attempt internal and external
This commit is contained in:
17
k8s/deploy.yaml → external/deploy.yaml
vendored
17
k8s/deploy.yaml → external/deploy.yaml
vendored
@@ -1,21 +1,21 @@
|
|||||||
kind: Deployment
|
kind: Deployment
|
||||||
apiVersion: apps/v1
|
apiVersion: apps/v1
|
||||||
metadata:
|
metadata:
|
||||||
name: traefik-custom-controller
|
name: traefik-external-controller
|
||||||
labels:
|
labels:
|
||||||
app: traefik-custom-controller
|
app: traefik-external-controller
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
spec:
|
spec:
|
||||||
replicas: 1
|
replicas: 1
|
||||||
selector:
|
selector:
|
||||||
matchLabels:
|
matchLabels:
|
||||||
app: traefik-custom-controller
|
app: traefik-external-controller
|
||||||
template:
|
template:
|
||||||
metadata:
|
metadata:
|
||||||
labels:
|
labels:
|
||||||
app: traefik-custom-controller
|
app: traefik-external-controller
|
||||||
spec:
|
spec:
|
||||||
serviceAccountName: traefik-custom-controller
|
serviceAccountName: traefik-external-controller
|
||||||
containers:
|
containers:
|
||||||
- name: traefik
|
- name: traefik
|
||||||
image: traefik:v2.2
|
image: traefik:v2.2
|
||||||
@@ -23,6 +23,7 @@ spec:
|
|||||||
- secretRef:
|
- secretRef:
|
||||||
name: namedotcom
|
name: namedotcom
|
||||||
args:
|
args:
|
||||||
|
- --providers.kubernetescrd.ingressclass=traefik-internal
|
||||||
- --log.level=DEBUG
|
- --log.level=DEBUG
|
||||||
- --api
|
- --api
|
||||||
- --api.insecure
|
- --api.insecure
|
||||||
@@ -39,7 +40,7 @@ spec:
|
|||||||
- --certificatesresolvers.myresolver.acme.dnschallenge.delaybeforecheck=0
|
- --certificatesresolvers.myresolver.acme.dnschallenge.delaybeforecheck=0
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /acme
|
- mountPath: /acme
|
||||||
name: traefik-acme
|
name: traefik-external-acme
|
||||||
ports:
|
ports:
|
||||||
- name: web
|
- name: web
|
||||||
containerPort: 9080
|
containerPort: 9080
|
||||||
@@ -48,6 +49,6 @@ spec:
|
|||||||
- name: admin
|
- name: admin
|
||||||
containerPort: 8080
|
containerPort: 8080
|
||||||
volumes:
|
volumes:
|
||||||
- name: traefik-acme
|
- name: traefik-external-acme
|
||||||
persistentVolumeClaim:
|
persistentVolumeClaim:
|
||||||
claimName: traefik-acme
|
claimName: traefik-external-acme
|
||||||
4
k8s/pvc/pvc.yaml → external/pvc/pvc.yaml
vendored
4
k8s/pvc/pvc.yaml → external/pvc/pvc.yaml
vendored
@@ -1,9 +1,9 @@
|
|||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: PersistentVolumeClaim
|
kind: PersistentVolumeClaim
|
||||||
metadata:
|
metadata:
|
||||||
name: traefik-acme
|
name: traefik-external-acme
|
||||||
labels:
|
labels:
|
||||||
app: traefik-custom-controller
|
app: traefik-external-controller
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
spec:
|
spec:
|
||||||
storageClassName: nfs-encrypted
|
storageClassName: nfs-encrypted
|
||||||
10
k8s/rbac.yaml → external/rbac.yaml
vendored
10
k8s/rbac.yaml → external/rbac.yaml
vendored
@@ -1,14 +1,14 @@
|
|||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: ServiceAccount
|
kind: ServiceAccount
|
||||||
metadata:
|
metadata:
|
||||||
name: traefik-custom-controller
|
name: traefik-external-controller
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
---
|
---
|
||||||
|
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
metadata:
|
metadata:
|
||||||
name: traefik-custom-controller
|
name: traefik-external-controller
|
||||||
rules:
|
rules:
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- ""
|
- ""
|
||||||
@@ -53,12 +53,12 @@ rules:
|
|||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
metadata:
|
metadata:
|
||||||
name: traefik-custom-controller
|
name: traefik-external-controller
|
||||||
roleRef:
|
roleRef:
|
||||||
apiGroup: rbac.authorization.k8s.io
|
apiGroup: rbac.authorization.k8s.io
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
name: traefik-custom-controller
|
name: traefik-external-controller
|
||||||
subjects:
|
subjects:
|
||||||
- kind: ServiceAccount
|
- kind: ServiceAccount
|
||||||
name: traefik-custom-controller
|
name: traefik-external-controller
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
4
k8s/service.yaml → external/service.yaml
vendored
4
k8s/service.yaml → external/service.yaml
vendored
@@ -1,12 +1,12 @@
|
|||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: Service
|
kind: Service
|
||||||
metadata:
|
metadata:
|
||||||
name: traefik-custom-controller
|
name: traefik-external-controller
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
spec:
|
spec:
|
||||||
type: LoadBalancer
|
type: LoadBalancer
|
||||||
selector:
|
selector:
|
||||||
app: traefik-custom-controller
|
app: traefik-external-controller
|
||||||
ports:
|
ports:
|
||||||
- protocol: TCP
|
- protocol: TCP
|
||||||
port: 9080
|
port: 9080
|
||||||
54
internal/deploy.yaml
Normal file
54
internal/deploy.yaml
Normal file
@@ -0,0 +1,54 @@
|
|||||||
|
kind: Deployment
|
||||||
|
apiVersion: apps/v1
|
||||||
|
metadata:
|
||||||
|
name: traefik-internal-controller
|
||||||
|
labels:
|
||||||
|
app: traefik-internal-controller
|
||||||
|
namespace: kube-system
|
||||||
|
spec:
|
||||||
|
replicas: 1
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: traefik-internal-controller
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: traefik-internal-controller
|
||||||
|
spec:
|
||||||
|
serviceAccountName: traefik-internal-controller
|
||||||
|
containers:
|
||||||
|
- name: traefik
|
||||||
|
image: traefik:v2.2
|
||||||
|
envFrom:
|
||||||
|
- secretRef:
|
||||||
|
name: namedotcom
|
||||||
|
args:
|
||||||
|
- --providers.kubernetescrd.ingressclass=traefik-internal
|
||||||
|
- --log.level=DEBUG
|
||||||
|
- --api
|
||||||
|
- --api.insecure
|
||||||
|
- --entrypoints.web.address=:80
|
||||||
|
- --entrypoints.websecure.address=:443
|
||||||
|
- --entrypoints.websecure.http.tls=true
|
||||||
|
- --providers.kubernetescrd
|
||||||
|
- --metrics.statsd=true
|
||||||
|
- --metrics.statsd.address=graphite.ducoterra.net:8125
|
||||||
|
- --certificatesresolvers.myresolver.acme.email=ducoterra@icloud.com
|
||||||
|
- --certificatesresolvers.myresolver.acme.storage=/acme/acme.json
|
||||||
|
- --certificatesresolvers.myresolver.acme.httpchallenge.entrypoint=web
|
||||||
|
- --certificatesresolvers.myresolver.acme.dnschallenge.provider=namedotcom
|
||||||
|
- --certificatesresolvers.myresolver.acme.dnschallenge.delaybeforecheck=0
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /acme
|
||||||
|
name: traefik-internal-acme
|
||||||
|
ports:
|
||||||
|
- name: web
|
||||||
|
containerPort: 80
|
||||||
|
- name: websecure
|
||||||
|
containerPort: 443
|
||||||
|
- name: admin
|
||||||
|
containerPort: 8080
|
||||||
|
volumes:
|
||||||
|
- name: traefik-internal-acme
|
||||||
|
persistentVolumeClaim:
|
||||||
|
claimName: traefik-internal-acme
|
||||||
14
internal/pvc/pvc.yaml
Normal file
14
internal/pvc/pvc.yaml
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: PersistentVolumeClaim
|
||||||
|
metadata:
|
||||||
|
name: traefik-internal-acme
|
||||||
|
labels:
|
||||||
|
app: traefik-internal-controller
|
||||||
|
namespace: kube-system
|
||||||
|
spec:
|
||||||
|
storageClassName: nfs-encrypted
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteOnce
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: 1Gi
|
||||||
64
internal/rbac.yaml
Normal file
64
internal/rbac.yaml
Normal file
@@ -0,0 +1,64 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: ServiceAccount
|
||||||
|
metadata:
|
||||||
|
name: traefik-internal-controller
|
||||||
|
namespace: kube-system
|
||||||
|
---
|
||||||
|
|
||||||
|
kind: ClusterRole
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
|
metadata:
|
||||||
|
name: traefik-internal-controller
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- services
|
||||||
|
- endpoints
|
||||||
|
- secrets
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- extensions
|
||||||
|
resources:
|
||||||
|
- ingresses
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- extensions
|
||||||
|
resources:
|
||||||
|
- ingresses/status
|
||||||
|
verbs:
|
||||||
|
- update
|
||||||
|
- apiGroups:
|
||||||
|
- traefik.containo.us
|
||||||
|
resources:
|
||||||
|
- middlewares
|
||||||
|
- ingressroutes
|
||||||
|
- traefikservices
|
||||||
|
- ingressroutetcps
|
||||||
|
- ingressrouteudps
|
||||||
|
- tlsoptions
|
||||||
|
- tlsstores
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
|
||||||
|
---
|
||||||
|
kind: ClusterRoleBinding
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
|
metadata:
|
||||||
|
name: traefik-internal-controller
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: ClusterRole
|
||||||
|
name: traefik-internal-controller
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: traefik-internal-controller
|
||||||
|
namespace: kube-system
|
||||||
18
internal/service.yaml
Normal file
18
internal/service.yaml
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: traefik-internal-controller
|
||||||
|
namespace: kube-system
|
||||||
|
spec:
|
||||||
|
type: LoadBalancer
|
||||||
|
selector:
|
||||||
|
app: traefik-internal-controller
|
||||||
|
ports:
|
||||||
|
- protocol: TCP
|
||||||
|
port: 9080
|
||||||
|
name: web
|
||||||
|
targetPort: 9080
|
||||||
|
- protocol: TCP
|
||||||
|
port: 9443
|
||||||
|
name: websecure
|
||||||
|
targetPort: 9443
|
||||||
Reference in New Issue
Block a user