fix k8s upgrade issues [ci skip]
This commit is contained in:
parent
73258b3581
commit
fd6d15c598
17 changed files with 192 additions and 114 deletions
127
.terraform.lock.hcl
generated
127
.terraform.lock.hcl
generated
|
|
@ -17,87 +17,92 @@ provider "registry.terraform.io/gavinbunney/kubectl" {
|
|||
}
|
||||
|
||||
provider "registry.terraform.io/hashicorp/helm" {
|
||||
version = "2.0.2"
|
||||
version = "2.4.1"
|
||||
hashes = [
|
||||
"h1:NeS94WlOI85mRXQblK/s1oGO/pdz+2HCAsQp8ePQqH0=",
|
||||
"zh:09f7b2389f0e41f51c933d014fe3a89aa53c12801ab45c082d3626689961d5a6",
|
||||
"zh:0af792512adf59648b7cb7f0f194151ac926ae6805ffdb2baf61512b55933e17",
|
||||
"zh:0e29837d65bf4dbe3b9766221a1a4448b2c9df7f4d3049a0b6812055e299c063",
|
||||
"zh:25a0c4d1cba9a22f4d12f6465f191db6e2ec675cbc2c7751bf128bcae23848a8",
|
||||
"zh:6d92f9ffd43a45f0f0da4c59cbb1790b163235882532a88344a53b8526808979",
|
||||
"zh:7c98a0e05f106d4bbfc0c81f7d8b41bc8e867a99b30ccd472367d0414e778c30",
|
||||
"zh:8de8232eedfa4ade990faea4ed3706f0846eb1d66fb82aa22718c7a9aeda92b1",
|
||||
"zh:baff5ff10c9573104d25eece9f79477112ed6882c0ea9280ecbfa944d117838d",
|
||||
"zh:d151fac8be471922cbe137f5a263f4854cdcfbf3fb8af7db83c709d64956934b",
|
||||
"zh:e4d238facc27fc91d26aef79b7f398a6b9f3a1fe078c8d3f0cd4df47ec5aaacd",
|
||||
"h1:Gqwrr+yKWR79esN39X9eRCddxMNapmaGMynLfjrUJJo=",
|
||||
"zh:07517b24ea2ce4a1d3be3b88c3efc7fb452cd97aea8fac93ca37a08a8ec06e14",
|
||||
"zh:11ef6118ed03a1b40ff66adfe21b8707ece0568dae1347ddfbcff8452c0655d5",
|
||||
"zh:1ae07e9cc6b088a6a68421642c05e2fa7d00ed03e9401e78c258cf22a239f526",
|
||||
"zh:1c5b4cd44033a0d7bf7546df930c55aa41db27b70b3bca6d145faf9b9a2da772",
|
||||
"zh:256413132110ddcb0c3ea17c7b01123ad2d5b70565848a77c5ccc22a3f32b0dd",
|
||||
"zh:4ab46fd9aadddef26604382bc9b49100586647e63ef6384e0c0c3f010ff2f66e",
|
||||
"zh:5a35d23a9f08c36fceda3cef7ce2c7dc5eca32e5f36494de695e09a5007122f0",
|
||||
"zh:8e9823a1e5b985b63fe283b755a821e5011a58112447d42fb969c7258ed57ed3",
|
||||
"zh:8f79722eba9bf77d341edf48a1fd51a52d93ec31d9cac9ba8498a3a061ea4a7f",
|
||||
"zh:b2ea782848b10a343f586ba8ee0cf4d7ff65aa2d4b144eea5bbd8f9801b54c67",
|
||||
"zh:e72d1ccf8a75d8e8456c6bb4d843fd4deb0e962ad8f167fa84cf17f12c12304e",
|
||||
]
|
||||
}
|
||||
|
||||
provider "registry.terraform.io/hashicorp/kubernetes" {
|
||||
version = "2.0.2"
|
||||
constraints = ">= 1.13.0"
|
||||
version = "2.7.1"
|
||||
constraints = ">= 2.7.1"
|
||||
hashes = [
|
||||
"h1:PRfDnUFBD4ud7SgsMAa5S2Gd60FeriD1PWE6EifjXB0=",
|
||||
"zh:4e66d509c828b0a2e599a567ad470bf85ebada62788aead87a8fb621301dec55",
|
||||
"zh:55ca6466a82f60d2c9798d171edafacc9ea4991aa7aa32ed5d82d6831cf44542",
|
||||
"zh:65741e6910c8b1322d9aef5dda4d98d1e6409aebc5514b518f46019cd06e1b47",
|
||||
"zh:79456ca037c19983977285703f19f4b04f7eadcf8eb6af21f5ea615026271578",
|
||||
"zh:7c39ced4dc44181296721715005e390021770077012c206ab4c209fb704b34d0",
|
||||
"zh:86856c82a6444c19b3e3005e91408ac68eb010c9218c4c4119fc59300b107026",
|
||||
"zh:999865090c72fa9b85c45e76b20839da51714ae429d1ab14b7d8ce66c2655abf",
|
||||
"zh:a3ea0ae37c61b4bfe81f7a395fb7b5ba61564e7d716d7a191372c3c983271d13",
|
||||
"zh:d9061861822933ebb2765fa691aeed2930ee495bfb6f72a5bdd88f43ccd9e038",
|
||||
"zh:e04adbe0d5597d1fdd4f418be19c9df171f1d709009f63b8ce1239b71b4fa45a",
|
||||
"h1:Df9MZxqgXueXVObeAiPPDQ5aLwQ2bJ2r1gul/IYSxeg=",
|
||||
"zh:0da320fd81ece6696f7cceda35e459ee97cae8955088af38fc7f2feab1dce924",
|
||||
"zh:37d304b8b992518c9c12e8f10437b9d4a0cc5a823c9421ac794ad2347c4d1122",
|
||||
"zh:3d4e12fb9588c3b2e782d392fea758c6982e5d653154bec951e949155bcbc169",
|
||||
"zh:6bb32b8d5cccf3e3ae7c124ed27df76dc7653ca760c132addeee15272630c930",
|
||||
"zh:94775153b90e285876fc17261e8f5338a1ff732f4133336cc68754acb74570b6",
|
||||
"zh:a665d1336765cdf8620a8797fd4e7e3cecf789e96e59ba80634336a4390df377",
|
||||
"zh:aa8b35e9958cb89f01c115e8866a07d5468fb53f1c227d673e94f7ee8fb76242",
|
||||
"zh:b7a571336387d773a74ed6eefa3843ff78d3662f2745c99c95008002a1341662",
|
||||
"zh:c50d661782175d50ea4952fe943b0e4a3e33c27aa69e5ff21b3cbfa513e90d0a",
|
||||
"zh:e0999b349cc772c75876adbc2a13b5dc256d3ecd7e4aa91baee5fdfcecaa7465",
|
||||
"zh:e1399aec06a7aa98e9b0f64b4281697247f338a8a40b79f5f6ebfd43bf4ce1e2",
|
||||
]
|
||||
}
|
||||
|
||||
provider "registry.terraform.io/hashicorp/null" {
|
||||
version = "3.0.0"
|
||||
version = "3.1.0"
|
||||
hashes = [
|
||||
"h1:ysHGBhBNkIiJLEpthB/IVCLpA1Qoncp3KbCTFGFZTO0=",
|
||||
"zh:05fb7eab469324c97e9b73a61d2ece6f91de4e9b493e573bfeda0f2077bc3a4c",
|
||||
"zh:1688aa91885a395c4ae67636d411475d0b831e422e005dcf02eedacaafac3bb4",
|
||||
"zh:24a0b1292e3a474f57c483a7a4512d797e041bc9c2fbaac42fe12e86a7fb5a3c",
|
||||
"zh:2fc951bd0d1b9b23427acc93be09b6909d72871e464088171da60fbee4fdde03",
|
||||
"zh:6db825759425599a326385a68acc6be2d9ba0d7d6ef587191d0cdc6daef9ac63",
|
||||
"zh:85985763d02618993c32c294072cc6ec51f1692b803cb506fcfedca9d40eaec9",
|
||||
"zh:a53186599c57058be1509f904da512342cfdc5d808efdaf02dec15f0f3cb039a",
|
||||
"zh:c2e07b49b6efa676bdc7b00c06333ea1792a983a5720f9e2233db27323d2707c",
|
||||
"zh:cdc8fe1096103cf5374751e2e8408ec4abd2eb67d5a1c5151fe2c7ecfd525bef",
|
||||
"zh:dbdef21df0c012b0d08776f3d4f34eb0f2f229adfde07ff252a119e52c0f65b7",
|
||||
"h1:vpC6bgUQoJ0znqIKVFevOdq+YQw42bRq0u+H3nto8nA=",
|
||||
"zh:02a1675fd8de126a00460942aaae242e65ca3380b5bb192e8773ef3da9073fd2",
|
||||
"zh:53e30545ff8926a8e30ad30648991ca8b93b6fa496272cd23b26763c8ee84515",
|
||||
"zh:5f9200bf708913621d0f6514179d89700e9aa3097c77dac730e8ba6e5901d521",
|
||||
"zh:9ebf4d9704faba06b3ec7242c773c0fbfe12d62db7d00356d4f55385fc69bfb2",
|
||||
"zh:a6576c81adc70326e4e1c999c04ad9ca37113a6e925aefab4765e5a5198efa7e",
|
||||
"zh:a8a42d13346347aff6c63a37cda9b2c6aa5cc384a55b2fe6d6adfa390e609c53",
|
||||
"zh:c797744d08a5307d50210e0454f91ca4d1c7621c68740441cf4579390452321d",
|
||||
"zh:cecb6a304046df34c11229f20a80b24b1603960b794d68361a67c5efe58e62b8",
|
||||
"zh:e1371aa1e502000d9974cfaff5be4cfa02f47b17400005a16f14d2ef30dc2a70",
|
||||
"zh:fc39cc1fe71234a0b0369d5c5c7f876c71b956d23d7d6f518289737a001ba69b",
|
||||
"zh:fea4227271ebf7d9e2b61b89ce2328c7262acd9fd190e1fd6d15a591abfa848e",
|
||||
]
|
||||
}
|
||||
|
||||
provider "registry.terraform.io/hashicorp/random" {
|
||||
version = "3.0.1"
|
||||
version = "3.1.0"
|
||||
hashes = [
|
||||
"h1:SzM8nt2wzLMI28A3CWAtW25g3ZCm1O4xD0h3Ps/rU1U=",
|
||||
"zh:0d4f683868324af056a9eb2b06306feef7c202c88dbbe6a4ad7517146a22fb50",
|
||||
"zh:4824b3c7914b77d41dfe90f6f333c7ac9860afb83e2a344d91fbe46e5dfbec26",
|
||||
"zh:4b82e43712f3cf0d0cbc95b2cbcd409ba8f0dc7848fdfb7c13633c27468ed04a",
|
||||
"zh:78b3a2b860c3ebc973a794000015f5946eb59b82705d701d487475406b2612f1",
|
||||
"zh:88bc65197bd74ff408d147b32f0045372ae3a3f2a2fdd7f734f315d988c0e4a2",
|
||||
"zh:91bd3c9f625f177f3a5d641a64e54d4b4540cb071070ecda060a8261fb6eb2ef",
|
||||
"zh:a6818842b28d800f784e0c93284ff602b0c4022f407e4750da03f50b853a9a2c",
|
||||
"zh:c4a1a2b52abd05687e6cfded4a789dcd7b43e7a746e4d02dd1055370cf9a994d",
|
||||
"zh:cf65041bf12fc3bde709c1d267dbe94142bc05adcabc4feb17da3b12249132ac",
|
||||
"zh:e385e00e7425dda9d30b74ab4ffa4636f4b8eb23918c0b763f0ffab84ece0c5c",
|
||||
"h1:BZMEPucF+pbu9gsPk0G0BHx7YP04+tKdq2MrRDF1EDM=",
|
||||
"zh:2bbb3339f0643b5daa07480ef4397bd23a79963cc364cdfbb4e86354cb7725bc",
|
||||
"zh:3cd456047805bf639fbf2c761b1848880ea703a054f76db51852008b11008626",
|
||||
"zh:4f251b0eda5bb5e3dc26ea4400dba200018213654b69b4a5f96abee815b4f5ff",
|
||||
"zh:7011332745ea061e517fe1319bd6c75054a314155cb2c1199a5b01fe1889a7e2",
|
||||
"zh:738ed82858317ccc246691c8b85995bc125ac3b4143043219bd0437adc56c992",
|
||||
"zh:7dbe52fac7bb21227acd7529b487511c91f4107db9cc4414f50d04ffc3cab427",
|
||||
"zh:a3a9251fb15f93e4cfc1789800fc2d7414bbc18944ad4c5c98f466e6477c42bc",
|
||||
"zh:a543ec1a3a8c20635cf374110bd2f87c07374cf2c50617eee2c669b3ceeeaa9f",
|
||||
"zh:d9ab41d556a48bd7059f0810cf020500635bfc696c9fc3adab5ea8915c1d886b",
|
||||
"zh:d9e13427a7d011dbd654e591b0337e6074eef8c3b9bb11b2e39eaaf257044fd7",
|
||||
"zh:f7605bd1437752114baf601bdf6931debe6dc6bfe3006eb7e9bb9080931dca8a",
|
||||
]
|
||||
}
|
||||
|
||||
provider "registry.terraform.io/hashicorp/vsphere" {
|
||||
version = "1.24.3"
|
||||
version = "2.0.2"
|
||||
hashes = [
|
||||
"h1:tmVOVBdsBWDIsPdIUgYguaA1dKAlUOKrnnmzGaMNAr4=",
|
||||
"zh:3b31455ca5a5c4ae7b65f1f4a51d651988d42862b9d4e078eb6fd5b238f98176",
|
||||
"zh:4935754d72299ecfd7081517f496274dee34fb021996266f1f1cc9a5c6b1129d",
|
||||
"zh:531dcccbc4f22cd09b19e217403d8545bc24ac291256ce3d2ec4484c400f7729",
|
||||
"zh:551da4dcd47b7736091e3a7e94c189be399043c7c3ec597e8edb9e6f7b2a2c1e",
|
||||
"zh:668db7ef747d8005194249288ebe081fa7f8be128081acc32915b2c769358391",
|
||||
"zh:b377f0d8a5340a3c661ee6e2a5c467f742f8f3679518375877cbcfd63b3804b1",
|
||||
"zh:c7573b9e2e2480f442704682f5dcf0756e78f890571e92dff08918262d0002cf",
|
||||
"zh:cd223874ba4acf6e6be98cc80c835ec4a172dbc0300c99b6a6ff8786a52dc092",
|
||||
"zh:dd523ff0fb2cfc9d6be2d14be1184cf9a90babc3f891630ee0f1e080ec87236e",
