Files
fleet-infra/clusters/lab/apps/uptime-kuma.yaml
Davide Piu 914890b339 feat: protect Uptime Kuma and Weave GitOps with Authelia ForwardAuth
- Add Traefik ForwardAuth middleware pointing to Authelia
- Apply to status.davidepiu.xyz and flux.davidepiu.xyz
- Users must login via auth.davidepiu.xyz before accessing these services
2026-02-19 23:18:38 +00:00

74 lines
1.5 KiB
YAML

---
apiVersion: source.toolkit.fluxcd.io/v1
kind: HelmRepository
metadata:
name: uptime-kuma
namespace: flux-system
spec:
interval: 1h
url: https://helm.irsigler.cloud
---
apiVersion: v1
kind: Namespace
metadata:
name: uptime-kuma
---
apiVersion: helm.toolkit.fluxcd.io/v2
kind: HelmRelease
metadata:
name: uptime-kuma
namespace: flux-system
spec:
interval: 1h
targetNamespace: uptime-kuma
install:
createNamespace: true
chart:
spec:
chart: uptime-kuma
sourceRef:
kind: HelmRepository
name: uptime-kuma
interval: 1h
values:
ingress:
enabled: true
className: traefik
annotations:
cert-manager.io/cluster-issuer: letsencrypt-prod
traefik.ingress.kubernetes.io/router.middlewares: default-authelia-forwardauth@kubernetescrd,default-redirect-https@kubernetescrd
hosts:
- host: status.davidepiu.xyz
paths:
- path: /
pathType: Prefix
tls:
- secretName: uptime-kuma-tls
hosts:
- status.davidepiu.xyz
persistence:
enabled: true
size: 4Gi
resources:
requests:
cpu: 10m
memory: 64Mi
limits:
cpu: 200m
memory: 200Mi
---
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: allow-ingress-from-traefik
namespace: uptime-kuma
spec:
podSelector: {}
policyTypes:
- Ingress
ingress:
- from:
- namespaceSelector:
matchLabels:
kubernetes.io/metadata.name: kube-system