From 52ec39de798206c42803ea40c458f819475058ff Mon Sep 17 00:00:00 2001 From: furyhawk Date: Sat, 28 Dec 2024 17:31:54 +0800 Subject: [PATCH] Refactor swarm configuration: Update Traefik network labels from 'traefik.docker.network' to 'traefik.swarm.network' across multiple service files --- .gitignore | 1 + swarm/adguardhome.yml | 2 +- swarm/api-server-deployment.yaml | 2 +- swarm/apps.yml | 18 +++++++++--------- swarm/authentik.yml | 2 +- swarm/core.yml | 2 +- swarm/docmost.yml | 2 +- swarm/dozzle-deployment.yaml | 2 +- swarm/emqx.yml | 4 ++-- swarm/ghost.yml | 2 +- swarm/librechat.yml | 2 +- swarm/local_core.yml | 2 +- swarm/mailserver.yml | 4 ++-- swarm/minio-common-deployment.yaml | 2 +- swarm/openwebui.yml | 2 +- swarm/osrm-backend-deployment.yaml | 2 +- swarm/outline.yml | 2 +- swarm/portainer.yml | 2 +- swarm/postgres-db-deployment.yaml | 2 +- swarm/registry.yml | 2 +- swarm/searxng-deployment.yaml | 2 +- swarm/searxng.yml | 2 +- swarm/secondary.yml | 10 +++++----- swarm/services.yml | 12 ++++++------ swarm/swarmpit.yml | 2 +- swarm/swarmprom.yml | 8 ++++---- swarm/thelounge.yml | 2 +- swarm/whoami-deployment.yaml | 2 +- 28 files changed, 50 insertions(+), 49 deletions(-) diff --git a/.gitignore b/.gitignore index 8f620a7..4734364 100644 --- a/.gitignore +++ b/.gitignore @@ -165,6 +165,7 @@ cython_debug/ # production.yml cache/ +config/ data-node/ meili_data*/ privatebin-data/ diff --git a/swarm/adguardhome.yml b/swarm/adguardhome.yml index e5215c5..692a49b 100644 --- a/swarm/adguardhome.yml +++ b/swarm/adguardhome.yml @@ -26,7 +26,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.tcp.routers.adguardhome_tcp.entrypoints=dns - traefik.tcp.routers.adguardhome_tcp.rule=HostSNI(`*`) diff --git a/swarm/api-server-deployment.yaml b/swarm/api-server-deployment.yaml index da22f24..aef8bf0 100644 --- a/swarm/api-server-deployment.yaml +++ b/swarm/api-server-deployment.yaml @@ -7,7 +7,7 @@ metadata: labels: io.kompose.service: api-server traefik.constraint-label: traefik-public - traefik.docker.network: traefik-public + traefik.swarm.network: traefik-public traefik.enable: "true" traefik.http.routers.api_server.entrypoints: https traefik.http.routers.api_server.rule: Host(`api.`) diff --git a/swarm/apps.yml b/swarm/apps.yml index 827d4f7..b7913bb 100644 --- a/swarm/apps.yml +++ b/swarm/apps.yml @@ -40,7 +40,7 @@ services: # - node.labels.adminer.pgadmin == true labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.adminer.entrypoints=https - traefik.http.routers.adminer.rule=Host(`adminer.${DOMAIN}`) || Host(`dbadmin.${DOMAIN}`) @@ -60,7 +60,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.cheatsheets.entrypoints=https - traefik.http.routers.cheatsheets.rule=Host(`cheat.${DOMAIN}`) @@ -83,7 +83,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.heynote.entrypoints=https - traefik.http.routers.heynote.rule=Host(`note.${DOMAIN}`) || Host(`note0.${DOMAIN}`) || Host(`note1.${DOMAIN}`) || Host(`note2.${DOMAIN}`) || Host(`note3.${DOMAIN}`) || Host(`pad.${DOMAIN}`) @@ -121,7 +121,7 @@ services: # - node.labels.jellyfin.jellyfin_cache == true labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.jellyfin.entrypoints=https - traefik.http.routers.jellyfin.rule=Host(`media.${DOMAIN}`) @@ -140,7 +140,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.meshtastic.entrypoints=https - traefik.http.routers.meshtastic.rule=Host(`mesh.${DOMAIN}`) @@ -164,7 +164,7 @@ services: # - node.labels.privatebin.privatebin_data == true labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.privatebin.entrypoints=https - traefik.http.routers.privatebin.rule=Host(`bin.${DOMAIN}`) || Host(`paste.${DOMAIN}`) @@ -185,7 +185,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.streamlit-bai.entrypoints=https - traefik.http.routers.streamlit-bai.rule=Host(`bai.${DOMAIN}`) @@ -203,7 +203,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.streamlit-fin.entrypoints=https - traefik.http.routers.streamlit-fin.rule=Host(`fin.${DOMAIN}`) @@ -224,7 +224,7 @@ services: # - node.labels.site.site_server == true labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.site_server.entrypoints=https - traefik.http.routers.site_server.rule=Host(`${DOMAIN}`) || Host(`www.