feat: nginx ingressClassName

This commit is contained in:
auricom
2021-08-25 14:08:18 +02:00
parent 2b842f58a5
commit 6bb6c3aad6
44 changed files with 156 additions and 199 deletions

View File

@@ -59,9 +59,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: bookstack.${SECRET_CLUSTER_DOMAIN}

View File

@@ -42,10 +42,9 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: freshrss.${SECRET_CLUSTER_DOMAIN}
paths:

View File

@@ -100,9 +100,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "hajimari.${SECRET_CLUSTER_DOMAIN}"

View File

@@ -40,7 +40,7 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
@@ -76,9 +76,8 @@ spec:
- "/www/assets/.vscode"
ingress:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
hosts:

View File

@@ -41,9 +41,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "joplin.${SECRET_CLUSTER_DOMAIN}"

View File

@@ -31,7 +31,6 @@ spec:
ingress:
enabled: true
annotations:
kubernetes.io/ingress.class: "nginx"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-buffering-medium@kubernetescrd
hosts:
@@ -43,13 +42,13 @@ spec:
- hosts:
- "pgadmin.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
# postRenderers:
# - kustomize:
# patchesJson6902:
# - target:
# kind: Ingress
# name: pgadmin-pgadmin4
# patch:
# - op: add
# path: /spec/ingressClassName
# value: traefik
postRenderers:
- kustomize:
patchesJson6902:
- target:
kind: Ingress
name: pgadmin-pgadmin4
patch:
- op: add
path: /spec/ingressClassName
value: nginx

View File

@@ -62,9 +62,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-buffering-small@kubernetescrd
hosts:

View File

@@ -205,8 +205,7 @@ spec:
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
annotations:
kubernetes.io/ingress.class: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
labels:
app.kubernetes.io/instance: resilio-sync
@@ -214,7 +213,7 @@ metadata:
name: resilio-sync
namespace: data
spec:
# ingressClassName: "traefik"
ingressClassName: "nginx"
tls:
- hosts:
- "resilio-sync-claude.${SECRET_CLUSTER_DOMAIN}"

View File

@@ -114,9 +114,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-buffering-large@kubernetescrd
hosts:

View File

@@ -52,9 +52,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "vaultwarden.${SECRET_CLUSTER_DOMAIN}"
@@ -66,12 +65,7 @@ spec:
- path: /notifications/hub
pathType: Prefix
servicePort: 3012
- host: "bitwarden.${SECRET_CLUSTER_DOMAIN}"
paths:
- path: /
pathType: Prefix
tls:
- hosts:
- "vaultwarden.${SECRET_CLUSTER_DOMAIN}"
- "bitwarden.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -42,9 +42,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "vikunja.${SECRET_CLUSTER_DOMAIN}"

View File

@@ -63,9 +63,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "wallabag.${SECRET_CLUSTER_DOMAIN}"

View File

@@ -40,7 +40,6 @@ spec:
ingress:
enabled: true
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/proxy-body-size: "0"
nginx.ingress.kubernetes.io/proxy-read-timeout: "600"
nginx.ingress.kubernetes.io/proxy-send-timeout: "600"
@@ -53,13 +52,13 @@ spec:
- "registry.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
# postRenderers:
# - kustomize:
# patchesJson6902:
# - target:
# kind: Ingress
# name: docker-registry
# patch:
# - op: add
# path: /spec/ingressClassName
# value: traefik
postRenderers:
- kustomize:
patchesJson6902:
- target:
kind: Ingress
name: docker-registry
patch:
- op: add
path: /spec/ingressClassName
value: nginx

View File

@@ -44,8 +44,7 @@ spec:
ingress:
enabled: true
annotations:
kubernetes.io/ingress.class: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "drone.${SECRET_CLUSTER_DOMAIN}"
@@ -54,11 +53,13 @@ spec:
- hosts:
- "wallabag.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
# postRenderers:
# - kustomize:
# patchesJson6902:
# name: drone
# patch:
# - op: add
# path: /spec/ingressClassName
# value: traefik
postRenderers:
- kustomize:
patchesJson6902:
- target:
kind: Ingress
name: drone
patch:
- op: add
path: /spec/ingressClassName
value: traefik

