cluster.fun/manifests/monitoring/ingess.yaml

70 lines
1.6 KiB
YAML
Raw Normal View History

apiVersion: networking.k8s.io/v1
2021-06-14 13:35:06 +00:00
kind: Ingress
metadata:
name: grafana
namespace: auth-proxy
2021-06-14 13:35:06 +00:00
labels:
app: grafana
annotations:
cert-manager.io/cluster-issuer: letsencrypt
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
2021-06-14 13:35:06 +00:00
spec:
ingressClassName: nginx
2021-06-14 13:35:06 +00:00
tls:
- hosts:
- grafana.cluster.fun
secretName: grafana-ingress
rules:
- host: grafana.cluster.fun
http:
paths:
- path: /
pathType: ImplementationSpecific
2021-06-14 13:35:06 +00:00
backend:
service:
name: auth-proxy
port:
number: 80
2021-06-14 13:35:06 +00:00
---
apiVersion: v1
kind: Secret
metadata:
name: prometheus-credentials
2021-06-14 15:47:45 +00:00
namespace: monitoring
annotations:
2021-06-14 16:00:34 +00:00
kube-1password: m7c2n5gqybiyxj6ylydju2nljm
kube-1password/vault: Kubernetes
kube-1password/password-key: auth
type: Opaque
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: prometheus-cloud
namespace: monitoring
labels:
app: prometheus-cloud
annotations:
cert-manager.io/cluster-issuer: letsencrypt
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
nginx.ingress.kubernetes.io/auth-type: basic
nginx.ingress.kubernetes.io/auth-secret: prometheus-credentials
nginx.ingress.kubernetes.io/auth-secret-type: auth-file
spec:
ingressClassName: nginx
tls:
- hosts:
- prometheus-cloud.cluster.fun
secretName: prometheus-cloud-ingress
rules:
- host: prometheus-cloud.cluster.fun
http:
paths:
- path: /
pathType: ImplementationSpecific
backend:
service:
name: prometheus-server
port:
number: 80