kube/haproxy/ingress.yaml
2025-05-26 20:12:11 +02:00

71 lines
1.8 KiB
YAML

apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: ingress-controller
annotations:
haproxy.org/rate-limit-period: "1m"
haproxy.org/rate-limit-requests: "500"
haproxy.org/rate-limit-status-code: "429"
# add an annotation indicating the issuer to use
cert-manager.io/cluster-issuer: letsencrypt
spec:
ingressClassName: haproxy
rules:
- host: "reault.tech"
http: &http_rules
paths:
- path: /contact
pathType: Prefix
backend:
service:
name: contact-form
port:
number: 80
- path: /
pathType: Prefix
backend:
service:
name: mywebsite
port:
number: 80
- host: "www.reault.tech"
http: *http_rules
- host: "iam.reault.tech"
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: keycloak-service
port:
number: 8080
- host: "immich.reault.tech"
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: immich-server
port:
number: 2283
- host: "gitea.reault.tech"
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: gitea-http
port:
number: 3000
tls:
- secretName: reault-tech-cert # cert-manager will store the certificate and key in this secret
hosts:
- www.reault.tech
- reault.tech
- iam.reault.tech
- immich.reault.tech
- gitea.reault.tech