View File

@@ -87,8 +87,7 @@ spec:
ingress:
enabled: true
annotations:
kubernetes.io/ingress.class: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "gitea.${SECRET_CLUSTER_DOMAIN}"
@@ -100,13 +99,13 @@ spec:
- "gitea.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
# postRenderers:
# - kustomize:
# patchesJson6902:
# - target:
# kind: Ingress
# name: gitea
# patch:
# - op: add
# path: /spec/ingressClassName
# value: traefik
postRenderers:
- kustomize:
patchesJson6902:
- target:
kind: Ingress
name: gitea
patch:
- op: add
path: /spec/ingressClassName
value: nginx

View File

@@ -60,8 +60,7 @@ spec:
ingress:
dashboard:
enabled: true
annotations:
kubernetes.io/ingress.class: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
path: /
hosts:
@@ -103,10 +102,10 @@ spec:
path: /spec/externalIPs
value:
- "${CLUSTER_LB_EMQX}"
# - target:
# kind: Ingress
# name: emqx-dashboard
# patch:
# - op: add
# path: /spec/ingressClassName
# value: traefik
- target:
kind: Ingress
name: emqx-dashboard
patch:
- op: add
path: /spec/ingressClassName
value: nginx

View File

@@ -95,9 +95,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"

View File

@@ -50,9 +50,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "hass.${SECRET_CLUSTER_DOMAIN}"
@@ -111,11 +110,10 @@ spec:
- "/config/.vscode"
ingress:
enabled: true
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
hosts:

View File

@@ -73,9 +73,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"

View File

@@ -37,7 +37,7 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"

View File

@@ -48,9 +48,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
nginx.ingress.kubernetes.io/configuration-snippet: |

View File

@@ -48,9 +48,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
nginx.ingress.kubernetes.io/configuration-snippet: |

View File

@@ -48,9 +48,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "jellyfin.${SECRET_CLUSTER_DOMAIN}"

View File

@@ -56,9 +56,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
nginx.ingress.kubernetes.io/configuration-snippet: |
@@ -77,9 +76,8 @@ spec:
- "lidarr.${SECRET_CLUSTER_DOMAIN}"
api:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "lidarr.${SECRET_CLUSTER_DOMAIN}"

View File

@@ -51,9 +51,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "lychee.${SECRET_CLUSTER_DOMAIN}"

View File

@@ -48,9 +48,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "navidrome.${SECRET_CLUSTER_DOMAIN}"

View File

@@ -39,9 +39,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
nginx.ingress.kubernetes.io/configuration-snippet: |

View File

@@ -43,9 +43,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"

View File

@@ -63,9 +63,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/configuration-snippet: |
proxy_set_header Accept-Encoding "";
sub_filter '</head>' '<link rel="stylesheet" type="text/css" href="https://gilbn.github.io/theme.park/CSS/themes/qbittorrent/space-gray.css"></head>';

View File

@@ -53,9 +53,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
nginx.ingress.kubernetes.io/configuration-snippet: |
@@ -74,9 +73,8 @@ spec:
- "radarr.${SECRET_CLUSTER_DOMAIN}"
api:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "radarr.${SECRET_CLUSTER_DOMAIN}"

View File

@@ -48,9 +48,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
nginx.ingress.kubernetes.io/configuration-snippet: |
@@ -69,9 +68,8 @@ spec:
- "readarr.${SECRET_CLUSTER_DOMAIN}"
api:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "readarr.${SECRET_CLUSTER_DOMAIN}"

View File

@@ -46,9 +46,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
nginx.ingress.kubernetes.io/configuration-snippet: |
@@ -67,10 +66,9 @@ spec:
- "sabnzbd.${SECRET_CLUSTER_DOMAIN}"
api:
enabled: true
# ingressClassName: "traefik"
ingressClassName: "nginx"
nameSuffix: "api"
annotations:
kubernetes.io/ingress.class: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "sabnzbd.${SECRET_CLUSTER_DOMAIN}"

View File

@@ -51,9 +51,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
nginx.ingress.kubernetes.io/configuration-snippet: |
@@ -72,9 +71,8 @@ spec:
- "sonarr.${SECRET_CLUSTER_DOMAIN}"
api:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "sonarr.${SECRET_CLUSTER_DOMAIN}"

View File

@@ -62,9 +62,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"

View File

@@ -75,7 +75,6 @@ apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
@@ -86,7 +85,7 @@ metadata:
name: travelstories
namespace: media
spec:
# ingressClassName: "traefik"
ingressClassName: "nginx"
rules:
- host: "travelstories.${SECRET_CLUSTER_DOMAIN}"
http:

View File

@@ -91,7 +91,6 @@ spec:
ingress:
enabled: true
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
@@ -106,13 +105,13 @@ spec:
- "blackbox.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
# postRenderers:
# - kustomize:
# patchesJson6902:
# - target:
# kind: Ingress
# name: blackbox-exporter-prometheus-blackbox-exporter
# patch:
# - op: add
# path: /spec/ingressClassName
# value: traefik
postRenderers:
- kustomize:
patchesJson6902:
- target:
kind: Ingress
name: blackbox-exporter-prometheus-blackbox-exporter
patch:
- op: add
path: /spec/ingressClassName
value: nginx

View File

@@ -54,9 +54,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "healthchecks.${SECRET_CLUSTER_DOMAIN}"

View File

@@ -32,9 +32,8 @@ spec:
ingress:
enabled: true
pathType: Prefix
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
@@ -209,9 +208,8 @@ spec:
ingress:
enabled: true
pathType: Prefix
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts: ["grafana.${SECRET_CLUSTER_DOMAIN}"]
tls:
@@ -229,9 +227,8 @@ spec:
ingress:
enabled: true
pathType: Prefix
# ingressClassName: "traefik"
ingressClassName: "nginx"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"

View File

@@ -29,7 +29,6 @@ spec:
enabled: true
hostname: "thanos.${SECRET_CLUSTER_DOMAIN}"
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
@@ -61,13 +60,13 @@ spec:
secret_key: "${SECRET_MINIO_SECRET_KEY}"
insecure: false
# postRenderers:
# - kustomize:
# patchesJson6902:
# - target:
# kind: Ingress
# name: thanos-query
# patch:
# - op: add
# path: /spec/ingressClassName
# value: traefik
postRenderers:
- kustomize:
patchesJson6902:
- target:
kind: Ingress
name: thanos-query
patch:
- op: add
path: /spec/ingressClassName
value: nginx

View File

@@ -67,8 +67,7 @@ spec:
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
annotations:
kubernetes.io/ingress.class: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
labels:
app.kubernetes.io/instance: uptime-kuma
@@ -76,7 +75,7 @@ metadata:
name: uptime-kuma
namespace: monitoring
spec:
# ingressClassName: "traefik"
ingressClassName: "nginx"
rules:
- host: "uptime-kuma.${SECRET_CLUSTER_DOMAIN}"
http:

View File

@@ -27,8 +27,7 @@ spec:
ingress:
enabled: true
annotations:
kubernetes.io/ingress.class: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
subdomain: login
@@ -159,3 +158,14 @@ spec:
key: SMTP_PASSWORD
value: "${SECRET_AUTHELIA_SMTP_PASSWORD}"
filename: SMTP_PASSWORD
postRenderers:
- kustomize:
patchesJson6902:
- target:
kind: Ingress
name: authelia
patch:
- op: add
path: /spec/ingressClassName
value: nginx

View File

@@ -23,9 +23,8 @@ spec:
ingress:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "id.${SECRET_CLUSTER_DOMAIN}"

View File

@@ -38,9 +38,8 @@ spec:
ingress:
main:
enabled: true
# ingressClassName: "traefik"
annotations:
kubernetes.io/ingress.class: "nginx"
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-buffering-medium@kubernetescrd
hosts:

View File

@@ -4,14 +4,13 @@ kind: Ingress
metadata:
name: rook-ceph-mgr-dashboard
namespace: rook-ceph
annotations:
kubernetes.io/ingress.class: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
labels:
app.kubernetes.io/instance: rook-ceph-mgr-dashboard
app.kubernetes.io/name: rook-ceph-mgr-dashboard
spec:
# ingressClassName: "traefik"
ingressClassName: "nginx"
rules:
- host: "rook.${SECRET_CLUSTER_DOMAIN}"
http: