view ingress.yaml @ 28:e114edff93dc

more explicit intervals. try to get a single day of notification out of a disk err increase
author drewp@bigasterisk.com
date Wed, 19 Jul 2023 21:17:22 -0700
parents 2eab3e6b89f2
children
line wrap: on
line source

apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: victoriametrics
  annotations:
    cert-manager.io/cluster-issuer: letsencrypt-prod
    ingress.pomerium.io/allow_public_unauthenticated_access: "false"
    ingress.pomerium.io/pass_identity_headers: "true"
    ingress.pomerium.io/preserve_host_header: "true"
    ingress.pomerium.io/policy: |
      allow:
        or: 
          - { email: { is: "drewpca@gmail.com" }}
          - { email: { is: "kelsimp@gmail.com" }}
    ingress.pomerium.io/prefix_rewrite: "/m/"
spec:
  ingressClassName: pomerium
  rules:
    - host: "bigasterisk.com"
      http:
        paths:
          - pathType: Prefix
            path: /m/
            backend: { service: { name: victoriametrics, port: { number: 80 } } }
  tls:
    - hosts: [bigasterisk.com]
      secretName: bigasterisk.com-tls
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: vmalert
  annotations:
    cert-manager.io/cluster-issuer: letsencrypt-prod
    ingress.pomerium.io/allow_public_unauthenticated_access: "false"
    ingress.pomerium.io/pass_identity_headers: "true"
    ingress.pomerium.io/preserve_host_header: "true"
    ingress.pomerium.io/policy: |
      allow:
        or: 
          - { email: { is: "drewpca@gmail.com" }}
          - { email: { is: "kelsimp@gmail.com" }}
    # ingress.pomerium.io/prefix_rewrite: "/vmalert/"
spec:
  ingressClassName: pomerium
  rules:
    - host: "bigasterisk.com"
      http:
        paths:
          - pathType: Prefix
            path: /vmalert/
            backend: { service: { name: vmalert, port: { number: 80 } } }
  tls:
    - hosts: [bigasterisk.com]
      secretName: bigasterisk.com-tls
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: alertmanager
  annotations:
    cert-manager.io/cluster-issuer: letsencrypt-prod
    ingress.pomerium.io/allow_public_unauthenticated_access: "false"
    ingress.pomerium.io/pass_identity_headers: "true"
    ingress.pomerium.io/preserve_host_header: "true"
    ingress.pomerium.io/policy: |
      allow:
        or: 
          - { email: { is: "drewpca@gmail.com" }}
          - { email: { is: "kelsimp@gmail.com" }}
    ingress.pomerium.io/prefix_rewrite: "/"
spec:
  ingressClassName: pomerium
  rules:
    - host: "bigasterisk.com"
      http:
        paths:
          - pathType: Prefix
            path: /alertmanager/
            backend: { service: { name: alertmanager, port: { number: 80 } } }
  tls:
    - hosts: [bigasterisk.com]
      secretName: bigasterisk.com-tls