mirror of
https://github.com/auricom/home-cluster.git
synced 2025-09-17 18:24:14 +02:00
feat: migrate ingresses to traefik
This commit is contained in:
@@ -50,8 +50,9 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Bookstack"
|
||||
forecastle.stakater.com/icon: "https://yunohost.org/user/images/logo-bookstack.png?height=80?height=80"
|
||||
@@ -61,9 +62,6 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "bookstack.${SECRET_CLUSTER_DOMAIN}"
|
||||
persistence:
|
||||
config:
|
||||
enabled: true
|
||||
|
@@ -30,7 +30,9 @@ spec:
|
||||
ingress:
|
||||
enabled: true
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
|
||||
hosts:
|
||||
- host: home.${SECRET_CLUSTER_DOMAIN}
|
||||
paths:
|
||||
@@ -38,7 +40,3 @@ spec:
|
||||
- host: services.${SECRET_CLUSTER_DOMAIN}
|
||||
paths:
|
||||
- /
|
||||
tls:
|
||||
- hosts:
|
||||
- home.${SECRET_CLUSTER_DOMAIN}
|
||||
- services.${SECRET_CLUSTER_DOMAIN}
|
||||
|
@@ -37,7 +37,8 @@ spec:
|
||||
main:
|
||||
enabled: true
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "FreshRSS"
|
||||
forecastle.stakater.com/icon: "https://raw.githubusercontent.com/FreshRSS/FreshRSS/edge/docs/img/FreshRSS-logo.png"
|
||||
|
@@ -27,8 +27,6 @@ spec:
|
||||
strategy:
|
||||
type: Recreate
|
||||
|
||||
resources: {}
|
||||
|
||||
service:
|
||||
main:
|
||||
annotations:
|
||||
@@ -48,13 +46,12 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
hosts:
|
||||
- host: joplin.${SECRET_CLUSTER_DOMAIN}
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "joplin.${SECRET_CLUSTER_DOMAIN}"
|
||||
|
@@ -29,11 +29,9 @@ spec:
|
||||
ingress:
|
||||
enabled: true
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
# -- Nginx client Body Buffer Size
|
||||
nginx.ingress.kubernetes.io/client-body-buffer-size: "50m"
|
||||
# -- Nginx Proxy Body Size
|
||||
nginx.ingress.kubernetes.io/proxy-body-size: "50m"
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-buffering-medium@kubernetescrd
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "pgAdmin"
|
||||
forecastle.stakater.com/icon: "https://bitnami.com/assets/stacks/postgresql/img/postgresql-stack-110x117.png"
|
||||
@@ -43,9 +41,6 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- pgadmin.${SECRET_CLUSTER_DOMAIN}
|
||||
persistentVolume:
|
||||
enabled: true
|
||||
existingClaim: pgadmin-config
|
||||
|
@@ -52,9 +52,10 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/client-body-buffer-size: "10m"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-buffering-small@kubernetescrd
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Recipes"
|
||||
forecastle.stakater.com/icon: "https://raw.githubusercontent.com/vabene1111/recipes/develop/docs/logo_color.svg"
|
||||
@@ -64,9 +65,6 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "recipes.${SECRET_CLUSTER_DOMAIN}"
|
||||
persistence:
|
||||
media:
|
||||
enabled: true
|
||||
|
@@ -206,7 +206,8 @@ apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Resilio Sync"
|
||||
forecastle.stakater.com/icon: "https://avatars.githubusercontent.com/u/12284211?s=200&v=4"
|
||||
@@ -238,7 +239,3 @@ spec:
|
||||
name: resilio-sync
|
||||
port:
|
||||
number: 8889
|
||||
tls:
|
||||
- hosts:
|
||||
- resilio-sync-claude.${SECRET_CLUSTER_DOMAIN}
|
||||
- resilio-sync-helene.${SECRET_CLUSTER_DOMAIN}
|
||||
|
@@ -43,12 +43,10 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
# -- Nginx client Body Buffer Size
|
||||
nginx.ingress.kubernetes.io/client-body-buffer-size: "2048m"
|
||||
# -- Nginx Proxy Body Size
|
||||
nginx.ingress.kubernetes.io/proxy-body-size: "2048m"
|
||||
nginx.ingress.kubernetes.io/proxy-buffering: "off"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-buffering-large@kubernetescrd
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Sharry"
|
||||
forecastle.stakater.com/icon: "https://raw.githubusercontent.com/eikek/sharry/master/artwork/icon.png"
|
||||
@@ -58,9 +56,6 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "sharry.${SECRET_CLUSTER_DOMAIN}"
|
||||
|
||||
config: |
|
||||
sharry.restserver {
|
||||
|
@@ -44,8 +44,9 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Vaultwarden"
|
||||
forecastle.stakater.com/icon: "https://image.winudf.com/v2/image1/Y29tLng4Yml0LmJpdHdhcmRlbl9pY29uXzE1OTM0NTk3NDNfMDA2/icon.png?fakeurl=1&h=120"
|
||||
@@ -64,10 +65,6 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "vaultwarden.${SECRET_CLUSTER_DOMAIN}"
|
||||
- "bitwarden.${SECRET_CLUSTER_DOMAIN}"
|
||||
persistence:
|
||||
config:
|
||||
enabled: true
|
||||
|
@@ -60,8 +60,9 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Vikunja"
|
||||
forecastle.stakater.com/icon: "https://vikunja.io/docs/images/vikunja-logo-white.svg"
|
||||
@@ -71,9 +72,6 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "vikunja.${SECRET_CLUSTER_DOMAIN}"
|
||||
|
||||
persistence:
|
||||
files:
|
||||
|
@@ -45,8 +45,9 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Wallabag"
|
||||
forecastle.stakater.com/icon: "https://cdnx.nextinpact.com/compress/850-412/data-next/images/bd/wide-linked-media/545.jpg"
|
||||
@@ -56,9 +57,6 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- wallabag.${SECRET_CLUSTER_DOMAIN}
|
||||
persistence:
|
||||
images:
|
||||
enabled: true
|
||||
|
@@ -32,15 +32,11 @@ spec:
|
||||
ingress:
|
||||
enabled: true
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/proxy-body-size: "0"
|
||||
nginx.ingress.kubernetes.io/proxy-read-timeout: "600"
|
||||
nginx.ingress.kubernetes.io/proxy-send-timeout: "600"
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-buffering-large@kubernetescrd
|
||||
hosts:
|
||||
- registry.${SECRET_CLUSTER_DOMAIN}
|
||||
tls:
|
||||
- hosts:
|
||||
- registry.${SECRET_CLUSTER_DOMAIN}
|
||||
service:
|
||||
annotations:
|
||||
prometheus.io/probe: "true"
|
||||
|
@@ -40,9 +40,9 @@ spec:
|
||||
DRONE_SERVER_HOST: drone.${SECRET_CLUSTER_DOMAIN}
|
||||
ingress:
|
||||
enabled: true
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
hosts:
|
||||
- host: drone.${SECRET_CLUSTER_DOMAIN}
|
||||
paths: ["/"]
|
||||
tls:
|
||||
- hosts:
|
||||
- drone.${SECRET_CLUSTER_DOMAIN}
|
||||
|
@@ -27,16 +27,13 @@ spec:
|
||||
ingress:
|
||||
enabled: true
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/proxy-body-size: 128m
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
hosts:
|
||||
- host: "gitea.${SECRET_CLUSTER_DOMAIN}"
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "gitea.${SECRET_CLUSTER_DOMAIN}"
|
||||
service:
|
||||
annotations:
|
||||
prometheus.io/probe: "true"
|
||||
|
@@ -30,13 +30,11 @@ spec:
|
||||
dashboard:
|
||||
enabled: true
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
path: /
|
||||
hosts:
|
||||
- emqx.${SECRET_CLUSTER_DOMAIN}
|
||||
tls:
|
||||
- hosts:
|
||||
- emqx.${SECRET_CLUSTER_DOMAIN}
|
||||
emqxConfig:
|
||||
EMQX_ALLOW_ANONYMOUS: "false"
|
||||
EMQX_ADMIN_PASSWORD: "${SECRET_EMQX_ADMIN_PASSWORD}"
|
||||
|
@@ -24,17 +24,14 @@ spec:
|
||||
main:
|
||||
enabled: true
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
|
||||
hosts:
|
||||
- host: "frigate.${SECRET_CLUSTER_DOMAIN}"
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "frigate.${SECRET_CLUSTER_DOMAIN}"
|
||||
service:
|
||||
main:
|
||||
annotations:
|
||||
|
@@ -44,8 +44,9 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
hosts:
|
||||
- host: hass.${SECRET_CLUSTER_DOMAIN}
|
||||
paths:
|
||||
@@ -55,9 +56,6 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "home-assistant.${SECRET_CLUSTER_DOMAIN}"
|
||||
prometheus:
|
||||
serviceMonitor:
|
||||
enabled: false
|
||||
@@ -88,18 +86,14 @@ spec:
|
||||
- "/config/.vscode"
|
||||
ingress:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
hosts:
|
||||
- host: hass-config.${SECRET_CLUSTER_DOMAIN}
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- hass-config.${SECRET_CLUSTER_DOMAIN}
|
||||
volumeMounts:
|
||||
- name: config
|
||||
mountPath: /config
|
||||
|
@@ -69,18 +69,15 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
|
||||
hosts:
|
||||
- host: "zigbee.${SECRET_CLUSTER_DOMAIN}"
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "zigbee.${SECRET_CLUSTER_DOMAIN}"
|
||||
persistence:
|
||||
config:
|
||||
enabled: true
|
||||
@@ -96,8 +93,4 @@ spec:
|
||||
requiredDuringSchedulingIgnoredDuringExecution:
|
||||
nodeSelectorTerms:
|
||||
- matchExpressions:
|
||||
- {
|
||||
key: "feature.node.kubernetes.io/custom-zigbee",
|
||||
operator: In,
|
||||
values: ["true"],
|
||||
}
|
||||
- { key: "feature.node.kubernetes.io/custom-zigbee", operator: In, values: ["true"] }
|
||||
|
@@ -28,10 +28,10 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
|
||||
hosts:
|
||||
- host: zwave.${SECRET_CLUSTER_DOMAIN}
|
||||
paths:
|
||||
@@ -60,8 +60,4 @@ spec:
|
||||
requiredDuringSchedulingIgnoredDuringExecution:
|
||||
nodeSelectorTerms:
|
||||
- matchExpressions:
|
||||
- {
|
||||
key: "feature.node.kubernetes.io/custom-zwave",
|
||||
operator: In,
|
||||
values: ["true"],
|
||||
}
|
||||
- { key: "feature.node.kubernetes.io/custom-zwave", operator: In, values: ["true"] }
|
||||
|
@@ -36,13 +36,10 @@ spec:
|
||||
clusterName: k3s
|
||||
ingress:
|
||||
create: true
|
||||
class: "nginx"
|
||||
class: "traefik"
|
||||
host: "k10.${SECRET_CLUSTER_DOMAIN}"
|
||||
annotations:
|
||||
nginx.ingress.kubernetes.io/app-root: /k10
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
urlPath: k10
|
||||
hosts:
|
||||
- "k10.${SECRET_CLUSTER_DOMAIN}"
|
||||
tls:
|
||||
enabled: true
|
||||
secretName: "${SECRET_CLUSTER_DOMAIN/./-}-tls"
|
||||
|
@@ -50,23 +50,12 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||
proxy_set_header Accept-Encoding "";
|
||||
sub_filter '</head>' '<link rel="stylesheet" type="text/css" href="https://gilbn.github.io/theme.park/CSS/themes/bazarr/space-gray.css"></head>';
|
||||
sub_filter_once on;
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Bazarr"
|
||||
forecastle.stakater.com/icon: "https://raw.githubusercontent.com/morpheus65535/bazarr/4ba88228177dcfac93dc74e375cfa49eda29ad21/static/logo128.png"
|
||||
forecastle.stakater.com/network-restricted: "true"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd, networking-buffering-small@kubernetescrd
|
||||
hosts:
|
||||
- host: bazarr.${SECRET_CLUSTER_DOMAIN}
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "bazarr.${SECRET_CLUSTER_DOMAIN}"
|
||||
|
@@ -36,9 +36,9 @@ spec:
|
||||
main:
|
||||
enabled: true
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Flood"
|
||||
forecastle.stakater.com/icon: "https://raw.githubusercontent.com/jesec/flood/master/flood.svg"
|
||||
@@ -48,9 +48,6 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "flood.${SECRET_CLUSTER_DOMAIN}"
|
||||
persistence:
|
||||
data:
|
||||
enabled: true
|
||||
|
@@ -53,8 +53,9 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Jellyfin"
|
||||
forecastle.stakater.com/icon: "https://features.jellyfin.org/images/logos/a7Lx9nYDzWuDR94Az8Yum7neWMvNMndkm9qr4QVtmjaMrOHDLisS5K7LJctTRzK9-icon-transparent.png?size=200"
|
||||
@@ -63,9 +64,6 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "jellyfin.${SECRET_CLUSTER_DOMAIN}"
|
||||
affinity:
|
||||
podAntiAffinity:
|
||||
preferredDuringSchedulingIgnoredDuringExecution:
|
||||
|
@@ -31,43 +31,29 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||
proxy_set_header Accept-Encoding "";
|
||||
sub_filter '</head>' '<link rel="stylesheet" type="text/css" href="https://gilbn.github.io/theme.park/CSS/themes/lidarr/space-gray.css"></head>';
|
||||
sub_filter_once on;
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd, networking-buffering-small@kubernetescrd
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Lidarr"
|
||||
forecastle.stakater.com/icon: "https://raw.githubusercontent.com/lidarr/Lidarr/14c3d31c2bf64893e9e7c137a04bfc096e6d36fe/frontend/src/Content/Images/Icons/android-chrome-192x192.png"
|
||||
forecastle.stakater.com/network-restricted: "true"
|
||||
# -- Nginx client Body Buffer Size
|
||||
nginx.ingress.kubernetes.io/client-body-buffer-size: "20m"
|
||||
# -- Nginx Proxy Body Size
|
||||
nginx.ingress.kubernetes.io/proxy-body-size: "20m"
|
||||
nginx.ingress.kubernetes.io/proxy-buffering: "off"
|
||||
hosts:
|
||||
- host: lidarr.${SECRET_CLUSTER_DOMAIN}
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "liddarr.${SECRET_CLUSTER_DOMAIN}"
|
||||
api:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
hosts:
|
||||
- host: "lidarr.${SECRET_CLUSTER_DOMAIN}"
|
||||
paths:
|
||||
- path: /api
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "lidarr.${SECRET_CLUSTER_DOMAIN}"
|
||||
persistence:
|
||||
config:
|
||||
enabled: true
|
||||
|
@@ -34,8 +34,9 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Lychee"
|
||||
forecastle.stakater.com/icon: "https://lycheeorg.github.io/docs/img/logo.png"
|
||||
@@ -44,9 +45,6 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "lychee.${SECRET_CLUSTER_DOMAIN}"
|
||||
|
||||
env:
|
||||
PHP_TZ: Europe/Paris
|
||||
|
@@ -31,8 +31,9 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Navidrome"
|
||||
forecastle.stakater.com/icon: "https://raw.githubusercontent.com/navidrome/navidrome/master/resources/logo-192x192.png"
|
||||
@@ -42,9 +43,6 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "navidrome.${SECRET_CLUSTER_DOMAIN}"
|
||||
env:
|
||||
ND_SCANINTERVAL: 15m
|
||||
ND_LOGLEVEL: info
|
||||
|
@@ -35,10 +35,10 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd, networking-buffering-small@kubernetescrd
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Prowlarr"
|
||||
forecastle.stakater.com/icon: "https://raw.githubusercontent.com/Prowlarr/Prowlarr/develop/Logo/256.png"
|
||||
@@ -48,9 +48,6 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "prowlarr.${SECRET_CLUSTER_DOMAIN}"
|
||||
resources:
|
||||
requests:
|
||||
memory: 100Mi
|
||||
|
@@ -46,10 +46,9 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "pyLoad"
|
||||
forecastle.stakater.com/icon: "https://raw.githubusercontent.com/pyload/pyload/main/media/logo.png"
|
||||
@@ -59,6 +58,3 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "pyload.${SECRET_CLUSTER_DOMAIN}"
|
||||
|
@@ -63,8 +63,9 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "qBittorrent"
|
||||
forecastle.stakater.com/icon: "https://upload.wikimedia.org/wikipedia/commons/thumb/6/66/New_qBittorrent_Logo.svg/600px-New_qBittorrent_Logo.svg.png"
|
||||
@@ -74,6 +75,3 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "qbittorrent.${SECRET_CLUSTER_DOMAIN}"
|
||||
|
@@ -31,43 +31,29 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||
proxy_set_header Accept-Encoding "";
|
||||
sub_filter '</head>' '<link rel="stylesheet" type="text/css" href="https://gilbn.github.io/theme.park/CSS/themes/radarr/space-gray.css"></head>';
|
||||
sub_filter_once on;
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd, networking-buffering-small@kubernetescrd
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Radarr"
|
||||
forecastle.stakater.com/icon: "https://raw.githubusercontent.com/Radarr/Radarr/develop/Logo/256.png"
|
||||
forecastle.stakater.com/network-restricted: "true"
|
||||
# -- Nginx client Body Buffer Size
|
||||
nginx.ingress.kubernetes.io/client-body-buffer-size: "20m"
|
||||
# -- Nginx Proxy Body Size
|
||||
nginx.ingress.kubernetes.io/proxy-body-size: "20m"
|
||||
nginx.ingress.kubernetes.io/proxy-buffering: "off"
|
||||
hosts:
|
||||
- host: radarr.${SECRET_CLUSTER_DOMAIN}
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "radarr.${SECRET_CLUSTER_DOMAIN}"
|
||||
api:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
hosts:
|
||||
- host: "radarr.${SECRET_CLUSTER_DOMAIN}"
|
||||
paths:
|
||||
- path: /api
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "radarr.${SECRET_CLUSTER_DOMAIN}"
|
||||
persistence:
|
||||
config:
|
||||
enabled: true
|
||||
|
@@ -31,14 +31,10 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||
proxy_set_header Accept-Encoding "";
|
||||
sub_filter '</head>' '<link rel="stylesheet" type="text/css" href="https://gilbn.github.io/theme.park/CSS/themes/sabnzbd/space-gray.css"></head>';
|
||||
sub_filter_once on;
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd, networking-buffering-small@kubernetescrd
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "SABnzbd"
|
||||
forecastle.stakater.com/icon: "https://avatars.githubusercontent.com/u/16778130?v=4"
|
||||
@@ -48,22 +44,17 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "sabnzbd.${SECRET_CLUSTER_DOMAIN}"
|
||||
api:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
nameSuffix: "api"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
hosts:
|
||||
- host: "sabnzbd.${SECRET_CLUSTER_DOMAIN}"
|
||||
paths:
|
||||
- path: /api
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "sabnzbd.${SECRET_CLUSTER_DOMAIN}"
|
||||
persistence:
|
||||
config:
|
||||
enabled: true