|
||||
"zh:e28991bff40a6c46d1a9f604b9bc9e6e6b59aa6bfb29b9ee7704a70ba262a332",
|
||||
"h1:/9qlE9Ni7mhl3cTHLhmYg1AFuyBnXqie53Q5Ujor6oU=",
|
||||
"zh:0b72856d2a89b118adf64dcfc75a0b0f7d8875e9872c637a9a0549d4a3dd9383",
|
||||
"zh:2cf50f17464feeac60039f4d36656835895260798d4d9167a1ff2d4e1e464dce",
|
||||
"zh:39d5f1c99bd4024d88b95892711f234afeb2b83700cdbd3df68a60c6b3bb0ac7",
|
||||
"zh:551b68f91f5eefa4daee4d826d27d2bc10236e0642fdafd066604884b2a06816",
|
||||
"zh:8454b5e7dbbf0300bbab1ecd73c12511cf35c0c493ad18e31742d58798e11026",
|
||||
"zh:84a8233a60240e0020de513668a20d015a7fbc760ad6ab639d52e6ddabfa3376",
|
||||
"zh:95574b7f092e77f9c629770b802d1635903f14d8d88d3828a96f58ca072876a5",
|
||||
"zh:a262c779c112e4d6ac47152d6c6303308180dfd4d5929b980cf24707ca9218e9",
|
||||
"zh:c7622cfa8bab6a6f122c0ab3d4767ecf0f52ccf32d64020aa4e9581f91da5586",
|
||||
"zh:e01cfc79d21c7151c97047afdc79dfe7bf37c0063908829200480a03359e4c2e",
|
||||
"zh:f64c3f283c31477886c3d16592426dbefa2cab55f2885cb3351cef094ad898a0",
|
||||
]
|
||||
}
|
||||
|
|
|
|||
9
modules/create-vm/versions.tf
Normal file
9
modules/create-vm/versions.tf
Normal file
|
|
@ -0,0 +1,9 @@
|
|||
|
||||
terraform {
|
||||
required_providers {
|
||||
vsphere = {
|
||||
source = "hashicorp/vsphere"
|
||||
version = "2.0.2"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
@ -103,7 +103,7 @@ resource "kubernetes_service" "blog" {
|
|||
}
|
||||
}
|
||||
|
||||
resource "kubernetes_ingress" "blog" {
|
||||
resource "kubernetes_ingress_v1" "blog" {
|
||||
metadata {
|
||||
name = "blog-ingress"
|
||||
namespace = "website"
|
||||
|
|
@ -123,8 +123,12 @@ resource "kubernetes_ingress" "blog" {
|
|||
path {
|
||||
path = "/"
|
||||
backend {
|
||||
service_name = "blog"
|
||||
service_port = "80"
|
||||
service {
|
||||
name = "blog"
|
||||
port {
|
||||
number = 80
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
@ -135,8 +139,12 @@ resource "kubernetes_ingress" "blog" {
|
|||
path {
|
||||
path = "/"
|
||||
backend {
|
||||
service_name = "blog"
|
||||
service_port = "80"
|
||||
service {
|
||||
name = "blog"
|
||||
port {
|
||||
number = 80
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -146,7 +146,7 @@ resource "kubernetes_service" "drone" {
|
|||
}
|
||||
}
|
||||
|
||||
resource "kubernetes_ingress" "drone" {
|
||||
resource "kubernetes_ingress_v1" "drone" {
|
||||
metadata {
|
||||
name = "drone-ingress"
|
||||
namespace = "drone"
|
||||
|
|
@ -168,8 +168,12 @@ resource "kubernetes_ingress" "drone" {
|
|||
path {
|
||||
path = "/"
|
||||
backend {
|
||||
service_name = "drone"
|
||||
service_port = "80"
|
||||
service {
|
||||
name = "drone"
|
||||
port {
|
||||
number = 80
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -77,7 +77,7 @@ module "tls_secret" {
|
|||
}
|
||||
|
||||
|
||||
resource "kubernetes_ingress" "f1-stream" {
|
||||
resource "kubernetes_ingress_v1" "f1-stream" {
|
||||
metadata {
|
||||
name = "f1-ingress"
|
||||
