From e06a35f1a27db0381a63a770285735c77e33ea6b Mon Sep 17 00:00:00 2001 From: DeveloperDurp Date: Mon, 13 May 2024 05:08:56 -0500 Subject: [PATCH] update --- authentik/templates/ingress.yaml | 6 +- bitwarden/templates/ingress.yaml | 8 +- durpapi/templates/ingress.yaml | 4 +- heimdall/templates/ingress.yaml | 8 +- internalproxy/templates/argocd.yaml | 6 +- .../templates/duplicati-ingress.yaml | 70 ---------------- internalproxy/templates/gitea.yaml | 9 -- internalproxy/templates/guac.yaml | 71 ---------------- internalproxy/templates/jellyfin.yaml | 9 -- internalproxy/templates/kasm.yaml | 9 -- internalproxy/templates/nexus.yaml | 71 ---------------- internalproxy/templates/plex.yaml | 9 -- .../templates/registry-internal.yaml | 59 ------------- internalproxy/templates/registry.yaml | 71 ---------------- internalproxy/templates/smokeping.yaml | 82 ------------------- internalproxy/templates/speedtest.yaml | 74 ----------------- internalproxy/templates/tdarr.yaml | 67 --------------- krakend/templates/ingress.yaml | 10 +-- kube-prometheus-stack/templates/ingress.yaml | 16 ++-- kubeclarity/templates/ingress.yaml | 10 +-- littlelink/templates/ingress.yaml | 10 +-- longhorn/templates/ingress.yaml | 8 +- open-webui/templates/ingress.yaml | 10 +-- uptimekuma/templates/ingress.yaml | 10 +-- vault/templates/ingress.yaml | 6 +- 25 files changed, 56 insertions(+), 657 deletions(-) delete mode 100644 internalproxy/templates/duplicati-ingress.yaml delete mode 100644 internalproxy/templates/gitea.yaml delete mode 100644 internalproxy/templates/guac.yaml delete mode 100644 internalproxy/templates/jellyfin.yaml delete mode 100644 internalproxy/templates/kasm.yaml delete mode 100644 internalproxy/templates/nexus.yaml delete mode 100644 internalproxy/templates/plex.yaml delete mode 100644 internalproxy/templates/registry-internal.yaml delete mode 100644 internalproxy/templates/registry.yaml delete mode 100644 internalproxy/templates/smokeping.yaml delete mode 100644 internalproxy/templates/speedtest.yaml delete mode 100644 internalproxy/templates/tdarr.yaml diff --git a/authentik/templates/ingress.yaml b/authentik/templates/ingress.yaml index ac10303..1de2d83 100644 --- a/authentik/templates/ingress.yaml +++ b/authentik/templates/ingress.yaml @@ -6,7 +6,7 @@ spec: entryPoints: - websecure routes: - - match: Host(`authentik.durp.info`) && PathPrefix(`/`) + - match: Host(`authentik.dev.durp.info`) && PathPrefix(`/`) kind: Rule services: - name: authentik-server @@ -25,9 +25,9 @@ spec: issuerRef: name: letsencrypt-production kind: ClusterIssuer - commonName: "authentik.durp.info" + commonName: "authentik.dev.durp.info" dnsNames: - - "authentik.durp.info" + - "authentik.dev.durp.info" --- diff --git a/bitwarden/templates/ingress.yaml b/bitwarden/templates/ingress.yaml index 8a9a628..49cfa24 100644 --- a/bitwarden/templates/ingress.yaml +++ b/bitwarden/templates/ingress.yaml @@ -6,7 +6,7 @@ spec: entryPoints: - websecure routes: - - match: Host(`bitwarden.durp.info`) && PathPrefix(`/`) + - match: Host(`bitwarden.dev.durp.info`) && PathPrefix(`/`) kind: Rule services: - name: bitwarden @@ -25,9 +25,9 @@ spec: issuerRef: name: letsencrypt-production kind: ClusterIssuer - commonName: "bitwarden.durp.info" + commonName: "bitwarden.dev.durp.info" dnsNames: - - "bitwarden.durp.info" + - "bitwarden.dev.durp.info" --- @@ -39,4 +39,4 @@ metadata: external-dns.alpha.kubernetes.io/hostname: bitwarden.durp.info spec: type: ExternalName - externalName: durp.info \ No newline at end of file + externalName: durp.info diff --git a/durpapi/templates/ingress.yaml b/durpapi/templates/ingress.yaml index bd268dd..b722670 100644 --- a/durpapi/templates/ingress.yaml +++ b/durpapi/templates/ingress.yaml @@ -6,7 +6,7 @@ spec: entryPoints: - websecure routes: - - match: Host("api.durp.info") && PathPrefix(`/api`) + - match: Host("api.dev.durp.info") && PathPrefix(`/api`) kind: Rule middlewares: - name: jwt @@ -24,7 +24,7 @@ spec: entryPoints: - websecure routes: - - match: Host("api.durp.info") && PathPrefix(`/swagger`) + - match: Host("api.dev.durp.info") && PathPrefix(`/swagger`) kind: Rule services: - name: "durpapi-service" diff --git a/heimdall/templates/ingress.yaml b/heimdall/templates/ingress.yaml index 98b6144..49dd1c7 100644 --- a/heimdall/templates/ingress.yaml +++ b/heimdall/templates/ingress.yaml @@ -7,7 +7,7 @@ spec: entryPoints: - websecure routes: - - match: Host(`heimdall.durp.info`) && PathPrefix(`/`) + - match: Host(`heimdall.dev.durp.info`) && PathPrefix(`/`) middlewares: - name: authentik-proxy-provider namespace: traefik @@ -15,7 +15,7 @@ spec: services: - name: heimdall port: 80 - - match: Host(`heimdall.durp.info`) && PathPrefix(`/outpost.goauthentik.io`) + - match: Host(`heimdall.dev.durp.info`) && PathPrefix(`/outpost.goauthentik.io`) kind: Rule services: - name: ak-outpost-authentik-embedded-outpost @@ -35,9 +35,9 @@ spec: issuerRef: name: letsencrypt-production kind: ClusterIssuer - commonName: "heimdall.durp.info" + commonName: "heimdall.dev.durp.info" dnsNames: - - "heimdall.durp.info" + - "heimdall.dev.durp.info" --- diff --git a/internalproxy/templates/argocd.yaml b/internalproxy/templates/argocd.yaml index 15dfaf9..01d5862 100644 --- a/internalproxy/templates/argocd.yaml +++ b/internalproxy/templates/argocd.yaml @@ -8,7 +8,7 @@ spec: entryPoints: - websecure routes: - - match: Host(`argocd.internal.durp.info`) + - match: Host(`argocd.dev.internal.durp.info`) middlewares: - name: whitelist namespace: traefik @@ -41,6 +41,6 @@ spec: issuerRef: name: letsencrypt-production kind: ClusterIssuer - commonName: "argocd.internal.durp.info" + commonName: "argocd.dev.internal.durp.info" dnsNames: - - "argocd.internal.durp.info" \ No newline at end of file + - "argocd.dev.internal.durp.info" diff --git a/internalproxy/templates/duplicati-ingress.yaml b/internalproxy/templates/duplicati-ingress.yaml deleted file mode 100644 index d51c391..0000000 --- a/internalproxy/templates/duplicati-ingress.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: duplicati -spec: - ports: - - name: app - port: 8200 - protocol: TCP - targetPort: 8200 - clusterIP: None - type: ClusterIP - ---- - -apiVersion: v1 -kind: Endpoints -metadata: - name: duplicati -subsets: -- addresses: - - ip: 192.168.20.253 - ports: - - name: app - port: 8200 - protocol: TCP - ---- - -apiVersion: traefik.containo.us/v1alpha1 -kind: IngressRoute -metadata: - name: duplicati-ingress -spec: - entryPoints: - - websecure - routes: - - match: Host(`duplicati.internal.durp.info`) && PathPrefix(`/`) - middlewares: - - name: whitelist - namespace: traefik - - name: authentik-proxy-provider - namespace: traefik - kind: Rule - services: - - name: duplicati - port: 8200 - - match: Host(`duplicati.internal.durp.info`) && PathPrefix(`/outpost.goauthentik.io`) - kind: Rule - services: - - name: ak-outpost-authentik-embedded-outpost - namespace: authentik - port: 9000 - tls: - secretName: duplicati-tls - ---- - -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: duplicati-tls -spec: - secretName: duplicati-tls - issuerRef: - name: letsencrypt-production - kind: ClusterIssuer - commonName: "duplicati.internal.durp.info" - dnsNames: - - "duplicati.internal.durp.info" \ No newline at end of file diff --git a/internalproxy/templates/gitea.yaml b/internalproxy/templates/gitea.yaml deleted file mode 100644 index 8443aaf..0000000 --- a/internalproxy/templates/gitea.yaml +++ /dev/null @@ -1,9 +0,0 @@ -kind: Service -apiVersion: v1 -metadata: - name: gitea-external-dns - annotations: - external-dns.alpha.kubernetes.io/hostname: gitea.durp.info -spec: - type: ExternalName - externalName: durp.info \ No newline at end of file diff --git a/internalproxy/templates/guac.yaml b/internalproxy/templates/guac.yaml deleted file mode 100644 index a69b685..0000000 --- a/internalproxy/templates/guac.yaml +++ /dev/null @@ -1,71 +0,0 @@ -kind: Service -apiVersion: v1 -metadata: - name: guac-external-dns - annotations: - external-dns.alpha.kubernetes.io/hostname: guac.durp.info -spec: - type: ExternalName - externalName: durp.info - ---- - -apiVersion: v1 -kind: Service -metadata: - name: guac -spec: - ports: - - name: app - port: 8082 - protocol: TCP - targetPort: 8082 - clusterIP: None - type: ClusterIP - ---- - -apiVersion: v1 -kind: Endpoints -metadata: - name: guac -subsets: -- addresses: - - ip: 192.168.20.253 - ports: - - name: app - port: 8082 - protocol: TCP - ---- - -apiVersion: traefik.containo.us/v1alpha1 -kind: IngressRoute -metadata: - name: guac-ingress -spec: - entryPoints: - - websecure - routes: - - match: Host(`guac.durp.info`) && PathPrefix(`/`) - kind: Rule - services: - - name: guac - port: 8082 - tls: - secretName: guac-tls - ---- - -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: guac-tls -spec: - secretName: guac-tls - issuerRef: - name: letsencrypt-production - kind: ClusterIssuer - commonName: "guac.durp.info" - dnsNames: - - "guac.durp.info" \ No newline at end of file diff --git a/internalproxy/templates/jellyfin.yaml b/internalproxy/templates/jellyfin.yaml deleted file mode 100644 index 61d86a5..0000000 --- a/internalproxy/templates/jellyfin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -kind: Service -apiVersion: v1 -metadata: - name: jellyfin-external-dns - annotations: - external-dns.alpha.kubernetes.io/hostname: jellyfin.durp.info -spec: - type: ExternalName - externalName: durp.info diff --git a/internalproxy/templates/kasm.yaml b/internalproxy/templates/kasm.yaml deleted file mode 100644 index 28b25ae..0000000 --- a/internalproxy/templates/kasm.yaml +++ /dev/null @@ -1,9 +0,0 @@ -kind: Service -apiVersion: v1 -metadata: - name: kasm-external-dns - annotations: - external-dns.alpha.kubernetes.io/hostname: kasm.durp.info -spec: - type: ExternalName - externalName: durp.info diff --git a/internalproxy/templates/nexus.yaml b/internalproxy/templates/nexus.yaml deleted file mode 100644 index 7074102..0000000 --- a/internalproxy/templates/nexus.yaml +++ /dev/null @@ -1,71 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: nexus -spec: - ports: - - name: app - port: 8081 - protocol: TCP - targetPort: 8081 - clusterIP: None - type: ClusterIP - ---- - -apiVersion: v1 -kind: Endpoints -metadata: - name: nexus -subsets: -- addresses: - - ip: 192.168.20.253 - ports: - - name: app - port: 8081 - protocol: TCP - ---- - -apiVersion: traefik.containo.us/v1alpha1 -kind: IngressRoute -metadata: - name: nexus-ingress -spec: - entryPoints: - - websecure - routes: - - match: Host(`nexus.durp.info`) && PathPrefix(`/`) - kind: Rule - services: - - name: nexus - port: 8081 - tls: - secretName: nexus-tls - ---- - -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: nexus-tls -spec: - secretName: nexus-tls - issuerRef: - name: letsencrypt-production - kind: ClusterIssuer - commonName: "nexus.durp.info" - dnsNames: - - "nexus.durp.info" - ---- - -kind: Service -apiVersion: v1 -metadata: - name: nexus-external-dns - annotations: - external-dns.alpha.kubernetes.io/hostname: nexus.durp.info -spec: - type: ExternalName - externalName: durp.info \ No newline at end of file diff --git a/internalproxy/templates/plex.yaml b/internalproxy/templates/plex.yaml deleted file mode 100644 index 2e70286..0000000 --- a/internalproxy/templates/plex.yaml +++ /dev/null @@ -1,9 +0,0 @@ -kind: Service -apiVersion: v1 -metadata: - name: plex-external-dns - annotations: - external-dns.alpha.kubernetes.io/hostname: plex.durp.info -spec: - type: ExternalName - externalName: durp.info diff --git a/internalproxy/templates/registry-internal.yaml b/internalproxy/templates/registry-internal.yaml deleted file mode 100644 index a1c584f..0000000 --- a/internalproxy/templates/registry-internal.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: registry-internal -spec: - ports: - - name: app - port: 5001 - protocol: TCP - targetPort: 5001 - clusterIP: None - type: ClusterIP - ---- - -apiVersion: v1 -kind: Endpoints -metadata: - name: registry-internal -subsets: -- addresses: - - ip: 192.168.20.253 - ports: - - name: app - port: 5001 - protocol: TCP - ---- - -apiVersion: traefik.containo.us/v1alpha1 -kind: IngressRoute -metadata: - name: registry-internal-ingress -spec: - entryPoints: - - websecure - routes: - - match: Host(`registry.internal.durp.info`) && PathPrefix(`/`) - kind: Rule - services: - - name: registry-internal - port: 5001 - tls: - secretName: registry-tls - ---- - -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: registry-internal-tls -spec: - secretName: registry-internal-tls - issuerRef: - name: letsencrypt-production - kind: ClusterIssuer - commonName: "registry.durp.info" - dnsNames: - - "registry.durp.info" diff --git a/internalproxy/templates/registry.yaml b/internalproxy/templates/registry.yaml deleted file mode 100644 index b4ac19a..0000000 --- a/internalproxy/templates/registry.yaml +++ /dev/null @@ -1,71 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: registry -spec: - ports: - - name: app - port: 5000 - protocol: TCP - targetPort: 5000 - clusterIP: None - type: ClusterIP - ---- - -apiVersion: v1 -kind: Endpoints -metadata: - name: registry -subsets: -- addresses: - - ip: 192.168.20.253 - ports: - - name: app - port: 5000 - protocol: TCP - ---- - -apiVersion: traefik.containo.us/v1alpha1 -kind: IngressRoute -metadata: - name: registry-ingress -spec: - entryPoints: - - websecure - routes: - - match: Host(`registry.durp.info`) && PathPrefix(`/`) - kind: Rule - services: - - name: registry - port: 5000 - tls: - secretName: registry-tls - ---- - -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: registry-tls -spec: - secretName: registry-tls - issuerRef: - name: letsencrypt-production - kind: ClusterIssuer - commonName: "registry.durp.info" - dnsNames: - - "registry.durp.info" - ---- - -kind: Service -apiVersion: v1 -metadata: - name: registry-external-dns - annotations: - external-dns.alpha.kubernetes.io/hostname: registry.durp.info -spec: - type: ExternalName - externalName: durp.info \ No newline at end of file diff --git a/internalproxy/templates/smokeping.yaml b/internalproxy/templates/smokeping.yaml deleted file mode 100644 index 8a76738..0000000 --- a/internalproxy/templates/smokeping.yaml +++ /dev/null @@ -1,82 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: smokeping -spec: - ports: - - name: app - port: 81 - protocol: TCP - targetPort: 81 - clusterIP: None - type: ClusterIP - ---- - -apiVersion: v1 -kind: Endpoints -metadata: - name: smokeping -subsets: -- addresses: - - ip: 192.168.20.253 - ports: - - name: app - port: 81 - protocol: TCP - ---- - -apiVersion: traefik.containo.us/v1alpha1 -kind: IngressRoute -metadata: - name: smokeping-ingress -spec: - entryPoints: - - websecure - routes: - - match: Host(`smokeping.durp.info`) && PathPrefix(`/`) - middlewares: - - name: whitelist - namespace: traefik - - name: authentik-proxy-provider - namespace: traefik - kind: Rule - services: - - name: smokeping - port: 81 - - match: Host(`smokeping.durp.info`) && PathPrefix(`/outpost.goauthentik.io`) - kind: Rule - services: - - name: ak-outpost-authentik-embedded-outpost - namespace: authentik - port: 9000 - tls: - secretName: smokeping-tls - ---- - -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: smokeping-tls -spec: - secretName: smokeping-tls - issuerRef: - name: letsencrypt-production - kind: ClusterIssuer - commonName: "smokeping.durp.info" - dnsNames: - - "smokeping.durp.info" - ---- - -kind: Service -apiVersion: v1 -metadata: - name: smokeping-external-dns - annotations: - external-dns.alpha.kubernetes.io/hostname: smokeping.durp.info -spec: - type: ExternalName - externalName: durp.info \ No newline at end of file diff --git a/internalproxy/templates/speedtest.yaml b/internalproxy/templates/speedtest.yaml deleted file mode 100644 index e034917..0000000 --- a/internalproxy/templates/speedtest.yaml +++ /dev/null @@ -1,74 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: speedtest -spec: - ports: - - name: app - port: 6580 - protocol: TCP - targetPort: 6580 - clusterIP: None - type: ClusterIP - ---- - -apiVersion: v1 -kind: Endpoints -metadata: - name: speedtest -subsets: -- addresses: - - ip: 192.168.20.253 - ports: - - name: app - port: 6580 - protocol: TCP - ---- - -apiVersion: traefik.containo.us/v1alpha1 -kind: IngressRoute -metadata: - name: speedtest-ingress -spec: - entryPoints: - - websecure - routes: - - match: Host(`speedtest.durp.info`) && PathPrefix(`/`) - kind: Rule - middlewares: - - name: authentik-proxy-provider - namespace: traefik - services: - - name: speedtest - port: 6580 - tls: - secretName: speedtest-tls - ---- - -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: speedtest-tls -spec: - secretName: speedtest-tls - issuerRef: - name: letsencrypt-production - kind: ClusterIssuer - commonName: "speedtest.durp.info" - dnsNames: - - "speedtest.durp.info" - ---- - -kind: Service -apiVersion: v1 -metadata: - name: speedtest-external-dns - annotations: - external-dns.alpha.kubernetes.io/hostname: speedtest.durp.info -spec: - type: ExternalName - externalName: durp.info \ No newline at end of file diff --git a/internalproxy/templates/tdarr.yaml b/internalproxy/templates/tdarr.yaml deleted file mode 100644 index c4403b9..0000000 --- a/internalproxy/templates/tdarr.yaml +++ /dev/null @@ -1,67 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: tdarr -spec: - ports: - - name: app - port: 8267 - protocol: TCP - targetPort: 8267 - clusterIP: None - type: ClusterIP - ---- - -apiVersion: v1 -kind: Endpoints -metadata: - name: tdarr -subsets: -- addresses: - - ip: 192.168.20.253 - ports: - - name: app - port: 8267 - protocol: TCP - ---- - -apiVersion: traefik.containo.us/v1alpha1 -kind: IngressRoute -metadata: - name: tdarr-ingress - annotations: - cert-manager.io/cluster-issuer: letsencrypt-production -spec: - entryPoints: - - websecure - routes: - - match: Host(`tdarr.internal.durp.info`) - middlewares: - - name: whitelist - namespace: traefik - - name: authentik-proxy-provider - namespace: traefik - kind: Rule - services: - - name: tdarr - port: 8267 - scheme: http - tls: - secretName: tdarr-tls - ---- - -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: tdarr-tls -spec: - secretName: tdarr-tls - issuerRef: - name: letsencrypt-production - kind: ClusterIssuer - commonName: "tdarr.internal.durp.info" - dnsNames: - - "tdarr.internal.durp.info" diff --git a/krakend/templates/ingress.yaml b/krakend/templates/ingress.yaml index a8c08eb..4b42ba3 100644 --- a/krakend/templates/ingress.yaml +++ b/krakend/templates/ingress.yaml @@ -7,9 +7,9 @@ spec: issuerRef: name: letsencrypt-production kind: ClusterIssuer - commonName: "api.durp.info" + commonName: "api.dev.durp.info" dnsNames: - - "api.durp.info" + - "api.dev.durp.info" --- @@ -21,7 +21,7 @@ spec: entryPoints: - websecure routes: - - match: Host(`api.durp.info`) && PathPrefix(`/`) + - match: Host(`api.dev.durp.info`) && PathPrefix(`/`) kind: Rule services: - name: krakend-service @@ -37,7 +37,7 @@ apiVersion: v1 metadata: name: api-external-dns annotations: - external-dns.alpha.kubernetes.io/hostname: api.durp.info + external-dns.alpha.kubernetes.io/hostname: api.dev.durp.info spec: type: ExternalName externalName: durp.info @@ -49,7 +49,7 @@ apiVersion: v1 metadata: name: api-developer-dns annotations: - external-dns.alpha.kubernetes.io/hostname: developer.durp.info + external-dns.alpha.kubernetes.io/hostname: developer.dev.durp.info external-dns.alpha.kubernetes.io/cloudflare-proxied: "false" spec: type: ExternalName diff --git a/kube-prometheus-stack/templates/ingress.yaml b/kube-prometheus-stack/templates/ingress.yaml index caf0ee1..851faff 100644 --- a/kube-prometheus-stack/templates/ingress.yaml +++ b/kube-prometheus-stack/templates/ingress.yaml @@ -6,7 +6,7 @@ spec: entryPoints: - websecure routes: - - match: Host(`grafana.durp.info`) && PathPrefix(`/`) + - match: Host(`grafana.dev.durp.info`) && PathPrefix(`/`) kind: Rule services: - name: grafana @@ -25,9 +25,9 @@ spec: issuerRef: name: letsencrypt-production kind: ClusterIssuer - commonName: "grafana.durp.info" + commonName: "grafana.dev.durp.info" dnsNames: - - "grafana.durp.info" + - "grafana.dev.durp.info" --- @@ -39,7 +39,7 @@ spec: entryPoints: - websecure routes: - - match: Host(`alertmanager.durp.info`) && PathPrefix(`/`) + - match: Host(`alertmanager.dev.durp.info`) && PathPrefix(`/`) middlewares: - name: whitelist namespace: traefik @@ -63,9 +63,9 @@ spec: issuerRef: name: letsencrypt-production kind: ClusterIssuer - commonName: "alertmanager.durp.info" + commonName: "alertmanager.dev.durp.info" dnsNames: - - "alertmanager.durp.info" + - "alertmanager.dev.durp.info" --- @@ -74,7 +74,7 @@ apiVersion: v1 metadata: name: grafana-external-dns annotations: - external-dns.alpha.kubernetes.io/hostname: grafana.durp.info + external-dns.alpha.kubernetes.io/hostname: grafana.dev.durp.info spec: type: ExternalName - externalName: durp.info \ No newline at end of file + externalName: dev.durp.info diff --git a/kubeclarity/templates/ingress.yaml b/kubeclarity/templates/ingress.yaml index 77b67a7..ac0950d 100644 --- a/kubeclarity/templates/ingress.yaml +++ b/kubeclarity/templates/ingress.yaml @@ -6,7 +6,7 @@ spec: entryPoints: - websecure routes: - - match: Host(`kubeclarity.durp.info`) && PathPrefix(`/`) + - match: Host(`kubeclarity.dev.durp.info`) && PathPrefix(`/`) middlewares: - name: whitelist namespace: traefik @@ -30,9 +30,9 @@ spec: issuerRef: name: letsencrypt-production kind: ClusterIssuer - commonName: "kubeclarity.durp.info" + commonName: "kubeclarity.dev.durp.info" dnsNames: - - "kubeclarity.durp.info" + - "kubeclarity.dev.durp.info" --- @@ -41,7 +41,7 @@ apiVersion: v1 metadata: name: kubeclarity-external-dns annotations: - external-dns.alpha.kubernetes.io/hostname: kubeclarity.durp.info + external-dns.alpha.kubernetes.io/hostname: kubeclarity.dev.durp.info spec: type: ExternalName - externalName: durp.info + externalName: dev.durp.info diff --git a/littlelink/templates/ingress.yaml b/littlelink/templates/ingress.yaml index 194f31e..5708501 100644 --- a/littlelink/templates/ingress.yaml +++ b/littlelink/templates/ingress.yaml @@ -6,7 +6,7 @@ spec: entryPoints: - websecure routes: - - match: Host(`links.durp.info`) && PathPrefix(`/`) + - match: Host(`links.dev.durp.info`) && PathPrefix(`/`) kind: Rule services: - name: littlelink @@ -25,9 +25,9 @@ spec: issuerRef: name: letsencrypt-production kind: ClusterIssuer - commonName: "links.durp.info" + commonName: "links.dev.durp.info" dnsNames: - - "links.durp.info" + - "links.dev.durp.info" --- @@ -36,7 +36,7 @@ apiVersion: v1 metadata: name: links-external-dns annotations: - external-dns.alpha.kubernetes.io/hostname: links.durp.info + external-dns.alpha.kubernetes.io/hostname: links.dev.durp.info spec: type: ExternalName - externalName: durp.info \ No newline at end of file + externalName: dev.durp.info diff --git a/longhorn/templates/ingress.yaml b/longhorn/templates/ingress.yaml index df2e071..7f67dec 100644 --- a/longhorn/templates/ingress.yaml +++ b/longhorn/templates/ingress.yaml @@ -6,7 +6,7 @@ spec: entryPoints: - websecure routes: - - match: Host(`longhorn.internal.durp.info`) && PathPrefix(`/`) + - match: Host(`longhorn.internal.dev.durp.info`) && PathPrefix(`/`) middlewares: - name: whitelist namespace: traefik @@ -16,7 +16,7 @@ spec: services: - name: longhorn-frontend port: 80 - - match: Host(`longhorn.internal.durp.info`) && PathPrefix(`/outpost.goauthentik.io`) + - match: Host(`longhorn.internal.dev.durp.info`) && PathPrefix(`/outpost.goauthentik.io`) kind: Rule services: - name: ak-outpost-authentik-embedded-outpost @@ -36,6 +36,6 @@ spec: issuerRef: name: letsencrypt-production kind: ClusterIssuer - commonName: "longhorn.internal.durp.info" + commonName: "longhorn.internal.dev.durp.info" dnsNames: - - "longhorn.internal.durp.info" + - "longhorn.internal.dev.durp.info" diff --git a/open-webui/templates/ingress.yaml b/open-webui/templates/ingress.yaml index 6331e92..9a5f14f 100644 --- a/open-webui/templates/ingress.yaml +++ b/open-webui/templates/ingress.yaml @@ -6,7 +6,7 @@ spec: entryPoints: - websecure routes: - - match: Host(`open-webui.durp.info`) && PathPrefix(`/`) + - match: Host(`open-webui.dev.durp.info`) && PathPrefix(`/`) kind: Rule services: - name: open-webui @@ -25,9 +25,9 @@ spec: issuerRef: name: letsencrypt-production kind: ClusterIssuer - commonName: "open-webui.durp.info" + commonName: "open-webui.dev.durp.info" dnsNames: - - "open-webui.durp.info" + - "open-webui.dev.durp.info" --- @@ -36,7 +36,7 @@ apiVersion: v1 metadata: name: open-webui-external-dns annotations: - external-dns.alpha.kubernetes.io/hostname: open-webui.durp.info + external-dns.alpha.kubernetes.io/hostname: open-webui.dev.durp.info spec: type: ExternalName - externalName: durp.info + externalName: dev.durp.info diff --git a/uptimekuma/templates/ingress.yaml b/uptimekuma/templates/ingress.yaml index 3df2689..24c683e 100644 --- a/uptimekuma/templates/ingress.yaml +++ b/uptimekuma/templates/ingress.yaml @@ -6,7 +6,7 @@ spec: entryPoints: - websecure routes: - - match: Host(`kuma.durp.info`) && PathPrefix(`/`) + - match: Host(`kuma.dev.durp.info`) && PathPrefix(`/`) middlewares: - name: authentik-proxy-provider namespace: traefik @@ -28,9 +28,9 @@ spec: issuerRef: name: letsencrypt-production kind: ClusterIssuer - commonName: "kuma.durp.info" + commonName: "kuma.dev.durp.info" dnsNames: - - "kuma.durp.info" + - "kuma.dev.durp.info" --- @@ -39,7 +39,7 @@ apiVersion: v1 metadata: name: heimdall-external-dns annotations: - external-dns.alpha.kubernetes.io/hostname: kuma.durp.info + external-dns.alpha.kubernetes.io/hostname: kuma.dev.durp.info spec: type: ExternalName - externalName: durp.info + externalName: dev.durp.info diff --git a/vault/templates/ingress.yaml b/vault/templates/ingress.yaml index 8998087..41802da 100644 --- a/vault/templates/ingress.yaml +++ b/vault/templates/ingress.yaml @@ -8,7 +8,7 @@ spec: entryPoints: - websecure routes: - - match: Host(`vault.internal.durp.info`) + - match: Host(`vault.internal.dev.durp.info`) middlewares: - name: whitelist namespace: traefik @@ -31,7 +31,7 @@ spec: issuerRef: name: letsencrypt-production kind: ClusterIssuer - commonName: "vault.internal.durp.info" + commonName: "vault.internal.dev.durp.info" dnsNames: - - "vault.internal.durp.info" + - "vault.internal.dev.durp.info"