initial commit

This commit is contained in:
2022-10-10 17:36:40 -05:00
commit d91a4238cc
86 changed files with 4143 additions and 0 deletions

View File

@@ -0,0 +1,56 @@
apiVersion: v1
kind: Service
metadata:
name: duplicati
spec:
ports:
- name: app
port: 8200
protocol: TCP
targetPort: 8200
clusterIP: None
type: ClusterIP
---
apiVersion: v1
kind: Endpoints
metadata:
name: duplicati
subsets:
- addresses:
- ip: 192.168.20.253
ports:
- name: app
port: 8200
protocol: TCP
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: duplicati-ingress
annotations:
kubernetes.io/ingress.class: nginx
cert-manager.io/cluster-issuer: letsencrypt-production
nginx.ingress.kubernetes.io/whitelist-source-range: "192.168.0.0/16"
nginx.ingress.kubernetes.io/auth-response-headers: Authorization
nginx.ingress.kubernetes.io/auth-url: http://oauth2-proxy.oauth2-proxy.svc.cluster.local/oauth2/auth
nginx.ingress.kubernetes.io/auth-signin: https://oauth.durp.info/oauth2/start?rd=https://$host$request_uri$is_args$args
spec:
rules:
- host: duplicati.internal.durp.info
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: duplicati
port:
number: 8200
tls:
- hosts:
- duplicati.internal.durp.info
secretName: duplicati-tls

View File

@@ -0,0 +1,84 @@
apiVersion: v1
kind: Service
metadata:
name: kasm
spec:
ports:
- name: app
port: 443
protocol: TCP
targetPort: 8443
clusterIP: None
type: ClusterIP
---
apiVersion: v1
kind: Endpoints
metadata:
name: kasm
subsets:
- addresses:
- ip: 192.168.20.110
ports:
- name: app
port: 8443
protocol: TCP
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: kasm-ingress
annotations:
kubernetes.io/ingress.class: nginx
cert-manager.io/cluster-issuer: letsencrypt-production
nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
#nginx.ingress.kubernetes.io/proxy-body-size: 10M
#nginx.ingress.kubernetes.io/proxy-read-timeout: "1800s"
#nginx.ingress.kubernetes.io/proxy-send-timeout: "1800s"
#nginx.ingress.kubernetes.io/proxy_connect_timeout: "1800s"
nginx.ingress.kubernetes.io/server-snippets: |
location / {
# The following configurations must be configured when proxying to Kasm Workspaces
# WebSocket Support
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
# Host and X headers
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
# Connectivity Options
proxy_http_version 1.1;
proxy_read_timeout 1800s;
proxy_send_timeout 1800s;
proxy_connect_timeout 1800s;
proxy_buffering off;
# Allow large requests to support file uploads to sessions
client_max_body_size 10M;
# Proxy to Kasm Workspaces running locally on 8443 using ssl
proxy_pass https://192.168.20.110:8443 ;
}
spec:
rules:
- host: kasm.durp.info
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: kasm
port:
number: 443
tls:
- hosts:
- kasm.durp.info
secretName: kasm-tls

View File

@@ -0,0 +1,53 @@
apiVersion: v1
kind: Service
metadata:
name: minio
spec:
ports:
- name: app
port: 9769
protocol: TCP
targetPort: 9769
clusterIP: None
type: ClusterIP
---
apiVersion: v1
kind: Endpoints
metadata:
name: minio
subsets:
- addresses:
- ip: 192.168.20.253
ports:
- name: app
port: 9769
protocol: TCP
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: minio-ingress
annotations:
kubernetes.io/ingress.class: nginx
cert-manager.io/cluster-issuer: letsencrypt-production
nginx.ingress.kubernetes.io/whitelist-source-range: "192.168.0.0/16"
spec:
rules:
- host: minio.internal.durp.info
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: minio
port:
number: 9769
tls:
- hosts:
- minio.internal.durp.info
secretName: minio-tls

View File

@@ -0,0 +1,54 @@
apiVersion: v1
kind: Service
metadata:
name: overlord
spec:
ports:
- name: app
port: 8006
protocol: TCP
targetPort: 8006
clusterIP: None
type: ClusterIP
---
apiVersion: v1
kind: Endpoints
metadata:
name: overlord
subsets:
- addresses:
- ip: 192.168.20.254
ports:
- name: app
port: 8006
protocol: TCP
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: overlord-ingress
annotations:
kubernetes.io/ingress.class: nginx
cert-manager.io/cluster-issuer: letsencrypt-production
nginx.ingress.kubernetes.io/whitelist-source-range: "192.168.0.0/16"
nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
spec:
rules:
- host: overlord.internal.durp.info
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: overlord
port:
number: 8006
tls:
- hosts:
- overlord.internal.durp.info
secretName: overlord-tls

View File

@@ -0,0 +1,54 @@
apiVersion: v1
kind: Service
metadata:
name: pfsense
spec:
ports:
- name: app
port: 443
protocol: TCP
targetPort: 443
clusterIP: None
type: ClusterIP
---
apiVersion: v1
kind: Endpoints
metadata:
name: pfsense
subsets:
- addresses:
- ip: 192.168.20.1
ports:
- name: app
port: 443
protocol: TCP
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: pfsense-ingress
annotations:
kubernetes.io/ingress.class: nginx
cert-manager.io/cluster-issuer: letsencrypt-production
nginx.ingress.kubernetes.io/whitelist-source-range: "192.168.0.0/16"
nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
spec:
rules:
- host: pfsense.internal.durp.info
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: pfsense
port:
number: 443
tls:
- hosts:
- pfsense.internal.durp.info
secretName: pfsense-tls

View File

@@ -0,0 +1,53 @@
apiVersion: v1
kind: Service
metadata:
name: plex
spec:
ports:
- name: app
port: 32400
protocol: TCP
targetPort: 32400
clusterIP: None
type: ClusterIP
---
apiVersion: v1
kind: Endpoints
metadata:
name: plex
subsets:
- addresses:
- ip: 192.168.20.253
ports:
- name: app
port: 32400
protocol: TCP
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: plex-ingress
annotations:
kubernetes.io/ingress.class: nginx
cert-manager.io/cluster-issuer: letsencrypt-production
nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
spec:
rules:
- host: plex.durp.info
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: plex
port:
number: 32400
tls:
- hosts:
- plex.durp.info
secretName: plex-tls

View File

@@ -0,0 +1,54 @@
apiVersion: v1
kind: Service
metadata:
name: unraid
spec:
ports:
- name: app
port: 443
protocol: TCP
targetPort: 443
clusterIP: None
type: ClusterIP
---
apiVersion: v1
kind: Endpoints
metadata:
name: unraid
subsets:
- addresses:
- ip: 192.168.20.253
ports:
- name: app
port: 443
protocol: TCP
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: unraid-ingress
annotations:
kubernetes.io/ingress.class: nginx
cert-manager.io/cluster-issuer: letsencrypt-production
nginx.ingress.kubernetes.io/whitelist-source-range: "192.168.0.0/16"
nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
spec:
rules:
- host: unraid.internal.durp.info
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: unraid
port:
number: 443
tls:
- hosts:
- unraid.internal.durp.info
secretName: unraid-tls