From 7fedd28cbddf3545601f31823b49fda974e59841 Mon Sep 17 00:00:00 2001
From: Patrick Spek
Date: Wed, 5 Apr 2023 13:36:02 +0200
Subject: Add directories to represent namespaces
---
.../certmanager/letsencrypt-production.yaml | 16 +++++++
.../certmanager/letsencrypt-staging.yaml | 17 +++++++
.../certmanager/letsencrypt-production.yaml | 16 -------
.../certmanager/letsencrypt-staging.yaml | 17 -------
.../manifests.d/keycloak/deployment.yaml | 52 ----------------------
.../k3s-hurzak/manifests.d/keycloak/ingress.yaml | 31 -------------
.../manifests.d/keycloak/sealed-secret.yaml | 18 --------
.../k3s-hurzak/manifests.d/keycloak/service.yaml | 22 ---------
.../personal-services/keycloak/deployment.yaml | 52 ++++++++++++++++++++++
.../personal-services/keycloak/ingress.yaml | 31 +++++++++++++
.../personal-services/keycloak/sealed-secret.yaml | 18 ++++++++
.../personal-services/keycloak/service.yaml | 22 +++++++++
.../personal-services/uptime-kuma/deployment.yaml | 36 +++++++++++++++
.../personal-services/uptime-kuma/ingress.yaml | 45 +++++++++++++++++++
.../personal-services/uptime-kuma/service.yaml | 17 +++++++
.../public-services/searxng/deployment.yaml | 31 +++++++++++++
.../public-services/searxng/ingress.yaml | 26 +++++++++++
.../public-services/searxng/service.yaml | 17 +++++++
.../k3s-hurzak/manifests.d/searxng/deployment.yaml | 31 -------------
data.d/k3s-hurzak/manifests.d/searxng/ingress.yaml | 26 -----------
data.d/k3s-hurzak/manifests.d/searxng/service.yaml | 17 -------
.../manifests.d/uptime-kuma/deployment.yaml | 36 ---------------
.../manifests.d/uptime-kuma/ingress.yaml | 45 -------------------
.../manifests.d/uptime-kuma/service.yaml | 17 -------
24 files changed, 328 insertions(+), 328 deletions(-)
create mode 100644 data.d/k3s-hurzak/manifests.d/base-system/certmanager/letsencrypt-production.yaml
create mode 100644 data.d/k3s-hurzak/manifests.d/base-system/certmanager/letsencrypt-staging.yaml
delete mode 100644 data.d/k3s-hurzak/manifests.d/certmanager/letsencrypt-production.yaml
delete mode 100644 data.d/k3s-hurzak/manifests.d/certmanager/letsencrypt-staging.yaml
delete mode 100644 data.d/k3s-hurzak/manifests.d/keycloak/deployment.yaml
delete mode 100644 data.d/k3s-hurzak/manifests.d/keycloak/ingress.yaml
delete mode 100644 data.d/k3s-hurzak/manifests.d/keycloak/sealed-secret.yaml
delete mode 100644 data.d/k3s-hurzak/manifests.d/keycloak/service.yaml
create mode 100644 data.d/k3s-hurzak/manifests.d/personal-services/keycloak/deployment.yaml
create mode 100644 data.d/k3s-hurzak/manifests.d/personal-services/keycloak/ingress.yaml
create mode 100644 data.d/k3s-hurzak/manifests.d/personal-services/keycloak/sealed-secret.yaml
create mode 100644 data.d/k3s-hurzak/manifests.d/personal-services/keycloak/service.yaml
create mode 100644 data.d/k3s-hurzak/manifests.d/personal-services/uptime-kuma/deployment.yaml
create mode 100644 data.d/k3s-hurzak/manifests.d/personal-services/uptime-kuma/ingress.yaml
create mode 100644 data.d/k3s-hurzak/manifests.d/personal-services/uptime-kuma/service.yaml
create mode 100644 data.d/k3s-hurzak/manifests.d/public-services/searxng/deployment.yaml
create mode 100644 data.d/k3s-hurzak/manifests.d/public-services/searxng/ingress.yaml
