| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275 | ---# Source: traefik/templates/rbac/serviceaccount.yamlkind: ServiceAccountapiVersion: v1metadata:  name: traefik  namespace: default  labels:    app.kubernetes.io/name: traefik    app.kubernetes.io/instance: traefik-default    helm.sh/chart: traefik-26.0.0    app.kubernetes.io/managed-by: Helm  annotations:---# Source: traefik/templates/rbac/clusterrole.yamlkind: ClusterRoleapiVersion: rbac.authorization.k8s.io/v1metadata:  name: traefik-default  labels:    app.kubernetes.io/name: traefik    app.kubernetes.io/instance: traefik-default    helm.sh/chart: traefik-26.0.0    app.kubernetes.io/managed-by: Helmrules:  - apiGroups:      - extensions      - networking.k8s.io    resources:      - ingressclasses      - ingresses    verbs:      - get      - list      - watch  - apiGroups:      - ""    resources:      - services      - endpoints      - secrets    verbs:      - get      - list      - watch  - apiGroups:      - extensions      - networking.k8s.io    resources:      - ingresses/status    verbs:      - update  - apiGroups:      - traefik.io      - traefik.containo.us    resources:      - ingressroutes      - ingressroutetcps      - ingressrouteudps      - middlewares      - middlewaretcps      - tlsoptions      - tlsstores      - traefikservices      - serverstransports    verbs:      - get      - list      - watch---# Source: traefik/templates/rbac/clusterrolebinding.yamlkind: ClusterRoleBindingapiVersion: rbac.authorization.k8s.io/v1metadata:  name: traefik-default  labels:    app.kubernetes.io/name: traefik    app.kubernetes.io/instance: traefik-default    helm.sh/chart: traefik-26.0.0    app.kubernetes.io/managed-by: HelmroleRef:  apiGroup: rbac.authorization.k8s.io  kind: ClusterRole  name: traefik-defaultsubjects:  - kind: ServiceAccount    name: traefik    namespace: default---# Source: traefik/templates/service.yamlapiVersion: v1kind: Servicemetadata:  name: traefik  namespace: default  labels:    app.kubernetes.io/name: traefik    app.kubernetes.io/instance: traefik-default    helm.sh/chart: traefik-26.0.0    app.kubernetes.io/managed-by: Helm  annotations:spec:  type: LoadBalancer  selector:    app.kubernetes.io/name: traefik    app.kubernetes.io/instance: traefik-default  ports:  - port: 80    name: "web"    targetPort: web    protocol: TCP  - port: 443    name: "websecure"    targetPort: websecure    protocol: TCP---# Source: traefik/templates/deployment.yamlapiVersion: apps/v1kind: Deploymentmetadata:  name: traefik  namespace: default  labels:    app.kubernetes.io/name: traefik    app.kubernetes.io/instance: traefik-default    helm.sh/chart: traefik-26.0.0    app.kubernetes.io/managed-by: Helm  annotations:spec:  replicas: 1  selector:    matchLabels:      app.kubernetes.io/name: traefik      app.kubernetes.io/instance: traefik-default  strategy:     rollingUpdate:      maxSurge: 1      maxUnavailable: 0    type: RollingUpdate  minReadySeconds: 0  template:     metadata:      annotations:        prometheus.io/scrape: "true"        prometheus.io/path: "/metrics"        prometheus.io/port: "9100"      labels:        app.kubernetes.io/name: traefik        app.kubernetes.io/instance: traefik-default        helm.sh/chart: traefik-26.0.0        app.kubernetes.io/managed-by: Helm    spec:      serviceAccountName: traefik      terminationGracePeriodSeconds: 60      hostNetwork: false      containers:      - image: docker.io/traefik:v2.10.6        imagePullPolicy: IfNotPresent        name: traefik        resources:        readinessProbe:          httpGet:            path: /ping            port: 9000            scheme: HTTP          failureThreshold: 1          initialDelaySeconds: 2          periodSeconds: 10          successThreshold: 1          timeoutSeconds: 2        livenessProbe:          httpGet:            path: /ping            port: 9000            scheme: HTTP          failureThreshold: 3          initialDelaySeconds: 2          periodSeconds: 10          successThreshold: 1          timeoutSeconds: 2        lifecycle:        ports:        - name: "metrics"          containerPort: 9100          protocol: "TCP"        - name: "traefik"          containerPort: 9000          protocol: "TCP"        - name: "web"          containerPort: 8000          protocol: "TCP"        - name: "websecure"          containerPort: 8443          protocol: "TCP"        securityContext:          allowPrivilegeEscalation: false          capabilities:            drop:            - ALL          readOnlyRootFilesystem: true        volumeMounts:          - name: data            mountPath: /data          - name: tmp            mountPath: /tmp        args:          - "--global.checknewversion"          - "--global.sendanonymoususage"          - "--entrypoints.metrics.address=:9100/tcp"          - "--entrypoints.traefik.address=:9000/tcp"          - "--entrypoints.web.address=:8000/tcp"          - "--entrypoints.websecure.address=:8443/tcp"          - "--api.dashboard=true"          - "--ping=true"          - "--metrics.prometheus=true"          - "--metrics.prometheus.entrypoint=metrics"          - "--providers.kubernetescrd"          - "--providers.kubernetesingress"          - "--entrypoints.websecure.http.tls=true"        env:          - name: POD_NAME            valueFrom:              fieldRef:                fieldPath: metadata.name          - name: POD_NAMESPACE            valueFrom:              fieldRef:                fieldPath: metadata.namespace      volumes:        - name: data          emptyDir: {}        - name: tmp          emptyDir: {}      securityContext:        fsGroupChangePolicy: OnRootMismatch        runAsGroup: 65532        runAsNonRoot: true        runAsUser: 65532---# Source: traefik/templates/ingressclass.yamlapiVersion: networking.k8s.io/v1kind: IngressClassmetadata:  annotations:    ingressclass.kubernetes.io/is-default-class: "true"  labels:    app.kubernetes.io/name: traefik    app.kubernetes.io/instance: traefik-default    helm.sh/chart: traefik-26.0.0    app.kubernetes.io/managed-by: Helm  name: traefikspec:  controller: traefik.io/ingress-controller---# Source: traefik/templates/dashboard-ingressroute.yamlapiVersion: traefik.io/v1alpha1kind: IngressRoutemetadata:  name: traefik-dashboard  namespace: default  annotations:  labels:    app.kubernetes.io/name: traefik    app.kubernetes.io/instance: traefik-default    helm.sh/chart: traefik-26.0.0    app.kubernetes.io/managed-by: Helmspec:  entryPoints:  - traefik  routes:  - match: PathPrefix(`/dashboard`) || PathPrefix(`/api`)    kind: Rule    services:    - name: api@internal      kind: TraefikService
 |