feat: change cluster url

This commit is contained in:
auricom
2024-06-16 23:56:36 +02:00
parent c9bf75538e
commit 2545b72b99
78 changed files with 156 additions and 161 deletions

View File

@@ -26,7 +26,7 @@ connectivity:
endpoints:
- name: status
group: external
url: https://status.${SECRET_CLUSTER_DOMAIN}
url: https://status.${SECRET_EXTERNAL_DOMAIN}
interval: 1m
client:
dns-resolver: tcp://192.168.8.1:53

View File

@@ -67,7 +67,7 @@ spec:
TZ: ${TIMEZONE}
GATUS_CONFIG_PATH: /config
CUSTOM_WEB_PORT: &port 8080
SECRET_CLUSTER_DOMAIN: ${SECRET_CLUSTER_DOMAIN}
SECRET_EXTERNAL_DOMAIN: ${SECRET_EXTERNAL_DOMAIN}
envFrom: *envFrom
resources:
requests:
@@ -110,7 +110,7 @@ spec:
external-dns.alpha.kubernetes.io/target: services.${SECRET_DOMAIN}.
hajimari.io/icon: mdi:list-status
hosts:
- host: &host "status.${SECRET_CLUSTER_DOMAIN}"
- host: &host "status.${SECRET_EXTERNAL_DOMAIN}"
paths:
- path: /
service:

View File

@@ -29,10 +29,10 @@ spec:
rbac:
pspEnabled: false
env:
GF_AUTH_GENERIC_OAUTH_API_URL: https://auth.${SECRET_CLUSTER_DOMAIN}/api/oidc/userinfo
GF_AUTH_GENERIC_OAUTH_AUTH_URL: https://auth.${SECRET_CLUSTER_DOMAIN}/api/oidc/authorization
GF_AUTH_GENERIC_OAUTH_API_URL: https://auth.${SECRET_EXTERNAL_DOMAIN}/api/oidc/userinfo
GF_AUTH_GENERIC_OAUTH_AUTH_URL: https://auth.${SECRET_EXTERNAL_DOMAIN}/api/oidc/authorization
GF_AUTH_GENERIC_OAUTH_CLIENT_ID: grafana
GF_AUTH_GENERIC_OAUTH_TOKEN_URL: https://auth.${SECRET_CLUSTER_DOMAIN}/api/oidc/token
GF_AUTH_GENERIC_OAUTH_TOKEN_URL: https://auth.${SECRET_EXTERNAL_DOMAIN}/api/oidc/token
GF_DATE_FORMATS_USE_BROWSER_LOCALE: true
GF_EXPLORE_ENABLED: true
GF_PANELS_DISABLE_SANITIZE_HTML: true
@@ -41,7 +41,7 @@ spec:
GF_DATE_FORMATS_FULL_DATE: "DD.MM.YYYY hh:mm:ss"
GF_SECURITY_ALLOW_EMBEDDING: true
GF_SECURITY_COOKIE_SAMESITE: grafana
GF_SERVER_ROOT_URL: https://grafana.${SECRET_CLUSTER_DOMAIN}
GF_SERVER_ROOT_URL: https://grafana.${SECRET_EXTERNAL_DOMAIN}
envFromSecrets:
- name: grafana-secret
grafana.ini:
@@ -50,7 +50,7 @@ spec:
check_for_plugin_updates: false
reporting_enabled: false
auth:
signout_redirect_url: "https://auth.${SECRET_CLUSTER_DOMAIN}/logout"
signout_redirect_url: "https://auth.${SECRET_EXTERNAL_DOMAIN}/logout"
oauth_auto_login: true
oauth_allow_insecure_email_lookup: true
auth.generic_oauth:
@@ -369,7 +369,7 @@ spec:
annotations:
hajimari.io/icon: simple-icons:grafana
hosts:
- &host "grafana.${SECRET_CLUSTER_DOMAIN}"
- &host "grafana.${SECRET_EXTERNAL_DOMAIN}"
tls:
- hosts:
- *host

View File

@@ -124,15 +124,15 @@ spec:
annotations:
nginx.ingress.kubernetes.io/auth-method: GET
nginx.ingress.kubernetes.io/auth-url: http://authelia.default.svc.cluster.local.:8888/api/verify
nginx.ingress.kubernetes.io/auth-signin: https://auth.${SECRET_CLUSTER_DOMAIN}?rm=$request_method
nginx.ingress.kubernetes.io/auth-signin: https://auth.${SECRET_EXTERNAL_DOMAIN}?rm=$request_method
nginx.ingress.kubernetes.io/auth-response-headers: Remote-User,Remote-Name,Remote-Groups,Remote-Email
nginx.ingress.kubernetes.io/auth-snippet: proxy_set_header X-Forwarded-Method $request_method;
hajimari.io/appName: "Prometheus"
hajimari.io/icon: simple-icons:prometheus
hosts: ["prometheus.${SECRET_CLUSTER_DOMAIN}"]
hosts: ["prometheus.${SECRET_EXTERNAL_DOMAIN}"]
tls:
- hosts:
- "prometheus.${SECRET_CLUSTER_DOMAIN}"
- "prometheus.${SECRET_EXTERNAL_DOMAIN}"
prometheusSpec:
podMetadata:
annotations:
@@ -242,15 +242,15 @@ spec:
annotations:
# nginx.ingress.kubernetes.io/auth-method: GET
# nginx.ingress.kubernetes.io/auth-url: http://authelia.default.svc.cluster.local.:8888/api/verify
# nginx.ingress.kubernetes.io/auth-signin: https://auth.${SECRET_CLUSTER_DOMAIN}?rm=$request_method
# nginx.ingress.kubernetes.io/auth-signin: https://auth.${SECRET_EXTERNAL_DOMAIN}?rm=$request_method
# nginx.ingress.kubernetes.io/auth-response-headers: Remote-User,Remote-Name,Remote-Groups,Remote-Email
# nginx.ingress.kubernetes.io/auth-snippet: proxy_set_header X-Forwarded-Method $request_method;
hajimari.io/appName: "Alert Manager"
hajimari.io/icon: mdi:alert-decagram-outline
hosts: ["alert-manager.${SECRET_CLUSTER_DOMAIN}"]
hosts: ["alert-manager.${SECRET_EXTERNAL_DOMAIN}"]
tls:
- hosts:
- "alert-manager.${SECRET_CLUSTER_DOMAIN}"
- "alert-manager.${SECRET_EXTERNAL_DOMAIN}"
prometheus:
monitor:
enabled: true

View File

@@ -63,7 +63,7 @@ spec:
annotations:
hajimari.io/icon: mdi:harddiskstatus
hosts:
- host: &host "{{ .Release.Name }}.${SECRET_CLUSTER_DOMAIN}"
- host: &host "{{ .Release.Name }}.${SECRET_EXTERNAL_DOMAIN}"
paths:
- path: /
service:

View File

@@ -75,7 +75,7 @@ spec:
size: 10Gi
query:
replicas: 3
extraArgs: ["--alert.query-url=https://thanos.${SECRET_CLUSTER_DOMAIN}"]
extraArgs: ["--alert.query-url=https://thanos.${SECRET_EXTERNAL_DOMAIN}"]
# additionalStores: ["thanos.turbo.ac:10901"]
queryFrontend:
enabled: true
@@ -91,7 +91,7 @@ spec:
enabled: true
ingressClassName: nginx
hosts:
- thanos.${SECRET_CLUSTER_DOMAIN}
- thanos.${SECRET_EXTERNAL_DOMAIN}
podAnnotations: &podAnnotations
configmap.reloader.stakater.com/reload: *configMap
rule: