Files
cloudy/keytong/redis-valkey-deployment.yaml
T
furyhawk 4549a213e2 Add Traefik and various service configurations for Docker Swarm
- Created `local_core.yml` for Traefik service configuration with multiple entry points and middleware settings.
- Added `services-all.yml` to define multiple services including API server, PostgreSQL, MinIO, Neo4j, and others with Traefik routing.
- Implemented Kubernetes deployment files for API server, Dozzle, MinIO, OSRM backend, PostgreSQL, SearxNG, and Whoami services.
- Configured persistent volume claims for MinIO, PostgreSQL, and SearxNG.
- Set up Traefik routing rules for all services to enable HTTPS and middleware for security.
2026-03-25 10:15:04 +08:00

60 lines
1.5 KiB
YAML

apiVersion: apps/v1
kind: Deployment
metadata:
annotations:
kompose.cmd: kompose convert -f searxng.yml
kompose.version: 1.34.0 (HEAD)
labels:
io.kompose.service: redis-valkey
name: redis-valkey
spec:
replicas: 1
selector:
matchLabels:
io.kompose.service: redis-valkey
strategy:
type: Recreate
template:
metadata:
annotations:
kompose.cmd: kompose convert -f searxng.yml
kompose.version: 1.34.0 (HEAD)
labels:
io.kompose.service: redis-valkey
spec:
affinity:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: searxng.redis
operator: In
values:
- "true"
containers:
- args:
- valkey-server
- --save
- "30"
- "1"
- --loglevel
- warning
image: docker.io/valkey/valkey:7-alpine
name: redis-valkey
securityContext:
capabilities:
add:
- SETGID
- SETUID
- DAC_OVERRIDE
drop:
- ALL
volumeMounts:
- mountPath: /data
name: valkey-data2
restartPolicy: Always
volumes:
- name: valkey-data2
persistentVolumeClaim:
claimName: valkey-data2