diff --git a/vaultwarden/ingresses.yaml b/vaultwarden/ingresses.yaml new file mode 100644 index 0000000..112757a --- /dev/null +++ b/vaultwarden/ingresses.yaml @@ -0,0 +1,29 @@ +apiVersion: networking.k8s.io/v1 +kind: Ingress +metadata: + annotations: + cert-manager.io/cluster-issuer: letsencrypt-prod + kubectl.kubernetes.io/last-applied-configuration: '{"apiVersion":"networking.k8s.io/v1","kind":"Ingress","metadata":{"annotations":{"cert-manager.io/cluster-issuer":"letsencrypt-prod"},"name":"vaultwarden-ingress","namespace":"vaultwarden"},"spec":{"ingressClassName":"traefik","rules":[{"host":"vaultwarden.chemavx.xyz","http":{"paths":[{"backend":{"service":{"name":"vaultwarden-service","port":{"number":80}}},"path":"/","pathType":"Prefix"}]}}],"tls":[{"hosts":["vaultwarden.chemavx.xyz"],"secretName":"vaultwarden-tls"}]}} + + ' + traefik.ingress.kubernetes.io/router.middlewares: default-rate-limit@kubernetescrd + name: vaultwarden-ingress + namespace: vaultwarden +spec: + ingressClassName: traefik + rules: + - host: vaultwarden.chemavx.xyz + http: + paths: + - backend: + service: + name: vaultwarden-service + port: + number: 80 + path: / + pathType: Prefix + tls: + - hosts: + - vaultwarden.chemavx.xyz + secretName: vaultwarden-tls +