diff --git a/internalproxy/templates/octopus.yaml b/internalproxy/templates/octopus.yaml new file mode 100644 index 0000000..e0e5d78 --- /dev/null +++ b/internalproxy/templates/octopus.yaml @@ -0,0 +1,63 @@ +apiVersion: v1 +kind: Service +metadata: + name: octopus +spec: + ports: + - name: app + port: 443 + protocol: TCP + targetPort: 443 + clusterIP: None + type: ClusterIP + +--- + +apiVersion: v1 +kind: Endpoints +metadata: + name: octopus +subsets: + - addresses: + - ip: 192.168.20.105 + ports: + - name: app + port: 443 + protocol: TCP + +--- + +apiVersion: traefik.containo.us/v1alpha1 +kind: IngressRoute +metadata: + name: octopus-ingress +spec: + entryPoints: + - websecure + routes: + - match: Host(`octopus.internal.durp.info`) && PathPrefix(`/`) + middlewares: + - name: whitelist + namespace: traefik + kind: Rule + services: + - name: octopus + port: 443 + scheme: https + tls: + secretName: octopus-tls + +--- + +apiVersion: cert-manager.io/v1 +kind: Certificate +metadata: + name: octopus-tls +spec: + secretName: octopus-tls + issuerRef: + name: letsencrypt-production + kind: ClusterIssuer + commonName: "octopus.internal.durp.info" + dnsNames: + - "octopus.internal.durp.info" diff --git a/internalproxy/templates/pfsense.yaml b/internalproxy/templates/pfsense.yaml index dee9e7f..45d45e8 100644 --- a/internalproxy/templates/pfsense.yaml +++ b/internalproxy/templates/pfsense.yaml @@ -7,7 +7,7 @@ spec: - name: app port: 10443 protocol: TCP - targetPort: 10433 + targetPort: 10443 clusterIP: None type: ClusterIP diff --git a/internalproxy/templates/unraid.yaml b/internalproxy/templates/unraid.yaml new file mode 100644 index 0000000..9c62edc --- /dev/null +++ b/internalproxy/templates/unraid.yaml @@ -0,0 +1,63 @@ +apiVersion: v1 +kind: Service +metadata: + name: unraid +spec: + ports: + - name: app + port: 443 + protocol: TCP + targetPort: 443 + clusterIP: None + type: ClusterIP + +--- + +apiVersion: v1 +kind: Endpoints +metadata: + name: unraid +subsets: + - addresses: + - ip: 192.168.20.253 + ports: + - name: app + port: 443 + protocol: TCP + +--- + +apiVersion: traefik.containo.us/v1alpha1 +kind: IngressRoute +metadata: + name: unraid-ingress +spec: + entryPoints: + - websecure + routes: + - match: Host(`unraid.internal.durp.info`) && PathPrefix(`/`) + middlewares: + - name: whitelist + namespace: traefik + kind: Rule + services: + - name: unraid + port: 443 + scheme: https + tls: + secretName: unraid-tls + +--- + +apiVersion: cert-manager.io/v1 +kind: Certificate +metadata: + name: unraid-tls +spec: + secretName: unraid-tls + issuerRef: + name: letsencrypt-production + kind: ClusterIssuer + commonName: "unraid.internal.durp.info" + dnsNames: + - "unraid.internal.durp.info"