
|
|
||||||
# command: -H tcp://tasks.agent:9001 --tlsskipverify
|
|
||||||
# volumes:
|
|
||||||
# - portainer_data:/data
|
|
||||||
# - /var/run/docker.sock:/var/run/docker.sock:ro
|
|
||||||
# networks:
|
|
||||||
# - public
|
|
||||||
# - agent_network
|
|
||||||
# deploy:
|
|
||||||
# mode: replicated
|
|
||||||
# replicas: 1
|
|
||||||
# placement:
|
|
||||||
# constraints: [node.role == manager]
|
|
||||||
# labels:
|
|
||||||
# - "io.portainer.accesscontrol.public"
|
|
||||||
# # Frontend
|
|
||||||
# - "traefik.enable=true"
|
|
||||||
# - "traefik.docker.network=public"
|
|
||||||
# - "traefik.http.routers.frontend.rule=Host(`portainer.jingoh.private`)"
|
|
||||||
# - "traefik.http.routers.frontend.entrypoints=websecure"
|
|
||||||
# - "traefik.http.services.frontend.loadbalancer.server.port=9000"
|
|
||||||
# - "traefik.http.routers.frontend.service=frontend"
|
|
||||||
# - "traefik.http.routers.frontend.tls=true"
|
|
||||||
# - "traefik.http.routers.frontend.middlewares=privatevpn"
|
|
||||||
# # Edge
|
|
||||||
# - "traefik.http.routers.edge.rule=Host(`edge.jingoh.private`)"
|
|
||||||
# - "traefik.http.routers.edge.entrypoints=websecure"
|
|
||||||
# - "traefik.http.services.edge.loadbalancer.server.port=8000"
|
|
||||||
# - "traefik.http.routers.edge.service=edge"
|
|
||||||
# - "traefik.http.routers.edge.tls=true"
|
|
||||||
# - "traefik.http.routers.edge.middlewares=privatevpn"
|
|
||||||
whoami:
|
whoami:
|
||||||
image: "traefik/whoami"
|
image: "traefik/whoami"
|
||||||
deploy:
|
deploy:
|
||||||
@@ -429,16 +373,12 @@
|
|||||||
volumes:
|
volumes:
|
||||||
db-data:
|
db-data:
|
||||||
influx-data:
|
influx-data:
|
||||||
|
|
||||||
|
|
||||||
configs:
|
configs:
|
||||||
traefik-dynamic-configuration:
|
traefik-dynamic-configuration:
|
||||||
external: true
|
external: true
|
||||||
|
|
||||||
secrets:
|
secrets:
|
||||||
wildcard-jingoh-private.crt:
|
wildcard-jingoh-private.crt:
|
||||||
external: true
|
external: true
|
||||||
|
|
||||||
wildcard-jingoh-private.key:
|
wildcard-jingoh-private.key:
|
||||||
external: true
|
external: true
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user