Update 10 files

- /internalproxy/templates/unraid-ingress.yaml
- /internalproxy/templates/wazuh.yaml
- /internalproxy/templates/plex-ingress.yaml
- /internalproxy/templates/pfsense-ingress.yaml
- /internalproxy/templates/overlord-ingress.yaml
- /internalproxy/templates/octopus-ingress.yaml
- /internalproxy/templates/minio-ingress.yaml
- /internalproxy/templates/jellyfin.yaml
- /internalproxy/templates/blueiris.yaml
- /internalproxy/templates/kasm-ingress.yaml
This commit is contained in:
2023-12-31 17:13:01 +00:00
parent d8649ef2a2
commit b9a1543a3c
10 changed files with 0 additions and 676 deletions

View File

@@ -1,62 +0,0 @@
apiVersion: v1
kind: Service
metadata:
name: blueiris
spec:
ports:
- name: app
port: 81
protocol: TCP
targetPort: 81
clusterIP: None
type: ClusterIP
---
apiVersion: v1
kind: Endpoints
metadata:
name: blueiris
subsets:
- addresses:
- ip: 192.168.20.101
ports:
- name: app
port: 81
protocol: TCP
---
apiVersion: traefik.containo.us/v1alpha1
kind: IngressRoute
metadata:
name: blueiris-ingress
spec:
entryPoints:
- websecure
routes:
- match: Host(`blueiris.internal.durp.info`) && PathPrefix(`/`)
middlewares:
- name: whitelist
namespace: traefik
kind: Rule
services:
- name: blueiris
port: 81
tls:
secretName: blueiris-tls
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: blueiris-tls
spec:
secretName: blueiris-tls
issuerRef:
name: letsencrypt-production
kind: ClusterIssuer
commonName: "blueiris.internal.durp.info"
dnsNames:
- "blueiris.internal.durp.info"

View File

@@ -1,75 +0,0 @@
#apiVersion: v1
#kind: Service
#metadata:
# name: jellyfin
#spec:
# ports:
# - name: app
# port: 8096
# protocol: TCP
# targetPort: 8096
# clusterIP: None
# type: ClusterIP
#
#---
#
#apiVersion: v1
#kind: Endpoints
#metadata:
# name: jellyfin
#subsets:
#- addresses:
# - ip: 192.168.20.253
# ports:
# - name: app
# port: 8096
# protocol: TCP
#
#---
#
#apiVersion: traefik.containo.us/v1alpha1
#kind: IngressRoute
#metadata:
# name: jellyfin-ingress
# annotations:
# cert-manager.io/cluster-issuer: letsencrypt-production
#spec:
# entryPoints:
# - websecure
# routes:
# - match: Host(`jellyfin.durp.info`)
# kind: Rule
# services:
# - name: jellyfin
# port: 8096
# scheme: http
# tls:
# secretName: jellyfin-tls
#
#---
#
#apiVersion: cert-manager.io/v1
#kind: Certificate
#metadata:
# name: jellyfin-tls
#spec:
# secretName: jellyfin-tls
# issuerRef:
# name: letsencrypt-production
# kind: ClusterIssuer
# commonName: "jellyfin.durp.info"
# dnsNames:
# - "jellyfin.durp.info"
#
#---
#
#kind: Service
#apiVersion: v1
#metadata:
# name: jellyfin-external-dns
# annotations:
# external-dns.alpha.kubernetes.io/hostname: jellyfin.durp.info
#spec:
# type: ExternalName
# externalName: durp.info
#

View File

@@ -1,68 +0,0 @@
apiVersion: v1
kind: Service
metadata:
name: kasm
spec:
ports:
- name: app
port: 443
protocol: TCP
targetPort: 443
clusterIP: None
type: ClusterIP
---
apiVersion: v1
kind: Endpoints
metadata:
name: kasm
subsets:
- addresses:
- ip: 192.168.20.100
ports:
- name: app
port: 443
protocol: TCP
---
apiVersion: traefik.containo.us/v1alpha1
kind: IngressRoute
metadata:
name: kasm-ingress
spec:
entryPoints:
- websecure
routes:
- match: Host(`kasm.durp.info`) && PathPrefix(`/`)
kind: Rule
services:
- name: kasm
port: 443
tls:
secretName: kasm-tls
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: kasm-tls
spec:
secretName: kasm-tls
issuerRef:
name: letsencrypt-production
kind: ClusterIssuer
commonName: "kasm.durp.info"
dnsNames:
- "kasm.durp.info"
---
kind: Service
apiVersion: v1
metadata:
name: kasm-external-dns
annotations:
external-dns.alpha.kubernetes.io/hostname: kasm.durp.info
spec:
type: ExternalName
externalName: durp.info

