feat: removed unused configuration on ingresses

This commit is contained in:
auricom
2022-07-02 19:58:32 +02:00
parent 804e4ff077
commit 78df35d804
24 changed files with 1 additions and 53 deletions

View File

@@ -56,4 +56,3 @@ spec:
tls:
- hosts:
- "bookstack.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -53,7 +53,6 @@ spec:
tls:
- hosts:
- "freshrss.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
resources:
requests:

View File

@@ -41,9 +41,6 @@ spec:
main:
enabled: true
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
hosts:
- host: "homer.${SECRET_CLUSTER_DOMAIN}"
paths:
@@ -57,7 +54,6 @@ spec:
- hosts:
- "homer.${SECRET_CLUSTER_DOMAIN}"
- "services.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
addons:
codeserver:
@@ -76,9 +72,6 @@ spec:
ingress:
enabled: true
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
hosts:
- host: "homer-config.${SECRET_CLUSTER_DOMAIN}"
paths:
@@ -87,7 +80,6 @@ spec:
tls:
- hosts:
- "homer-config.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
volumeMounts:
- name: config
mountPath: /www/assets

View File

@@ -53,4 +53,3 @@ spec:
tls:
- hosts:
- "joplin.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -30,9 +30,6 @@ spec:
ingress:
enabled: true
annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-buffering-medium@kubernetescrd
hosts:
- host: "pgadmin.${SECRET_CLUSTER_DOMAIN}"
paths:
@@ -41,7 +38,6 @@ spec:
tls:
- hosts:
- "pgadmin.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
postRenderers:
- kustomize:
patchesJson6902:

View File

@@ -63,9 +63,6 @@ spec:
main:
enabled: true
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-buffering-small@kubernetescrd
hosts:
- host: "recipes.${SECRET_CLUSTER_DOMAIN}"
paths:
@@ -74,4 +71,3 @@ spec:
tls:
- hosts:
- "recipes.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -212,8 +212,6 @@ spec:
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
labels:
app.kubernetes.io/instance: resilio-sync
app.kubernetes.io/name: resilio-sync
@@ -225,7 +223,6 @@ spec:
- hosts:
- "resilio-sync-claude.${SECRET_CLUSTER_DOMAIN}"
- "resilio-sync-helene.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
rules:
- host: "resilio-sync-claude.${SECRET_CLUSTER_DOMAIN}"
http:

View File

@@ -151,4 +151,3 @@ spec:
tls:
- hosts:
- "sharry.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -69,4 +69,3 @@ spec:
tls:
- hosts:
- "vaultwarden.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -54,7 +54,6 @@ spec:
tls:
- hosts:
- "vikunja.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
additionalContainers:
- name: api

View File

@@ -75,4 +75,3 @@ spec:
tls:
- hosts:
- "wallabag.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -52,4 +52,3 @@ spec:
tls:
- hosts:
- "registry.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -51,4 +51,3 @@ spec:
tls:
- hosts:
- "drone.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -97,4 +97,3 @@ spec:
tls:
- hosts:
- "gitea.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -51,8 +51,6 @@ spec:
main:
enabled: true
ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "hass.${SECRET_CLUSTER_DOMAIN}"
paths:
@@ -66,7 +64,6 @@ spec:
- hosts:
- "hass.${SECRET_CLUSTER_DOMAIN}"
- "home-assistant.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
prometheus:
serviceMonitor:
@@ -114,8 +111,6 @@ spec:
annotations:
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
hosts:
- host: "hass-config.${SECRET_CLUSTER_DOMAIN}"
paths:
@@ -124,7 +119,6 @@ spec:
tls:
- hosts:
- "hass-config.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
volumeMounts:
- name: config
mountPath: /config

View File

@@ -77,8 +77,6 @@ spec:
annotations:
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
hosts:
- host: "zigbee.${SECRET_CLUSTER_DOMAIN}"
paths:
@@ -87,7 +85,6 @@ spec:
tls:
- hosts:
- "zigbee.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
persistence:
config:

View File

@@ -49,7 +49,6 @@ spec:
tls:
- hosts:
- zwave.${SECRET_CLUSTER_DOMAIN}
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
persistence:
config:

View File

@@ -81,8 +81,6 @@ spec:
enabled: true
ingressClassName: "nginx"
nameSuffix: "api"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts:
- host: "sabnzbd.${SECRET_CLUSTER_DOMAIN}"
paths:

View File

@@ -77,8 +77,6 @@ metadata:
annotations:
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd, networking-buffering-small@kubernetescrd
labels:
app.kubernetes.io/instance: travelstories
app.kubernetes.io/name: travelstories
@@ -100,4 +98,3 @@ spec:
tls:
- hosts:
- "tdarr.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -90,8 +90,6 @@ spec:
annotations:
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
hosts:
- host: "blackbox.${SECRET_CLUSTER_DOMAIN}"
paths:
@@ -100,7 +98,6 @@ spec:
tls:
- hosts:
- "blackbox.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
postRenderers:
- kustomize:

View File

@@ -66,4 +66,3 @@ spec:
tls:
- hosts:
- "healthchecks.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -68,8 +68,6 @@ spec:
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
labels:
app.kubernetes.io/instance: uptime-kuma
app.kubernetes.io/name: uptime-kuma

View File

@@ -5,7 +5,6 @@ metadata:
name: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
namespace: networking
spec:
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
issuerRef:
name: letsencrypt-production
kind: ClusterIssuer

View File

@@ -47,6 +47,5 @@ spec:
- *host
tls:
enabled: true
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
grafana:
enabled: false