diff --git a/apps/production/cert-manager/external-services/aetheria-grafana.fascinated.cc.yml b/apps/production/cert-manager/external-services/aetheria-grafana.fascinated.cc.yml new file mode 100644 index 0000000..3ac0f72 --- /dev/null +++ b/apps/production/cert-manager/external-services/aetheria-grafana.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: aetheria-grafana-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.225 + ports: + - name: http + port: 3000 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: aetheria-grafana-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`aetheria-grafana.fascinated.cc`) + kind: Rule + services: + - name: aetheria-grafana-external + port: 3000 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/aetheria-influx.fascinated.cc.yml b/apps/production/cert-manager/external-services/aetheria-influx.fascinated.cc.yml new file mode 100644 index 0000000..b7b4bd6 --- /dev/null +++ b/apps/production/cert-manager/external-services/aetheria-influx.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: aetheria-influx-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.225 + ports: + - name: http + port: 8086 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: aetheria-influx-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`aetheria-influx.fascinated.cc`) + kind: Rule + services: + - name: aetheria-influx-external + port: 8086 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/analytics.fascinated.cc.yml b/apps/production/cert-manager/external-services/analytics.fascinated.cc.yml new file mode 100644 index 0000000..8d0380a --- /dev/null +++ b/apps/production/cert-manager/external-services/analytics.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: analytics-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.120 + ports: + - name: http + port: 8000 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: analytics-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`analytics.fascinated.cc`) + kind: Rule + services: + - name: analytics-external + port: 8000 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/api.mcutils.xyz.yml b/apps/production/cert-manager/external-services/api.mcutils.xyz.yml new file mode 100644 index 0000000..caa994b --- /dev/null +++ b/apps/production/cert-manager/external-services/api.mcutils.xyz.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: mc-utils-api-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.137 + ports: + - name: http + port: 80 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: mc-utils-api-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`api.mcutils.xyz`) + kind: Rule + services: + - name: mc-utils-api-external + port: 80 + tls: + secretName: mcutils-xyz diff --git a/apps/production/cert-manager/external-services/azure-metrics.fascinated.cc.yml b/apps/production/cert-manager/external-services/azure-metrics.fascinated.cc.yml new file mode 100644 index 0000000..cf7bd3e --- /dev/null +++ b/apps/production/cert-manager/external-services/azure-metrics.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: azure-metrics-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.204 + ports: + - name: http + port: 3000 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: azure-metrics-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`azure-metrics.fascinated.cc`) + kind: Rule + services: + - name: azure-metrics-external + port: 3000 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/azure-phpma.fascinated.cc.yml b/apps/production/cert-manager/external-services/azure-phpma.fascinated.cc.yml new file mode 100644 index 0000000..a9ce966 --- /dev/null +++ b/apps/production/cert-manager/external-services/azure-phpma.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: azure-phpma-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.204 + ports: + - name: http + port: 8080 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: azure-phpma-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`azure-phpma.fascinated.cc`) + kind: Rule + services: + - name: azure-phpma-external + port: 8080 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/bitmagnet.local.fascinated.cc.yml b/apps/production/cert-manager/external-services/bitmagnet.local.fascinated.cc.yml new file mode 100644 index 0000000..5405994 --- /dev/null +++ b/apps/production/cert-manager/external-services/bitmagnet.local.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: bitmagnet-local-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.142 + ports: + - name: http + port: 3333 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: bitmagnet-local-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`bitmagnet.local.fascinated.cc`) + kind: Rule + services: + - name: bitmagnet-local-external + port: 3333 + tls: + secretName: local-fascinated-cc diff --git a/apps/production/cert-manager/external-services/cdn.fascinated.cc.yml b/apps/production/cert-manager/external-services/cdn.fascinated.cc.yml new file mode 100644 index 0000000..11c1e30 --- /dev/null +++ b/apps/production/cert-manager/external-services/cdn.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: cdn-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.0.136 + ports: + - name: http + port: 8087 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: cdn-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`cdn.fascinated.cc`) + kind: Rule + services: + - name: cdn-external + port: 8087 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/cloud.fascinated.cc.yml b/apps/production/cert-manager/external-services/cloud.fascinated.cc.yml new file mode 100644 index 0000000..776cdd1 --- /dev/null +++ b/apps/production/cert-manager/external-services/cloud.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: nextcloud-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.160 + ports: + - name: http + port: 80 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: nextcloud-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`cloud.fascinated.cc`) + kind: Rule + services: + - name: nextcloud-external + port: 80 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/docs.fascinated.cc.yml b/apps/production/cert-manager/external-services/docs.fascinated.cc.yml new file mode 100644 index 0000000..0ac22b0 --- /dev/null +++ b/apps/production/cert-manager/external-services/docs.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: docs-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.254 + ports: + - name: http + port: 80 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: docs-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`docs.fascinated.cc`) + kind: Rule + services: + - name: docs-external + port: 80 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/example.com.yml b/apps/production/cert-manager/external-services/example.com.yml new file mode 100644 index 0000000..bd7c92e --- /dev/null +++ b/apps/production/cert-manager/external-services/example.com.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: cdn-external + namespace: traefik +spec: + type: ExternalName + externalName: internal ip + ports: + - name: http + port: service port +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: cdn-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`example.com`) + kind: Rule + services: + - name: cdn-external + port: service port + tls: + secretName: example.com diff --git a/apps/production/cert-manager/external-services/fascinated.cc.yml b/apps/production/cert-manager/external-services/fascinated.cc.yml new file mode 100644 index 0000000..86a1e3a --- /dev/null +++ b/apps/production/cert-manager/external-services/fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: main-site-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.209 + ports: + - name: http + port: 3000 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: main-site-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`fascinated.cc`) + kind: Rule + services: + - name: main-site-external + port: 3000 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/git.fascinated.cc.yml b/apps/production/cert-manager/external-services/git.fascinated.cc.yml new file mode 100644 index 0000000..af8d541 --- /dev/null +++ b/apps/production/cert-manager/external-services/git.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: git-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.235 + ports: + - name: http + port: 3003 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: git-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`git.fascinated.cc`) + kind: Rule + services: + - name: git-external + port: 3003 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/glitchtip.fascinated.cc.yml b/apps/production/cert-manager/external-services/glitchtip.fascinated.cc.yml new file mode 100644 index 0000000..5fc2b25 --- /dev/null +++ b/apps/production/cert-manager/external-services/glitchtip.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: sentry-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.36 + ports: + - name: http + port: 8000 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: sentry-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`glitchtip.fascinated.cc`) + kind: Rule + services: + - name: sentry-external + port: 8000 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/grafana.mcutils.xyz.yml b/apps/production/cert-manager/external-services/grafana.mcutils.xyz.yml new file mode 100644 index 0000000..a335fcb --- /dev/null +++ b/apps/production/cert-manager/external-services/grafana.mcutils.xyz.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: mc-utils-grafana-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.137 + ports: + - name: http + port: 3000 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: mc-utils-grafana-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`grafana.mcutils.xyz`) + kind: Rule + services: + - name: mc-utils-grafana-external + port: 3000 + tls: + secretName: mcutils-xyz diff --git a/apps/production/cert-manager/external-services/img.fascinated.cc.yml b/apps/production/cert-manager/external-services/img.fascinated.cc.yml new file mode 100644 index 0000000..fedc957 --- /dev/null +++ b/apps/production/cert-manager/external-services/img.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: img-proxy-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.185 + ports: + - name: http + port: 8080 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: img-proxy-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`img.fascinated.cc`) + kind: Rule + services: + - name: img-proxy-external + port: 8080 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/influx.mcutils.xyz.yml b/apps/production/cert-manager/external-services/influx.mcutils.xyz.yml new file mode 100644 index 0000000..18665ad --- /dev/null +++ b/apps/production/cert-manager/external-services/influx.mcutils.xyz.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: mc-utils-influx-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.137 + ports: + - name: http + port: 8086 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: mc-utils-influx-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`influx.mcutils.xyz`) + kind: Rule + services: + - name: mc-utils-influx-external + port: 8086 + tls: + secretName: mcutils-xyz diff --git a/apps/production/cert-manager/external-services/mastodon.fascinated.cc.yml b/apps/production/cert-manager/external-services/mastodon.fascinated.cc.yml new file mode 100644 index 0000000..0ffa24f --- /dev/null +++ b/apps/production/cert-manager/external-services/mastodon.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: mastodon-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.0.136 + ports: + - name: http + port: 3000 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: mastodon-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`mastodon.fascinated.cc`) + kind: Rule + services: + - name: mastodon-external + port: 3000 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/mc-tracker.fascinated.cc.yml b/apps/production/cert-manager/external-services/mc-tracker.fascinated.cc.yml new file mode 100644 index 0000000..b5309c6 --- /dev/null +++ b/apps/production/cert-manager/external-services/mc-tracker.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: mc-tracker-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.3.76 + ports: + - name: http + port: 3000 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: mc-tracker-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`mc-tracker.fascinated.cc`) + kind: Rule + services: + - name: mc-tracker-external + port: 3000 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/mcutils.xyz.yml b/apps/production/cert-manager/external-services/mcutils.xyz.yml new file mode 100644 index 0000000..6191afd --- /dev/null +++ b/apps/production/cert-manager/external-services/mcutils.xyz.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: mc-utils-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.137 + ports: + - name: http + port: 80 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: mc-utils-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`mcutils.xyz`) + kind: Rule + services: + - name: mc-utils-external + port: 80 + tls: + secretName: mcutils-xyz diff --git a/apps/production/cert-manager/external-services/node-hl-01.fascinated.cc.yml b/apps/production/cert-manager/external-services/node-hl-01.fascinated.cc.yml new file mode 100644 index 0000000..cf2d615 --- /dev/null +++ b/apps/production/cert-manager/external-services/node-hl-01.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: node-hl-01-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.222 + ports: + - name: http + port: 443 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: node-hl-01-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`node-hl-01.fascinated.cc`) + kind: Rule + services: + - name: node-hl-01-external + port: 443 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/obsidian-sync.fascinated.cc.yml b/apps/production/cert-manager/external-services/obsidian-sync.fascinated.cc.yml new file mode 100644 index 0000000..3f80bcc --- /dev/null +++ b/apps/production/cert-manager/external-services/obsidian-sync.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: obsidian-sync-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.184 + ports: + - name: http + port: 5984 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: obsidian-sync-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`obsidian-sync.fascinated.cc`) + kind: Rule + services: + - name: obsidian-sync-external + port: 5984 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/overseerr.fascinated.cc.yml b/apps/production/cert-manager/external-services/overseerr.fascinated.cc.yml new file mode 100644 index 0000000..9431deb --- /dev/null +++ b/apps/production/cert-manager/external-services/overseerr.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: overseerr-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.0.136 + ports: + - name: http + port: 5055 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: overseerr-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`overseerr.fascinated.cc`) + kind: Rule + services: + - name: overseerr-external + port: 5055 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/owntracks-web.fascinated.cc.yml b/apps/production/cert-manager/external-services/owntracks-web.fascinated.cc.yml new file mode 100644 index 0000000..ba05769 --- /dev/null +++ b/apps/production/cert-manager/external-services/owntracks-web.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: owntracks-web-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.43 + ports: + - name: http + port: 6969 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: owntracks-web-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`owntracks-web.fascinated.cc`) + kind: Rule + services: + - name: owntracks-web-external + port: 6969 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/owntracks.fascinated.cc.yml b/apps/production/cert-manager/external-services/owntracks.fascinated.cc.yml new file mode 100644 index 0000000..35180a6 --- /dev/null +++ b/apps/production/cert-manager/external-services/owntracks.