add cert-manager
This commit is contained in:
parent
2bdf2de9d1
commit
09d137b092
@ -1,7 +0,0 @@
|
||||
---
|
||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
resources:
|
||||
- rbac.yaml
|
||||
- traefik.yaml
|
||||
- svc.yaml
|
15
apps/production/cert-manager/certificates/fascinated-cc.yml
Normal file
15
apps/production/cert-manager/certificates/fascinated-cc.yml
Normal file
@ -0,0 +1,15 @@
|
||||
---
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: fascinated-cc
|
||||
namespace: traefik
|
||||
spec:
|
||||
secretName: fascinated-cc
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "*.fascinated.cc"
|
||||
dnsNames:
|
||||
- "fascinated.cc"
|
||||
- "*.fascinated.cc"
|
@ -0,0 +1,14 @@
|
||||
---
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: local-fascinated-cc
|
||||
namespace: traefik
|
||||
spec:
|
||||
secretName: local-fascinated-cc
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "*.local.fascinated.cc"
|
||||
dnsNames:
|
||||
- "*.local.fascinated.cc"
|
15
apps/production/cert-manager/certificates/mcutils-xyz.yml
Normal file
15
apps/production/cert-manager/certificates/mcutils-xyz.yml
Normal file
@ -0,0 +1,15 @@
|
||||
---
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: mcutils-xyz
|
||||
namespace: traefik
|
||||
spec:
|
||||
secretName: mcutils-xyz
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "*.mcutils.xyz"
|
||||
dnsNames:
|
||||
- "mcutils.xyz"
|
||||
- "*.mcutils.xyz"
|
23
apps/production/cert-manager/issuer.yml
Normal file
23
apps/production/cert-manager/issuer.yml
Normal file
@ -0,0 +1,23 @@
|
||||
---
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: ClusterIssuer
|
||||
metadata:
|
||||
name: letsencrypt-production
|
||||
namespace: cert-manager
|
||||
spec:
|
||||
acme:
|
||||
server: https://acme-v02.api.letsencrypt.org/directory
|
||||
email: liam@fascinated.cc
|
||||
privateKeySecretRef:
|
||||
name: letsencrypt-production
|
||||
solvers:
|
||||
- dns01:
|
||||
cloudflare:
|
||||
email: liam@fascinated.cc
|
||||
apiTokenSecretRef:
|
||||
name: cloudflare-token-secret
|
||||
key: cloudflare-token
|
||||
selector:
|
||||
dnsZones:
|
||||
- "fascinated.cc"
|
||||
- "mcutils.xyz"
|
8
apps/production/cert-manager/kustomization.yaml
Normal file
8
apps/production/cert-manager/kustomization.yaml
Normal file
@ -0,0 +1,8 @@
|
||||
---
|
||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
namespace: cert-manager
|
||||
resources:
|
||||
- namespace.yaml
|
||||
- certificates/*.yaml
|
||||
- issuers.yaml
|
5
apps/production/cert-manager/namespace.yaml
Normal file
5
apps/production/cert-manager/namespace.yaml
Normal file
@ -0,0 +1,5 @@
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Namespace
|
||||
metadata:
|
||||
name: cert-manager
|
@ -4,7 +4,6 @@ kind: Kustomization
|
||||
namespace: traefik-production
|
||||
resources:
|
||||
- namespace.yaml
|
||||
- ../../base/traefik
|
||||
|
||||
patchesStrategicMerge:
|
||||
- traefik-patch.yaml
|
||||
- rbac.yaml
|
||||
- traefik.yaml
|
||||
- service.yaml
|
||||
|
@ -12,7 +12,6 @@ spec:
|
||||
app.kubernetes.io/name: traefik
|
||||
type: LoadBalancer
|
||||
loadBalancerIP: 10.0.69.250
|
||||
externalTrafficPolicy: Local
|
||||
ports:
|
||||
- port: 80
|
||||
name: web
|
@ -1,23 +0,0 @@
|
||||
---
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: traefik
|
||||
spec:
|
||||
template:
|
||||
spec:
|
||||
containers:
|
||||
- name: traefik
|
||||
args:
|
||||
- "--entryPoints.web.address=:8000/tcp"
|
||||
- "--entryPoints.websecure.address=:8443/tcp"
|
||||
- "--ping=true"
|
||||
- "--global.sendanonymoususage=false"
|
||||
- "--global.checknewversion=false"
|
||||
- "--serversTransport.insecureSkipVerify=true"
|
||||
- "--log.level=INFO"
|
||||
- "--providers.kubernetescrd"
|
||||
- "--providers.kubernetescrd.allowCrossNamespace=true"
|
||||
- "--providers.kubernetescrd.allowExternalNameServices=true"
|
||||
- "--providers.kubernetesingress.allowCrossNamespace=true"
|
||||
- "--providers.kubernetesingress.allowExternalNameServices=true"
|
@ -26,11 +26,16 @@ spec:
|
||||
args:
|
||||
- "--entryPoints.web.address=:8000/tcp"
|
||||
- "--entryPoints.websecure.address=:8443/tcp"
|
||||
- "--api=true"
|
||||
- "--api.dashboard=true"
|
||||
- "--ping=true"
|
||||
- "--global.sendanonymoususage=false"
|
||||
- "--global.checknewversion=false"
|
||||
- "--serversTransport.insecureSkipVerify=true"
|
||||
- "--log.level=INFO"
|
||||
- "--providers.kubernetescrd"
|
||||
- "--providers.kubernetescrd.allowCrossNamespace=true"
|
||||
- "--providers.kubernetescrd.allowExternalNameServices=true"
|
||||
- "--providers.kubernetesingress.allowCrossNamespace=true"
|
||||
- "--providers.kubernetesingress.allowExternalNameServices=true"
|
||||
readinessProbe:
|
||||
httpGet:
|
||||
path: /ping
|
Reference in New Issue
Block a user