Fábio Kaiser Rauber
2 years ago
5 changed files with 114 additions and 0 deletions
@ -0,0 +1,6 @@ |
|||
dependencies: |
|||
- name: redis |
|||
repository: https://charts.bitnami.com/bitnami |
|||
version: 17.0.1 |
|||
digest: sha256:971c7d3e44106de73552c8dee38509fd10b0ed4d08d308ed94e5249d1862e427 |
|||
generated: "2022-07-13T14:59:03.042613-03:00" |
Binary file not shown.
@ -0,0 +1,52 @@ |
|||
apiVersion: v1 |
|||
kind: ConfigMap |
|||
metadata: |
|||
name: {{ include "rspamd.fullname" . }} |
|||
namespace: {{ .Release.Namespace | quote }} |
|||
labels: {{- include "rspamd.labels" . | nindent 4 }} |
|||
data: |
|||
ratelimit.conf: |- |
|||
rates { |
|||
# Limit for all mail per recipient (default rate 70 per day) |
|||
to = "{{ .Values.rspamd.rateLimits.to }}"; |
|||
# Limit for all mail per one source ip (default rate 150 per day) |
|||
to_ip = "{{ .Values.rspamd.rateLimits.toIp }}"; |
|||
# Limit for all mail per one source ip and from address (default rate 100 per day) |
|||
to_ip_from = "{{ .Values.rspamd.rateLimits.toIpFrom }}"; |
|||
# Limit for all bounce mail (rate 2 per hour) |
|||
#bounce_to = "2 / 1h"; |
|||
# Limit for bounce mail per one source ip (rate 1 per hour) |
|||
#bounce_to_ip = "1 / 1h"; |
|||
# Limit for all mail per authenticated user (default rate 100 per day) |
|||
user = "{{ .Values.rspamd.rateLimits.user }}"; |
|||
} |
|||
whitelisted_rcpts = "{{ .Values.rspamd.rateLimits.whitelisted.rcpts }}"; |
|||
whitelisted_ip = "/etc/rspamd/local.d/ratelimit_whitelist.map"; |
|||
max_rcpt = {{ .Values.rspamd.rateLimits.maxRcpt }}; |
|||
ratelimit_whitelist.map: |- |
|||
{{- range .Values.rspamd.rateLimits.whitelisted.ips }} |
|||
{{ . }} |
|||
{{- end }} |
|||
redis.conf: |- |
|||
servers = "{{ printf "%s-%s" .Release.Name "redis-master" | trunc 63 | trimSuffix "-" }}"; |
|||
db = "3"; |
|||
password = "{{ .Values.redis.auth.password }}"; |
|||
worker-proxy.inc: |- |
|||
milter = {{ .Values.rspamd.workerProxy.milter }}; |
|||
bind_socket = "*:11332" |
|||
timeout = {{ .Values.rspamd.workerProxy.timeout }}; |
|||
upstream "local" { |
|||
default = yes; # Self-scan upstreams are always default |
|||
self_scan = yes; # Enable self-scan |
|||
} |
|||
count = {{ .Values.rspamd.workerProxy.count }}; # Spawn more processes in self-scan mode |
|||
max_retries = {{ .Values.rspamd.workerProxy.maxRetries }}; # How many times master is queried in case of failure |
|||
discard_on_reject = {{ .Values.rspamd.workerProxy.discardOnReject }}; # Discard message instead of rejection |
|||
quarantine_on_reject = {{ .Values.rspamd.workerProxy.quarantineOnReject }}; # Tell MTA to quarantine rejected messages |
|||
spam_header = "{{ .Values.rspamd.workerProxy.spamHeader }}"; # Use the specific spam header |
|||
reject_message = "{{ .Values.rspamd.workerProxy.rejectMessage }}"; # Use custom rejection message |
|||
worker-normal.inc: |- |
|||
# Disable worker-normal in Milter mode |
|||
worker "normal" { |
|||
enabled = false; |
|||
} |
Loading…
Reference in new issue