infrastructure/ansible/roles/traefik/files/traefik.yml

88 lines
1.6 KiB
YAML
Raw Normal View History

2020-02-02 21:10:29 +00:00
entryPoints:
web:
2020-06-18 20:49:12 +01:00
address: :80
http:
redirections:
entryPoint:
to: web-secure
scheme: https
2020-02-02 21:10:29 +00:00
proxyProtocol:
trustedIPs:
- "{{ wireguard.cidr }}"
- "{{ pve_hosts.internal_cidr }}"
- "{{ nebula.cidr }}"
2020-02-02 21:10:29 +00:00
web-secure:
2020-06-18 20:49:12 +01:00
address: :443
http:
middlewares:
- tls-redirect@file
2020-02-02 21:10:29 +00:00
proxyProtocol:
trustedIPs:
- "{{ wireguard.cidr }}"
- "{{ pve_hosts.internal_cidr }}"
- "{{ nebula.cidr }}"
2020-02-02 21:10:29 +00:00
matrix:
2020-06-18 20:49:12 +01:00
address: :8448
http:
middlewares:
- tls-redirect@file
2020-02-02 21:10:29 +00:00
proxyProtocol:
trustedIPs:
- "{{ wireguard.cidr }}"
- "{{ pve_hosts.internal_cidr }}"
- "{{ nebula.cidr }}"
traefik:
address: "{{ private_ip }}:8080"
2020-02-02 21:10:29 +00:00
2020-04-25 12:15:28 +01:00
ping: {}
2020-02-02 21:10:29 +00:00
providers:
docker:
2020-03-25 21:27:15 +00:00
endpoint: unix:///var/run/docker.sock
2020-02-02 21:10:29 +00:00
watch: true
exposedByDefault: false
file:
directory: /etc/traefik/conf
{% if with_traefik_pages %}
http:
endpoint:
- "http://{{ traefik_pages_password }}@127.0.0.1:5000/.traefik-pages/provider"
{% endif %}
2020-02-02 21:10:29 +00:00
api:
dashboard: true
2020-04-25 12:15:28 +01:00
insecure: true
2020-02-02 21:10:29 +00:00
certificatesResolvers:
le:
acme:
2021-02-14 12:29:14 +00:00
email: "{{ letsencrypt_email }}"
2020-03-25 21:27:15 +00:00
storage: /etc/traefik/acme.json
dnsChallenge:
provider: cloudflare
2020-09-05 20:33:57 +01:00
delayBeforeCheck: 0
resolvers:
- 1.1.1.1:53
- 1.0.0.1:53
serversTransport:
insecureSkipVerify: true
2020-08-30 15:58:03 +01:00
metrics:
prometheus:
entryPoint: traefik
2020-09-27 12:36:49 +01:00
tls:
options:
default:
minVersion: VersionTLS12
2021-03-24 23:14:01 +00:00
pilot:
dashboard: false
accessLog:
filePath: "/var/log/traefik/access.log"
filters:
statusCodes:
- "400-600"