Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

KeyDescriptionExampleCreated byData-typeDatafile:Used by:
profile::haproxy::web::profileWhich web profile  should this haproxy node have'management'N/AStringnode-specificrole::bootstrap, role::balancer::*
profile::haproxy::${profile}::ipv4The IPv4 address used in front og the loadbalancer used for managemnet services'192.0.2.151' N/AStringnetworking.yamlrole::bootstrap, role::puppet::db, role::puppet::server, role::mysql, role::balancer::management
profile::haproxy::${profile}::ipv4::idThe VRRP id used by the IPv4 VRRP instance.11N/AIntegernetworking.yamlrole::bootstrap, role::balancer::management
profile::haproxy::${profile}::ipv4::priorityThe VRRP priority used by the IPv4 VRRP instance.10 N/AIntegernetworking.yamlrole::bootstrap, role::balancer::management
profile::haproxy::${profile}::ipv6The IPv4 address used in front og the loadbalancer used for managemnet services'2001:db8:beef:707::7b1'N/AStringnetworking.yamlrole::bootstrap, role::puppet::db, role::puppet::server, role::mysql, role::balancer::management 
profile::haproxy::${profile}::ipv6::idThe VRRP id used by the IPv6 VRRP instance. 12N/AIntegernetworking.yamlrole::bootstrap, role::balancer::management
profile::haproxy::${profile}::ipv6::priorityThe VRRP priority used by the IPv6 VRRP instance.10N/AIntegernetworking.yamlrole::bootstrap, role::balancer::management
profile::haproxy::${profile}::domainsWhich domains haproxy should forward for in frontend "ft_web" for given profile

-'foo.com'

-'bar.foo.com'

N/AList of stringscommon.yamlrole::balancer::*
profile::haproxy::management::apicertA .pem certificate bundle with private key, CAcert and server certtl;dr

cat private_key.key server.crt ca.crt > haproxy_web.pem

The order is important!

TLS from CertManager: Choose the "as Certificate (w/ issuer after)" alternative

Multiline stringcerts.yamlrole::bootstrap, role::balancer::management
profile::haproxy::services::apicertA .pem certificate bundle with private key, CAcert and server certtl;dr

cat private_key.key server.crt ca.crt > haproxy_web.pem

The order is important!

TLS from CertManager: Choose the "as Certificate (w/ issuer after)" alternative

Multiline stringcerts.yamlrole::bootstrap, role::balancer::services
profile::haproxy::${profile}::webcertA .pem certificate bundle with private key, CAcert and server certtl;dr

cat private_key.key server.crt ca.crt > haproxy_web.pem

The order is important!

TLS from CertManager: Choose the "as Certificate (w/ issuer after)" alternative

Multiline stringcerts.yaml

role::balancer::*

 

profile::haproxy::management::apicert::certfileFilepath and name for the apicert bundle'/etc/ssl/private/haproxy_web.pem'N/AStringcerts.yamlrole::balancer::web

...