restructure services based on host machine

This commit is contained in:
2024-01-06 01:33:42 +00:00
parent 350eee1ff0
commit f26bfb2063
49 changed files with 0 additions and 0 deletions

View File

@@ -0,0 +1,13 @@
http:
routers:
homeassistant-router:
rule: "Host(`homeassistant.dudenhoeffer.casa`)"
service: homeassistant-service
services:
homeassistant-service:
loadBalancer:
servers:
- url: "http://192.168.0.197:8123"
passHostHeader: true

View File

@@ -0,0 +1,13 @@
http:
routers:
nas-router:
rule: "Host(`nas.dudenhoeffer.casa`)"
service: nas-service
# Optionally, you can add TLS configuration here if your router is serving HTTPS
services:
nas-service:
loadBalancer:
servers:
- url: "http://192.168.0.145:5000"
passHostHeader: true

View File

@@ -0,0 +1,40 @@
http:
routers:
nextcloud:
rule: "Host(`cloud.dudenhoeffer.casa`)"
#entrypoints:
# - "web"
service: nextcloud
#middlewares:
# - nextcloud-chain
services:
nextcloud:
loadBalancer:
#serversTransport: "nextcloud-servers-transport"
servers:
- url: "http://nextcloud-aio-nextcloud:9000" # Use the host's IP address if Traefik runs outside the host network
middlewares:
nextcloud-secure-headers:
headers:
hostsProxyHeaders:
- "X-Forwarded-Host"
referrerPolicy: "same-origin"
https-redirect:
redirectscheme:
scheme: https
nextcloud-chain:
chain:
middlewares:
# - ... (e.g. rate limiting middleware)
- https-redirect
- nextcloud-secure-headers
# Define the serversTransport to skip TLS verification
serversTransports:
nextcloud-servers-transport:
insecureSkipVerify: true

View File

@@ -0,0 +1,13 @@
http:
routers:
pihole-router:
rule: "Host(`pihole.dudenhoeffer.casa`)"
service: pihole-service
services:
pihole-service:
loadBalancer:
servers:
- url: "http://192.168.0.197:8081"
passHostHeader: true

View File

@@ -0,0 +1,20 @@
http:
routers:
scrypted-router:
rule: "Host(`scrypted.dudenhoeffer.casa`)"
service: scrypted-service
# Optionally, you can add TLS configuration here if your router is serving HTTPS
services:
scrypted-service:
loadBalancer:
servers:
- url: "https://192.168.0.197:10443"
passHostHeader: true
# Skip TLS verification for the self-signed certificate
serversTransport: "scrypted-servers-transport"
# Define the serversTransport to skip TLS verification
serversTransports:
scrypted-servers-transport:
insecureSkipVerify: true

View File

@@ -0,0 +1,20 @@
http:
routers:
unifi-router:
rule: "Host(`unifi.dudenhoeffer.casa`)"
service: unifi-service
# Optionally, you can add TLS configuration here if your router is serving HTTPS
services:
unifi-service:
loadBalancer:
servers:
- url: "https://192.168.0.146"
passHostHeader: true
# Skip TLS verification for the self-signed certificate
serversTransport: "unifi-servers-transport"
# Define the serversTransport to skip TLS verification
serversTransports:
unifi-servers-transport:
insecureSkipVerify: true

View File

@@ -0,0 +1,13 @@
http:
routers:
wireguard2-router:
rule: "Host(`wireguard2.dudenhoeffer.casa`)"
service: wireguard2-service
services:
wireguard2-service:
loadBalancer:
servers:
- url: "http://192.168.0.197:51821"
passHostHeader: true