Update 5 files

- /internalproxy/templates/heimdall.yaml
- /internalproxy/templates/durpapi.yaml
- /internalproxy/templates/kasm-ingress.yaml
- /internalproxy/templates/nexus.yaml
- /internalproxy/templates/registry.yaml
This commit is contained in:
2023-06-09 01:53:13 +00:00
parent 4256a02cea
commit d9fb933076
5 changed files with 57 additions and 130 deletions

View File

@@ -0,0 +1,20 @@
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: durpapi
namespace: argocd
spec:
project: default
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: durpapi
destination:
namespace: durpapi
name: in-cluster
syncPolicy:
automated:
prune: true
selfHeal: true
syncOptions:
- CreateNamespace=true

View File

@@ -1,70 +0,0 @@
apiVersion: v1
kind: Service
metadata:
name: heimdall
spec:
ports:
- name: app
port: 8443
protocol: TCP
targetPort: 8443
clusterIP: None
type: ClusterIP
---
apiVersion: v1
kind: Endpoints
metadata:
name: heimdall
subsets:
- addresses:
- ip: 192.168.20.253
ports:
- name: app
port: 8443
protocol: TCP
---
apiVersion: traefik.containo.us/v1alpha1
kind: IngressRoute
metadata:
name: heimdall-ingress
spec:
entryPoints:
- websecure
routes:
- match: Host(`heimdall.internal.durp.info`) && PathPrefix(`/`)
middlewares:
- name: whitelist
namespace: traefik
- name: authentik-proxy-provider
namespace: traefik
kind: Rule
services:
- name: heimdall
port: 8200
- match: Host(`heimdall.internal.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
kind: Rule
services:
- name: ak-outpost-authentik-embedded-outpost
namespace: authentik
port: 9000
tls:
secretName: heimdall-tls
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: heimdall-tls
spec:
secretName: heimdall-tls
issuerRef:
name: letsencrypt-production
kind: ClusterIssuer
commonName: "heimdall.internal.durp.info"
dnsNames:
- "heimdall.internal.durp.info"

View File

@@ -24,64 +24,6 @@ subsets:
protocol: TCP
---
#apiVersion: networking.k8s.io/v1
#kind: Ingress
#metadata:
# name: kasm-ingress
# annotations:
# kubernetes.io/ingress.class: traefik
# cert-manager.io/cluster-issuer: letsencrypt-production
# nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
# #nginx.ingress.kubernetes.io/proxy-body-size: 10M
# #nginx.ingress.kubernetes.io/proxy-read-timeout: "1800s"
# #nginx.ingress.kubernetes.io/proxy-send-timeout: "1800s"
# #nginx.ingress.kubernetes.io/proxy_connect_timeout: "1800s"
# nginx.ingress.kubernetes.io/server-snippets: |
# location / {
# # The following configurations must be configured when proxying to Kasm Workspaces
#
# # WebSocket Support
# proxy_set_header Upgrade $http_upgrade;
# proxy_set_header Connection "upgrade";
#
# # Host and X headers
# proxy_set_header Host $host;
# proxy_set_header X-Real-IP $remote_addr;
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Forwarded-Proto $scheme;
#
# # Connectivity Options
# proxy_http_version 1.1;
# proxy_read_timeout 1800s;
# proxy_send_timeout 1800s;
# proxy_connect_timeout 1800s;
# proxy_buffering off;
#
# # Allow large requests to support file uploads to sessions
# client_max_body_size 10M;
#
# # Proxy to Kasm Workspaces running locally on 8443 using ssl
# proxy_pass https://192.168.20.110:8443 ;
# }
#
#
#spec:
# rules:
# - host: kasm.durp.info
# http:
# paths:
# - path: /
# pathType: Prefix
# backend:
# service:
# name: kasm
# port:
# number: 443
# tls:
# - hosts:
# - kasm.durp.info
# secretName: kasm-tls
apiVersion: traefik.containo.us/v1alpha1
kind: IngressRoute
metadata:
@@ -113,3 +55,14 @@ spec:
dnsNames:
- "kasm.durp.info"
---
kind: Service
apiVersion: v1
metadata:
name: heimdall-external-dns
annotations:
external-dns.alpha.kubernetes.io/hostname: kasm.durp.info
spec:
type: ExternalName
externalName: home.durp.info

View File

@@ -57,3 +57,15 @@ spec:
commonName: "nexus.durp.info"
dnsNames:
- "nexus.durp.info"
---
kind: Service
apiVersion: v1
metadata:
name: heimdall-external-dns
annotations:
external-dns.alpha.kubernetes.io/hostname: nexus.durp.info
spec:
type: ExternalName
externalName: home.durp.info

View File

@@ -57,3 +57,15 @@ spec:
commonName: "registry.durp.info"
dnsNames:
- "registry.durp.info"
---
kind: Service
apiVersion: v1
metadata:
name: heimdall-external-dns
annotations:
external-dns.alpha.kubernetes.io/hostname: registry.durp.info
spec:
type: ExternalName
externalName: home.durp.info