Merge pull request 'external-resources' (#291) from external-resources into main
All checks were successful
Validate Kubernetes Manifests / kubeconform (push) Successful in 14s
All checks were successful
Validate Kubernetes Manifests / kubeconform (push) Successful in 14s
Reviewed-on: #291
This commit was merged in pull request #291.
This commit is contained in:
7
clusters/ipv6/external-resources/namespace.yml
Normal file
7
clusters/ipv6/external-resources/namespace.yml
Normal file
@@ -0,0 +1,7 @@
|
||||
---
|
||||
kind: Namespace
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: external-resources
|
||||
labels:
|
||||
name: external-resources
|
||||
13
clusters/ipv6/external-resources/omv/omv-endpoint.yml
Normal file
13
clusters/ipv6/external-resources/omv/omv-endpoint.yml
Normal file
@@ -0,0 +1,13 @@
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Endpoints
|
||||
metadata:
|
||||
name: omv
|
||||
namespace: external-resources
|
||||
subsets:
|
||||
- addresses:
|
||||
- ip: 192.168.1.4
|
||||
ports:
|
||||
- name: http
|
||||
protocol: TCP
|
||||
port: 80
|
||||
27
clusters/ipv6/external-resources/omv/omv-ingress.yml
Normal file
27
clusters/ipv6/external-resources/omv/omv-ingress.yml
Normal file
@@ -0,0 +1,27 @@
|
||||
---
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
name: omv-ingress
|
||||
namespace: external-resources
|
||||
annotations:
|
||||
cert-manager.io/cluster-issuer: letsencrypt-cloudflare
|
||||
traefik.ingress.kubernetes.io/router.middlewares: tools-authelia@kubernetescrd
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: websecure
|
||||
spec:
|
||||
ingressClassName: traefik
|
||||
tls:
|
||||
- hosts:
|
||||
- omv.akshun-lab.cc
|
||||
secretName: omv-tls
|
||||
rules:
|
||||
- host: omv.akshun-lab.cc
|
||||
http:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
backend:
|
||||
service:
|
||||
name: omv
|
||||
port:
|
||||
number: 80
|
||||
13
clusters/ipv6/external-resources/omv/omv-svc.yml
Normal file
13
clusters/ipv6/external-resources/omv/omv-svc.yml
Normal file
@@ -0,0 +1,13 @@
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: omv
|
||||
namespace: external-resources
|
||||
spec:
|
||||
ports:
|
||||
- name: http
|
||||
port: 80
|
||||
targetPort: 80
|
||||
protocol: TCP
|
||||
clusterIP: None
|
||||
13
clusters/ipv6/external-resources/pbs/pbs-endpoint.yml
Normal file
13
clusters/ipv6/external-resources/pbs/pbs-endpoint.yml
Normal file
@@ -0,0 +1,13 @@
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Endpoints
|
||||
metadata:
|
||||
name: pbs
|
||||
namespace: external-resources
|
||||
subsets:
|
||||
- addresses:
|
||||
- ip: 192.168.1.112
|
||||
ports:
|
||||
- name: https
|
||||
protocol: TCP
|
||||
port: 8007
|
||||
27
clusters/ipv6/external-resources/pbs/pbs-ingress.yml
Normal file
27
clusters/ipv6/external-resources/pbs/pbs-ingress.yml
Normal file
@@ -0,0 +1,27 @@
|
||||
---
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
name: pbs-ingress
|
||||
namespace: external-resources
|
||||
annotations:
|
||||
cert-manager.io/cluster-issuer: letsencrypt-cloudflare
|
||||
traefik.ingress.kubernetes.io/router.middlewares: tools-authelia@kubernetescrd
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: websecure
|
||||
spec:
|
||||
ingressClassName: traefik
|
||||
tls:
|
||||
- hosts:
|
||||
- pbs.akshun-lab.cc
|
||||
secretName: pbs-tls
|
||||
rules:
|
||||
- host: pbs.akshun-lab.cc
|
||||
http:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
backend:
|
||||
service:
|
||||
name: pbs
|
||||
port:
|
||||
number: 8007
|
||||
16
clusters/ipv6/external-resources/pbs/pbs-svc.yml
Normal file
16
clusters/ipv6/external-resources/pbs/pbs-svc.yml
Normal file
@@ -0,0 +1,16 @@
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: pbs
|
||||
namespace: external-resources
|
||||
annotations:
|
||||
traefik.ingress.kubernetes.io/service.serversscheme: https
|
||||
traefik.ingress.kubernetes.io/service.serverstransport: external-resources-insecure-transport@kubernetescrd
|
||||
spec:
|
||||
ports:
|
||||
- name: https
|
||||
port: 8007
|
||||
targetPort: 8007
|
||||
protocol: TCP
|
||||
clusterIP: None
|
||||
13
clusters/ipv6/external-resources/pihole/pihole-endpoint.yml
Normal file
13
clusters/ipv6/external-resources/pihole/pihole-endpoint.yml
Normal file
@@ -0,0 +1,13 @@
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Endpoints
|
||||
metadata:
|
||||
name: pihole
|
||||
namespace: external-resources
|
||||
subsets:
|
||||
- addresses:
|
||||
- ip: 192.168.1.19
|
||||
ports:
|
||||
- name: http
|
||||
protocol: TCP
|
||||
port: 80
|
||||
27
clusters/ipv6/external-resources/pihole/pihole-ingress.yml
Normal file
27
clusters/ipv6/external-resources/pihole/pihole-ingress.yml
Normal file
@@ -0,0 +1,27 @@
|
||||
---
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
name: pihole-ingress
|
||||
namespace: external-resources
|
||||
annotations:
|
||||
cert-manager.io/cluster-issuer: letsencrypt-cloudflare
|
||||
traefik.ingress.kubernetes.io/router.middlewares: tools-authelia@kubernetescrd
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: websecure
|
||||
spec:
|
||||
ingressClassName: traefik
|
||||
tls:
|
||||
- hosts:
|
||||
- pihole.akshun-lab.cc
|
||||
secretName: pihole-tls
|
||||
rules:
|
||||
- host: pihole.akshun-lab.cc
|
||||
http:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
backend:
|
||||
service:
|
||||
name: pihole
|
||||
port:
|
||||
number: 80
|
||||
13
clusters/ipv6/external-resources/pihole/pihole-svc.yml
Normal file
13
clusters/ipv6/external-resources/pihole/pihole-svc.yml
Normal file
@@ -0,0 +1,13 @@
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: pihole
|
||||
namespace: external-resources
|
||||
spec:
|
||||
ports:
|
||||
- name: http
|
||||
port: 80
|
||||
targetPort: 80
|
||||
protocol: TCP
|
||||
clusterIP: None
|
||||
@@ -0,0 +1,13 @@
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Endpoints
|
||||
metadata:
|
||||
name: proxmox
|
||||
namespace: external-resources
|
||||
subsets:
|
||||
- addresses:
|
||||
- ip: 192.168.1.113
|
||||
ports:
|
||||
- name: https
|
||||
protocol: TCP
|
||||
port: 8006
|
||||
27
clusters/ipv6/external-resources/proxmox/proxmox-ingress.yml
Normal file
27
clusters/ipv6/external-resources/proxmox/proxmox-ingress.yml
Normal file
@@ -0,0 +1,27 @@
|
||||
---
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
name: proxmox-ingress
|
||||
namespace: external-resources
|
||||
annotations:
|
||||
cert-manager.io/cluster-issuer: letsencrypt-cloudflare
|
||||
traefik.ingress.kubernetes.io/router.middlewares: tools-authelia@kubernetescrd
|
||||
traefik.ingress.kubernetes.io/router.entrypoints: websecure
|
||||
spec:
|
||||
ingressClassName: traefik
|
||||
tls:
|
||||
- hosts:
|
||||
- proxmox.akshun-lab.cc
|
||||
secretName: proxmox-tls
|
||||
rules:
|
||||
- host: proxmox.akshun-lab.cc
|
||||
http:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
backend:
|
||||
service:
|
||||
name: proxmox
|
||||
port:
|
||||
number: 8006
|
||||
16
clusters/ipv6/external-resources/proxmox/proxmox-svc.yml
Normal file
16
clusters/ipv6/external-resources/proxmox/proxmox-svc.yml
Normal file
@@ -0,0 +1,16 @@
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: proxmox
|
||||
namespace: external-resources
|
||||
annotations:
|
||||
traefik.ingress.kubernetes.io/service.serversscheme: https
|
||||
traefik.ingress.kubernetes.io/service.serverstransport: external-resources-insecure-transport@kubernetescrd
|
||||
spec:
|
||||
ports:
|
||||
- name: https
|
||||
port: 8006
|
||||
targetPort: 8006
|
||||
protocol: TCP
|
||||
clusterIP: None
|
||||
8
clusters/ipv6/external-resources/server-transport.yml
Normal file
8
clusters/ipv6/external-resources/server-transport.yml
Normal file
@@ -0,0 +1,8 @@
|
||||
---
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: ServersTransport
|
||||
metadata:
|
||||
name: insecure-transport
|
||||
namespace: external-resources
|
||||
spec:
|
||||
insecureSkipVerify: true
|
||||
Reference in New Issue
Block a user