From 5e6e12e8c990b44a6d32392d25654039619f0638 Mon Sep 17 00:00:00 2001 From: gitea-bot Date: Thu, 9 Apr 2026 01:29:32 +0000 Subject: [PATCH 1/2] chore: Update manifests after change --- ...Role-external-secrets-cert-controller.yaml | 1 + ...ding-external-secrets-cert-controller.yaml | 1 + ...ment-external-secrets-cert-controller.yaml | 2 ++ .../Deployment-external-secrets-webhook.yaml | 2 ++ .../Secret-external-secrets-webhook.yaml | 1 + ...ernal-secrets-cert-controller-metrics.yaml | 22 ++++++++++++++++ .../Service-external-secrets-metrics.yaml | 21 +++++++++++++++ .../Service-external-secrets-webhook.yaml | 5 ++++ ...ount-external-secrets-cert-controller.yaml | 1 + ...rviceAccount-external-secrets-webhook.yaml | 1 + ...ernal-secrets-cert-controller-metrics.yaml | 26 +++++++++++++++++++ ...rviceMonitor-external-secrets-metrics.yaml | 24 +++++++++++++++++ ...itor-external-secrets-webhook-metrics.yaml | 26 +++++++++++++++++++ ...Configuration-externalsecret-validate.yaml | 1 + ...ookConfiguration-secretstore-validate.yaml | 1 + .../Elasticsearch-elasticsearch-stalwart.yaml | 2 +- ...ticsearch-elasticsearch-tubearchivist.yaml | 2 +- 17 files changed, 137 insertions(+), 2 deletions(-) create mode 100644 clusters/cl01tl/manifests/external-secrets/Service-external-secrets-cert-controller-metrics.yaml create mode 100644 clusters/cl01tl/manifests/external-secrets/Service-external-secrets-metrics.yaml create mode 100644 clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-cert-controller-metrics.yaml create mode 100644 clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-metrics.yaml create mode 100644 clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-webhook-metrics.yaml diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml index 45b70f340..b5962e6e1 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml @@ -8,6 +8,7 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm + app.kubernetes.io/metrics: "cert-controller" rules: - apiGroups: - "apiextensions.k8s.io" diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml index de4bf02fb..750966196 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml @@ -8,6 +8,7 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm + app.kubernetes.io/metrics: "cert-controller" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml index 7c8da3a62..685770016 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml @@ -9,6 +9,7 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm + app.kubernetes.io/metrics: "cert-controller" spec: replicas: 1 revisionHistoryLimit: 10 @@ -24,6 +25,7 @@ spec: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm + app.kubernetes.io/metrics: "cert-controller" spec: serviceAccountName: external-secrets-cert-controller automountServiceAccountToken: true diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml index 18a8827a0..0b5687096 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml @@ -9,6 +9,7 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm + app.kubernetes.io/metrics: "webhook" spec: replicas: 1 revisionHistoryLimit: 10 @@ -24,6 +25,7 @@ spec: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm + app.kubernetes.io/metrics: "webhook" spec: hostNetwork: false serviceAccountName: external-secrets-webhook diff --git a/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml index 3a64fd95a..82219ded6 100644 --- a/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml @@ -9,4 +9,5 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm + app.kubernetes.io/metrics: "webhook" external-secrets.io/component: webhook diff --git a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-cert-controller-metrics.yaml b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-cert-controller-metrics.yaml new file mode 100644 index 000000000..3c4e4f39d --- /dev/null +++ b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-cert-controller-metrics.yaml @@ -0,0 +1,22 @@ +apiVersion: v1 +kind: Service +metadata: + name: external-secrets-cert-controller-metrics + namespace: external-secrets + labels: + helm.sh/chart: external-secrets-2.2.0 + app.kubernetes.io/name: external-secrets-cert-controller + app.kubernetes.io/instance: external-secrets + app.kubernetes.io/version: "v2.2.0" + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/metrics: "cert-controller" +spec: + type: ClusterIP + ports: + - port: 8080 + protocol: TCP + targetPort: metrics + name: metrics + selector: + app.kubernetes.io/name: external-secrets-cert-controller + app.kubernetes.io/instance: external-secrets diff --git a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-metrics.yaml b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-metrics.yaml