create mode 100644 data.d/k3s-hurzak/manifests.d/public-services/searxng/service.yaml
delete mode 100644 data.d/k3s-hurzak/manifests.d/searxng/deployment.yaml
delete mode 100644 data.d/k3s-hurzak/manifests.d/searxng/ingress.yaml
delete mode 100644 data.d/k3s-hurzak/manifests.d/searxng/service.yaml
delete mode 100644 data.d/k3s-hurzak/manifests.d/uptime-kuma/deployment.yaml
delete mode 100644 data.d/k3s-hurzak/manifests.d/uptime-kuma/ingress.yaml
delete mode 100644 data.d/k3s-hurzak/manifests.d/uptime-kuma/service.yaml
(limited to 'data.d/k3s-hurzak')
diff --git a/data.d/k3s-hurzak/manifests.d/base-system/certmanager/letsencrypt-production.yaml b/data.d/k3s-hurzak/manifests.d/base-system/certmanager/letsencrypt-production.yaml
new file mode 100644
index 0000000..dbff2c2
--- /dev/null
+++ b/data.d/k3s-hurzak/manifests.d/base-system/certmanager/letsencrypt-production.yaml
@@ -0,0 +1,16 @@
+---
+apiVersion: cert-manager.io/v1
+kind: ClusterIssuer
+metadata:
+ name: letsencrypt-production
+spec:
+ acme:
+ email: root@tyil.net
+ server: https://acme-v02.api.letsencrypt.org/directory
+ privateKeySecretRef:
+ name: clusterissuer-letsencrypt-production
+ solvers:
+ - http01:
+ ingress:
+ class: traefik
+...
diff --git a/data.d/k3s-hurzak/manifests.d/base-system/certmanager/letsencrypt-staging.yaml b/data.d/k3s-hurzak/manifests.d/base-system/certmanager/letsencrypt-staging.yaml
new file mode 100644
index 0000000..9b0a27d
--- /dev/null
+++ b/data.d/k3s-hurzak/manifests.d/base-system/certmanager/letsencrypt-staging.yaml
@@ -0,0 +1,17 @@
+---
+apiVersion: cert-manager.io/v1
+kind: ClusterIssuer
+metadata:
+ name: letsencrypt-staging
+spec:
+ acme:
+ email: root@tyil.net
+ server: https://acme-staging-v02.api.letsencrypt.org/directory
+ privateKeySecretRef:
+ name: clusterissuer-letsencrypt-staging
+ solvers:
+ - http01:
+ ingress:
+ class: traefik
+ selector: {}
+...
diff --git a/data.d/k3s-hurzak/manifests.d/certmanager/letsencrypt-production.yaml b/data.d/k3s-hurzak/manifests.d/certmanager/letsencrypt-production.yaml
deleted file mode 100644
index dbff2c2..0000000
--- a/data.d/k3s-hurzak/manifests.d/certmanager/letsencrypt-production.yaml
+++ /dev/null
@@ -1,16 +0,0 @@
----
-apiVersion: cert-manager.io/v1
-kind: ClusterIssuer
-metadata:
- name: letsencrypt-production
-spec:
- acme:
- email: root@tyil.net
- server: https://acme-v02.api.letsencrypt.org/directory
- privateKeySecretRef:
- name: clusterissuer-letsencrypt-production
- solvers:
- - http01:
- ingress:
- class: traefik
-...
diff --git a/data.d/k3s-hurzak/manifests.d/certmanager/letsencrypt-staging.yaml b/data.d/k3s-hurzak/manifests.d/certmanager/letsencrypt-staging.yaml
deleted file mode 100644
index 9b0a27d..0000000
--- a/data.d/k3s-hurzak/manifests.d/certmanager/letsencrypt-staging.yaml
+++ /dev/null
@@ -1,17 +0,0 @@
----
-apiVersion: cert-manager.io/v1
-kind: ClusterIssuer
-metadata:
- name: letsencrypt-staging
-spec:
- acme:
- email: root@tyil.net
- server: https://acme-staging-v02.api.letsencrypt.org/directory
- privateKeySecretRef:
- name: clusterissuer-letsencrypt-staging
- solvers:
- - http01:
- ingress:
- class: traefik
- selector: {}
-...
diff --git a/data.d/k3s-hurzak/manifests.d/keycloak/deployment.yaml b/data.d/k3s-hurzak/manifests.d/keycloak/deployment.yaml
deleted file mode 100644
index 5cd9975..0000000
--- a/data.d/k3s-hurzak/manifests.d/keycloak/deployment.yaml
+++ /dev/null
@@ -1,52 +0,0 @@
----
-apiVersion: apps/v1
-kind: Deployment
-metadata:
- name: keycloak
- namespace: personal-services
- labels:
- app.kubernetes.io/created-by: tyil
- app.kubernetes.io/managed-by: manual
- app.kubernetes.io/name: keycloak
- app.kubernetes.io/part-of: keycloak
-spec:
- replicas: 1
- selector:
- matchLabels:
- app.kubernetes.io/created-by: tyil
- app.kubernetes.io/managed-by: manual
- app.kubernetes.io/name: keycloak
- app.kubernetes.io/part-of: keycloak
- template:
- metadata:
- labels:
- app.kubernetes.io/created-by: tyil
- app.kubernetes.io/managed-by: manual
- app.kubernetes.io/name: keycloak
- app.kubernetes.io/part-of: keycloak
- spec:
- containers:
- - name: keycloak
- image: quay.io/keycloak/keycloak:21.0.2
- args: ["start-dev"]
- env:
- - name: KEYCLOAK_ADMIN
- valueFrom:
- secretKeyRef:
- name: keycloak-credentials
- key: username
- - name: KEYCLOAK_ADMIN_PASSWORD
- valueFrom:
- secretKeyRef:
- name: keycloak-credentials
- key: password
- - name: KC_PROXY
- value: "edge"
- ports:
- - name: http
- containerPort: 8080
- readinessProbe:
- httpGet:
- path: /realms/master
- port: 8080
-...
diff --git a/data.d/k3s-hurzak/manifests.d/keycloak/ingress.yaml b/data.d/k3s-hurzak/manifests.d/keycloak/ingress.yaml
deleted file mode 100644
index 40e6d22..0000000
--- a/data.d/k3s-hurzak/manifests.d/keycloak/ingress.yaml
+++ /dev/null
@@ -1,31 +0,0 @@
----
-apiVersion: networking.k8s.io/v1
-kind: Ingress
-metadata:
- name: keycloak
- namespace: personal-services
- labels:
- app.kubernetes.io/created-by: tyil
- app.kubernetes.io/managed-by: manual
- app.kubernetes.io/name: keycloak
- app.kubernetes.io/part-of: keycloak
- annotations:
- cert-manager.io/cluster-issuer: "letsencrypt-production"
-spec:
- ingressClassName: "traefik"
- tls:
- - hosts:
- - id.tyil.nl
- secretName: tls-nl.tyil.id
- rules:
- - host: id.tyil.nl
- http:
- paths:
- - path: /
- pathType: Prefix
- backend:
- service:
- name: keycloak
- port:
- number: 8080
-...
diff --git a/data.d/k3s-hurzak/manifests.d/keycloak/sealed-secret.yaml b/data.d/k3s-hurzak/manifests.d/keycloak/sealed-secret.yaml
deleted file mode 100644
index acda853..0000000
--- a/data.d/k3s-hurzak/manifests.d/keycloak/sealed-secret.yaml
+++ /dev/null
@@ -1,18 +0,0 @@
-apiVersion: bitnami.com/v1alpha1
-kind: SealedSecret
-metadata:
- creationTimestamp: null
- name: keycloak-credentials
- namespace: personal-services
-spec:
- encryptedData:
- password: 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
- username: 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
- template:
- data: null
- metadata:
- creationTimestamp: null
- name: keycloak-credentials
- namespace: personal-services
- type: Opaque
-
diff --git a/data.d/k3s-hurzak/manifests.d/keycloak/service.yaml b/data.d/k3s-hurzak/manifests.d/keycloak/service.yaml
deleted file mode 100644
index c9068b7..0000000
--- a/data.d/k3s-hurzak/manifests.d/keycloak/service.yaml
+++ /dev/null
@@ -1,22 +0,0 @@
----
-apiVersion: v1
-kind: Service
-metadata:
- name: keycloak
- namespace: personal-services
- labels:
- app.kubernetes.io/created-by: tyil
- app.kubernetes.io/managed-by: manual
- app.kubernetes.io/name: keycloak
- app.kubernetes.io/part-of: keycloak
-spec:
- selector:
- app.kubernetes.io/created-by: tyil
- app.kubernetes.io/managed-by: manual
- app.kubernetes.io/name: keycloak
- app.kubernetes.io/part-of: keycloak
- ports:
- - name: http
- port: 8080
- targetPort: 8080
-...
diff --git a/data.d/k3s-hurzak/manifests.d/personal-services/keycloak/deployment.yaml b/data.d/k3s-hurzak/manifests.d/personal-services/keycloak/deployment.yaml
new file mode 100644
index 0000000..5cd9975
--- /dev/null
+++ b/data.d/k3s-hurzak/manifests.d/personal-services/keycloak/deployment.yaml
@@ -0,0 +1,52 @@
+---
+apiVersion: apps/v1
+kind: Deployment
+metadata:
+ name: keycloak
+ namespace: personal-services
+ labels:
+ app.kubernetes.io/created-by: tyil
+ app.kubernetes.io/managed-by: manual
+ app.kubernetes.io/name: keycloak
+ app.kubernetes.io/part-of: keycloak
+spec:
+ replicas: 1
+ selector:
+ matchLabels:
+ app.kubernetes.io/created-by: tyil
+ app.kubernetes.io/managed-by: manual
+ app.kubernetes.io/name: keycloak
+ app.kubernetes.io/part-of: keycloak
+ template:
+ metadata:
+ labels:
+ app.kubernetes.io/created-by: tyil
+ app.kubernetes.io/managed-by: manual
+ app.kubernetes.io/name: keycloak
+ app.kubernetes.io/part-of: keycloak
+ spec:
+ containers:
+ - name: keycloak
+ image: quay.io/keycloak/keycloak:21.0.2
+ args: ["start-dev"]
+ env:
+ - name: KEYCLOAK_ADMIN
+ valueFrom:
+ secretKeyRef:
+ name: keycloak-credentials
+ key: username
+ - name: KEYCLOAK_ADMIN_PASSWORD
+ valueFrom:
+ secretKeyRef:
+ name: keycloak-credentials
+ key: password
+ - name: KC_PROXY
+ value: "edge"
+ ports:
+ - name: http
+ containerPort: 8080
+ readinessProbe:
+ httpGet:
+ path: /realms/master
+ port: 8080
+...
diff --git a/data.d/k3s-hurzak/manifests.d/personal-services/keycloak/ingress.yaml b/data.d/k3s-hurzak/manifests.d/personal-services/keycloak/ingress.yaml
new file mode 100644
index 0000000..40e6d22
--- /dev/null
+++ b/data.d/k3s-hurzak/manifests.d/personal-services/keycloak/ingress.yaml
@@ -0,0 +1,31 @@
+---
+apiVersion: networking.k8s.io/v1
+kind: Ingress
+metadata:
+ name: keycloak
+ namespace: personal-services
+ labels:
+ app.kubernetes.io/created-by: tyil
+ app.kubernetes.io/managed-by: manual
+ app.kubernetes.io/name: keycloak
+ app.kubernetes.io/part-of: keycloak
+ annotations:
+ cert-manager.io/cluster-issuer: "letsencrypt-production"
+spec:
+ ingressClassName: "traefik"
+ tls:
+ - hosts:
+ - id.tyil.nl
+ secretName: tls-nl.tyil.id
+ rules:
+ - host: id.tyil.nl
+ http:
+ paths:
+ - path: /
+ pathType: Prefix
+ backend:
+ service:
+ name: keycloak
+ port:
+ number: 8080
+...