namespace = "f1-stream"
|
||||
|
|
@ -100,8 +100,12 @@ resource "kubernetes_ingress" "f1-stream" {
|
|||
path {
|
||||
path = "/"
|
||||
backend {
|
||||
service_name = "f1-stream"
|
||||
service_port = "80"
|
||||
service {
|
||||
name = "f1-stream"
|
||||
port {
|
||||
number = 80
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -137,7 +137,7 @@ resource "kubernetes_service" "hackmd" {
|
|||
}
|
||||
}
|
||||
|
||||
resource "kubernetes_ingress" "hackmd" {
|
||||
resource "kubernetes_ingress_v1" "hackmd" {
|
||||
metadata {
|
||||
name = "hackmd-ingress"
|
||||
namespace = "hackmd"
|
||||
|
|
@ -157,8 +157,12 @@ resource "kubernetes_ingress" "hackmd" {
|
|||
path {
|
||||
path = "/"
|
||||
backend {
|
||||
service_name = "hackmd"
|
||||
service_port = "80"
|
||||
service {
|
||||
name = "hackmd"
|
||||
port {
|
||||
number = 80
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -10,12 +10,12 @@ resource "random_password" "csrf_token" {
|
|||
module "dashboard" {
|
||||
# source = "cookielab/dashboard/kubernetes"
|
||||
source = "ViktorBarzin/dashboard/kubernetes"
|
||||
version = "0.13.1"
|
||||
version = "0.13.2"
|
||||
kubernetes_dashboard_csrf = random_password.csrf_token.result
|
||||
kubernetes_dashboard_deployment_args = list(
|
||||
kubernetes_dashboard_deployment_args = tolist([
|
||||
"--auto-generate-certificates",
|
||||
"--token-ttl=0"
|
||||
)
|
||||
])
|
||||
}
|
||||
|
||||
module "tls_secret" {
|
||||
|
|
@ -41,7 +41,7 @@ module "tls_secret" {
|
|||
# depends_on = [kubernetes_namespace.kubernetes-dashboard]
|
||||
# }
|
||||
|
||||
resource "kubernetes_ingress" "kubernetes-dashboard" {
|
||||
resource "kubernetes_ingress_v1" "kubernetes-dashboard" {
|
||||
metadata {
|
||||
name = "kubernetes-dashboard"
|
||||
namespace = "kubernetes-dashboard"
|
||||
|
|
@ -68,8 +68,12 @@ resource "kubernetes_ingress" "kubernetes-dashboard" {
|
|||
path {
|
||||
path = "/"
|
||||
backend {
|
||||
service_name = "kubernetes-dashboard"
|
||||
service_port = "443"
|
||||
service {
|
||||
name = "kubernetes-dashboard"
|
||||
port {
|
||||
number = 443
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
@ -96,7 +100,7 @@ resource "kubernetes_cluster_role_binding" "kubernetes-dashboard" {
|
|||
depends_on = [module.dashboard]
|
||||
}
|
||||
|
||||
# resource "kubernetes_ingress" "oauth" {
|
||||
# resource "kubernetes_ingress_v1" "oauth" {
|
||||
# metadata {
|
||||
# name = "kubernetes-dashboard"
|
||||
# namespace = "oauth"
|
||||
|
|
|
|||
|
|
@ -105,7 +105,7 @@ resource "kubernetes_service" "kafka-ui" {
|
|||
}
|
||||
}
|
||||
|
||||
resource "kubernetes_ingress" "kafka-ui" {
|
||||
resource "kubernetes_ingress_v1" "kafka-ui" {
|
||||
metadata {
|
||||
name = "kafka-ui-ingress"
|
||||
namespace = "kafka"
|
||||
|
|
@ -128,8 +128,12 @@ resource "kubernetes_ingress" "kafka-ui" {
|
|||
path {
|
||||
path = "/"
|
||||
backend {
|
||||
service_name = "kafka-ui"
|
||||
service_port = "80"
|
||||
service {
|