${DOMAIN}`) || Host(`info.${DOMAIN}`) || Host(`124c41.${DOMAIN}`) diff --git a/swarm/authentik.yml b/swarm/authentik.yml index a6bdf50..e454cdd 100644 --- a/swarm/authentik.yml +++ b/swarm/authentik.yml @@ -79,7 +79,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.authentik-rtr.entrypoints=https - traefik.http.routers.authentik-rtr.rule=Host(`authentik.${DOMAIN}`) diff --git a/swarm/core.yml b/swarm/core.yml index c5f9df1..e830d0b 100644 --- a/swarm/core.yml +++ b/swarm/core.yml @@ -41,7 +41,7 @@ services: # Enable Traefik for this service, to make it available in the public network - traefik.enable=true # Use the traefik-public network (declared below) - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public # Use the custom label "traefik.constraint-label=traefik-public" # This public Traefik will only use services with this label # That way you can add other internal Traefik instances per stack if needed diff --git a/swarm/docmost.yml b/swarm/docmost.yml index e4c26b8..07c6615 100644 --- a/swarm/docmost.yml +++ b/swarm/docmost.yml @@ -30,7 +30,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.docmost.entrypoints=https - traefik.http.routers.docmost.rule=Host(`doc.${DOMAIN}`) diff --git a/swarm/dozzle-deployment.yaml b/swarm/dozzle-deployment.yaml index d4040be..84aa150 100644 --- a/swarm/dozzle-deployment.yaml +++ b/swarm/dozzle-deployment.yaml @@ -7,7 +7,7 @@ metadata: labels: io.kompose.service: dozzle traefik.constraint-label: traefik-public - traefik.docker.network: traefik-public + traefik.swarm.network: traefik-public traefik.enable: "true" traefik.http.routers.dozzle.entrypoints: https traefik.http.routers.dozzle.middlewares: admin-auth diff --git a/swarm/emqx.yml b/swarm/emqx.yml index 0a7d39d..2270493 100644 --- a/swarm/emqx.yml +++ b/swarm/emqx.yml @@ -29,7 +29,7 @@ services: # - node.labels.emqx1.emqx-data1 == true labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.tcp.routers.emqx1-tcp-mqtt.entrypoints=mqtt - traefik.tcp.routers.emqx1-tcp-mqtt.rule=HostSNI(`*`) @@ -68,7 +68,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.mqttx-web.entrypoints=https - traefik.http.routers.mqttx-web.rule=Host(`mqttx.${DOMAIN}`) diff --git a/swarm/ghost.yml b/swarm/ghost.yml index df2607b..e9a0b9d 100644 --- a/swarm/ghost.yml +++ b/swarm/ghost.yml @@ -48,7 +48,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.ghost.entrypoints=https - traefik.http.routers.ghost.rule=Host(`ghost.${DOMAIN}`) diff --git a/swarm/librechat.yml b/swarm/librechat.yml index 482a2cf..d4ab432 100644 --- a/swarm/librechat.yml +++ b/swarm/librechat.yml @@ -51,7 +51,7 @@ services: - node.labels.librechat.libre-logs == true labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.librechat.entrypoints=https - traefik.http.routers.librechat.rule=Host(`chat.${DOMAIN}`) diff --git a/swarm/local_core.yml b/swarm/local_core.yml index 8e90b38..b21f2c1 100644 --- a/swarm/local_core.yml +++ b/swarm/local_core.yml @@ -50,7 +50,7 @@ services: # Enable Traefik for this service, to make it available in the public network - traefik.enable=true # Use the traefik-public network (declared below) - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public # Use the custom label "traefik.constraint-label=traefik-public" # This public Traefik will only use services with this label # That way you can add other internal Traefik instances per stack if needed diff --git a/swarm/mailserver.yml b/swarm/mailserver.yml index ea866eb..96a850e 100644 --- a/swarm/mailserver.yml +++ b/swarm/mailserver.yml @@ -35,7 +35,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.mailwhoami.entrypoints=https - traefik.http.routers.mailwhoami.rule=Host(`mail.${DOMAIN}`) @@ -52,7 +52,7 @@ services: # deploy: # labels: # - traefik.enable=true - # - traefik.docker.network=traefik-public + # - traefik.swarm.network=traefik-public # - traefik.constraint-label=traefik-public # - traefik.http.routers.rainloop.entrypoints=https # - traefik.http.routers.rainloop.rule=Host(`webmail.