diff --git a/data.d/k3s-hurzak/manifests.d/personal-services/keycloak/sealed-secret.yaml b/data.d/k3s-hurzak/manifests.d/personal-services/keycloak/sealed-secret.yaml
new file mode 100644
index 0000000..acda853
--- /dev/null
+++ b/data.d/k3s-hurzak/manifests.d/personal-services/keycloak/sealed-secret.yaml
@@ -0,0 +1,18 @@
+apiVersion: bitnami.com/v1alpha1
+kind: SealedSecret
+metadata:
+ creationTimestamp: null
+ name: keycloak-credentials
+ namespace: personal-services
+spec:
+ encryptedData:
+ password: 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
+ username: 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
+ template:
+ data: null
+ metadata:
+ creationTimestamp: null
+ name: keycloak-credentials
+ namespace: personal-services
+ type: Opaque
+
diff --git a/data.d/k3s-hurzak/manifests.d/personal-services/keycloak/service.yaml b/data.d/k3s-hurzak/manifests.d/personal-services/keycloak/service.yaml
new file mode 100644
index 0000000..c9068b7
--- /dev/null
+++ b/data.d/k3s-hurzak/manifests.d/personal-services/keycloak/service.yaml
@@ -0,0 +1,22 @@
+---
+apiVersion: v1
+kind: Service
+metadata:
+ name: keycloak
+ namespace: personal-services
+ labels:
+ app.kubernetes.io/created-by: tyil
+ app.kubernetes.io/managed-by: manual
+ app.kubernetes.io/name: keycloak
+ app.kubernetes.io/part-of: keycloak
+spec:
+ selector:
+ app.kubernetes.io/created-by: tyil
+ app.kubernetes.io/managed-by: manual
+ app.kubernetes.io/name: keycloak
+ app.kubernetes.io/part-of: keycloak
+ ports:
+ - name: http
+ port: 8080
+ targetPort: 8080
+...
diff --git a/data.d/k3s-hurzak/manifests.d/personal-services/uptime-kuma/deployment.yaml b/data.d/k3s-hurzak/manifests.d/personal-services/uptime-kuma/deployment.yaml
new file mode 100644
index 0000000..9553007
--- /dev/null
+++ b/data.d/k3s-hurzak/manifests.d/personal-services/uptime-kuma/deployment.yaml
@@ -0,0 +1,36 @@
+---
+apiVersion: apps/v1
+kind: Deployment
+metadata:
+ name: uptime-kuma
+ namespace: personal-services
+spec:
+ replicas: 1
+ selector:
+ matchLabels:
+ app.kubernetes.io/created-by: tyil
+ app.kubernetes.io/managed-by: manual
+ app.kubernetes.io/name: uptime-kuma
+ app.kubernetes.io/part-of: personal-services
+ template:
+ metadata:
+ labels:
+ app.kubernetes.io/created-by: tyil
+ app.kubernetes.io/managed-by: manual
+ app.kubernetes.io/name: uptime-kuma
+ app.kubernetes.io/part-of: personal-services
+ spec:
+ containers:
+ - name: uptime-kuma
+ image: louislam/uptime-kuma:1
+ ports:
+ - containerPort: 3001
+ volumeMounts:
+ - name: data
+ mountPath: /app/data
+ volumes:
+ - name: data
+ hostPath:
+ type: Directory
+ path: /srv/personal-services/uptime-kuma
+...
