From 3ffbbd16eafd278f1e44d4daa300299edaff3273 Mon Sep 17 00:00:00 2001 From: alexlebens Date: Fri, 16 Aug 2024 23:20:56 -0500 Subject: [PATCH] remove comment --- .../cl01tl/applications/prowlarr/values.yaml | 19 ------------------- .../applications/radarr5-4k/values.yaml | 19 ------------------- .../cl01tl/applications/radarr5/values.yaml | 19 ------------------- .../readarr-audiobooks/values.yaml | 19 ------------------- .../applications/readarr-books/values.yaml | 19 ------------------- .../applications/sonarr4-4k/values.yaml | 19 ------------------- .../cl01tl/applications/sonarr4/values.yaml | 19 ------------------- .../cl01tl/applications/tdarr/values.yaml | 18 ------------------ 8 files changed, 151 deletions(-) diff --git a/clusters/cl01tl/applications/prowlarr/values.yaml b/clusters/cl01tl/applications/prowlarr/values.yaml index ecde2ddfc..2c105960f 100644 --- a/clusters/cl01tl/applications/prowlarr/values.yaml +++ b/clusters/cl01tl/applications/prowlarr/values.yaml @@ -57,25 +57,6 @@ prowlarr: targetPort: 9696 protocol: HTTP ingress: - # main: - # enabled: true - # className: traefik - # annotations: - # traefik.ingress.kubernetes.io/router.entrypoints: websecure - # traefik.ingress.kubernetes.io/router.tls: "true" - # cert-manager.io/cluster-issuer: letsencrypt-issuer - # hosts: - # - host: prowlarr.alexlebens.net - # paths: - # - path: / - # pathType: Prefix - # service: - # name: prowlarr - # port: 80 - # tls: - # - secretName: prowlarr-secret-tls - # hosts: - # - prowlarr.alexlebens.net tailscale: enabled: true className: tailscale diff --git a/clusters/cl01tl/applications/radarr5-4k/values.yaml b/clusters/cl01tl/applications/radarr5-4k/values.yaml index 750b90405..912247bc7 100644 --- a/clusters/cl01tl/applications/radarr5-4k/values.yaml +++ b/clusters/cl01tl/applications/radarr5-4k/values.yaml @@ -106,25 +106,6 @@ radarr5-4k: targetPort: 9793 protocol: TCP ingress: - # main: - # enabled: true - # className: traefik - # annotations: - # traefik.ingress.kubernetes.io/router.entrypoints: websecure - # traefik.ingress.kubernetes.io/router.tls: "true" - # cert-manager.io/cluster-issuer: letsencrypt-issuer - # hosts: - # - host: radarr-4k.alexlebens.net - # paths: - # - path: / - # pathType: Prefix - # service: - # name: radarr5-4k - # port: 80 - # tls: - # - secretName: radarr5-4k-secret-tls - # hosts: - # - radarr-4k.alexlebens.net tailscale: enabled: true className: tailscale diff --git a/clusters/cl01tl/applications/radarr5/values.yaml b/clusters/cl01tl/applications/radarr5/values.yaml index b2cb4bd5d..978ea76f3 100644 --- a/clusters/cl01tl/applications/radarr5/values.yaml +++ b/clusters/cl01tl/applications/radarr5/values.yaml @@ -106,25 +106,6 @@ radarr5: targetPort: 9793 protocol: TCP ingress: - # main: - # enabled: true - # className: traefik - # annotations: - # traefik.ingress.kubernetes.io/router.entrypoints: websecure - # traefik.ingress.kubernetes.io/router.tls: "true" - # cert-manager.io/cluster-issuer: letsencrypt-issuer - # hosts: - # - host: radarr.alexlebens.net - # paths: - # - path: / - # pathType: Prefix - # service: - # name: radarr5 - # port: 80 - # tls: - # - secretName: radarr5-secret-tls - # hosts: - # - radarr.alexlebens.net tailscale: enabled: true className: tailscale diff --git a/clusters/cl01tl/applications/readarr-audiobooks/values.yaml b/clusters/cl01tl/applications/readarr-audiobooks/values.yaml index e15a1d007..10dffbbd7 100644 --- a/clusters/cl01tl/applications/readarr-audiobooks/values.yaml +++ b/clusters/cl01tl/applications/readarr-audiobooks/values.yaml @@ -108,25 +108,6 @@ readarr-audiobooks: targetPort: 9796 protocol: TCP ingress: - # main: - # enabled: true - # className: traefik - # annotations: - # traefik.ingress.kubernetes.io/router.entrypoints: websecure - # traefik.ingress.kubernetes.io/router.tls: "true" - # cert-manager.io/cluster-issuer: letsencrypt-issuer - # hosts: - # - host: readarr-audiobooks.alexlebens.net - # paths: - # - path: / - # pathType: Prefix - # service: - # name: readarr-audiobooks - # port: 80 - # tls: - # - secretName: readarr-audiobooks-secret-tls - # hosts: - # - readarr-audiobooks.alexlebens.net tailscale: enabled: true className: tailscale diff --git a/clusters/cl01tl/applications/readarr-books/values.yaml b/clusters/cl01tl/applications/readarr-books/values.yaml index 84453258e..6c1fe208e 100644 --- a/clusters/cl01tl/applications/readarr-books/values.yaml +++ b/clusters/cl01tl/applications/readarr-books/values.yaml @@ -108,25 +108,6 @@ readarr-books: targetPort: 9796 protocol: TCP ingress: - # main: - # enabled: true - # className: traefik - # annotations: - # traefik.ingress.kubernetes.io/router.entrypoints: websecure - # traefik.ingress.kubernetes.io/router.tls: "true" - # cert-manager.io/cluster-issuer: letsencrypt-issuer - # hosts: - # - host: readarr-books.alexlebens.net - # paths: - # - path: / - # pathType: Prefix - # service: - # name: readarr-books - # port: 80 - # tls: - # - secretName: readarr-books-secret-tls - # hosts: - # - readarr-books.alexlebens.net tailscale: enabled: true className: tailscale diff --git a/clusters/cl01tl/applications/sonarr4-4k/values.yaml b/clusters/cl01tl/applications/sonarr4-4k/values.yaml index 67802278a..4e1d04bae 100644 --- a/clusters/cl01tl/applications/sonarr4-4k/values.yaml +++ b/clusters/cl01tl/applications/sonarr4-4k/values.yaml @@ -106,25 +106,6 @@ sonarr4-4k: targetPort: 9794 protocol: TCP ingress: - # main: - # enabled: true - # className: traefik - # annotations: - # traefik.ingress.kubernetes.io/router.entrypoints: websecure - # traefik.ingress.kubernetes.io/router.tls: "true" - # cert-manager.io/cluster-issuer: letsencrypt-issuer - # hosts: - # - host: sonarr-4k.alexlebens.net - # paths: - # - path: / - # pathType: Prefix - # service: - # name: sonarr4-4k - # port: 80 - # tls: - # - secretName: sonarr4-4k-secret-tls - # hosts: - # - sonarr-4k.alexlebens.net tailscale: enabled: true className: tailscale diff --git a/clusters/cl01tl/applications/sonarr4/values.yaml b/clusters/cl01tl/applications/sonarr4/values.yaml index 812696c6e..19cd2777c 100644 --- a/clusters/cl01tl/applications/sonarr4/values.yaml +++ b/clusters/cl01tl/applications/sonarr4/values.yaml @@ -106,25 +106,6 @@ sonarr4: targetPort: 9794 protocol: TCP ingress: - # main: - # enabled: true - # className: traefik - # annotations: - # traefik.ingress.kubernetes.io/router.entrypoints: websecure - # traefik.ingress.kubernetes.io/router.tls: "true" - # cert-manager.io/cluster-issuer: letsencrypt-issuer - # hosts: - # - host: sonarr.alexlebens.net - # paths: - # - path: / - # pathType: Prefix - # service: - # name: sonarr4 - # port: 80 - # tls: - # - secretName: sonarr4-secret-tls - # hosts: - # - sonarr.alexlebens.net tailscale: enabled: true className: tailscale diff --git a/clusters/cl01tl/applications/tdarr/values.yaml b/clusters/cl01tl/applications/tdarr/values.yaml index 3b83d2937..91b02fee4 100644 --- a/clusters/cl01tl/applications/tdarr/values.yaml +++ b/clusters/cl01tl/applications/tdarr/values.yaml @@ -96,24 +96,6 @@ tdarr: targetPort: 8265 protocol: HTTP ingress: - # main: - # className: traefik - # annotations: - # traefik.ingress.kubernetes.io/router.entrypoints: websecure - # traefik.ingress.kubernetes.io/router.tls: "true" - # cert-manager.io/cluster-issuer: letsencrypt-issuer - # hosts: - # - host: tdarr.alexlebens.net - # paths: - # - path: / - # pathType: Prefix - # service: - # name: tdarr-web - # port: 8265 - # tls: - # - secretName: tdarr-secret-tls - # hosts: - # - tdarr.alexlebens.net tailscale: enabled: true className: tailscale