${DOMAIN}`) diff --git a/swarm/minio-common-deployment.yaml b/swarm/minio-common-deployment.yaml index 06aebbb..cc97e7d 100644 --- a/swarm/minio-common-deployment.yaml +++ b/swarm/minio-common-deployment.yaml @@ -7,7 +7,7 @@ metadata: labels: io.kompose.service: minio-common traefik.constraint-label: traefik-public - traefik.docker.network: traefik-public + traefik.swarm.network: traefik-public traefik.enable: "true" traefik.http.routers.minio-api-router.entrypoints: https traefik.http.routers.minio-api-router.rule: Host(`minio.`) || Host(`s3.`) diff --git a/swarm/openwebui.yml b/swarm/openwebui.yml index 0d3f0db..c11378b 100644 --- a/swarm/openwebui.yml +++ b/swarm/openwebui.yml @@ -25,7 +25,7 @@ services: - node.labels.open_webui.open_webui == true labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.open_webui.entrypoints=https - traefik.http.routers.open_webui.rule=Host(`bot.${DOMAIN}`) diff --git a/swarm/osrm-backend-deployment.yaml b/swarm/osrm-backend-deployment.yaml index aa24ebf..51679ed 100644 --- a/swarm/osrm-backend-deployment.yaml +++ b/swarm/osrm-backend-deployment.yaml @@ -7,7 +7,7 @@ metadata: labels: io.kompose.service: osrm-backend traefik.constraint-label: traefik-public - traefik.docker.network: traefik-public + traefik.swarm.network: traefik-public traefik.enable: "true" traefik.http.routers.osrm-backend.entrypoints: https traefik.http.routers.osrm-backend.middlewares: rate-limit diff --git a/swarm/outline.yml b/swarm/outline.yml index 9869bd2..3f62cf4 100644 --- a/swarm/outline.yml +++ b/swarm/outline.yml @@ -55,7 +55,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.outline-rtr.entrypoints=https - traefik.http.routers.outline-rtr.rule=Host(`outline.${DOMAIN}`) diff --git a/swarm/portainer.yml b/swarm/portainer.yml index 2879588..5d5bc7e 100644 --- a/swarm/portainer.yml +++ b/swarm/portainer.yml @@ -29,7 +29,7 @@ services: - node.labels.portainer.portainer-data == true labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.portainer-https.entrypoints=https - traefik.http.routers.portainer-https.rule=Host(`port.${DOMAIN?Variable not set}`) || Host(`portainer.${DOMAIN?Variable not set}`) diff --git a/swarm/postgres-db-deployment.yaml b/swarm/postgres-db-deployment.yaml index 174761a..8f798a3 100644 --- a/swarm/postgres-db-deployment.yaml +++ b/swarm/postgres-db-deployment.yaml @@ -7,7 +7,7 @@ metadata: labels: io.kompose.service: postgres-db traefik.constraint-label: traefik-public - traefik.docker.network: traefik-public + traefik.swarm.network: traefik-public traefik.enable: "true" traefik.tcp.routers.postgres.entrypoints: postgres-socket traefik.tcp.routers.postgres.rule: HostSNI(`*`) diff --git a/swarm/registry.yml b/swarm/registry.yml index 1e21291..885f8d5 100644 --- a/swarm/registry.yml +++ b/swarm/registry.yml @@ -7,7 +7,7 @@ services: deploy: labels: - traefik.frontend.rule=Host:register.${DOMAIN?Variable not set} - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.port=5000 ports: - 5000:5000 diff --git a/swarm/searxng-deployment.yaml b/swarm/searxng-deployment.yaml index bf58103..8b31e58 100644 --- a/swarm/searxng-deployment.yaml +++ b/swarm/searxng-deployment.yaml @@ -7,7 +7,7 @@ metadata: labels: io.kompose.service: searxng traefik.constraint-label: traefik-public - traefik.docker.network: traefik-public + traefik.swarm.network: traefik-public traefik.enable: "true" traefik.http.routers.searxng-rtr.entrypoints: https traefik.http.routers.searxng-rtr.middlewares: xbot diff --git a/swarm/searxng.yml b/swarm/searxng.yml index 8218c7d..d7ef689 100644 --- a/swarm/searxng.yml +++ b/swarm/searxng.yml @@ -72,7 +72,7 @@ services: # - node.labels.searxng.searxng_data == true labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.searxng-rtr.entrypoints=https - traefik.http.routers.searxng-rtr.rule=Host(`search.${DOMAIN}`) diff --git a/swarm/secondary.yml b/swarm/secondary.yml index 83fe005..f0978ed 100644 --- a/swarm/secondary.yml +++ b/swarm/secondary.yml @@ -7,7 +7,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.cyberchef.entrypoints=https - traefik.http.routers.cyberchef.rule=Host(`cook.${DOMAIN}`) @@ -36,7 +36,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.librespeed.entrypoints=https - traefik.http.routers.librespeed.rule=Host(`speed.