added middleware whitelist for .internal services
This commit is contained in:
@@ -16,5 +16,6 @@ longhorn:
|
||||
host: longhorn.apps.internal.k3s.stabify.de
|
||||
annotations:
|
||||
cert-manager.io/cluster-issuer: letsencrypt-prod
|
||||
traefik.ingress.kubernetes.io/router.middlewares: traefik-system-ipwhitelist-internal@kubernetescrd
|
||||
tls: true
|
||||
tlsSecret: longhorn-tls
|
||||
|
||||
@@ -38,6 +38,7 @@ spec:
|
||||
className: traefik
|
||||
annotations: |
|
||||
cert-manager.io/cluster-issuer: letsencrypt-prod
|
||||
traefik.ingress.kubernetes.io/router.middlewares: traefik-system-ipwhitelist-internal@kubernetescrd
|
||||
host: filer.seaweedfs.apps.internal.k3s.stabify.de
|
||||
tls:
|
||||
- secretName: seaweedfs-filer-tls
|
||||
@@ -53,6 +54,7 @@ spec:
|
||||
className: traefik
|
||||
annotations: |
|
||||
cert-manager.io/cluster-issuer: letsencrypt-prod
|
||||
traefik.ingress.kubernetes.io/router.middlewares: traefik-system-ipwhitelist-internal@kubernetescrd
|
||||
host: s3.apps.internal.k3s.stabify.de
|
||||
tls:
|
||||
- secretName: seaweedfs-s3-tls
|
||||
|
||||
26
infrastructure/traefik-middleware-app.yaml
Normal file
26
infrastructure/traefik-middleware-app.yaml
Normal file
@@ -0,0 +1,26 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: traefik-middleware-ipwhitelist
|
||||
namespace: argocd
|
||||
annotations:
|
||||
argocd.argoproj.io/sync-wave: "0" # Nach Traefik, aber vor Apps
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://git.cloud-infra.prod.openmailserver.de/stabify/gitops.git
|
||||
targetRevision: HEAD
|
||||
path: infrastructure
|
||||
directory:
|
||||
recurse: false
|
||||
include: traefik-middleware-ipwhitelist.yaml
|
||||
destination:
|
||||
server: https://kubernetes.default.svc
|
||||
namespace: traefik-system
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
- ServerSideApply=true
|
||||
19
infrastructure/traefik-middleware-ipwhitelist.yaml
Normal file
19
infrastructure/traefik-middleware-ipwhitelist.yaml
Normal file
@@ -0,0 +1,19 @@
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: ipwhitelist-internal
|
||||
namespace: traefik-system
|
||||
labels:
|
||||
app.kubernetes.io/name: traefik
|
||||
app.kubernetes.io/component: middleware
|
||||
spec:
|
||||
ipWhiteList:
|
||||
# VPN IP-Range: Anpassen je nach VPN-Konfiguration
|
||||
# Standard: 10.100.0.0/16 (komplettes internes Netzwerk)
|
||||
# Für spezifische VPN-Range: z.B. 10.100.200.0/24
|
||||
sourceRange:
|
||||
- "10.100.0.0/16"
|
||||
- "10.200.0.0/24" # Internes Netzwerk (VLAN 30, 40, 90, etc.)
|
||||
# Weitere VPN-Ranges hier hinzufügen:
|
||||
# - "10.100.200.0/24" # Beispiel: Dediziertes VPN-Subnetz
|
||||
# - "192.168.1.0/24" # Beispiel: Externes VPN-Netzwerk
|
||||
Reference in New Issue
Block a user