||||
name = "kafka-ui"
|
||||
port {
|
||||
number = 80
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -106,7 +106,7 @@ resource "kubernetes_service" "kms-web-page" {
|
|||
}
|
||||
}
|
||||
|
||||
resource "kubernetes_ingress" "kms-web-page" {
|
||||
resource "kubernetes_ingress_v1" "kms-web-page" {
|
||||
metadata {
|
||||
name = "kms-web-page"
|
||||
namespace = "kms"
|
||||
|
|
@ -126,8 +126,12 @@ resource "kubernetes_ingress" "kms-web-page" {
|
|||
path {
|
||||
path = "/"
|
||||
backend {
|
||||
service_name = "kms-web-page"
|
||||
service_port = "80"
|
||||
service {
|
||||
name = "kms-web-page"
|
||||
port {
|
||||
number = 80
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -182,7 +182,7 @@ resource "kubernetes_cron_job" "monitor_prom" {
|
|||
}
|
||||
}
|
||||
|
||||
resource "kubernetes_ingress" "status" {
|
||||
resource "kubernetes_ingress_v1" "status" {
|
||||
metadata {
|
||||
name = "hetrix-redirect-ingress"
|
||||
namespace = "monitoring"
|
||||
|
|
@ -203,8 +203,12 @@ resource "kubernetes_ingress" "status" {
|
|||
path {
|
||||
path = "/"
|
||||
backend {
|
||||
service_name = "not-used" # redirected by annotation
|
||||
service_port = "80"
|
||||
service {
|
||||
name = "not-used"
|
||||
port {
|
||||
number = 80 # redirected by annotation
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
@ -212,7 +216,7 @@ resource "kubernetes_ingress" "status" {
|
|||
}
|
||||
}
|
||||
|
||||
resource "kubernetes_ingress" "status_yotovski" {
|
||||
resource "kubernetes_ingress_v1" "status_yotovski" {
|
||||
metadata {
|
||||
name = "hetrix-yotovski-redirect-ingress"
|
||||
namespace = "monitoring"
|
||||
|
|
@ -233,8 +237,12 @@ resource "kubernetes_ingress" "status_yotovski" {
|
|||
path {
|
||||
path = "/"
|
||||
backend {
|
||||
service_name = "not-used" # redirected by annotation
|
||||
service_port = "80"
|
||||
service {
|
||||
name = "not-used" # redirected by annotation
|
||||
port {
|
||||
number = 80
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -98,7 +98,7 @@ resource "kubernetes_service" "oauth_proxy" {
|
|||
}
|
||||
}
|
||||
|
||||
resource "kubernetes_ingress" "oauth" {
|
||||
resource "kubernetes_ingress_v1" "oauth" {
|
||||
metadata {
|
||||
name = "oauth-ingress"
|
||||
namespace = var.namespace
|
||||
|
|
@ -119,8 +119,12 @@ resource "kubernetes_ingress" "oauth" {
|
|||
path {
|
||||
path = "/oauth2/.*"
|
||||
backend {
|
||||
service_name = var.svc_name
|
||||
service_port = "80"
|
||||
service {
|
||||
name = var.svc_name
|
||||
port {
|
||||
number = 80
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -78,7 +78,7 @@ resource "kubernetes_service" "openid_help_page" {
|
|||
}
|
||||
}
|
||||
|
||||
resource "kubernetes_ingress" "openid_help_page" {
|
||||
resource "kubernetes_ingress_v1" "openid_help_page" {
|
||||
metadata {
|
||||
name = "openid-help-page"
|
||||
namespace = "openid-help-page"
|
||||
|
|
@ -98,8 +98,12 @@ resource "kubernetes_ingress" "openid_help_page" {