View File

@@ -1,65 +0,0 @@
#apiVersion: v1
#kind: Service
#metadata:
# name: minio
#spec:
# ports:
# - name: app
# port: 9769
# protocol: TCP
# targetPort: 9769
# clusterIP: None
# type: ClusterIP
#
#---
#
#apiVersion: v1
#kind: Endpoints
#metadata:
# name: minio
#subsets:
#- addresses:
# - ip: 192.168.20.253
# ports:
# - name: app
# port: 9769
# protocol: TCP
#
#---
#
#apiVersion: traefik.containo.us/v1alpha1
#kind: IngressRoute
#metadata:
# name: minio-ingress
# annotations:
# cert-manager.io/cluster-issuer: letsencrypt-production
#spec:
# entryPoints:
# - websecure
# routes:
# - match: Host(`minio.internal.durp.info`)
# middlewares:
# - name: whitelist
# namespace: traefik
# kind: Rule
# services:
# - name: minio
# port: 9769
# scheme: http
# tls:
# secretName: minio-tls
#
#---
#
#apiVersion: cert-manager.io/v1
#kind: Certificate
#metadata:
# name: minio-tls
#spec:
# secretName: minio-tls
# issuerRef:
# name: letsencrypt-production
# kind: ClusterIssuer
# commonName: "minio.internal.durp.info"
# dnsNames:
# - "minio.internal.durp.info"

View File

@@ -1,65 +0,0 @@
#apiVersion: v1
#kind: Service
#metadata:
# name: octopus
#spec:
# ports:
# - name: app
# port: 443
# protocol: TCP
# targetPort: 443
# clusterIP: None
# type: ClusterIP
#
#---
#
#apiVersion: v1
#kind: Endpoints
#metadata:
# name: octopus
#subsets:
#- addresses:
# - ip: 192.168.20.103
# ports:
# - name: app
# port: 443
# protocol: TCP
#
#---
#
#apiVersion: traefik.containo.us/v1alpha1
#kind: IngressRoute
#metadata:
# name: octopus-ingress
# annotations:
# cert-manager.io/cluster-issuer: letsencrypt-production
#spec:
# entryPoints:
# - websecure
# routes:
# - match: Host(`octopus.internal.durp.info`)
# middlewares:
# - name: whitelist
# namespace: traefik
# kind: Rule
# services:
# - name: octopus
# port: 443
# scheme: https
# tls:
# secretName: octopus-tls
#
#---
#
#apiVersion: cert-manager.io/v1
#kind: Certificate
#metadata:
# name: octopus-tls
#spec:
# secretName: octopus-tls
# issuerRef:
# name: letsencrypt-production
# kind: ClusterIssuer
# commonName: "octopus.internal.durp.info"
# dnsNames:
# - "octopus.internal.durp.info"

View File

@@ -1,65 +0,0 @@
#apiVersion: v1
#kind: Service
#metadata:
# name: overlord
#spec:
# ports:
# - name: app
# port: 8006
# protocol: TCP
# targetPort: 8006
# clusterIP: None
# type: ClusterIP
#
#---
#
#apiVersion: v1
#kind: Endpoints
#metadata:
# name: overlord
#subsets:
#- addresses:
# - ip: 192.168.21.254
# ports:
# - name: app
# port: 8006
# protocol: TCP
#
#---
#
#apiVersion: traefik.containo.us/v1alpha1
#kind: IngressRoute
#metadata:
# name: overlord-ingress
# annotations:
# cert-manager.io/cluster-issuer: letsencrypt-production
#spec:
# entryPoints:
# - websecure
# routes:
# - match: Host(`overlord.internal.durp.info`)
# middlewares:
# - name: whitelist
# namespace: traefik
# kind: Rule
# services:
# - name: overlord
# port: 8006
# scheme: https
# tls:
# secretName: overlord-tls
#
#---
#
#apiVersion: cert-manager.io/v1
#kind: Certificate
#metadata:
# name: overlord-tls
#spec:
# secretName: overlord-tls
# issuerRef:
# name: letsencrypt-production
# kind: ClusterIssuer
# commonName: "overlord.internal.durp.info"
# dnsNames:
# - "overlord.internal.durp.info"

View File

@@ -1,66 +0,0 @@
#apiVersion: v1
#kind: Service
#metadata:
# name: pfsense
#spec:
# ports:
# - name: app
# port: 10443
# protocol: TCP
# targetPort: 10443
# clusterIP: None
# type: ClusterIP
#
#---
#
#apiVersion: v1
#kind: Endpoints
#metadata:
# name: pfsense
#subsets:
#- addresses:
# - ip: 192.168.20.1
# ports:
# - name: app
# port: 10443
# protocol: TCP
#
#---
#
#apiVersion: traefik.containo.us/v1alpha1
#kind: IngressRoute
#metadata:
# name: pfsense-ingress
# annotations:
# cert-manager.io/cluster-issuer: letsencrypt-production
#spec:
# entryPoints:
# - websecure
# routes:
# - match: Host(`pfsense.internal.durp.info`)
# middlewares:
# - name: whitelist
# namespace: traefik
# kind: Rule
# services:
# - name: pfsense
# port: 10443
# scheme: https
# tls:
# secretName: pfsense-tls
#
#---
#
#apiVersion: cert-manager.io/v1
#kind: Certificate
#metadata:
# name: pfsense-tls
#spec:
# secretName: pfsense-tls
# issuerRef:
# name: letsencrypt-production
# kind: ClusterIssuer
# commonName: "pfsense.internal.durp.info"
# dnsNames:
# - "pfsense.internal.durp.info"
#

