Update 5 files
- /internalproxy/templates/heimdall.yaml - /internalproxy/templates/durpapi.yaml - /internalproxy/templates/kasm-ingress.yaml - /internalproxy/templates/nexus.yaml - /internalproxy/templates/registry.yaml
This commit is contained in:
20
internalproxy/templates/durpapi.yaml
Normal file
20
internalproxy/templates/durpapi.yaml
Normal file
@@ -0,0 +1,20 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: durpapi
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: main
|
||||
path: durpapi
|
||||
destination:
|
||||
namespace: durpapi
|
||||
name: in-cluster
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
@@ -1,70 +0,0 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: heimdall
|
||||
spec:
|
||||
ports:
|
||||
- name: app
|
||||
port: 8443
|
||||
protocol: TCP
|
||||
targetPort: 8443
|
||||
clusterIP: None
|
||||
type: ClusterIP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Endpoints
|
||||
metadata:
|
||||
name: heimdall
|
||||
subsets:
|
||||
- addresses:
|
||||
- ip: 192.168.20.253
|
||||
ports:
|
||||
- name: app
|
||||
port: 8443
|
||||
protocol: TCP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: heimdall-ingress
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`heimdall.internal.durp.info`) && PathPrefix(`/`)
|
||||
middlewares:
|
||||
- name: whitelist
|
||||
namespace: traefik
|
||||
- name: authentik-proxy-provider
|
||||
namespace: traefik
|
||||
kind: Rule
|
||||
services:
|
||||
- name: heimdall
|
||||
port: 8200
|
||||
- match: Host(`heimdall.internal.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: ak-outpost-authentik-embedded-outpost
|
||||
namespace: authentik
|
||||
port: 9000
|
||||
tls:
|
||||
secretName: heimdall-tls
|
||||
|
||||
---
|
||||
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: heimdall-tls
|
||||
spec:
|
||||
secretName: heimdall-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "heimdall.internal.durp.info"
|
||||
dnsNames:
|
||||
- "heimdall.internal.durp.info"
|
||||
@@ -24,64 +24,6 @@ subsets:
|
||||
protocol: TCP
|
||||
---
|
||||
|
||||
#apiVersion: networking.k8s.io/v1
|
||||
#kind: Ingress
|
||||
#metadata:
|
||||
# name: kasm-ingress
|
||||
# annotations:
|
||||
# kubernetes.io/ingress.class: traefik
|
||||
# cert-manager.io/cluster-issuer: letsencrypt-production
|
||||
# nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
|
||||
# #nginx.ingress.kubernetes.io/proxy-body-size: 10M
|
||||
# #nginx.ingress.kubernetes.io/proxy-read-timeout: "1800s"
|
||||
# #nginx.ingress.kubernetes.io/proxy-send-timeout: "1800s"
|
||||
# #nginx.ingress.kubernetes.io/proxy_connect_timeout: "1800s"
|
||||
# nginx.ingress.kubernetes.io/server-snippets: |
|
||||
# location / {
|
||||
# # The following configurations must be configured when proxying to Kasm Workspaces
|
||||
#
|
||||
# # WebSocket Support
|
||||
# proxy_set_header Upgrade $http_upgrade;
|
||||
# proxy_set_header Connection "upgrade";
|
||||
#
|
||||
# # Host and X headers
|
||||
# proxy_set_header Host $host;
|
||||
# proxy_set_header X-Real-IP $remote_addr;
|
||||
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
# proxy_set_header X-Forwarded-Proto $scheme;
|
||||
#
|
||||
# # Connectivity Options
|
||||
# proxy_http_version 1.1;
|
||||
# proxy_read_timeout 1800s;
|
||||
# proxy_send_timeout 1800s;
|
||||
# proxy_connect_timeout 1800s;
|
||||
# proxy_buffering off;
|
||||
#
|
||||
# # Allow large requests to support file uploads to sessions
|
||||
# client_max_body_size 10M;
|
||||
#
|
||||
# # Proxy to Kasm Workspaces running locally on 8443 using ssl
|
||||
# proxy_pass https://192.168.20.110:8443 ;
|
||||
# }
|
||||
#
|
||||
#
|
||||
#spec:
|
||||
# rules:
|
||||
# - host: kasm.durp.info
|
||||
# http:
|
||||
# paths:
|
||||
# - path: /
|
||||
# pathType: Prefix
|
||||
# backend:
|
||||
# service:
|
||||
# name: kasm
|
||||
# port:
|
||||
# number: 443
|
||||
# tls:
|
||||
# - hosts:
|
||||
# - kasm.durp.info
|
||||
# secretName: kasm-tls
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
@@ -113,3 +55,14 @@ spec:
|
||||
dnsNames:
|
||||
- "kasm.durp.info"
|
||||
|
||||
---
|
||||
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: heimdall-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: kasm.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: home.durp.info
|
||||
|
||||
@@ -56,4 +56,16 @@ spec:
|
||||
kind: ClusterIssuer
|
||||
commonName: "nexus.durp.info"
|
||||
dnsNames:
|
||||
- "nexus.durp.info"
|
||||
- "nexus.durp.info"
|
||||
|
||||
---
|
||||
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: heimdall-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: nexus.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: home.durp.info
|
||||
@@ -56,4 +56,16 @@ spec:
|
||||
kind: ClusterIssuer
|
||||
commonName: "registry.durp.info"
|
||||
dnsNames:
|
||||
- "registry.durp.info"
|
||||
- "registry.durp.info"
|
||||
|
||||
---
|
||||
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: heimdall-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: registry.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: home.durp.info
|
||||
Reference in New Issue
Block a user