Files
cloudy/keytong/api-server-deployment.yaml
furyhawk 4549a213e2 Add Traefik and various service configurations for Docker Swarm
- Created `local_core.yml` for Traefik service configuration with multiple entry points and middleware settings.
- Added `services-all.yml` to define multiple services including API server, PostgreSQL, MinIO, Neo4j, and others with Traefik routing.
- Implemented Kubernetes deployment files for API server, Dozzle, MinIO, OSRM backend, PostgreSQL, SearxNG, and Whoami services.
- Configured persistent volume claims for MinIO, PostgreSQL, and SearxNG.
- Set up Traefik routing rules for all services to enable HTTPS and middleware for security.
2026-03-25 10:15:04 +08:00

45 lines
1.4 KiB
YAML

apiVersion: apps/v1
kind: Deployment
metadata:
annotations:
kompose.cmd: kompose convert -f services.yml
kompose.version: 1.34.0 (HEAD)
labels:
io.kompose.service: api-server
traefik.constraint-label: traefik-public
traefik.swarm.network: traefik-public
traefik.enable: "true"
traefik.http.routers.api_server.entrypoints: https
traefik.http.routers.api_server.rule: Host(`api.`)
traefik.http.routers.api_server.service: api_server_service
traefik.http.routers.api_server.tls.certresolver: le
traefik.http.services.api_server_service.loadbalancer.server.port: "8000"
name: api-server
spec:
replicas: 1
selector:
matchLabels:
io.kompose.service: api-server
template:
metadata:
annotations:
kompose.cmd: kompose convert -f services.yml
kompose.version: 1.34.0 (HEAD)
labels:
io.kompose.service: api-server
spec:
containers:
- env:
- name: DATABASE__DB
- name: DATABASE__HOSTNAME
- name: DATABASE__PASSWORD
- name: DATABASE__PORT
- name: DATABASE__USERNAME
- name: DOMAIN
- name: SECURITY__ALLOWED_HOSTS
- name: SECURITY__BACKEND_CORS_ORIGINS
- name: SECURITY__JWT_SECRET_KEY
image: furyhawk/listen:v0.1.15
name: api-server
restartPolicy: Always