View File

@@ -1,74 +0,0 @@
#apiVersion: v1
#kind: Service
#metadata:
# name: plex
#spec:
# ports:
# - name: app
# port: 32400
# protocol: TCP
# targetPort: 32400
# clusterIP: None
# type: ClusterIP
#
#---
#
#apiVersion: v1
#kind: Endpoints
#metadata:
# name: plex
#subsets:
#- addresses:
# - ip: 192.168.20.253
# ports:
# - name: app
# port: 32400
# protocol: TCP
#
#---
#
#apiVersion: traefik.containo.us/v1alpha1
#kind: IngressRoute
#metadata:
# name: plex-ingress
# annotations:
# cert-manager.io/cluster-issuer: letsencrypt-production
#spec:
# entryPoints:
# - websecure
# routes:
# - match: Host(`plex.durp.info`)
# kind: Rule
# services:
# - name: plex
# port: 32400
# scheme: https
# tls:
# secretName: plex-tls
#
#---
#
#apiVersion: cert-manager.io/v1
#kind: Certificate
#metadata:
# name: plex-tls
#spec:
# secretName: plex-tls
# issuerRef:
# name: letsencrypt-production
# kind: ClusterIssuer
# commonName: "plex.durp.info"
# dnsNames:
# - "plex.durp.info"
#
#---
#
#kind: Service
#apiVersion: v1
#metadata:
# name: plex-external-dns
# annotations:
# external-dns.alpha.kubernetes.io/hostname: plex.durp.info
#spec:
# type: ExternalName
# externalName: home.durp.info

View File

@@ -1,65 +0,0 @@
#apiVersion: v1
#kind: Service
#metadata:
# name: unraid
#spec:
# ports:
# - name: app
# port: 443
# protocol: TCP
# targetPort: 443
# clusterIP: None
# type: ClusterIP
#
#---
#
#apiVersion: v1
#kind: Endpoints
#metadata:
# name: unraid
#subsets:
#- addresses:
# - ip: 192.168.20.253
# ports:
# - name: app
# port: 443
# protocol: TCP
#
#---
#
#apiVersion: traefik.containo.us/v1alpha1
#kind: IngressRoute
#metadata:
# name: unraid-ingress
# annotations:
# cert-manager.io/cluster-issuer: letsencrypt-production
#spec:
# entryPoints:
# - websecure
# routes:
# - match: Host(`unraid.internal.durp.info`)
# middlewares:
# - name: whitelist
# namespace: traefik
# kind: Rule
# services:
# - name: unraid
# port: 443
# scheme: https
# tls:
# secretName: unraid-tls
#
#---
#
#apiVersion: cert-manager.io/v1
#kind: Certificate
#metadata:
# name: unraid-tls
#spec:
# secretName: unraid-tls
# issuerRef:
# name: letsencrypt-production
# kind: ClusterIssuer
# commonName: "unraid.internal.durp.info"
# dnsNames:
#

View File

@@ -1,71 +0,0 @@
apiVersion: v1
kind: Service
metadata:
name: wazuh
spec:
ports:
- name: app
port: 443
protocol: TCP
targetPort: 443
clusterIP: None
type: ClusterIP
---
apiVersion: v1
kind: Endpoints
metadata:
name: wazuh
subsets:
- addresses:
- ip: 192.168.20.102
ports:
- name: app
port: 443
protocol: TCP
---
apiVersion: traefik.containo.us/v1alpha1
kind: IngressRoute
metadata:
name: wazuh-ingress
spec:
entryPoints:
- websecure
routes:
- match: Host(`wazuh.durp.info`) && PathPrefix(`/`)
kind: Rule
services:
- name: wazuh
port: 443
tls:
secretName: wazuh-tls
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: wazuh-tls
spec:
secretName: wazuh-tls
issuerRef:
name: letsencrypt-production
kind: ClusterIssuer
commonName: "wazuh.durp.info"
dnsNames:
- "wazuh.durp.info"
---
kind: Service
apiVersion: v1
metadata:
name: wazuh-external-dns
annotations:
external-dns.alpha.kubernetes.io/hostname: wazuh.durp.info
spec:
type: ExternalName
externalName: durp.info