fck nginx-ingress, use loadbalancer for https

This commit is contained in:
Aaron Riedel 2023-06-18 05:18:02 +02:00
parent 03df120bbe
commit 82294d3cf5
Signed by: aaron
GPG key ID: 643004654D40D577
6 changed files with 3 additions and 69 deletions

View file

@ -6,8 +6,6 @@ metadata:
namespace: argocd
annotations:
kubernetes.io/ingress.class: "nginx"
cert-manager.io/cluster-issuer: letsencrypt-prod
acme.cert-manager.io/http01-edit-in-place: "true"
ingress.kubernetes.io/ssl-redirect: "false"
nginx.org/ssl-services: "argocd-server"
spec:
@ -22,7 +20,3 @@ spec:
name: argocd-server
port:
number: 443
tls:
- hosts:
- argo.apps.yolokube.de
secretName: argocd-cert

View file

@ -52,36 +52,6 @@ spec:
---
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: certbot
namespace: argocd
spec:
project: default
sources:
- chart: cert-manager
repoURL: https://charts.jetstack.io
targetRevision: v1.11.0
helm:
releaseName: certbot
parameters:
- name: "installCRDs"
value: "true"
- repoURL: https://git.ar21.de/yolokube/core-deployments.git
targetRevision: HEAD
path: certbot
destination:
server: https://kubernetes.default.svc
namespace: cert-manager
syncPolicy:
syncOptions:
- CreateNamespace=true
automated:
selfHeal: false
prune: true
---
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: rook
namespace: argocd

View file

@ -69,8 +69,6 @@ metadata:
namespace: example
annotations:
spec.ingressClassName: "nginx"
cert-manager.io/cluster-issuer: letsencrypt-prod
acme.cert-manager.io/http01-edit-in-place: "false"
ingress.kubernetes.io/ssl-redirect: "false"
# Use for Basic auth:
#nginx.org/basic-auth-secret: example-basic-auth-secret
@ -88,10 +86,6 @@ spec:
name: example-service
port:
number: 80
tls:
- hosts:
- example.apps.yolokube.de
secretName: example-cert
# Use for Basic auth:
#---
#kind: Secret

View file

@ -6,8 +6,6 @@ metadata:
namespace: grafana
annotations:
kubernetes.io/ingress.class: "nginx"
cert-manager.io/cluster-issuer: letsencrypt-prod
acme.cert-manager.io/http01-edit-in-place: "true"
ingress.kubernetes.io/ssl-redirect: "false"
#nginx.org/ssl-services: "grafana"
spec:
@ -22,7 +20,3 @@ spec:
name: grafana
port:
number: 80
tls:
- hosts:
- grafana.apps.yolokube.de
secretName: grafana-cert

View file

@ -6,8 +6,6 @@ metadata:
namespace: prometheus
annotations:
kubernetes.io/ingress.class: "nginx"
cert-manager.io/cluster-issuer: letsencrypt-staging
acme.cert-manager.io/http01-edit-in-place: "false"
ingress.kubernetes.io/ssl-redirect: "false"
nginx.org/basic-auth-secret: prometheus-basic-auth-secret
#nginx.org/ssl-services: "prometheus-server"
@ -23,10 +21,6 @@ spec:
name: prometheus-server
port:
number: 80
tls:
- hosts:
- prometheus.apps.yolokube.de
secretName: prometheus-cert
---
apiVersion: networking.k8s.io/v1
kind: Ingress
@ -35,8 +29,6 @@ metadata:
namespace: prometheus
annotations:
kubernetes.io/ingress.class: "nginx"
cert-manager.io/cluster-issuer: letsencrypt-staging
acme.cert-manager.io/http01-edit-in-place: "false"
ingress.kubernetes.io/ssl-redirect: "false"
nginx.org/basic-auth-secret: prometheus-basic-auth-secret
#nginx.org/ssl-services: "prometheus-server"
@ -52,10 +44,6 @@ spec:
name: prometheus-alertmanager
port:
number: 9093
tls:
- hosts:
- alertmanager.apps.yolokube.de
secretName: alertmanager-cert
---
kind: Secret
metadata:

View file

@ -6,8 +6,6 @@ metadata:
namespace: rook-ceph
annotations:
kubernetes.io/ingress.class: "nginx"
cert-manager.io/cluster-issuer: letsencrypt-prod
acme.cert-manager.io/http01-edit-in-place: "true"
ingress.kubernetes.io/ssl-redirect: "false"
spec:
rules:
@ -21,7 +19,3 @@ spec:
name: rook-ceph-mgr-dashboard
port:
number: 80
tls:
- hosts:
- rook.apps.yolokube.de
secretName: rook-dashboard-cert