diff --git a/clusters/ipv6/external-resources/namespace.yml b/clusters/ipv6/external-resources/namespace.yml new file mode 100644 index 0000000..54c3ff0 --- /dev/null +++ b/clusters/ipv6/external-resources/namespace.yml @@ -0,0 +1,7 @@ +--- +kind: Namespace +apiVersion: v1 +metadata: + name: external-resources + labels: + name: external-resources diff --git a/clusters/ipv6/external-resources/omv/omv-endpoint.yml b/clusters/ipv6/external-resources/omv/omv-endpoint.yml new file mode 100644 index 0000000..6b8fec7 --- /dev/null +++ b/clusters/ipv6/external-resources/omv/omv-endpoint.yml @@ -0,0 +1,13 @@ +--- +apiVersion: v1 +kind: Endpoints +metadata: + name: omv + namespace: external-resources +subsets: + - addresses: + - ip: 192.168.1.4 + ports: + - name: http + protocol: TCP + port: 80 diff --git a/clusters/ipv6/external-resources/omv/omv-ingress.yml b/clusters/ipv6/external-resources/omv/omv-ingress.yml new file mode 100644 index 0000000..8961f7f --- /dev/null +++ b/clusters/ipv6/external-resources/omv/omv-ingress.yml @@ -0,0 +1,27 @@ +--- +apiVersion: networking.k8s.io/v1 +kind: Ingress +metadata: + name: omv-ingress + namespace: external-resources + annotations: + cert-manager.io/cluster-issuer: letsencrypt-cloudflare + traefik.ingress.kubernetes.io/router.middlewares: tools-authelia@kubernetescrd + traefik.ingress.kubernetes.io/router.entrypoints: websecure +spec: + ingressClassName: traefik + tls: + - hosts: + - omv.akshun-lab.cc + secretName: omv-tls + rules: + - host: omv.akshun-lab.cc + http: + paths: + - path: / + pathType: Prefix + backend: + service: + name: omv + port: + number: 80 diff --git a/clusters/ipv6/external-resources/omv/omv-svc.yml b/clusters/ipv6/external-resources/omv/omv-svc.yml new file mode 100644 index 0000000..d077328 --- /dev/null +++ b/clusters/ipv6/external-resources/omv/omv-svc.yml @@ -0,0 +1,13 @@ +--- +apiVersion: v1 +kind: Service +metadata: + name: omv + namespace: external-resources +spec: + ports: + - name: http + port: 80 + targetPort: 80 + protocol: TCP + clusterIP: None diff --git a/clusters/ipv6/external-resources/pbs/pbs-endpoint.yml b/clusters/ipv6/external-resources/pbs/pbs-endpoint.yml new file mode 100644 index 0000000..a2908b1 --- /dev/null +++ b/clusters/ipv6/external-resources/pbs/pbs-endpoint.yml @@ -0,0 +1,13 @@ +--- +apiVersion: v1 +kind: Endpoints +metadata: + name: pbs + namespace: external-resources +subsets: + - addresses: + - ip: 192.168.1.112 + ports: + - name: https + protocol: TCP + port: 8007 diff --git a/clusters/ipv6/external-resources/pbs/pbs-ingress.yml b/clusters/ipv6/external-resources/pbs/pbs-ingress.yml new file mode 100644 index 0000000..9fc0da0 --- /dev/null +++ b/clusters/ipv6/external-resources/pbs/pbs-ingress.yml @@ -0,0 +1,27 @@ +--- +apiVersion: networking.k8s.io/v1 +kind: Ingress +metadata: + name: pbs-ingress + namespace: external-resources + annotations: + cert-manager.io/cluster-issuer: letsencrypt-cloudflare + traefik.ingress.kubernetes.io/router.middlewares: tools-authelia@kubernetescrd + traefik.ingress.kubernetes.io/router.entrypoints: websecure +spec: + ingressClassName: traefik + tls: + - hosts: + - pbs.akshun-lab.cc + secretName: pbs-tls + rules: + - host: pbs.akshun-lab.cc + http: + paths: + - path: / + pathType: Prefix + backend: + service: + name: pbs + port: + number: 8007 diff --git a/clusters/ipv6/external-resources/pbs/pbs-svc.yml b/clusters/ipv6/external-resources/pbs/pbs-svc.yml new file mode 100644 index 0000000..167a1dd --- /dev/null +++ b/clusters/ipv6/external-resources/pbs/pbs-svc.yml @@ -0,0 +1,16 @@ +--- +apiVersion: v1 +kind: Service +metadata: + name: pbs + namespace: external-resources + annotations: + traefik.ingress.kubernetes.io/service.serversscheme: https + traefik.ingress.kubernetes.io/service.serverstransport: external-resources-insecure-transport@kubernetescrd +spec: + ports: + - name: https + port: 8007 + targetPort: 8007 + protocol: TCP + clusterIP: None diff --git a/clusters/ipv6/external-resources/pihole/pihole-endpoint.yml b/clusters/ipv6/external-resources/pihole/pihole-endpoint.yml