|
|||
path {
|
||||
path = "/"
|
||||
backend {
|
||||
service_name = "openid-help-page"
|
||||
service_port = "80"
|
||||
service {
|
||||
name = "openid-help-page"
|
||||
port {
|
||||
number = 80
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -164,7 +164,7 @@ resource "kubernetes_service" "pihole-web" {
|
|||
}
|
||||
}
|
||||
|
||||
resource "kubernetes_ingress" "pihole" {
|
||||
resource "kubernetes_ingress_v1" "pihole" {
|
||||
metadata {
|
||||
name = "pihole-ingress"
|
||||
namespace = "pihole"
|
||||
|
|
@ -186,8 +186,12 @@ resource "kubernetes_ingress" "pihole" {
|
|||
path {
|
||||
path = "/"
|
||||
backend {
|
||||
service_name = "pihole-web"
|
||||
service_port = "80"
|
||||
service {
|
||||
name = "pihole-web"
|
||||
port {
|
||||
number = 80
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -98,7 +98,7 @@ resource "kubernetes_service" "privatebin" {
|
|||
}
|
||||
}
|
||||
|
||||
resource "kubernetes_ingress" "privatebin" {
|
||||
resource "kubernetes_ingress_v1" "privatebin" {
|
||||
metadata {
|
||||
name = "privatebin-ingress"
|
||||
namespace = "privatebin"
|
||||
|
|
@ -118,8 +118,12 @@ resource "kubernetes_ingress" "privatebin" {
|
|||
path {
|
||||
path = "/"
|
||||
backend {
|
||||
service_name = "privatebin"
|
||||
service_port = "80"
|
||||
service {
|
||||
name = "privatebin"
|
||||
port {
|
||||
number = 80
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
@ -130,8 +134,12 @@ resource "kubernetes_ingress" "privatebin" {
|
|||
path {
|
||||
path = "/"
|
||||
backend {
|
||||
service_name = "privatebin"
|
||||
service_port = "80"
|
||||
service {
|
||||
name = "privatebin"
|
||||
port {
|
||||
number = 80
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -41,7 +41,7 @@ resource "kubernetes_service" "openwrt" {
|
|||
# port: 443
|
||||
# protocol: TCP
|
||||
|
||||
resource "kubernetes_ingress" "openwrt" {
|
||||
resource "kubernetes_ingress_v1" "openwrt" {
|
||||
metadata {
|
||||
name = "openwrt-ingress"
|
||||
namespace = "website"
|
||||
|
|
|
|||
|
|
@ -1,8 +1,8 @@
|
|||
terraform {
|
||||
required_providers {
|
||||
kubernetes = {
|
||||
source = "hashicorp/kubernetes"
|
||||
source = "hashicorp/kubernetes"
|
||||
version = ">= 2.7.1"
|
||||
}
|
||||
}
|
||||
required_version = ">= 0.13"
|
||||
}
|
||||
|
|
|
|||
|
|
@ -187,7 +187,7 @@ resource "kubernetes_service" "webhook_handler" {
|
|||
}
|
||||
}
|
||||
|
||||
resource "kubernetes_ingress" "webhook_handler" {
|
||||
resource "kubernetes_ingress_v1" "webhook_handler" {
|
||||
metadata {
|
||||
name = "webhook-handler-ingress"
|
||||
namespace = "webhook-handler"
|
||||
|
|
@ -207,8 +207,12 @@ resource "kubernetes_ingress" "webhook_handler" {
|
|||
path {
|
||||
path = "/"
|
||||
backend {
|
||||
service_name = "webhook-handler"
|
||||
service_port = "80"
|
||||
service {
|
||||
name = "webhook-handler"
|
||||
port {
|
||||
number = 80
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue