mirror of
https://github.com/auricom/home-cluster.git
synced 2025-09-17 18:24:14 +02:00
feat: removed unused configuration on ingresses
This commit is contained in:
@@ -56,4 +56,3 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "bookstack.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
@@ -53,7 +53,6 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "freshrss.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
||||
resources:
|
||||
requests:
|
||||
|
@@ -41,9 +41,6 @@ spec:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "nginx"
|
||||
# annotations:
|
||||
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
|
||||
hosts:
|
||||
- host: "homer.${SECRET_CLUSTER_DOMAIN}"
|
||||
paths:
|
||||
@@ -57,7 +54,6 @@ spec:
|
||||
- hosts:
|
||||
- "homer.${SECRET_CLUSTER_DOMAIN}"
|
||||
- "services.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
||||
addons:
|
||||
codeserver:
|
||||
@@ -76,9 +72,6 @@ spec:
|
||||
ingress:
|
||||
enabled: true
|
||||
ingressClassName: "nginx"
|
||||
# annotations:
|
||||
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
|
||||
hosts:
|
||||
- host: "homer-config.${SECRET_CLUSTER_DOMAIN}"
|
||||
paths:
|
||||
@@ -87,7 +80,6 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "homer-config.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
volumeMounts:
|
||||
- name: config
|
||||
mountPath: /www/assets
|
||||
|
@@ -53,4 +53,3 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "joplin.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
@@ -30,9 +30,6 @@ spec:
|
||||
|
||||
ingress:
|
||||
enabled: true
|
||||
annotations:
|
||||
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
# traefik.ingress.kubernetes.io/router.middlewares: networking-buffering-medium@kubernetescrd
|
||||
hosts:
|
||||
- host: "pgadmin.${SECRET_CLUSTER_DOMAIN}"
|
||||
paths:
|
||||
@@ -41,7 +38,6 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "pgadmin.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
postRenderers:
|
||||
- kustomize:
|
||||
patchesJson6902:
|
||||
|
@@ -63,9 +63,6 @@ spec:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "nginx"
|
||||
# annotations:
|
||||
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
# traefik.ingress.kubernetes.io/router.middlewares: networking-buffering-small@kubernetescrd
|
||||
hosts:
|
||||
- host: "recipes.${SECRET_CLUSTER_DOMAIN}"
|
||||
paths:
|
||||
@@ -74,4 +71,3 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "recipes.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
@@ -212,8 +212,6 @@ spec:
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
# annotations:
|
||||
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
labels:
|
||||
app.kubernetes.io/instance: resilio-sync
|
||||
app.kubernetes.io/name: resilio-sync
|
||||
@@ -225,7 +223,6 @@ spec:
|
||||
- hosts:
|
||||
- "resilio-sync-claude.${SECRET_CLUSTER_DOMAIN}"
|
||||
- "resilio-sync-helene.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
rules:
|
||||
- host: "resilio-sync-claude.${SECRET_CLUSTER_DOMAIN}"
|
||||
http:
|
||||
|
@@ -151,4 +151,3 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "sharry.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
@@ -69,4 +69,3 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "vaultwarden.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
@@ -54,7 +54,6 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "vikunja.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
||||
additionalContainers:
|
||||
- name: api
|
||||
|
@@ -75,4 +75,3 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "wallabag.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
@@ -52,4 +52,3 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "registry.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
@@ -51,4 +51,3 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "drone.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
@@ -97,4 +97,3 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "gitea.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
@@ -51,8 +51,6 @@ spec:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "nginx"
|
||||
# annotations:
|
||||
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
hosts:
|
||||
- host: "hass.${SECRET_CLUSTER_DOMAIN}"
|
||||
paths:
|
||||
@@ -66,7 +64,6 @@ spec:
|
||||
- hosts:
|
||||
- "hass.${SECRET_CLUSTER_DOMAIN}"
|
||||
- "home-assistant.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
||||
prometheus:
|
||||
serviceMonitor:
|
||||
@@ -114,8 +111,6 @@ spec:
|
||||
annotations:
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
|
||||
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
|
||||
hosts:
|
||||
- host: "hass-config.${SECRET_CLUSTER_DOMAIN}"
|
||||
paths:
|
||||
@@ -124,7 +119,6 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "hass-config.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
volumeMounts:
|
||||
- name: config
|
||||
mountPath: /config
|
||||
|
@@ -77,8 +77,6 @@ spec:
|
||||
annotations:
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
|
||||
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
|
||||
hosts:
|
||||
- host: "zigbee.${SECRET_CLUSTER_DOMAIN}"
|
||||
paths:
|
||||
@@ -87,7 +85,6 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "zigbee.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
||||
persistence:
|
||||
config:
|
||||
|
@@ -49,7 +49,6 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- zwave.${SECRET_CLUSTER_DOMAIN}
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
||||
persistence:
|
||||
config:
|
||||
|
@@ -81,8 +81,6 @@ spec:
|
||||
enabled: true
|
||||
ingressClassName: "nginx"
|
||||
nameSuffix: "api"
|
||||
# annotations:
|
||||
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
hosts:
|
||||
- host: "sabnzbd.${SECRET_CLUSTER_DOMAIN}"
|
||||
paths:
|
||||
|
@@ -77,8 +77,6 @@ metadata:
|
||||
annotations:
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
|
||||
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd, networking-buffering-small@kubernetescrd
|
||||
labels:
|
||||
app.kubernetes.io/instance: travelstories
|
||||
app.kubernetes.io/name: travelstories
|
||||
@@ -100,4 +98,3 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "tdarr.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
@@ -90,8 +90,6 @@ spec:
|
||||
annotations:
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
|
||||
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
|
||||
hosts:
|
||||
- host: "blackbox.${SECRET_CLUSTER_DOMAIN}"
|
||||
paths:
|
||||
@@ -100,7 +98,6 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "blackbox.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
||||
postRenderers:
|
||||
- kustomize:
|
||||
|
@@ -66,4 +66,3 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "healthchecks.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
@@ -68,8 +68,6 @@ spec:
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
# annotations:
|
||||
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
labels:
|
||||
app.kubernetes.io/instance: uptime-kuma
|
||||
app.kubernetes.io/name: uptime-kuma
|
||||
@@ -91,4 +89,4 @@ spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- "uptime-kuma.${SECRET_CLUSTER_DOMAIN}"
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
secretName:"${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
|
@@ -5,7 +5,6 @@ metadata:
|
||||
name: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
namespace: networking
|
||||
spec:
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
|
@@ -47,6 +47,5 @@ spec:
|
||||
- *host
|
||||
tls:
|
||||
enabled: true
|
||||
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
|
||||
grafana:
|
||||
enabled: false
|
||||
|
Reference in New Issue
Block a user