docs(argo-cd): Moved documentation for AWS ALB (#1539)
Signed-off-by: Petr Drastil <petr.drastil@gmail.com>
This commit is contained in:
parent
6eaec3188a
commit
6fce9e7d9b
3 changed files with 46 additions and 49 deletions
|
@ -2,7 +2,7 @@ apiVersion: v2
|
||||||
appVersion: v2.4.15
|
appVersion: v2.4.15
|
||||||
description: A Helm chart for Argo CD, a declarative, GitOps continuous delivery tool for Kubernetes.
|
description: A Helm chart for Argo CD, a declarative, GitOps continuous delivery tool for Kubernetes.
|
||||||
name: argo-cd
|
name: argo-cd
|
||||||
version: 5.6.3
|
version: 5.6.4
|
||||||
home: https://github.com/argoproj/argo-helm
|
home: https://github.com/argoproj/argo-helm
|
||||||
icon: https://argo-cd.readthedocs.io/en/stable/assets/logo.png
|
icon: https://argo-cd.readthedocs.io/en/stable/assets/logo.png
|
||||||
sources:
|
sources:
|
||||||
|
@ -22,4 +22,4 @@ dependencies:
|
||||||
condition: redis-ha.enabled
|
condition: redis-ha.enabled
|
||||||
annotations:
|
annotations:
|
||||||
artifacthub.io/changes: |
|
artifacthub.io/changes: |
|
||||||
- "[Changed]: Renamed metrics service templates to metrics.yaml"
|
- "[Fixed]: Documentation for AWS ALB should relate to Server component"
|
||||||
|
|
|
@ -698,6 +698,28 @@ NAME: my-release
|
||||||
| server.volumeMounts | list | `[]` | Additional volumeMounts to the server main container |
|
| server.volumeMounts | list | `[]` | Additional volumeMounts to the server main container |
|
||||||
| server.volumes | list | `[]` | Additional volumes to the server pod |
|
| server.volumes | list | `[]` | Additional volumes to the server pod |
|
||||||
|
|
||||||
|
### Using AWS ALB Ingress Controller With GRPC
|
||||||
|
|
||||||
|
If you are using an AWS ALB Ingress controller, you will need to set `server.ingressGrpc.isAWSALB` to `true`. This will create a second service with the annotation `alb.ingress.kubernetes.io/backend-protocol-version: HTTP2` and modify the server ingress to add a condition annotation to route GRPC traffic to the new service.
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
server:
|
||||||
|
ingress:
|
||||||
|
enabled: true
|
||||||
|
annotations:
|
||||||
|
alb.ingress.kubernetes.io/backend-protocol: HTTPS
|
||||||
|
alb.ingress.kubernetes.io/listen-ports: '[{"HTTPS":443}]'
|
||||||
|
alb.ingress.kubernetes.io/scheme: internal
|
||||||
|
alb.ingress.kubernetes.io/target-type: ip
|
||||||
|
ingressGrpc:
|
||||||
|
enabled: true
|
||||||
|
isAWSALB: true
|
||||||
|
awsALB:
|
||||||
|
serviceType: ClusterIP
|
||||||
|
```
|
||||||
|
|
||||||
## Dex
|
## Dex
|
||||||
|
|
||||||
| Key | Type | Default | Description |
|
| Key | Type | Default | Description |
|
||||||
|
@ -1027,29 +1049,6 @@ If you want to use an existing Redis (eg. a managed service from a cloud provide
|
||||||
| notifications.tolerations | list | `[]` | [Tolerations] for use with node taints |
|
| notifications.tolerations | list | `[]` | [Tolerations] for use with node taints |
|
||||||
| notifications.triggers | object | `{}` | The trigger defines the condition when the notification should be sent |
|
| notifications.triggers | object | `{}` | The trigger defines the condition when the notification should be sent |
|
||||||
|
|
||||||
### Using AWS ALB Ingress Controller With GRPC
|
|
||||||
|
|
||||||
If you are using an AWS ALB Ingress controller, you will need to set `server.ingressGrpc.isAWSALB` to `true`. This will create a second service with the annotation `alb.ingress.kubernetes.io/backend-protocol-version: HTTP2` and modify the server ingress to add a condition annotation to route GRPC traffic to the new service.
