kube/haproxy/ingress.yaml
2025-05-25 20:47:30 +02:00

60 lines
1.5 KiB
YAML

apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: ingress-controller
annotations:
haproxy.org/rate-limit-period: "1m"
haproxy.org/rate-limit-requests: "200"
haproxy.org/rate-limit-status-code: "429"
# add an annotation indicating the issuer to use
cert-manager.io/cluster-issuer: letsencrypt
spec:
ingressClassName: haproxy
rules:
- host: "reault.tech"
http: &http_rules
paths:
- path: /contact
pathType: Prefix
backend:
service:
name: contact-form
port:
number: 80
- path: /
pathType: Prefix
backend:
service:
name: mywebsite
port:
number: 80
- host: "www.reault.tech"
http: *http_rules
- host: "iam.reault.tech"
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: keycloak-service
port:
number: 8080
- host: "immich.reault.tech"
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: immich-server
port:
number: 2283
tls:
- secretName: reault-tech-cert # cert-manager will store the certificate and key in this secret
hosts:
- www.reault.tech
- reault.tech
- iam.reault.tech
- immich.reault.tech