fck nginx-ingress, use loadbalancer for https

This commit is contained in:
Aaron Riedel 2023-06-18 05:18:02 +02:00
parent 03df120bbe
commit 82294d3cf5
Signed by: aaron
GPG key ID: 643004654D40D577
6 changed files with 3 additions and 69 deletions

View file

@ -6,8 +6,6 @@ metadata:
namespace: argocd namespace: argocd
annotations: annotations:
kubernetes.io/ingress.class: "nginx" kubernetes.io/ingress.class: "nginx"
cert-manager.io/cluster-issuer: letsencrypt-prod
acme.cert-manager.io/http01-edit-in-place: "true"
ingress.kubernetes.io/ssl-redirect: "false" ingress.kubernetes.io/ssl-redirect: "false"
nginx.org/ssl-services: "argocd-server" nginx.org/ssl-services: "argocd-server"
spec: spec:
@ -21,8 +19,4 @@ spec:
service: service:
name: argocd-server name: argocd-server
port: port:
number: 443 number: 443
tls:
- hosts:
- argo.apps.yolokube.de
secretName: argocd-cert

View file

@ -52,36 +52,6 @@ spec:
--- ---
apiVersion: argoproj.io/v1alpha1 apiVersion: argoproj.io/v1alpha1
kind: Application kind: Application
metadata:
name: certbot
namespace: argocd
spec:
project: default
sources:
- chart: cert-manager
repoURL: https://charts.jetstack.io
targetRevision: v1.11.0
helm:
releaseName: certbot
parameters:
- name: "installCRDs"
value: "true"
- repoURL: https://git.ar21.de/yolokube/core-deployments.git
targetRevision: HEAD
path: certbot
destination:
server: https://kubernetes.default.svc
namespace: cert-manager
syncPolicy:
syncOptions:
- CreateNamespace=true
automated:
selfHeal: false
prune: true
---
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata: metadata:
name: rook name: rook
namespace: argocd namespace: argocd

View file

@ -69,8 +69,6 @@ metadata:
namespace: example namespace: example
annotations: annotations:
spec.ingressClassName: "nginx" spec.ingressClassName: "nginx"
cert-manager.io/cluster-issuer: letsencrypt-prod
acme.cert-manager.io/http01-edit-in-place: "false"
ingress.kubernetes.io/ssl-redirect: "false" ingress.kubernetes.io/ssl-redirect: "false"
# Use for Basic auth: # Use for Basic auth:
#nginx.org/basic-auth-secret: example-basic-auth-secret #nginx.org/basic-auth-secret: example-basic-auth-secret
@ -88,10 +86,6 @@ spec:
name: example-service name: example-service
port: port:
number: 80 number: 80
tls:
- hosts:
- example.apps.yolokube.de
secretName: example-cert
# Use for Basic auth: # Use for Basic auth:
#--- #---
#kind: Secret #kind: Secret

View file

@ -6,8 +6,6 @@ metadata:
namespace: grafana namespace: grafana
annotations: annotations:
kubernetes.io/ingress.class: "nginx" kubernetes.io/ingress.class: "nginx"
cert-manager.io/cluster-issuer: letsencrypt-prod
acme.cert-manager.io/http01-edit-in-place: "true"
ingress.kubernetes.io/ssl-redirect: "false" ingress.kubernetes.io/ssl-redirect: "false"
#nginx.org/ssl-services: "grafana" #nginx.org/ssl-services: "grafana"
spec: spec:
@ -21,8 +19,4 @@ spec:
service: service:
name: grafana name: grafana
port: port:
number: 80 number: 80
tls:
- hosts:
- grafana.apps.yolokube.de
secretName: grafana-cert

View file

@ -6,8 +6,6 @@ metadata:
namespace: prometheus namespace: prometheus
annotations: annotations:
kubernetes.io/ingress.class: "nginx" kubernetes.io/ingress.class: "nginx"
cert-manager.io/cluster-issuer: letsencrypt-staging
acme.cert-manager.io/http01-edit-in-place: "false"
ingress.kubernetes.io/ssl-redirect: "false" ingress.kubernetes.io/ssl-redirect: "false"
nginx.org/basic-auth-secret: prometheus-basic-auth-secret nginx.org/basic-auth-secret: prometheus-basic-auth-secret
#nginx.org/ssl-services: "prometheus-server" #nginx.org/ssl-services: "prometheus-server"
@ -23,10 +21,6 @@ spec:
name: prometheus-server name: prometheus-server
port: port:
number: 80 number: 80
tls:
- hosts:
- prometheus.apps.yolokube.de
secretName: prometheus-cert
--- ---
apiVersion: networking.k8s.io/v1 apiVersion: networking.k8s.io/v1
kind: Ingress kind: Ingress
@ -35,8 +29,6 @@ metadata:
namespace: prometheus namespace: prometheus
annotations: annotations:
kubernetes.io/ingress.class: "nginx" kubernetes.io/ingress.class: "nginx"
cert-manager.io/cluster-issuer: letsencrypt-staging
acme.cert-manager.io/http01-edit-in-place: "false"
ingress.kubernetes.io/ssl-redirect: "false" ingress.kubernetes.io/ssl-redirect: "false"
nginx.org/basic-auth-secret: prometheus-basic-auth-secret nginx.org/basic-auth-secret: prometheus-basic-auth-secret
#nginx.org/ssl-services: "prometheus-server" #nginx.org/ssl-services: "prometheus-server"
@ -52,10 +44,6 @@ spec:
name: prometheus-alertmanager name: prometheus-alertmanager
port: port:
number: 9093 number: 9093
tls:
- hosts:
- alertmanager.apps.yolokube.de
secretName: alertmanager-cert
--- ---
kind: Secret kind: Secret
metadata: metadata:

View file

@ -6,8 +6,6 @@ metadata:
namespace: rook-ceph namespace: rook-ceph
annotations: annotations:
kubernetes.io/ingress.class: "nginx" kubernetes.io/ingress.class: "nginx"
cert-manager.io/cluster-issuer: letsencrypt-prod
acme.cert-manager.io/http01-edit-in-place: "true"
ingress.kubernetes.io/ssl-redirect: "false" ingress.kubernetes.io/ssl-redirect: "false"
spec: spec:
rules: rules:
@ -20,8 +18,4 @@ spec:
service: service:
name: rook-ceph-mgr-dashboard name: rook-ceph-mgr-dashboard
port: port:
number: 80 number: 80
tls:
- hosts:
- rook.apps.yolokube.de
secretName: rook-dashboard-cert