|
||||
|
@@ -31,43 +31,29 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||
proxy_set_header Accept-Encoding "";
|
||||
sub_filter '</head>' '<link rel="stylesheet" type="text/css" href="https://gilbn.github.io/theme.park/CSS/themes/sonarr/space-gray.css"></head>';
|
||||
sub_filter_once on;
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd, networking-buffering-small@kubernetescrd
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Sonarr"
|
||||
forecastle.stakater.com/icon: "https://raw.githubusercontent.com/Sonarr/Sonarr/develop/Logo/256.png"
|
||||
forecastle.stakater.com/network-restricted: "true"
|
||||
# -- Nginx client Body Buffer Size
|
||||
nginx.ingress.kubernetes.io/client-body-buffer-size: "20m"
|
||||
# -- Nginx Proxy Body Size
|
||||
nginx.ingress.kubernetes.io/proxy-body-size: "20m"
|
||||
nginx.ingress.kubernetes.io/proxy-buffering: "off"
|
||||
hosts:
|
||||
- host: sonarr.${SECRET_CLUSTER_DOMAIN}
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "sonarr.${SECRET_CLUSTER_DOMAIN}"
|
||||
api:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
hosts:
|
||||
- host: "sonarr.${SECRET_CLUSTER_DOMAIN}"
|
||||
paths:
|
||||
- path: /api
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "sonarr.${SECRET_CLUSTER_DOMAIN}"
|
||||
persistence:
|
||||
config:
|
||||
enabled: true
|
||||
|
@@ -62,10 +62,10 @@ spec:
|
||||
ingress:
|
||||
main:
|
||||
enabled: true
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Tdarr"
|
||||
forecastle.stakater.com/icon: "https://raw.githubusercontent.com/HaveAGitGat/Tdarr/master/public/images/icon_dark.png"
|
||||
@@ -75,6 +75,3 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "tdarr.${SECRET_CLUSTER_DOMAIN}"
|
||||
|
@@ -79,9 +79,9 @@ apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd, networking-buffering-small@kubernetescrd
|
||||
forecastle.stakater.com/expose: "true"
|
||||
forecastle.stakater.com/appName: "Travelstories"
|
||||
forecastle.stakater.com/icon: "https://image.flaticon.com/icons/png/512/120/120653.png"
|
||||
@@ -102,6 +102,3 @@ spec:
|
||||
name: travelstories
|
||||
port:
|
||||
number: 80
|
||||
tls:
|
||||
- hosts:
|
||||
- travelstories.${SECRET_CLUSTER_DOMAIN}
|
||||
|
@@ -87,15 +87,11 @@ spec:
|
||||
ingress:
|
||||
enabled: true
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
|
||||
hosts:
|
||||
- host: "blackbox.${SECRET_CLUSTER_DOMAIN}"
|
||||
paths:
|
||||
- path: /
|
||||
pathType: ImplementationSpecific
|
||||
|
||||
tls:
|
||||
- hosts:
|
||||
- "blackbox.${SECRET_CLUSTER_DOMAIN}"
|
||||
pathType: Prefix
|
||||
|
@@ -53,14 +53,6 @@ spec:
|
||||
prometheus.io/probe: "true"
|
||||
prometheus.io/protocol: http
|
||||
|
||||
nodeSelector: {}
|
||||
|
||||
tolerations: []
|
||||
|
||||
affinity: {}
|
||||
|
||||
podAnnotations: {}
|
||||
|
||||
persistence:
|
||||
config:
|
||||
enabled: false
|
||||
@@ -76,6 +68,3 @@ spec:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
tls:
|
||||
- hosts:
|
||||
- "healthchecks.${SECRET_CLUSTER_DOMAIN}"
|
||||
|
@@ -33,13 +33,10 @@ spec:
|
||||
enabled: true
|
||||
pathType: Prefix
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
|
||||
hosts: ["alert-manager.${SECRET_CLUSTER_DOMAIN}"]
|
||||
tls:
|
||||
- hosts:
|
||||
- alert-manager.${SECRET_CLUSTER_DOMAIN}
|
||||
config:
|
||||
global:
|
||||
resolve_timeout: 5m
|
||||
@@ -199,11 +196,9 @@ spec:
