imfreedom/k8s-cluster
move 20-ingress to kustomize
--- a/20-ingress.yaml Thu Jun 17 04:25:47 2021 -0500
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,378 +0,0 @@
-# The most recent CRDs and RBAC configurations can be found at
-# https://doc.traefik.io/traefik/reference/dynamic-configuration/kubernetes-crd/#definitions
----
-apiVersion: apiextensions.k8s.io/v1beta1
-kind: CustomResourceDefinition
- name: ingressroutes.traefik.containo.us
- group: traefik.containo.us
----
-apiVersion: apiextensions.k8s.io/v1beta1
-kind: CustomResourceDefinition
- name: ingressroutetcps.traefik.containo.us
- group: traefik.containo.us
- plural: ingressroutetcps
- singular: ingressroutetcp
----
-apiVersion: apiextensions.k8s.io/v1beta1
-kind: CustomResourceDefinition
- name: middlewares.traefik.containo.us
- group: traefik.containo.us
----
-apiVersion: apiextensions.k8s.io/v1beta1
-kind: CustomResourceDefinition
- name: tlsoptions.traefik.containo.us
- group: traefik.containo.us
----
-apiVersion: apiextensions.k8s.io/v1beta1
-kind: CustomResourceDefinition
- name: traefikservices.traefik.containo.us
- group: traefik.containo.us
- plural: traefikservices
- singular: traefikservice
----
-apiVersion: apiextensions.k8s.io/v1beta1
-kind: CustomResourceDefinition
- name: tlsstores.traefik.containo.us
- group: traefik.containo.us
----
-apiVersion: apiextensions.k8s.io/v1beta1
-kind: CustomResourceDefinition
- name: ingressrouteudps.traefik.containo.us
- group: traefik.containo.us
- plural: ingressrouteudps
- singular: ingressrouteudp
----
- name: traefik-service-account
----
-apiVersion: rbac.authorization.k8s.io/v1beta1
- name: traefik-cluster-role
----
-apiVersion: rbac.authorization.k8s.io/v1
-kind: ClusterRoleBinding
- name: traefik-cluster-role-binding
- apiGroup: rbac.authorization.k8s.io
- name: traefik-cluster-role
- name: traefik-service-account
----
-apiVersion: traefik.containo.us/v1alpha1
- minVersion: VersionTLS12
- maxVersion: VersionTLS13
- - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
----
-apiVersion: policy/v1beta1
-kind: PodDisruptionBudget
----
- prometheus: cluster-wide
- preferredDuringSchedulingIgnoredDuringExecution:
- topologyKey: failure-domain.beta.kubernetes.io/region
- serviceAccountName: traefik-service-account
- - name: traefik-ingress-controller
- image: docker.io/traefik:v2.3.6
- - "--global.checknewversion=false"
- - "--global.sendanonymoususage=false"
- - "--api.dashboard=true"
- - "--api.insecure=true"
- - "--providers.kubernetescrd=true"
- - "--providers.kubernetesingress=true"
- - "--metrics.prometheus=true"
- - "--entryPoints.traefik.address=:9000"
- - "--entryPoints.https.address=:8443"
- - "--entryPoints.http.address=:8080"
- - "--entryPoints.keep-ssh.address=:22222"
- - "--entryPoints.xmpp-c2s.address=:5222"
- - "--entryPoints.xmpp-s2s.address=:5269"
- initialDelaySeconds: 10
- initialDelaySeconds: 10
----
- externalTrafficPolicy: Cluster
----
- name: traefik-dashboard
----
-apiVersion: networking.k8s.io/v1
----
-apiVersion: monitoring.coreos.com/v1
- prometheus: cluster-wide
----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/20-ingress/crd.yaml Thu Jun 17 04:33:14 2021 -0500
@@ -0,0 +1,92 @@
+apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition + name: ingressroutes.traefik.containo.us + group: traefik.containo.us +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition + name: ingressroutetcps.traefik.containo.us + group: traefik.containo.us + plural: ingressroutetcps + singular: ingressroutetcp +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition + name: middlewares.traefik.containo.us + group: traefik.containo.us +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition + name: tlsoptions.traefik.containo.us + group: traefik.containo.us +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition + name: traefikservices.traefik.containo.us + group: traefik.containo.us + plural: traefikservices + singular: traefikservice +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition + name: tlsstores.traefik.containo.us + group: traefik.containo.us +apiVersion: apiextensions.k8s.io/v1beta1 +kind: CustomResourceDefinition + name: ingressrouteudps.traefik.containo.us + group: traefik.containo.us + plural: ingressrouteudps + singular: ingressrouteudp --- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/20-ingress/kustomization.yaml Thu Jun 17 04:33:14 2021 -0500
@@ -0,0 +1,8 @@
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/20-ingress/manifest.yaml Thu Jun 17 04:33:14 2021 -0500
@@ -0,0 +1,167 @@
+# The most recent CRDs and RBAC configurations can be found at +# https://doc.traefik.io/traefik/reference/dynamic-configuration/kubernetes-crd/#definitions +apiVersion: traefik.containo.us/v1alpha1 + minVersion: VersionTLS12 + maxVersion: VersionTLS13 + - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 + - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 +apiVersion: policy/v1beta1 +kind: PodDisruptionBudget + prometheus: cluster-wide + preferredDuringSchedulingIgnoredDuringExecution: + topologyKey: failure-domain.beta.kubernetes.io/region + serviceAccountName: traefik-service-account + - name: traefik-ingress-controller + image: docker.io/traefik:v2.3.6 + - "--global.checknewversion=false" + - "--global.sendanonymoususage=false" + - "--api.dashboard=true" + - "--api.insecure=true" + - "--providers.kubernetescrd=true" + - "--providers.kubernetesingress=true" + - "--metrics.prometheus=true" + - "--entryPoints.traefik.address=:9000" + - "--entryPoints.https.address=:8443" + - "--entryPoints.http.address=:8080" + - "--entryPoints.keep-ssh.address=:22222" + - "--entryPoints.xmpp-c2s.address=:5222" + - "--entryPoints.xmpp-s2s.address=:5269" + initialDelaySeconds: 10 + initialDelaySeconds: 10 + externalTrafficPolicy: Cluster + name: traefik-dashboard --- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/20-ingress/prometheus.yaml Thu Jun 17 04:33:14 2021 -0500
@@ -0,0 +1,18 @@
+apiVersion: monitoring.coreos.com/v1 + prometheus: cluster-wide --- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/20-ingress/rbac.yaml Thu Jun 17 04:33:14 2021 -0500
@@ -0,0 +1,71 @@
+ name: traefik-service-account +apiVersion: rbac.authorization.k8s.io/v1beta1 + name: traefik-cluster-role +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding + name: traefik-cluster-role-binding + apiGroup: rbac.authorization.k8s.io + name: traefik-cluster-role + name: traefik-service-account