homelab/manifests/authentik/authentik-public-ingress.yaml
Nik Afiq 83f46c9748 feat(gitea): add backup CronJob with RBAC and NFS support
feat(gitea): create PersistentVolume and PersistentVolumeClaim for Gitea

feat(gitea): add script to create Gitea runner registration token secret

feat(gitea): deploy Gitea Actions runner with Docker socket access

feat(media): deploy JDownloader with Ingress configuration

feat(media): set up Jellyfin media server with NFS and Ingress

feat(media): configure qBittorrent deployment with Ingress

feat(monitoring): add Grafana Loki datasource ConfigMap

feat(monitoring): create Grafana admin credentials secret

feat(monitoring): define PersistentVolumes for monitoring stack

feat(network): implement DDNS CronJob for Porkbun DNS updates

feat(network): create secret for Porkbun DDNS API credentials

feat(network): set up Glances service and Ingress for Debian node

fix(network): patch Pi-hole DNS services with external IPs

feat(network): configure Traefik dashboard Ingress with Authentik auth

feat(network): set up Watch Party service and Ingress for Mac Mini

refactor(values): update Helm values files for various services
2026-03-12 21:56:32 +09:00

33 lines
830 B
YAML

# Apply: kubectl apply -f manifests/authentik/authentik-public-ingress.yaml
# Delete: kubectl delete -f manifests/authentik/authentik-public-ingress.yaml
# Description: Public TLS certificate and Traefik IngressRoute for Authentik at auth.nik4nao.com.
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: authentik-public-tls
namespace: authentik
spec:
secretName: authentik-public-tls
issuerRef:
name: letsencrypt-prod
kind: ClusterIssuer
dnsNames:
- auth.nik4nao.com
---
apiVersion: traefik.io/v1alpha1
kind: IngressRoute
metadata:
name: authentik-public
namespace: authentik
spec:
entryPoints:
- websecure
routes:
- match: Host(`auth.nik4nao.com`)
kind: Rule
services:
- name: authentik-server
port: 80
tls:
secretName: authentik-public-tls