|
||||
enabled: true
|
||||
pathType: Prefix
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
hosts: ["grafana.${SECRET_CLUSTER_DOMAIN}"]
|
||||
tls:
|
||||
- hosts:
|
||||
- grafana.${SECRET_CLUSTER_DOMAIN}
|
||||
kubeEtcd:
|
||||
enabled: false
|
||||
kubeControllerManager:
|
||||
@@ -217,13 +212,10 @@ spec:
|
||||
enabled: true
|
||||
pathType: Prefix
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
|
||||
hosts: ["prometheus.${SECRET_CLUSTER_DOMAIN}"]
|
||||
tls:
|
||||
- hosts:
|
||||
- prometheus.${SECRET_CLUSTER_DOMAIN}
|
||||
prometheusSpec:
|
||||
replicas: 2
|
||||
replicaExternalLabelName: "replica"
|
||||
|
@@ -29,10 +29,10 @@ spec:
|
||||
enabled: true
|
||||
hostname: "thanos.${SECRET_CLUSTER_DOMAIN}"
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local./api/verify"
|
||||
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}/"
|
||||
tls: true
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
|
||||
tls: false
|
||||
queryFrontend:
|
||||
enabled: false
|
||||
bucketweb:
|
||||
|
@@ -68,7 +68,8 @@ apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
labels:
|
||||
app.kubernetes.io/instance: uptime-kuma
|
||||
app.kubernetes.io/name: uptime-kuma
|
||||
@@ -86,6 +87,3 @@ spec:
|
||||
name: uptime-kuma
|
||||
port:
|
||||
number: 3001
|
||||
tls:
|
||||
- hosts:
|
||||
- uptime-kuma.${SECRET_CLUSTER_DOMAIN}
|
||||
|
@@ -91,16 +91,14 @@ apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
labels:
|
||||
app.kubernetes.io/instance: authelia
|
||||
app.kubernetes.io/name: authelia
|
||||
name: authelia
|
||||
namespace: networking
|
||||
spec:
|
||||
tls:
|
||||
- hosts:
|
||||
- login.${SECRET_CLUSTER_DOMAIN}
|
||||
rules:
|
||||
- host: login.${SECRET_CLUSTER_DOMAIN}
|
||||
http:
|
||||
|
@@ -23,14 +23,13 @@ spec:
|
||||
|
||||
ingress:
|
||||
enabled: true
|
||||
ingressClassName: "nginx"
|
||||
ingressClassName: "traefik"
|
||||
annotations:
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
hosts:
|
||||
- host: id.${SECRET_CLUSTER_DOMAIN}
|
||||
paths:
|
||||
- path: /
|
||||
tls:
|
||||
- hosts:
|
||||
- id.${SECRET_CLUSTER_DOMAIN}
|
||||
|
||||
geoip:
|
||||
enabled: false
|
||||
|
@@ -32,14 +32,11 @@ spec:
|
||||
ingress:
|
||||
enabled: true
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
|
||||
nginx.ingress.kubernetes.io/proxy-body-size: 10m
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
traefik.ingress.kubernetes.io/router.middlewares: networking-buffering-medium@kubernetescrd
|
||||
hosts:
|
||||
- unifi.${SECRET_CLUSTER_DOMAIN}
|
||||
tls:
|
||||
- hosts:
|
||||
- unifi.${SECRET_CLUSTER_DOMAIN}
|
||||
guiService:
|
||||
type: LoadBalancer
|
||||
externalIPs:
|
||||
|
@@ -5,8 +5,8 @@ metadata:
|
||||
name: rook-ceph-mgr-dashboard
|
||||
namespace: rook-ceph
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: "nginx"
|
||||
nginx.ingress.kubernetes.io/backend-protocol: "HTTP"
|
||||
kubernetes.io/ingress.class: "traefik"
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
|
||||
labels:
|
||||
app.kubernetes.io/instance: rook-ceph-mgr-dashboard
|
||||
app.kubernetes.io/name: rook-ceph-mgr-dashboard
|
||||
@@ -22,6 +22,3 @@ spec:
|
||||
name: rook-ceph-mgr-dashboard
|
||||
port:
|
||||
name: http-dashboard
|
||||
tls:
|
||||
- hosts:
|
||||
- "rook.${SECRET_CLUSTER_DOMAIN}"
|
||||
|
Reference in New Issue
Block a user