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: owntracks-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.43 + ports: + - name: http + port: 8083 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: owntracks-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`owntracks.fascinated.cc`) + kind: Rule + services: + - name: owntracks-external + port: 8083 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/panel.fascinated.cc.yml b/apps/production/cert-manager/external-services/panel.fascinated.cc.yml new file mode 100644 index 0000000..c34372f --- /dev/null +++ b/apps/production/cert-manager/external-services/panel.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: panel-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.244 + ports: + - name: http + port: 80 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: panel-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`panel.fascinated.cc`) + kind: Rule + services: + - name: panel-external + port: 80 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/paste-grafana.local.fascinated.cc.yml b/apps/production/cert-manager/external-services/paste-grafana.local.fascinated.cc.yml new file mode 100644 index 0000000..fcdcd83 --- /dev/null +++ b/apps/production/cert-manager/external-services/paste-grafana.local.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: paste-grafana-local-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.118 + ports: + - name: http + port: 3035 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: paste-grafana-local-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`paste-grafana.local.fascinated.cc`) + kind: Rule + services: + - name: paste-grafana-local-external + port: 3035 + tls: + secretName: local-fascinated-cc diff --git a/apps/production/cert-manager/external-services/plex.fascinated.cc.yml b/apps/production/cert-manager/external-services/plex.fascinated.cc.yml new file mode 100644 index 0000000..0cce9a3 --- /dev/null +++ b/apps/production/cert-manager/external-services/plex.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: plex-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.0.235 + ports: + - name: http + port: 32400 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: plex-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`plex.fascinated.cc`) + kind: Rule + services: + - name: plex-external + port: 32400 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/proxmox.local.fascinated.cc.yml b/apps/production/cert-manager/external-services/proxmox.local.fascinated.cc.yml new file mode 100644 index 0000000..db0e41d --- /dev/null +++ b/apps/production/cert-manager/external-services/proxmox.local.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: proxmox-luna-local-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.2 + ports: + - name: https + port: 8006 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: proxmox-luna-local-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`proxmox.local.fascinated.cc`) + kind: Rule + services: + - name: proxmox-luna-local-external + port: 8006 + tls: + secretName: local-fascinated-cc diff --git a/apps/production/cert-manager/external-services/repo.fascinated.cc.yml b/apps/production/cert-manager/external-services/repo.fascinated.cc.yml new file mode 100644 index 0000000..533f548 --- /dev/null +++ b/apps/production/cert-manager/external-services/repo.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: repo-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.164 + ports: + - name: http + port: 8080 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: repo-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`repo.fascinated.cc`) + kind: Rule + services: + - name: repo-external + port: 8080 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/restic.fascinated.cc.yml b/apps/production/cert-manager/external-services/restic.fascinated.cc.yml new file mode 100644 index 0000000..ef3a8b4 --- /dev/null +++ b/apps/production/cert-manager/external-services/restic.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: restic-backups-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.0.136 + ports: + - name: http + port: 8000 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: restic-backups-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`restic.fascinated.cc`) + kind: Rule + services: + - name: restic-backups-external + port: 8000 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/s.fascinated.cc.yml b/apps/production/cert-manager/external-services/s.fascinated.cc.yml new file mode 100644 index 0000000..37c62ec --- /dev/null +++ b/apps/production/cert-manager/external-services/s.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: slash-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.133 + ports: + - name: http + port: 5231 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: slash-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`s.fascinated.cc`) + kind: Rule + services: + - name: slash-external + port: 5231 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/sonarr-anime.local.fascinated.cc.yml b/apps/production/cert-manager/external-services/sonarr-anime.local.fascinated.cc.yml new file mode 100644 index 0000000..ae5d09d --- /dev/null +++ b/apps/production/cert-manager/external-services/sonarr-anime.local.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: sonarr-anime-local-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.0.136 + ports: + - name: http + port: 8988 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: sonarr-anime-local-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`sonarr-anime.local.fascinated.cc`) + kind: Rule + services: + - name: sonarr-anime-local-external + port: 8988 + tls: + secretName: local-fascinated-cc diff --git a/apps/production/cert-manager/external-services/sonarr.local.fascinated.cc.yml b/apps/production/cert-manager/external-services/sonarr.local.fascinated.cc.yml new file mode 100644 index 0000000..39f6f46 --- /dev/null +++ b/apps/production/cert-manager/external-services/sonarr.local.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: sonarr-local-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.0.136 + ports: + - name: http + port: 8989 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: sonarr-local-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`sonarr.local.fascinated.cc`) + kind: Rule + services: + - name: sonarr-local-external + port: 8989 + tls: + secretName: local-fascinated-cc diff --git a/apps/production/cert-manager/external-services/ssr-staging.fascinated.cc.yml b/apps/production/cert-manager/external-services/ssr-staging.fascinated.cc.yml new file mode 100644 index 0000000..d069c6d --- /dev/null +++ b/apps/production/cert-manager/external-services/ssr-staging.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: ssr-staging-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.65 + ports: + - name: http + port: 80 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: ssr-staging-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`ssr-staging.fascinated.cc`) + kind: Rule + services: + - name: ssr-staging-external + port: 80 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/status.fascinated.cc.yml b/apps/production/cert-manager/external-services/status.fascinated.cc.yml new file mode 100644 index 0000000..518be63 --- /dev/null +++ b/apps/production/cert-manager/external-services/status.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: status-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.8 + ports: + - name: http + port: 3001 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: status-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`status.fascinated.cc`) + kind: Rule + services: + - name: status-external + port: 3001 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/subscriptions.fascinated.cc.yml b/apps/production/cert-manager/external-services/subscriptions.fascinated.cc.yml new file mode 100644 index 0000000..50eaad8 --- /dev/null +++ b/apps/production/cert-manager/external-services/subscriptions.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: subscriptions-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.35 + ports: + - name: http + port: 8282 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: subscriptions-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`subscriptions.fascinated.cc`) + kind: Rule + services: + - name: subscriptions-external + port: 8282 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/tautulli.fascinated.cc.yml b/apps/production/cert-manager/external-services/tautulli.fascinated.cc.yml new file mode 100644 index 0000000..0ca54e5 --- /dev/null +++ b/apps/production/cert-manager/external-services/tautulli.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: tautulli-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.183 + ports: + - name: http + port: 8181 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: tautulli-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`tautulli.fascinated.cc`) + kind: Rule + services: + - name: tautulli-external + port: 8181 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/tdarr.local.fascinated.cc.yml b/apps/production/cert-manager/external-services/tdarr.local.fascinated.cc.yml new file mode 100644 index 0000000..f37035c --- /dev/null +++ b/apps/production/cert-manager/external-services/tdarr.local.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: tdarr-local-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.0.136 + ports: + - name: http + port: 8265 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: tdarr-local-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`tdarr.local.fascinated.cc`) + kind: Rule + services: + - name: tdarr-local-external + port: 8265 + tls: + secretName: local-fascinated-cc diff --git a/apps/production/cert-manager/external-services/teleport.fascinated.cc.yml b/apps/production/cert-manager/external-services/teleport.fascinated.cc.yml new file mode 100644 index 0000000..a71e5ba --- /dev/null +++ b/apps/production/cert-manager/external-services/teleport.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: teleport-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.182 + ports: + - name: https + port: 3080 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: teleport-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`teleport.fascinated.cc`) + kind: Rule + services: + - name: teleport-external + port: 3080 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/torrent.local.fascinated.cc.yml b/apps/production/cert-manager/external-services/torrent.local.fascinated.cc.yml new file mode 100644 index 0000000..8560e64 --- /dev/null +++ b/apps/production/cert-manager/external-services/torrent.local.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: torrent-local-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.0.136 + ports: + - name: http + port: 8080 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: torrent-local-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`torrent.local.fascinated.cc`) + kind: Rule + services: + - name: torrent-local-external + port: 8080 + tls: + secretName: local-fascinated-cc diff --git a/apps/production/cert-manager/external-services/translate.fascinated.cc.yml b/apps/production/cert-manager/external-services/translate.fascinated.cc.yml new file mode 100644 index 0000000..0a25856 --- /dev/null +++ b/apps/production/cert-manager/external-services/translate.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: translate-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.116 + ports: + - name: http + port: 5000 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: translate-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`translate.fascinated.cc`) + kind: Rule + services: + - name: translate-external + port: 5000 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/tube.fascinated.cc.yml b/apps/production/cert-manager/external-services/tube.fascinated.cc.yml new file mode 100644 index 0000000..4a36b0d --- /dev/null +++ b/apps/production/cert-manager/external-services/tube.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: tube-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.0.136 + ports: + - name: http + port: 8209 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: tube-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`tube.fascinated.cc`) + kind: Rule + services: + - name: tube-external + port: 8209 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/vaultwarden.fascinated.cc.yml b/apps/production/cert-manager/external-services/vaultwarden.fascinated.cc.yml new file mode 100644 index 0000000..047631b --- /dev/null +++ b/apps/production/cert-manager/external-services/vaultwarden.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: vaultwarden-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.224 + ports: + - name: http + port: 4743 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: vaultwarden-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`vaultwarden.fascinated.cc`) + kind: Rule + services: + - name: vaultwarden-external + port: 4743 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/vencloud.fascinated.cc.yml b/apps/production/cert-manager/external-services/vencloud.fascinated.cc.yml new file mode 100644 index 0000000..c1cb7b1 --- /dev/null +++ b/apps/production/cert-manager/external-services/vencloud.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: vencloud-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.202 + ports: + - name: http + port: 8080 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: vencloud-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`vencloud.fascinated.cc`) + kind: Rule + services: + - name: vencloud-external + port: 8080 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/wakatime.fascinated.cc.yml b/apps/production/cert-manager/external-services/wakatime.fascinated.cc.yml new file mode 100644 index 0000000..2e71356 --- /dev/null +++ b/apps/production/cert-manager/external-services/wakatime.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: wakatime-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.251 + ports: + - name: http + port: 3355 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: wakatime-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`wakatime.fascinated.cc`) + kind: Rule + services: + - name: wakatime-external + port: 3355 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/external-services/wazuh.local.fascinated.cc.yml b/apps/production/cert-manager/external-services/wazuh.local.fascinated.cc.yml new file mode 100644 index 0000000..9992030 --- /dev/null +++ b/apps/production/cert-manager/external-services/wazuh.local.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: wazuh-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.212 + ports: + - name: https + port: 443 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: wazuh-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`wazuh.local.fascinated.cc`) + kind: Rule + services: + - name: wazuh-external + port: 443 + tls: + secretName: local-fascinated-cc diff --git a/apps/production/cert-manager/external-services/wiki.fascinated.cc.yml b/apps/production/cert-manager/external-services/wiki.fascinated.cc.yml new file mode 100644 index 0000000..3a181bb --- /dev/null +++ b/apps/production/cert-manager/external-services/wiki.fascinated.cc.yml @@ -0,0 +1,30 @@ +kind: Service +apiVersion: v1 +metadata: + name: wiki-external + namespace: traefik +spec: + type: ExternalName + externalName: 10.0.50.254 + ports: + - name: http + port: 80 +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: wiki-external-ingress + namespace: traefik + annotations: + kubernetes.io/ingress.class: traefik-external +spec: + entryPoints: + - websecure + routes: + - match: Host(`wiki.fascinated.cc`) + kind: Rule + services: + - name: wiki-external + port: 80 + tls: + secretName: fascinated-cc diff --git a/apps/production/cert-manager/kustomization.yaml b/apps/production/cert-manager/kustomization.yaml index 4ed581d..49bda84 100644 --- a/apps/production/cert-manager/kustomization.yaml +++ b/apps/production/cert-manager/kustomization.yaml @@ -9,3 +9,4 @@ resources: - ./certificates/fascinated-cc.yaml - ./certificates/local-fascinated-cc.yaml - ./certificates/mcutils-xyz.yaml + - ./external-services