Testing for RR stuff...
This commit is contained in:
13
argocd/apps/cert-manager/include/rr-certificate.yaml
Normal file
13
argocd/apps/cert-manager/include/rr-certificate.yaml
Normal file
@@ -0,0 +1,13 @@
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: rr-cert
|
||||
namespace: kube-system
|
||||
spec:
|
||||
secretName: rr-tls
|
||||
issuerRef:
|
||||
name: lets-encrypt
|
||||
kind: ClusterIssuer
|
||||
commonName: rr.innovation-hub-niedersachsen.de
|
||||
dnsNames:
|
||||
- rr.innovation-hub-niedersachsen.de
|
||||
53
config/rr/rr-ingressroute.yaml
Normal file
53
config/rr/rr-ingressroute.yaml
Normal file
@@ -0,0 +1,53 @@
|
||||
---
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: rr-stripprefix
|
||||
namespace: kube-system
|
||||
spec:
|
||||
stripPrefix:
|
||||
prefixes:
|
||||
- /
|
||||
---
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: ServersTransport
|
||||
metadata:
|
||||
name: rr-transport
|
||||
namespace: kube-system
|
||||
spec:
|
||||
insecureSkipVerify: true
|
||||
---
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: rr-external
|
||||
namespace: kube-system
|
||||
annotations:
|
||||
cert-manager.io/cluster-issuer: "lets-encrypt"
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`rr.innovation-hub-niedersachsen.de`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: rr-external-service
|
||||
port: 5173
|
||||
scheme: http
|
||||
serversTransport: rr-transport
|
||||
middlewares:
|
||||
- name: rr-stripprefix
|
||||
tls:
|
||||
secretName: rr-tls
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: rr-external-service
|
||||
namespace: kube-system
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: 192-168-4-106.nip.io
|
||||
ports:
|
||||
- port: 5173
|
||||
targetPort: 5173
|
||||
Reference in New Issue
Block a user