new file mode 100644 index 000000000..41610c675 --- /dev/null +++ b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-metrics.yaml @@ -0,0 +1,21 @@ +apiVersion: v1 +kind: Service +metadata: + name: external-secrets-metrics + namespace: external-secrets + labels: + helm.sh/chart: external-secrets-2.2.0 + app.kubernetes.io/name: external-secrets + app.kubernetes.io/instance: external-secrets + app.kubernetes.io/version: "v2.2.0" + app.kubernetes.io/managed-by: Helm +spec: + type: ClusterIP + ports: + - port: 8080 + protocol: TCP + targetPort: metrics + name: metrics + selector: + app.kubernetes.io/name: external-secrets + app.kubernetes.io/instance: external-secrets diff --git a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml index 82909d5ef..d15aaea1d 100644 --- a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml @@ -9,6 +9,7 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm + app.kubernetes.io/metrics: "webhook" external-secrets.io/component: webhook spec: type: ClusterIP @@ -17,6 +18,10 @@ spec: targetPort: webhook protocol: TCP name: webhook + - port: 8080 + protocol: TCP + targetPort: metrics + name: metrics selector: app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml index 7e790977a..a440d6e75 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml @@ -9,3 +9,4 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm + app.kubernetes.io/metrics: "cert-controller" diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml index ea7232f1f..b131c913b 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml @@ -9,3 +9,4 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm + app.kubernetes.io/metrics: "webhook" diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-cert-controller-metrics.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-cert-controller-metrics.yaml new file mode 100644 index 000000000..771f4e2db --- /dev/null +++ b/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-cert-controller-metrics.yaml @@ -0,0 +1,26 @@ +apiVersion: "monitoring.coreos.com/v1" +kind: ServiceMonitor +metadata: + labels: + helm.sh/chart: external-secrets-2.2.0 + app.kubernetes.io/name: external-secrets-cert-controller + app.kubernetes.io/instance: external-secrets + app.kubernetes.io/version: "v2.2.0" + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/metrics: "cert-controller" + name: external-secrets-cert-controller-metrics + namespace: "external-secrets" +spec: + selector: + matchLabels: + app.kubernetes.io/name: external-secrets-cert-controller + app.kubernetes.io/instance: external-secrets + app.kubernetes.io/metrics: "cert-controller" + namespaceSelector: + matchNames: + - external-secrets + endpoints: + - port: metrics + interval: 30s + scrapeTimeout: 25s + honorLabels: false diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-metrics.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-metrics.yaml new file mode 100644 index 000000000..e288b8a49 --- /dev/null +++ b/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-metrics.yaml @@ -0,0 +1,24 @@ +apiVersion: "monitoring.coreos.com/v1" +kind: ServiceMonitor +metadata: + labels: + helm.sh/chart: external-secrets-2.2.0 + app.kubernetes.io/name: external-secrets + app.kubernetes.io/instance: external-secrets + app.kubernetes.io/version: "v2.2.0" + app.kubernetes.io/managed-by: Helm + name: external-secrets-metrics + namespace: "external-secrets" +spec: + selector: + matchLabels: + app.kubernetes.io/name: external-secrets + app.kubernetes.io/instance: external-secrets + namespaceSelector: + matchNames: + - external-secrets + endpoints: + - port: metrics + interval: 30s + scrapeTimeout: 25s + honorLabels: false diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-webhook-metrics.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-webhook-metrics.yaml new file mode 100644 index 000000000..ede976d97 --- /dev/null +++ b/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-webhook-metrics.yaml @@ -0,0 +1,26 @@ +apiVersion: "monitoring.coreos.com/v1" +kind: ServiceMonitor +metadata: + labels: + helm.sh/chart: external-secrets-2.2.0 + app.kubernetes.io/name: external-secrets-webhook + app.kubernetes.io/instance: external-secrets + app.kubernetes.io/version: "v2.2.0" + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/metrics: "webhook" + name: external-secrets-webhook-metrics + namespace: "external-secrets" +spec: + selector: + matchLabels: + app.kubernetes.io/name: external-secrets-webhook + app.kubernetes.io/instance: external-secrets + app.kubernetes.io/metrics: "webhook" + namespaceSelector: + matchNames: + - external-secrets + endpoints: + - port: metrics + interval: 