${DOMAIN}`) || Host(`speedtest.${DOMAIN}`) @@ -57,7 +57,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.linx.entrypoints=https - traefik.http.routers.linx.rule=Host(`linx.${DOMAIN}`) @@ -79,7 +79,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.wetty.entrypoints=https - traefik.http.routers.wetty.rule=Host(`terminal.${DOMAIN}`) @@ -95,7 +95,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.whisper_web.entrypoints=https - traefik.http.routers.whisper_web.rule=Host(`whisper.${DOMAIN}`) diff --git a/swarm/services.yml b/swarm/services.yml index eab5277..d501818 100644 --- a/swarm/services.yml +++ b/swarm/services.yml @@ -21,7 +21,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.api_server.entrypoints=https - traefik.http.routers.api_server.rule=Host(`api.${DOMAIN}`) @@ -49,7 +49,7 @@ services: - node.role == manager labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.dozzle.entrypoints=https - traefik.http.routers.dozzle.rule=Host(`log.${DOMAIN}`) @@ -96,7 +96,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.minio-router.entrypoints=https - traefik.http.routers.minio-router.rule=Host(`drive.${DOMAIN}`) || Host(`storage.${DOMAIN}`) @@ -136,7 +136,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.osrm-backend.entrypoints=https - traefik.http.routers.osrm-backend.rule=Host(`osrm.${DOMAIN}`) @@ -177,7 +177,7 @@ services: - node.labels.postgres.postgres_data == true labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.tcp.routers.postgres.entrypoints=postgres-socket - traefik.tcp.routers.postgres.rule=HostSNI(`*`) @@ -195,7 +195,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.whoami-rtr.entrypoints=https - traefik.http.routers.whoami-rtr.rule=Host(`whoami.$DOMAIN`) diff --git a/swarm/swarmpit.yml b/swarm/swarmpit.yml index 5047f75..cd47099 100644 --- a/swarm/swarmpit.yml +++ b/swarm/swarmpit.yml @@ -22,7 +22,7 @@ services: - node.role == manager labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.swarmpit-https.entrypoints=https - traefik.http.routers.swarmpit-https.rule=Host(`swarmpit.${DOMAIN?Variable not set}`) diff --git a/swarm/swarmprom.yml b/swarm/swarmprom.yml index 32ab3d3..0cde702 100644 --- a/swarm/swarmprom.yml +++ b/swarm/swarmprom.yml @@ -87,7 +87,7 @@ services: memory: 64M labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.swarmprom-grafana-https.rule=Host(`grafana.${DOMAIN?Variable not set}`) - traefik.http.routers.swarmprom-grafana-https.entrypoints=https @@ -123,7 +123,7 @@ services: memory: 64M labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.swarmprom-alertmanager-https.rule=Host(`alertmanager.${DOMAIN?Variable not set}`) - traefik.http.routers.swarmprom-alertmanager-https.entrypoints=https @@ -146,7 +146,7 @@ services: replicas: 1 labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.swarmprom-unsee-https.rule=Host(`unsee.${DOMAIN?Variable not set}`) - traefik.http.routers.swarmprom-unsee-https.entrypoints=https @@ -211,7 +211,7 @@ services: memory: 128M labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.swarmprom-prometheus-https.rule=Host(`prometheus.${DOMAIN?Variable not set}`) - traefik.http.routers.swarmprom-prometheus-https.entrypoints=https diff --git a/swarm/thelounge.yml b/swarm/thelounge.yml index 8537749..a6533a1 100644 --- a/swarm/thelounge.yml +++ b/swarm/thelounge.yml @@ -8,7 +8,7 @@ services: deploy: labels: - traefik.enable=true - - traefik.docker.network=traefik-public + - traefik.swarm.network=traefik-public - traefik.constraint-label=traefik-public - traefik.http.routers.thelounge-https.entrypoints=https - traefik.http.routers.thelounge-https.rule=Host(`irc.${DOMAIN?Variable not set}`) diff --git a/swarm/whoami-deployment.yaml b/swarm/whoami-deployment.yaml index 52490f7..2b5f86c 100644 --- a/swarm/whoami-deployment.yaml +++ b/swarm/whoami-deployment.yaml @@ -7,7 +7,7 @@ metadata: labels: io.kompose.service: whoami traefik.constraint-label: traefik-public - traefik.docker.network: traefik-public + traefik.swarm.network: traefik-public traefik.enable: "true" traefik.http.routers.whoami-rtr.entrypoints: https traefik.http.routers.whoami-rtr.rule: Host(`whoami.`)