Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

deployment: Update ingress rules for aztecscan.io #242

Merged
merged 5 commits into from
Jan 6, 2025
Merged
Show file tree
Hide file tree
Changes from 4 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
33 changes: 33 additions & 0 deletions k8s/production/cert-manager/ingress_nginx_svc_aztecscout_xyz.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
# this is a workaround for deploying cert-manager with nginx-ingress on digital ocean
# for reference see: https://www.digitalocean.com/community/tutorials/how-to-set-up-an-nginx-ingress-with-cert-manager-on-digitalocean-kubernetes#step-5-enabling-pod-communication-through-the-load-balancer-optional
apiVersion: v1
kind: Service
metadata:
annotations:
service.beta.kubernetes.io/do-loadbalancer-enable-proxy-protocol: "true"
service.beta.kubernetes.io/do-loadbalancer-hostname: "workaround.aztecscout.xyz"
labels:
helm.sh/chart: ingress-nginx-4.11.2
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/version: 1.11.2
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/component: controller
name: ingress-nginx-controller
namespace: ingress-nginx
spec:
type: LoadBalancer
externalTrafficPolicy: Local
ports:
- name: http
port: 80
protocol: TCP
targetPort: http
- name: https
port: 443
protocol: TCP
targetPort: https
selector:
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/instance: ingress-nginx
app.kubernetes.io/component: controller
17 changes: 14 additions & 3 deletions k8s/production/explorer-api/ingress.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -12,11 +12,22 @@ metadata:
spec:
ingressClassName: nginx
tls:
- hosts:
- secretName: aztecscout-api-tls
hosts:
- api.aztecscout.xyz
secretName: aztecscout-api-tls
- api.aztecscan.io
rules:
- host: api.aztecscout.xyz # TODO: change to env-var "DOMAIN"
- host: api.aztecscout.xyz
http:
paths:
- path: /v1/([^/]+)/(.*)
pathType: ImplementationSpecific
backend:
service:
name: explorer-api
port:
name: http-app
- host: api.aztecscan.io
http:
paths:
- path: /v1/([^/]+)/(.*)
Expand Down
15 changes: 13 additions & 2 deletions k8s/production/explorer-ui/ingress.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,9 +8,10 @@ metadata:
spec:
ingressClassName: nginx
tls:
- hosts:
- secretName: aztecscout-ui-tls
hosts:
- aztecscout.xyz
secretName: aztecscout-ui-tls
FilipHarald marked this conversation as resolved.
Show resolved Hide resolved
- aztecscan.io
rules:
- host: aztecscout.xyz # TODO: change to env-var "DOMAIN"
http:
Expand All @@ -22,5 +23,15 @@ spec:
name: http-app
path: /
pathType: Prefix
- host: aztecscan.io
http:
paths:
- backend:
service:
name: explorer-ui
port:
name: http-app
path: /
pathType: Prefix
status:
loadBalancer: {}
3 changes: 2 additions & 1 deletion k8s/production/skaffold.production.full.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,8 @@ manifests:
- k8s/production/websocket-event-publisher/service.yaml
- k8s/production/cert-manager/cert-staging-issuer.yaml
- k8s/production/cert-manager/cert-production-issuer.yaml
- k8s/production/cert-manager/ingress_nginx_svc.yaml
- k8s/production/cert-manager/ingress_nginx_svc_aztecscan.yaml
- k8s/production/cert-manager/ingress_nginx_svc_aztecscout.yaml
helm:
releases:
- name: cert-manager
Expand Down