restructure services based on host machine
This commit is contained in:
13
nuc/traefik/custom/homeassistant.yml
Normal file
13
nuc/traefik/custom/homeassistant.yml
Normal file
@@ -0,0 +1,13 @@
|
||||
|
||||
http:
|
||||
routers:
|
||||
homeassistant-router:
|
||||
rule: "Host(`homeassistant.dudenhoeffer.casa`)"
|
||||
service: homeassistant-service
|
||||
|
||||
services:
|
||||
homeassistant-service:
|
||||
loadBalancer:
|
||||
servers:
|
||||
- url: "http://192.168.0.197:8123"
|
||||
passHostHeader: true
|
13
nuc/traefik/custom/nas.yml
Normal file
13
nuc/traefik/custom/nas.yml
Normal file
@@ -0,0 +1,13 @@
|
||||
http:
|
||||
routers:
|
||||
nas-router:
|
||||
rule: "Host(`nas.dudenhoeffer.casa`)"
|
||||
service: nas-service
|
||||
# Optionally, you can add TLS configuration here if your router is serving HTTPS
|
||||
|
||||
services:
|
||||
nas-service:
|
||||
loadBalancer:
|
||||
servers:
|
||||
- url: "http://192.168.0.145:5000"
|
||||
passHostHeader: true
|
40
nuc/traefik/custom/nextcloud.yml
Normal file
40
nuc/traefik/custom/nextcloud.yml
Normal file
@@ -0,0 +1,40 @@
|
||||
http:
|
||||
routers:
|
||||
nextcloud:
|
||||
rule: "Host(`cloud.dudenhoeffer.casa`)"
|
||||
#entrypoints:
|
||||
# - "web"
|
||||
service: nextcloud
|
||||
#middlewares:
|
||||
# - nextcloud-chain
|
||||
|
||||
|
||||
services:
|
||||
nextcloud:
|
||||
loadBalancer:
|
||||
#serversTransport: "nextcloud-servers-transport"
|
||||
servers:
|
||||
- url: "http://nextcloud-aio-nextcloud:9000" # Use the host's IP address if Traefik runs outside the host network
|
||||
|
||||
middlewares:
|
||||
nextcloud-secure-headers:
|
||||
headers:
|
||||
hostsProxyHeaders:
|
||||
- "X-Forwarded-Host"
|
||||
referrerPolicy: "same-origin"
|
||||
|
||||
https-redirect:
|
||||
redirectscheme:
|
||||
scheme: https
|
||||
|
||||
nextcloud-chain:
|
||||
chain:
|
||||
middlewares:
|
||||
# - ... (e.g. rate limiting middleware)
|
||||
- https-redirect
|
||||
- nextcloud-secure-headers
|
||||
|
||||
# Define the serversTransport to skip TLS verification
|
||||
serversTransports:
|
||||
nextcloud-servers-transport:
|
||||
insecureSkipVerify: true
|
13
nuc/traefik/custom/pihole.yml
Normal file
13
nuc/traefik/custom/pihole.yml
Normal file
@@ -0,0 +1,13 @@
|
||||
|
||||
http:
|
||||
routers:
|
||||
pihole-router:
|
||||
rule: "Host(`pihole.dudenhoeffer.casa`)"
|
||||
service: pihole-service
|
||||
|
||||
services:
|
||||
pihole-service:
|
||||
loadBalancer:
|
||||
servers:
|
||||
- url: "http://192.168.0.197:8081"
|
||||
passHostHeader: true
|
20
nuc/traefik/custom/scrypted.yml
Normal file
20
nuc/traefik/custom/scrypted.yml
Normal file
@@ -0,0 +1,20 @@
|
||||
http:
|
||||
routers:
|
||||
scrypted-router:
|
||||
rule: "Host(`scrypted.dudenhoeffer.casa`)"
|
||||
service: scrypted-service
|
||||
# Optionally, you can add TLS configuration here if your router is serving HTTPS
|
||||
|
||||
services:
|
||||
scrypted-service:
|
||||
loadBalancer:
|
||||
servers:
|
||||
- url: "https://192.168.0.197:10443"
|
||||
passHostHeader: true
|
||||
# Skip TLS verification for the self-signed certificate
|
||||
serversTransport: "scrypted-servers-transport"
|
||||
|
||||
# Define the serversTransport to skip TLS verification
|
||||
serversTransports:
|
||||
scrypted-servers-transport:
|
||||
insecureSkipVerify: true
|
20
nuc/traefik/custom/unifi.yml
Normal file
20
nuc/traefik/custom/unifi.yml
Normal file
@@ -0,0 +1,20 @@
|
||||
http:
|
||||
routers:
|
||||
unifi-router:
|
||||
rule: "Host(`unifi.dudenhoeffer.casa`)"
|
||||
service: unifi-service
|
||||
# Optionally, you can add TLS configuration here if your router is serving HTTPS
|
||||
|
||||
services:
|
||||
unifi-service:
|
||||
loadBalancer:
|
||||
servers:
|
||||
- url: "https://192.168.0.146"
|
||||
passHostHeader: true
|
||||
# Skip TLS verification for the self-signed certificate
|
||||
serversTransport: "unifi-servers-transport"
|
||||
|
||||
# Define the serversTransport to skip TLS verification
|
||||
serversTransports:
|
||||
unifi-servers-transport:
|
||||
insecureSkipVerify: true
|
13
nuc/traefik/custom/wireguard.yml
Normal file
13
nuc/traefik/custom/wireguard.yml
Normal file
@@ -0,0 +1,13 @@
|
||||
|
||||
http:
|
||||
routers:
|
||||
wireguard2-router:
|
||||
rule: "Host(`wireguard2.dudenhoeffer.casa`)"
|
||||
service: wireguard2-service
|
||||
|
||||
services:
|
||||
wireguard2-service:
|
||||
loadBalancer:
|
||||
servers:
|
||||
- url: "http://192.168.0.197:51821"
|
||||
passHostHeader: true
|
Reference in New Issue
Block a user