diff --git a/data.d/k3s-hurzak/manifests.d/personal-services/uptime-kuma/ingress.yaml b/data.d/k3s-hurzak/manifests.d/personal-services/uptime-kuma/ingress.yaml
new file mode 100644
index 0000000..66eb258
--- /dev/null
+++ b/data.d/k3s-hurzak/manifests.d/personal-services/uptime-kuma/ingress.yaml
@@ -0,0 +1,45 @@
+---
+apiVersion: networking.k8s.io/v1
+kind: Ingress
+metadata:
+ name: uptime-kuma
+ namespace: personal-services
+ labels:
+ app.kubernetes.io/created-by: tyil
+ app.kubernetes.io/managed-by: manual
+ app.kubernetes.io/name: uptime-kuma
+ app.kubernetes.io/part-of: personal-services
+ annotations:
+ cert-manager.io/cluster-issuer: letsencrypt-production
+ #nginx.ingress.kubernetes.io/configuration-snippet: |
+ # proxy_cache_bypass $http_upgrade;
+ # proxy_set_header Connection "Upgrade";
+ # proxy_set_header Host $host;
+ # proxy_set_header Upgrade $http_upgrade;
+ # proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
+ # proxy_set_header X-Forwarded-For $remote_addr;
+ # proxy_set_header X-Forwarded-Host $http_host;
+ # proxy_set_header X-Forwarded-Proto $scheme;
+ # proxy_set_header X-Real-IP $remote_addr;
+ #nginx.ingress.kubernetes.io/proxy-http-version: "1.1"
+ #nginx.ingress.kubernetes.io/proxy-read-timeout: "3600"
+ #nginx.ingress.kubernetes.io/proxy-send-timeout: "3600"
+ #nginx.ingress.kubernetes.io/ssl-redirect: "true"
+spec:
+ ingressClassName: "traefik"
+ rules:
+ - host: uptime.tyil.nl
+ http:
+ paths:
+ - path: /
+ pathType: Prefix
+ backend:
+ service:
+ name: uptime-kuma
+ port:
+ number: 80
+ tls:
+ - hosts:
+ - uptime.tyil.nl
+ secretName: tls-nl.tyil.uptime
+...
diff --git a/data.d/k3s-hurzak/manifests.d/personal-services/uptime-kuma/service.yaml b/data.d/k3s-hurzak/manifests.d/personal-services/uptime-kuma/service.yaml
new file mode 100644
index 0000000..51d6d53
--- /dev/null
+++ b/data.d/k3s-hurzak/manifests.d/personal-services/uptime-kuma/service.yaml
@@ -0,0 +1,17 @@
+---
+apiVersion: v1
+kind: Service
+metadata:
+ name: uptime-kuma
+ namespace: personal-services
+spec:
+ selector:
+ app.kubernetes.io/created-by: tyil
+ app.kubernetes.io/managed-by: manual
+ app.kubernetes.io/name: uptime-kuma
+ app.kubernetes.io/part-of: personal-services
+ ports:
+ - protocol: TCP
+ port: 80
+ targetPort: 3001
+...
diff --git a/data.d/k3s-hurzak/manifests.d/public-services/searxng/deployment.yaml b/data.d/k3s-hurzak/manifests.d/public-services/searxng/deployment.yaml
new file mode 100644
index 0000000..f5f6064
--- /dev/null
+++ b/data.d/k3s-hurzak/manifests.d/public-services/searxng/deployment.yaml
@@ -0,0 +1,31 @@
+---
+apiVersion: apps/v1
+kind: Deployment
+metadata:
+ name: searxng
+ namespace: public-services
+spec:
+ replicas: 1
+ selector:
+ matchLabels:
+ app.kubernetes.io/created-by: tyil
+ app.kubernetes.io/managed-by: manual
+ app.kubernetes.io/name: searxng
+ app.kubernetes.io/part-of: searxng
+ template:
+ metadata:
+ labels:
+ app.kubernetes.io/created-by: tyil
+ app.kubernetes.io/managed-by: manual
+ app.kubernetes.io/name: searxng
+ app.kubernetes.io/part-of: searxng
+ spec:
+ containers:
+ - name: searxng
+ image: searxng/searxng:2022.08.01-7c9c1124
+ ports:
+ - containerPort: 8080
+ env:
+ - name: BASE_URL
+ value: https://searxng.tyil.nl
+...
diff --git a/data.d/k3s-hurzak/manifests.d/public-services/searxng/ingress.yaml b/data.d/k3s-hurzak/manifests.d/public-services/searxng/ingress.yaml
new file mode 100644
index 0000000..0b8fe62
--- /dev/null
+++ b/data.d/k3s-hurzak/manifests.d/public-services/searxng/ingress.yaml
@@ -0,0 +1,26 @@
+---
+apiVersion: networking.k8s.io/v1
+kind: Ingress
+metadata:
+ name: searxng
+ namespace: public-services
+ annotations:
+ cert-manager.io/cluster-issuer: "letsencrypt-production"
+spec:
+ ingressClassName: "traefik"
+ tls:
+ - hosts:
+ - searxng.tyil.nl
+ secretName: tls-nl.tyil.searxng
+ rules:
+ - host: searxng.tyil.nl
+ http:
+ paths:
+ - path: /
+ pathType: Prefix
+ backend:
+ service:
+ name: searxng
+ port:
+ number: 80
+...
diff --git a/data.d/k3s-hurzak/manifests.d/public-services/searxng/service.yaml b/data.d/k3s-hurzak/manifests.d/public-services/searxng/service.yaml
new file mode 100644
index 0000000..23fb8ac
--- /dev/null
+++ b/data.d/k3s-hurzak/manifests.d/public-services/searxng/service.yaml
@@ -0,0 +1,17 @@
+---
+apiVersion: v1
+kind: Service
+metadata:
+ name: searxng
+ namespace: public-services
+spec:
+ selector:
+ app.kubernetes.io/created-by: tyil
+ app.kubernetes.io/managed-by: manual
+ app.kubernetes.io/name: searxng
+ app.kubernetes.io/part-of: searxng
+ ports:
+ - protocol: TCP
+ port: 80
+ targetPort: 8080
+...
diff --git a/data.d/k3s-hurzak/manifests.d/searxng/deployment.yaml b/data.d/k3s-hurzak/manifests.d/searxng/deployment.yaml
deleted file mode 100644
index f5f6064..0000000
--- a/data.d/k3s-hurzak/manifests.d/searxng/deployment.yaml
+++ /dev/null
@@ -1,31 +0,0 @@
----
-apiVersion: apps/v1
-kind: Deployment
-metadata:
- name: searxng
- namespace: public-services
-spec:
- replicas: 1
- selector:
- matchLabels:
- app.kubernetes.io/created-by: tyil
- app.kubernetes.io/managed-by: manual
- app.kubernetes.io/name: searxng
- app.kubernetes.io/part-of: searxng
- template:
- metadata:
- labels:
- app.kubernetes.io/created-by: tyil
- app.kubernetes.io/managed-by: manual
- app.kubernetes.io/name: searxng
- app.kubernetes.io/part-of: searxng
- spec:
- containers:
- - name: searxng
- image: searxng/searxng:2022.08.01-7c9c1124
- ports:
- - containerPort: 8080
- env:
- - name: BASE_URL
- value: https://searxng.tyil.nl
-...
diff --git a/data.d/k3s-hurzak/manifests.d/searxng/ingress.yaml b/data.d/k3s-hurzak/manifests.d/searxng/ingress.yaml
deleted file mode 100644
index 0b8fe62..0000000
--- a/data.d/k3s-hurzak/manifests.d/searxng/ingress.yaml
+++ /dev/null
@@ -1,26 +0,0 @@
----
-apiVersion: networking.k8s.io/v1
-kind: Ingress
-metadata:
- name: searxng
- namespace: public-services
- annotations:
- cert-manager.io/cluster-issuer: "letsencrypt-production"
-spec:
- ingressClassName: "traefik"
- tls:
- - hosts:
- - searxng.tyil.nl
- secretName: tls-nl.tyil.searxng
- rules:
- - host: searxng.tyil.nl
- http:
- paths:
- - path: /
- pathType: Prefix
- backend:
- service:
- name: searxng
- port:
- number: 80
-...
diff --git a/data.d/k3s-hurzak/manifests.d/searxng/service.yaml b/data.d/k3s-hurzak/manifests.d/searxng/service.yaml
deleted file mode 100644
index 23fb8ac..0000000
--- a/data.d/k3s-hurzak/manifests.d/searxng/service.yaml
+++ /dev/null
@@ -1,17 +0,0 @@
----
-apiVersion: v1
-kind: Service
-metadata:
- name: searxng
- namespace: public-services
-spec:
- selector:
- app.kubernetes.io/created-by: tyil
- app.kubernetes.io/managed-by: manual
- app.kubernetes.io/name: searxng
- app.kubernetes.io/part-of: searxng
- ports:
- - protocol: TCP
- port: 80
- targetPort: 8080
-...
diff --git a/data.d/k3s-hurzak/manifests.d/uptime-kuma/deployment.yaml b/data.d/k3s-hurzak/manifests.d/uptime-kuma/deployment.yaml
deleted file mode 100644
index 9553007..0000000
--- a/data.d/k3s-hurzak/manifests.d/uptime-kuma/deployment.yaml
+++ /dev/null
@@ -1,36 +0,0 @@
----
-apiVersion: apps/v1
-kind: Deployment
-metadata:
- name: uptime-kuma
- namespace: personal-services
-spec:
- replicas: 1
- selector:
- matchLabels:
- app.kubernetes.io/created-by: tyil
- app.kubernetes.io/managed-by: manual
- app.kubernetes.io/name: uptime-kuma
- app.kubernetes.io/part-of: personal-services
- template:
- metadata:
- labels:
- app.kubernetes.io/created-by: tyil
- app.kubernetes.io/managed-by: manual
- app.kubernetes.io/name: uptime-kuma
- app.kubernetes.io/part-of: personal-services
- spec:
- containers:
- - name: uptime-kuma
- image: louislam/uptime-kuma:1
- ports:
- - containerPort: 3001
- volumeMounts:
- - name: data
- mountPath: /app/data
- volumes:
- - name: data
- hostPath:
- type: Directory
- path: /srv/personal-services/uptime-kuma
-...
diff --git a/data.d/k3s-hurzak/manifests.d/uptime-kuma/ingress.yaml b/data.d/k3s-hurzak/manifests.d/uptime-kuma/ingress.yaml
deleted file mode 100644
index 66eb258..0000000
--- a/data.d/k3s-hurzak/manifests.d/uptime-kuma/ingress.yaml
+++ /dev/null
@@ -1,45 +0,0 @@
----
-apiVersion: networking.k8s.io/v1
-kind: Ingress
-metadata:
- name: uptime-kuma
- namespace: personal-services
- labels:
- app.kubernetes.io/created-by: tyil
- app.kubernetes.io/managed-by: manual
- app.kubernetes.io/name: uptime-kuma
- app.kubernetes.io/part-of: personal-services
- annotations:
- cert-manager.io/cluster-issuer: letsencrypt-production
- #nginx.ingress.kubernetes.io/configuration-snippet: |
- # proxy_cache_bypass $http_upgrade;
- # proxy_set_header Connection "Upgrade";
- # proxy_set_header Host $host;
- # proxy_set_header Upgrade $http_upgrade;
- # proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
- # proxy_set_header X-Forwarded-For $remote_addr;
- # proxy_set_header X-Forwarded-Host $http_host;
- # proxy_set_header X-Forwarded-Proto $scheme;
- # proxy_set_header X-Real-IP $remote_addr;
- #nginx.ingress.kubernetes.io/proxy-http-version: "1.1"
- #nginx.ingress.kubernetes.io/proxy-read-timeout: "3600"
- #nginx.ingress.kubernetes.io/proxy-send-timeout: "3600"
- #nginx.ingress.kubernetes.io/ssl-redirect: "true"
-spec:
- ingressClassName: "traefik"
- rules:
- - host: uptime.tyil.nl
- http:
- paths:
- - path: /
- pathType: Prefix
- backend:
- service:
- name: uptime-kuma
- port:
- number: 80
- tls:
- - hosts:
- - uptime.tyil.nl
- secretName: tls-nl.tyil.uptime
-...
diff --git a/data.d/k3s-hurzak/manifests.d/uptime-kuma/service.yaml b/data.d/k3s-hurzak/manifests.d/uptime-kuma/service.yaml
deleted file mode 100644
index 51d6d53..0000000
--- a/data.d/k3s-hurzak/manifests.d/uptime-kuma/service.yaml
+++ /dev/null
@@ -1,17 +0,0 @@
----
-apiVersion: v1
-kind: Service
-metadata:
- name: uptime-kuma
- namespace: personal-services
-spec:
- selector:
- app.kubernetes.io/created-by: tyil
- app.kubernetes.io/managed-by: manual
- app.kubernetes.io/name: uptime-kuma
- app.kubernetes.io/part-of: personal-services
- ports:
- - protocol: TCP
- port: 80
- targetPort: 3001
-...
--
cgit v1.1