new file mode 100644 index 0000000..6595859 --- /dev/null +++ b/clusters/ipv6/external-resources/pihole/pihole-endpoint.yml @@ -0,0 +1,13 @@ +--- +apiVersion: v1 +kind: Endpoints +metadata: + name: pihole + namespace: external-resources +subsets: + - addresses: + - ip: 192.168.1.19 + ports: + - name: http + protocol: TCP + port: 80 diff --git a/clusters/ipv6/external-resources/pihole/pihole-ingress.yml b/clusters/ipv6/external-resources/pihole/pihole-ingress.yml new file mode 100644 index 0000000..4814f93 --- /dev/null +++ b/clusters/ipv6/external-resources/pihole/pihole-ingress.yml @@ -0,0 +1,27 @@ +--- +apiVersion: networking.k8s.io/v1 +kind: Ingress +metadata: + name: pihole-ingress + namespace: external-resources + annotations: + cert-manager.io/cluster-issuer: letsencrypt-cloudflare + traefik.ingress.kubernetes.io/router.middlewares: tools-authelia@kubernetescrd + traefik.ingress.kubernetes.io/router.entrypoints: websecure +spec: + ingressClassName: traefik + tls: + - hosts: + - pihole.akshun-lab.cc + secretName: pihole-tls + rules: + - host: pihole.akshun-lab.cc + http: + paths: + - path: / + pathType: Prefix + backend: + service: + name: pihole + port: + number: 80 diff --git a/clusters/ipv6/external-resources/pihole/pihole-svc.yml b/clusters/ipv6/external-resources/pihole/pihole-svc.yml new file mode 100644 index 0000000..bf78822 --- /dev/null +++ b/clusters/ipv6/external-resources/pihole/pihole-svc.yml @@ -0,0 +1,13 @@ +--- +apiVersion: v1 +kind: Service +metadata: + name: pihole + namespace: external-resources +spec: + ports: + - name: http + port: 80 + targetPort: 80 + protocol: TCP + clusterIP: None diff --git a/clusters/ipv6/external-resources/proxmox/proxmox-endpoint.yml b/clusters/ipv6/external-resources/proxmox/proxmox-endpoint.yml new file mode 100644 index 0000000..4ef59a2 --- /dev/null +++ b/clusters/ipv6/external-resources/proxmox/proxmox-endpoint.yml @@ -0,0 +1,13 @@ +--- +apiVersion: v1 +kind: Endpoints +metadata: + name: proxmox + namespace: external-resources +subsets: + - addresses: + - ip: 192.168.1.113 + ports: + - name: https + protocol: TCP + port: 8006 diff --git a/clusters/ipv6/external-resources/proxmox/proxmox-ingress.yml b/clusters/ipv6/external-resources/proxmox/proxmox-ingress.yml new file mode 100644 index 0000000..010e734 --- /dev/null +++ b/clusters/ipv6/external-resources/proxmox/proxmox-ingress.yml @@ -0,0 +1,27 @@ +--- +apiVersion: networking.k8s.io/v1 +kind: Ingress +metadata: + name: proxmox-ingress + namespace: external-resources + annotations: + cert-manager.io/cluster-issuer: letsencrypt-cloudflare + traefik.ingress.kubernetes.io/router.middlewares: tools-authelia@kubernetescrd + traefik.ingress.kubernetes.io/router.entrypoints: websecure +spec: + ingressClassName: traefik + tls: + - hosts: + - proxmox.akshun-lab.cc + secretName: proxmox-tls + rules: + - host: proxmox.akshun-lab.cc + http: + paths: + - path: / + pathType: Prefix + backend: + service: + name: proxmox + port: + number: 8006 diff --git a/clusters/ipv6/external-resources/proxmox/proxmox-svc.yml b/clusters/ipv6/external-resources/proxmox/proxmox-svc.yml new file mode 100644 index 0000000..60dd801 --- /dev/null +++ b/clusters/ipv6/external-resources/proxmox/proxmox-svc.yml @@ -0,0 +1,16 @@ +--- +apiVersion: v1 +kind: Service +metadata: + name: proxmox + namespace: external-resources + annotations: + traefik.ingress.kubernetes.io/service.serversscheme: https + traefik.ingress.kubernetes.io/service.serverstransport: external-resources-insecure-transport@kubernetescrd +spec: + ports: + - name: https + port: 8006 + targetPort: 8006 + protocol: TCP + clusterIP: None diff --git a/clusters/ipv6/external-resources/server-transport.yml b/clusters/ipv6/external-resources/server-transport.yml new file mode 100644 index 0000000..e291164 --- /dev/null +++ b/clusters/ipv6/external-resources/server-transport.yml @@ -0,0 +1,8 @@ +--- +apiVersion: traefik.io/v1alpha1 +kind: ServersTransport +metadata: + name: insecure-transport + namespace: external-resources +spec: + insecureSkipVerify: true