|
|
||||||
|
|
||||||
Example:
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
server:
|
|
||||||
ingress:
|
|
||||||
enabled: true
|
|
||||||
annotations:
|
|
||||||
alb.ingress.kubernetes.io/backend-protocol: HTTPS
|
|
||||||
alb.ingress.kubernetes.io/listen-ports: '[{"HTTPS":443}]'
|
|
||||||
alb.ingress.kubernetes.io/scheme: internal
|
|
||||||
alb.ingress.kubernetes.io/target-type: ip
|
|
||||||
ingressGrpc:
|
|
||||||
enabled: true
|
|
||||||
isAWSALB: true
|
|
||||||
awsALB:
|
|
||||||
serviceType: ClusterIP
|
|
||||||
|
|
||||||
```
|
|
||||||
|
|
||||||
----------------------------------------------
|
----------------------------------------------
|
||||||
Autogenerated from chart metadata using [helm-docs](https://github.com/norwoodj/helm-docs)
|
Autogenerated from chart metadata using [helm-docs](https://github.com/norwoodj/helm-docs)
|
||||||
|
|
||||||
|
|
|
@ -381,6 +381,28 @@ NAME: my-release
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
||||||
|
### Using AWS ALB Ingress Controller With GRPC
|
||||||
|
|
||||||
|
If you are using an AWS ALB Ingress controller, you will need to set `server.ingressGrpc.isAWSALB` to `true`. This will create a second service with the annotation `alb.ingress.kubernetes.io/backend-protocol-version: HTTP2` and modify the server ingress to add a condition annotation to route GRPC traffic to the new service.
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
server:
|
||||||
|
ingress:
|
||||||
|
enabled: true
|
||||||
|
annotations:
|
||||||
|
alb.ingress.kubernetes.io/backend-protocol: HTTPS
|
||||||
|
alb.ingress.kubernetes.io/listen-ports: '[{"HTTPS":443}]'
|
||||||
|
alb.ingress.kubernetes.io/scheme: internal
|
||||||
|
alb.ingress.kubernetes.io/target-type: ip
|
||||||
|
ingressGrpc:
|
||||||
|
enabled: true
|
||||||
|
isAWSALB: true
|
||||||
|
awsALB:
|
||||||
|
serviceType: ClusterIP
|
||||||
|
```
|
||||||
|
|
||||||
## Dex
|
## Dex
|
||||||
|
|
||||||
| Key | Type | Default | Description |
|
| Key | Type | Default | Description |
|
||||||
|
@ -454,30 +476,6 @@ If you want to use an existing Redis (eg. a managed service from a cloud provide
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
||||||
|
|
||||||
### Using AWS ALB Ingress Controller With GRPC
|
|
||||||
|
|
||||||
If you are using an AWS ALB Ingress controller, you will need to set `server.ingressGrpc.isAWSALB` to `true`. This will create a second service with the annotation `alb.ingress.kubernetes.io/backend-protocol-version: HTTP2` and modify the server ingress to add a condition annotation to route GRPC traffic to the new service.
|
|
||||||
|
|
||||||
Example:
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
server:
|
|
||||||
ingress:
|
|
||||||
enabled: true
|
|
||||||
annotations:
|
|
||||||
alb.ingress.kubernetes.io/backend-protocol: HTTPS
|
|
||||||
alb.ingress.kubernetes.io/listen-ports: '[{"HTTPS":443}]'
|
|
||||||
alb.ingress.kubernetes.io/scheme: internal
|
|
||||||
alb.ingress.kubernetes.io/target-type: ip
|
|
||||||
ingressGrpc:
|
|
||||||
enabled: true
|
|
||||||
isAWSALB: true
|
|
||||||
awsALB:
|
|
||||||
serviceType: ClusterIP
|
|
||||||
|
|
||||||
```
|
|
||||||
|
|
||||||
----------------------------------------------
|
----------------------------------------------
|
||||||
Autogenerated from chart metadata using [helm-docs](https://github.com/norwoodj/helm-docs)
|
Autogenerated from chart metadata using [helm-docs](https://github.com/norwoodj/helm-docs)
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue