- Multi-architecture Docker image (ARM64 + AMD64) - Kubernetes manifests for 3-replica deployment - Traefik ingress configuration - NGINX Proxy Manager integration - ConfigMap-based configuration - Automated build and deployment scripts - Session monitoring tools
45 lines
1.2 KiB
Plaintext
45 lines
1.2 KiB
Plaintext
# /etc/rancher/k3s/registries.yaml
|
|
#
|
|
# This file configures k3s to allow pulling images from insecure (HTTP) registries.
|
|
# Copy this file to /etc/rancher/k3s/registries.yaml on EACH k3s node (server and agents).
|
|
#
|
|
# After creating this file, restart k3s:
|
|
# - On server: sudo systemctl restart k3s
|
|
# - On agents: sudo systemctl restart k3s-agent
|
|
#
|
|
# For more information: https://docs.k3s.io/installation/private-registry
|
|
|
|
mirrors:
|
|
# Configure mirror for your Gitea registry
|
|
"192.168.1.208:3002":
|
|
endpoint:
|
|
- "http://192.168.1.208:3002"
|
|
|
|
configs:
|
|
# Allow insecure connection to Gitea registry (HTTP instead of HTTPS)
|
|
"192.168.1.208:3002":
|
|
tls:
|
|
insecure_skip_verify: true
|
|
# Optional: Add authentication if your registry requires it
|
|
# auth:
|
|
# username: your-username
|
|
# password: your-password
|
|
|
|
# Example: If you have multiple registries
|
|
# mirrors:
|
|
# "registry1.example.com:5000":
|
|
# endpoint:
|
|
# - "http://registry1.example.com:5000"
|
|
# "registry2.example.com:5000":
|
|
# endpoint:
|
|
# - "https://registry2.example.com:5000"
|
|
#
|
|
# configs:
|
|
# "registry1.example.com:5000":
|
|
# tls:
|
|
# insecure_skip_verify: true
|
|
# "registry2.example.com:5000":
|
|
# auth:
|
|
# username: user
|
|
# password: pass
|