30s + scrapeTimeout: 25s + honorLabels: false diff --git a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml index 752518916..079ad615d 100644 --- a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml @@ -8,6 +8,7 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm + app.kubernetes.io/metrics: "webhook" external-secrets.io/component: webhook webhooks: - name: "validate.externalsecret.external-secrets.io" diff --git a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml index 8f476b6f3..76eb26e34 100644 --- a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml @@ -8,6 +8,7 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm + app.kubernetes.io/metrics: "webhook" external-secrets.io/component: webhook webhooks: - name: "validate.secretstore.external-secrets.io" diff --git a/clusters/cl01tl/manifests/stalwart/Elasticsearch-elasticsearch-stalwart.yaml b/clusters/cl01tl/manifests/stalwart/Elasticsearch-elasticsearch-stalwart.yaml index 9d4062f10..3b1cb7a70 100644 --- a/clusters/cl01tl/manifests/stalwart/Elasticsearch-elasticsearch-stalwart.yaml +++ b/clusters/cl01tl/manifests/stalwart/Elasticsearch-elasticsearch-stalwart.yaml @@ -8,7 +8,7 @@ metadata: app.kubernetes.io/instance: stalwart app.kubernetes.io/part-of: stalwart spec: - version: 9.3.2 + version: 9.3.3 auth: fileRealm: - secretName: stalwart-elasticsearch-secret diff --git a/clusters/cl01tl/manifests/tubearchivist/Elasticsearch-elasticsearch-tubearchivist.yaml b/clusters/cl01tl/manifests/tubearchivist/Elasticsearch-elasticsearch-tubearchivist.yaml index 4d3aa1e09..39078fa0a 100644 --- a/clusters/cl01tl/manifests/tubearchivist/Elasticsearch-elasticsearch-tubearchivist.yaml +++ b/clusters/cl01tl/manifests/tubearchivist/Elasticsearch-elasticsearch-tubearchivist.yaml @@ -8,7 +8,7 @@ metadata: app.kubernetes.io/instance: tubearchivist app.kubernetes.io/part-of: tubearchivist spec: - version: 9.3.2 + version: 9.3.3 auth: fileRealm: - secretName: tubearchivist-elasticsearch-secret -- 2.49.1 From 80306e0c927cfa6bd63543b8ada86bd4e2589d96 Mon Sep 17 00:00:00 2001 From: gitea-bot Date: Thu, 9 Apr 2026 01:49:38 +0000 Subject: [PATCH 2/2] chore: Update manifests after change --- .../manifests/actual/HTTPRoute-actual.yaml | 2 +- ...eusRule-argocd-application-controller.yaml | 37 +++++++++++++++++++ ...Monitor-argocd-application-controller.yaml | 27 ++++++++++++++ ...itor-argocd-applicationset-controller.yaml | 27 ++++++++++++++ .../ServiceMonitor-argocd-dex-server.yaml | 27 ++++++++++++++ ...nitor-argocd-notifications-controller.yaml | 26 +++++++++++++ ...erviceMonitor-argocd-redis-ha-haproxy.yaml | 22 +++++++++++ .../ServiceMonitor-argocd-redis-ha.yaml | 22 +++++++++++ .../ServiceMonitor-argocd-repo-server.yaml | 27 ++++++++++++++ .../argocd/ServiceMonitor-argocd-server.yaml | 27 ++++++++++++++ .../HTTPRoute-audiobookshelf.yaml | 2 +- .../backrest/HTTPRoute-backrest.yaml | 2 +- .../manifests/bazarr/HTTPRoute-bazarr.yaml | 2 +- .../dawarich/HTTPRoute-dawarich.yaml | 2 +- .../directus/HTTPRoute-directus.yaml | 2 +- .../excalidraw/HTTPRoute-excalidraw.yaml | 2 +- ...Role-external-secrets-cert-controller.yaml | 1 - ...ding-external-secrets-cert-controller.yaml | 1 - ...ment-external-secrets-cert-controller.yaml | 2 - .../Deployment-external-secrets-webhook.yaml | 2 - .../Secret-external-secrets-webhook.yaml | 1 - ...ernal-secrets-cert-controller-metrics.yaml | 22 ----------- .../Service-external-secrets-metrics.yaml | 21 ----------- .../Service-external-secrets-webhook.yaml | 5 --- ...ount-external-secrets-cert-controller.yaml | 1 - ...rviceAccount-external-secrets-webhook.yaml | 1 - ...ernal-secrets-cert-controller-metrics.yaml | 26 ------------- ...rviceMonitor-external-secrets-metrics.yaml | 24 ------------ ...itor-external-secrets-webhook-metrics.yaml | 26 ------------- ...Configuration-externalsecret-validate.yaml | 1 - ...ookConfiguration-secretstore-validate.yaml | 1 - .../foldergram/HTTPRoute-foldergram.yaml | 2 +- .../manifests/garage/HTTPRoute-garage-s3.yaml | 2 +- .../garage/HTTPRoute-garage-webui.yaml | 2 +- .../grimmory/HTTPRoute-grimmory.yaml | 2 +- .../HTTPRoute-home-assistant-code-server.yaml | 2 +- .../HTTPRoute-home-assistant-main.yaml | 2 +- .../homepage/HTTPRoute-homepage.yaml | 2 +- .../houndarr/HTTPRoute-houndarr.yaml | 2 +- .../manifests/immich/HTTPRoute-immich.yaml | 2 +- .../jellyfin/HTTPRoute-jellyfin.yaml | 2 +- .../jellystat/HTTPRoute-jellystat.yaml | 2 +- .../manifests/kiwix/HTTPRoute-kiwix.yaml | 2 +- .../manifests/komodo/HTTPRoute-komodo.yaml | 2 +- .../languagetool/HTTPRoute-languagetool.yaml | 2 +- .../manifests/lidarr/HTTPRoute-lidarr.yaml | 2 +- .../medialyze/HTTPRoute-medialyze.yaml | 2 +- .../HTTPRoute-music-grabber.yaml | 2 +- .../HTTPRoute-navidrome-feishin.yaml | 2 +- .../navidrome/HTTPRoute-navidrome-main.yaml | 2 +- .../cl01tl/manifests/ntfy/HTTPRoute-ntfy.yaml | 2 +- .../manifests/ollama/HTTPRoute-ollama.yaml | 2 +- .../omni-tools/HTTPRoute-omni-tools.yaml | 2 +- .../HTTPRoute-paperless-ngx.yaml | 2 +- .../cl01tl/manifests/plex/HTTPRoute-plex.yaml | 2 +- .../manifests/postiz/HTTPRoute-postiz.yaml | 2 +- .../prowlarr/HTTPRoute-prowlarr.yaml | 2 +- .../HTTPRoute-qbittorrent-main.yaml | 2 +- .../HTTPRoute-qbittorrent-qui.yaml | 2 +- .../radarr-4k/HTTPRoute-radarr-4k.yaml | 2 +- .../radarr-anime/HTTPRoute-radarr-anime.yaml | 2 +- .../HTTPRoute-radarr-standup.yaml | 2 +- .../manifests/radarr/HTTPRoute-radarr.yaml | 2 +- .../roundcube/HTTPRoute-roundcube.yaml | 2 +- .../manifests/searxng/HTTPRoute-searxng.yaml | 2 +- .../shelfmark/HTTPRoute-shelfmark.yaml | 2 +- .../manifests/slskd/HTTPRoute-slskd.yaml | 2 +- .../sonarr-4k/HTTPRoute-sonarr-4k.yaml | 2 +- .../sonarr-anime/HTTPRoute-sonarr-anime.yaml | 2 +- .../manifests/sonarr/HTTPRoute-sonarr.yaml | 2 +- .../stalwart/HTTPRoute-stalwart.yaml | 2 +- .../manifests/tdarr/HTTPRoute-tdarr.yaml | 2 +- .../HTTPRoute-tubearchivist.yaml | 2 +- .../manifests/whodb/HTTPRoute-whodb.yaml | 2 +- .../yamtrack/HTTPRoute-yamtrack.yaml | 2 +- .../manifests/yubal/HTTPRoute-yubal.yaml | 2 +- 76 files changed, 294 insertions(+), 187 deletions(-) create mode 100644 clusters/cl01tl/manifests/argocd/PrometheusRule-argocd-application-controller.yaml create mode 100644 clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-application-controller.yaml create mode 100644 clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-applicationset-controller.yaml create mode 100644 clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-dex-server.yaml create mode 100644 clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-notifications-controller.yaml create mode 100644 clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-redis-ha-haproxy.yaml create mode 100644 clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-redis-ha.yaml create mode 100644 clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-repo-server.yaml create mode 100644 clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-server.yaml delete mode 100644 clusters/cl01tl/manifests/external-secrets/Service-external-secrets-cert-controller-metrics.yaml delete mode 100644 clusters/cl01tl/manifests/external-secrets/Service-external-secrets-metrics.yaml delete mode 100644 clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-cert-controller-metrics.yaml delete mode 100644 clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-metrics.yaml delete mode 100644 clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-webhook-metrics.yaml diff --git a/clusters/cl01tl/manifests/actual/HTTPRoute-actual.yaml b/clusters/cl01tl/manifests/actual/HTTPRoute-actual.yaml index ec660a450..5728d3f28 100644 --- a/clusters/cl01tl/manifests/actual/HTTPRoute-actual.yaml +++ b/clusters/cl01tl/manifests/actual/HTTPRoute-actual.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: actual diff --git a/clusters/cl01tl/manifests/argocd/PrometheusRule-argocd-application-controller.yaml b/clusters/cl01tl/manifests/argocd/PrometheusRule-argocd-application-controller.yaml new file mode 100644 index 000000000..95b41618c --- /dev/null +++ b/clusters/cl01tl/manifests/argocd/PrometheusRule-argocd-application-controller.yaml @@ -0,0 +1,37 @@ +apiVersion: monitoring.coreos.com/v1 +kind: PrometheusRule +metadata: + name: argocd-application-controller + namespace: "argocd" + labels: + helm.sh/chart: argo-cd-9.5.0 + app.kubernetes.io/name: argocd-application-controller + app.kubernetes.io/instance: argocd + app.kubernetes.io/component: application-controller + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/part-of: argocd + app.kubernetes.io/version: "v3.3.6" +spec: + groups: + - name: argocd + rules: + - alert: ArgoAppMissing + annotations: + description: | + Argo CD has not reported any applications data for the past 15 minutes which means that it must be down or not functioning properly. This needs to be resolved for this cloud to continue to maintain state. + summary: '[Argo CD] No reported applications' + expr: | + absent(argocd_app_info) == 1 + for: 15m + labels: + severity: critical + - alert: ArgoAppNotSynced + annotations: + description: | + The application [{{`{{$labels.name}}`}} has not been synchronized for over 12 hours which means that the state of this cloud has drifted away from the state inside Git. + summary: '[{{`{{$labels.name}}`}}] Application not synchronized' + expr: | + argocd_app_info{sync_status!