added new traefik rules

This commit is contained in:
2026-01-18 00:33:49 +01:00
parent 52be4a0e5a
commit b9660c986d
2 changed files with 32 additions and 1 deletions

View File

@@ -0,0 +1,30 @@
http:
middlewares:
internal-ipwhitelist:
ipWhiteList:
sourceRange:
- "10.100.0.0/16" # Internes Netzwerk (VLAN 30, 40, 90, etc.)
- "10.200.0.0/24" # VPN-Netzwerk
# Nur VPN-Clients dürfen auf *.apps.internal.* zugreifen
routers:
# Separate Route für interne Apps mit TLS Termination (nicht Passthrough)
# Damit können wir IP-Whitelist anwenden
internal-apps:
rule: "HostRegexp(`^.+\\.apps\\.internal\\.k3s\\.stabify\\.de$`)"
entryPoints:
- websecure
service: k3s-cluster-internal
middlewares:
- internal-ipwhitelist
tls:
certResolver: le
domains:
- main: "*.apps.internal.k3s.stabify.de"
services:
k3s-cluster-internal:
loadBalancer:
servers:
- url: "https://10.100.40.6:443"
passHostHeader: true

View File

@@ -1,7 +1,8 @@
tcp: tcp:
routers: routers:
# Öffentliche k3s Domains (NICHT *.apps.internal.*)
k3s-passthrough: k3s-passthrough:
rule: "HostSNIRegexp(`^.+\\.k3s\\.stabify\\.de$`)" rule: "HostSNIRegexp(`^[^.]+\\.(apps|sys)\\.k3s\\.stabify\\.de$`) && !HostSNIRegexp(`^.+\\.apps\\.internal\\.k3s\\.stabify\\.de$`)"
entryPoints: entryPoints:
- websecure - websecure
service: k3s-cluster service: k3s-cluster