Currently, APISIX Ingress Controller automatically manipulates some APISIX resources, which is not very compatible with APISIX Dashboard. In addition, users should not modify resources labeled managed-by: apisix-ingress-controllers via APISIX Dashboard.
conf.yaml:| conf: listen: port: 9000 # allow_list: # If we don't set any IP list, then any IP access is allowed by default. # - 127.0.0.1 # The rules are checked in sequence until the first match is found. # - ::1 # In this example, access is allowed only for IPv4 network 127.0.0.1, and for IPv6 network ::1. # It also support CIDR like 192.168.1.0/24 and 2001:0db8::/32 etcd: endpoints:# supports defining multiple etcd host addresses for an etcd cluster -apisix-etcd-headless:2379 # yamllint disable rule:comments-indentation # etcd basic auth info # username: "root" # ignore etcd username if not enable etcd auth # password: "123456" # ignore etcd password if not enable etcd auth mtls: key_file:""# Path of your self-signed client side key cert_file:""# Path of your self-signed client side cert ca_file:""# Path of your self-signed ca cert, the CA is used to sign callers' certificates # prefix: /apisix # apisix config's prefix in etcd, /apisix by default log: error_log: level:warn# supports levels, lower to higher: debug, info, warn, error, panic, fatal file_path: logs/error.log# supports relative path, absolute path, standard output # such as: logs/error.log, /tmp/logs/error.log, /dev/stdout, /dev/stderr # such as absolute path on Windows: winfile:///C:\error.log access_log: file_path: logs/access.log# supports relative path, absolute path, standard output max_cpu:0# supports tweaking with the numbe
authentication: secret: secret# secret for jwt token generation. # NOTE: Highly recommended to modify this value to protect `manager api`. # if it's default value, when `manager api` start, it will generate a random string to replace it. expire_time:3600# jwt token expire time, in second users:# yamllint enable rule:comments-indentation -username:admin# username and password for login `manager api` password:admin -username:user password:user