="Synced"} == 1 + for: 12h + labels: + severity: warning diff --git a/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-application-controller.yaml b/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-application-controller.yaml new file mode 100644 index 000000000..f91f127c5 --- /dev/null +++ b/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-application-controller.yaml @@ -0,0 +1,27 @@ +apiVersion: monitoring.coreos.com/v1 +kind: ServiceMonitor +metadata: + name: argocd-application-controller + namespace: "argocd" + labels: + helm.sh/chart: argo-cd-9.5.0 + app.kubernetes.io/name: argocd-application-controller + app.kubernetes.io/instance: argocd + app.kubernetes.io/component: application-controller + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/part-of: argocd + app.kubernetes.io/version: "v3.3.6" +spec: + endpoints: + - port: http-metrics + interval: 30s + path: /metrics + honorLabels: false + namespaceSelector: + matchNames: + - argocd + selector: + matchLabels: + app.kubernetes.io/name: argocd-metrics + app.kubernetes.io/instance: argocd + app.kubernetes.io/component: application-controller diff --git a/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-applicationset-controller.yaml b/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-applicationset-controller.yaml new file mode 100644 index 000000000..4241e3b4b --- /dev/null +++ b/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-applicationset-controller.yaml @@ -0,0 +1,27 @@ +apiVersion: monitoring.coreos.com/v1 +kind: ServiceMonitor +metadata: + name: argocd-applicationset-controller + namespace: "argocd" + labels: + helm.sh/chart: argo-cd-9.5.0 + app.kubernetes.io/name: argocd-applicationset-controller + app.kubernetes.io/instance: argocd + app.kubernetes.io/component: applicationset-controller + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/part-of: argocd + app.kubernetes.io/version: "v3.3.6" +spec: + endpoints: + - port: http-metrics + interval: 30s + path: /metrics + honorLabels: false + namespaceSelector: + matchNames: + - argocd + selector: + matchLabels: + app.kubernetes.io/name: argocd-metrics + app.kubernetes.io/instance: argocd + app.kubernetes.io/component: applicationset-controller diff --git a/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-dex-server.yaml b/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-dex-server.yaml new file mode 100644 index 000000000..3d0575ca7 --- /dev/null +++ b/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-dex-server.yaml @@ -0,0 +1,27 @@ +apiVersion: monitoring.coreos.com/v1 +kind: ServiceMonitor +metadata: + name: argocd-dex-server + namespace: "argocd" + labels: + helm.sh/chart: argo-cd-9.5.0 + app.kubernetes.io/name: argocd-dex-server + app.kubernetes.io/instance: argocd + app.kubernetes.io/component: dex-server + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/part-of: argocd + app.kubernetes.io/version: "v3.3.6" +spec: + endpoints: + - port: http-metrics + interval: 30s + path: /metrics + honorLabels: false + namespaceSelector: + matchNames: + - argocd + selector: + matchLabels: + app.kubernetes.io/name: argocd-dex-server + app.kubernetes.io/instance: argocd + app.kubernetes.io/component: dex-server diff --git a/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-notifications-controller.yaml b/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-notifications-controller.yaml new file mode 100644 index 000000000..e01112898 --- /dev/null +++ b/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-notifications-controller.yaml @@ -0,0 +1,26 @@ +apiVersion: monitoring.coreos.com/v1 +kind: ServiceMonitor +metadata: + name: argocd-notifications-controller + namespace: "argocd" + labels: + helm.sh/chart: argo-cd-9.5.0 + app.kubernetes.io/name: argocd-notifications-controller + app.kubernetes.io/instance: argocd + app.kubernetes.io/component: notifications-controller + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/part-of: argocd + app.kubernetes.io/version: "v3.3.6" +spec: + endpoints: + - port: http-metrics + path: /metrics + honorLabels: false + namespaceSelector: + matchNames: + - argocd + selector: + matchLabels: + app.kubernetes.io/name: argocd-metrics + app.kubernetes.io/instance: argocd + app.kubernetes.io/component: notifications-controller diff --git a/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-redis-ha-haproxy.yaml b/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-redis-ha-haproxy.yaml new file mode 100644 index 000000000..5fa97e1ee --- /dev/null +++ b/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-redis-ha-haproxy.yaml @@ -0,0 +1,22 @@ +apiVersion: monitoring.coreos.com/v1 +kind: ServiceMonitor +metadata: + name: argocd-redis-ha-haproxy + namespace: "argocd" + labels: + app: redis-ha + heritage: "Helm" + release: "argocd" + chart: redis-ha-4.34.11 +spec: + endpoints: + - targetPort: 9101 + jobLabel: argocd-redis-ha-haproxy + namespaceSelector: + matchNames: + - "argocd" + selector: + matchLabels: + app: redis-ha + release: argocd + component: haproxy diff --git a/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-redis-ha.yaml b/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-redis-ha.yaml new file mode 100644 index 000000000..98eae8eb8 --- /dev/null +++ b/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-redis-ha.yaml @@ -0,0 +1,22 @@ +apiVersion: monitoring.coreos.com/v1 +kind: ServiceMonitor +metadata: + name: argocd-redis-ha + namespace: "argocd" + labels: + app: redis-ha + heritage: "Helm" + release: "argocd" + chart: redis-ha-4.34.11 +spec: + endpoints: + - targetPort: 9121 + jobLabel: argocd-redis-ha + namespaceSelector: + matchNames: + - "argocd" + selector: + matchLabels: + app: redis-ha + release: argocd + exporter: enabled diff --git a/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-repo-server.yaml b/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-repo-server.yaml new file mode 100644 index 000000000..780e89a91 --- /dev/null +++ b/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-repo-server.yaml @@ -0,0 +1,27 @@ +apiVersion: monitoring.coreos.com/v1 +kind: ServiceMonitor +metadata: + name: argocd-repo-server + namespace: "argocd" + labels: + helm.sh/chart: argo-cd-9.5.0 + app.kubernetes.io/name: argocd-repo-server + app.kubernetes.io/instance: argocd + app.kubernetes.io/component: repo-server + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/part-of: argocd + app.kubernetes.io/version: "v3.3.6" +spec: + endpoints: + - port: http-metrics + interval: 30s + path: /metrics + honorLabels: false + namespaceSelector: + matchNames: + - argocd + selector: + matchLabels: + app.kubernetes.io/name: argocd-repo-server-metrics + app.kubernetes.io/instance: argocd + app.kubernetes.io/component: repo-server diff --git a/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-server.yaml b/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-server.yaml new file mode 100644 index 000000000..0237c1b8b --- /dev/null +++ b/clusters/cl01tl/manifests/argocd/ServiceMonitor-argocd-server.yaml @@ -0,0 +1,27 @@ +apiVersion: monitoring.coreos.com/v1 +kind: ServiceMonitor +metadata: + name: argocd-server + namespace: "argocd" + labels: + helm.sh/chart: argo-cd-9.5.0 + app.kubernetes.io/name: argocd-server + app.kubernetes.io/instance: argocd + app.kubernetes.io/component: server + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/part-of: argocd + app.kubernetes.io/version: "v3.3.6" +spec: + endpoints: + - port: http-metrics + interval: 30s + path: /metrics + honorLabels: false + namespaceSelector: + matchNames: + - argocd + selector: + matchLabels: + app.kubernetes.io/name: argocd-server-metrics + app.kubernetes.io/instance: argocd + app.kubernetes.io/component: server diff --git a/clusters/cl01tl/manifests/audiobookshelf/HTTPRoute-audiobookshelf.yaml b/clusters/cl01tl/manifests/audiobookshelf/HTTPRoute-audiobookshelf.yaml index 88256e269..93122ec3e 100644 --- a/clusters/cl01tl/manifests/audiobookshelf/HTTPRoute-audiobookshelf.yaml +++ b/clusters/cl01tl/manifests/audiobookshelf/HTTPRoute-audiobookshelf.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: audiobookshelf diff --git a/clusters/cl01tl/manifests/backrest/HTTPRoute-backrest.yaml b/clusters/cl01tl/manifests/backrest/HTTPRoute-backrest.yaml index 65a9fec22..530b5752b 100644 --- a/clusters/cl01tl/manifests/backrest/HTTPRoute-backrest.yaml +++ b/clusters/cl01tl/manifests/backrest/HTTPRoute-backrest.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: backrest diff --git a/clusters/cl01tl/manifests/bazarr/HTTPRoute-bazarr.yaml b/clusters/cl01tl/manifests/bazarr/HTTPRoute-bazarr.yaml index 60e194ee3..d65d1db36 100644 --- a/clusters/cl01tl/manifests/bazarr/HTTPRoute-bazarr.yaml +++ b/clusters/cl01tl/manifests/bazarr/HTTPRoute-bazarr.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: bazarr diff --git a/clusters/cl01tl/manifests/dawarich/HTTPRoute-dawarich.yaml b/clusters/cl01tl/manifests/dawarich/HTTPRoute-dawarich.yaml index 451b31f52..ea743156a 100644 --- a/clusters/cl01tl/manifests/dawarich/HTTPRoute-dawarich.yaml +++ b/clusters/cl01tl/manifests/dawarich/HTTPRoute-dawarich.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: dawarich diff --git a/clusters/cl01tl/manifests/directus/HTTPRoute-directus.yaml b/clusters/cl01tl/manifests/directus/HTTPRoute-directus.yaml index 40df60fe9..4f3239997 100644 --- a/clusters/cl01tl/manifests/directus/HTTPRoute-directus.yaml +++ b/clusters/cl01tl/manifests/directus/HTTPRoute-directus.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: directus diff --git a/clusters/cl01tl/manifests/excalidraw/HTTPRoute-excalidraw.yaml b/clusters/cl01tl/manifests/excalidraw/HTTPRoute-excalidraw.yaml index b6597643c..66a0bee63 100644 --- a/clusters/cl01tl/manifests/excalidraw/HTTPRoute-excalidraw.yaml +++ b/clusters/cl01tl/manifests/excalidraw/HTTPRoute-excalidraw.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: excalidraw diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml index b5962e6e1..45b70f340 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml @@ -8,7 +8,6 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm - app.kubernetes.io/metrics: "cert-controller" rules: - apiGroups: - "apiextensions.k8s.io" diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml index 750966196..de4bf02fb 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml @@ -8,7 +8,6 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm - app.kubernetes.io/metrics: "cert-controller" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml index 685770016..7c8da3a62 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml @@ -9,7 +9,6 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm - app.kubernetes.io/metrics: "cert-controller" spec: replicas: 1 revisionHistoryLimit: 10 @@ -25,7 +24,6 @@ spec: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm - app.kubernetes.io/metrics: "cert-controller" spec: serviceAccountName: external-secrets-cert-controller automountServiceAccountToken: true diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml index 0b5687096..18a8827a0 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml @@ -9,7 +9,6 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm - app.kubernetes.io/metrics: "webhook" spec: replicas: 1 revisionHistoryLimit: 10 @@ -25,7 +24,6 @@ spec: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm - app.kubernetes.io/metrics: "webhook" spec: hostNetwork: false serviceAccountName: external-secrets-webhook diff --git a/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml index 82219ded6..3a64fd95a 100644 --- a/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml @@ -9,5 +9,4 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm - app.kubernetes.io/metrics: "webhook" external-secrets.io/component: webhook diff --git a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-cert-controller-metrics.yaml b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-cert-controller-metrics.yaml deleted file mode 100644 index 3c4e4f39d..000000000 --- a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-cert-controller-metrics.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: external-secrets-cert-controller-metrics - namespace: external-secrets - labels: - helm.sh/chart: external-secrets-2.2.0 - app.kubernetes.io/name: external-secrets-cert-controller - app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.2.0" - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/metrics: "cert-controller" -spec: - type: ClusterIP - ports: - - port: 8080 - protocol: TCP - targetPort: metrics - name: metrics - selector: - app.kubernetes.io/name: external-secrets-cert-controller - app.kubernetes.io/instance: external-secrets diff --git a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-metrics.yaml b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-metrics.yaml deleted file mode 100644 index 41610c675..000000000 --- a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-metrics.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: external-secrets-metrics - namespace: external-secrets - labels: - helm.sh/chart: external-secrets-2.2.0 - app.kubernetes.io/name: external-secrets - app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.2.0" - app.kubernetes.io/managed-by: Helm -spec: - type: ClusterIP - ports: - - port: 8080 - protocol: TCP - targetPort: metrics - name: metrics - selector: - app.kubernetes.io/name: external-secrets - app.kubernetes.io/instance: external-secrets diff --git a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml index d15aaea1d..82909d5ef 100644 --- a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml @@ -9,7 +9,6 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm - app.kubernetes.io/metrics: "webhook" external-secrets.io/component: webhook spec: type: ClusterIP @@ -18,10 +17,6 @@ spec: targetPort: webhook protocol: TCP name: webhook - - port: 8080 - protocol: TCP - targetPort: metrics - name: metrics selector: app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml index a440d6e75..7e790977a 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml @@ -9,4 +9,3 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm - app.kubernetes.io/metrics: "cert-controller" diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml index b131c913b..ea7232f1f 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml @@ -9,4 +9,3 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm - app.kubernetes.io/metrics: "webhook" diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-cert-controller-metrics.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-cert-controller-metrics.yaml deleted file mode 100644 index 771f4e2db..000000000 --- a/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-cert-controller-metrics.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: "monitoring.coreos.com/v1" -kind: ServiceMonitor -metadata: - labels: - helm.sh/chart: external-secrets-2.2.0 - app.kubernetes.io/name: external-secrets-cert-controller - app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.2.0" - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/metrics: "cert-controller" - name: external-secrets-cert-controller-metrics - namespace: "external-secrets" -spec: - selector: - matchLabels: - app.kubernetes.io/name: external-secrets-cert-controller - app.kubernetes.io/instance: external-secrets - app.kubernetes.io/metrics: "cert-controller" - namespaceSelector: - matchNames: - - external-secrets - endpoints: - - port: metrics - interval: 30s - scrapeTimeout: 25s - honorLabels: false diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-metrics.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-metrics.yaml deleted file mode 100644 index e288b8a49..000000000 --- a/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-metrics.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: "monitoring.coreos.com/v1" -kind: ServiceMonitor -metadata: - labels: - helm.sh/chart: external-secrets-2.2.0 - app.kubernetes.io/name: external-secrets - app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.2.0" - app.kubernetes.io/managed-by: Helm - name: external-secrets-metrics - namespace: "external-secrets" -spec: - selector: - matchLabels: - app.kubernetes.io/name: external-secrets - app.kubernetes.io/instance: external-secrets - namespaceSelector: - matchNames: - - external-secrets - endpoints: - - port: metrics - interval: 30s - scrapeTimeout: 25s - honorLabels: false diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-webhook-metrics.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-webhook-metrics.yaml deleted file mode 100644 index ede976d97..000000000 --- a/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-webhook-metrics.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: "monitoring.coreos.com/v1" -kind: ServiceMonitor -metadata: - labels: - helm.sh/chart: external-secrets-2.2.0 - app.kubernetes.io/name: external-secrets-webhook - app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.2.0" - app.kubernetes.io/managed-by: Helm - app.kubernetes.io/metrics: "webhook" - name: external-secrets-webhook-metrics - namespace: "external-secrets" -spec: - selector: - matchLabels: - app.kubernetes.io/name: external-secrets-webhook - app.kubernetes.io/instance: external-secrets - app.kubernetes.io/metrics: "webhook" - namespaceSelector: - matchNames: - - external-secrets - endpoints: - - port: metrics - interval: 30s - scrapeTimeout: 25s - honorLabels: false diff --git a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml index 079ad615d..752518916 100644 --- a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml @@ -8,7 +8,6 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm - app.kubernetes.io/metrics: "webhook" external-secrets.io/component: webhook webhooks: - name: "validate.externalsecret.external-secrets.io" diff --git a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml index 76eb26e34..8f476b6f3 100644 --- a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml @@ -8,7 +8,6 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm - app.kubernetes.io/metrics: "webhook" external-secrets.io/component: webhook webhooks: - name: "validate.secretstore.external-secrets.io" diff --git a/clusters/cl01tl/manifests/foldergram/HTTPRoute-foldergram.yaml b/clusters/cl01tl/manifests/foldergram/HTTPRoute-foldergram.yaml index c7eba8b09..40cf67f33 100644 --- a/clusters/cl01tl/manifests/foldergram/HTTPRoute-foldergram.yaml +++ b/clusters/cl01tl/manifests/foldergram/HTTPRoute-foldergram.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: foldergram diff --git a/clusters/cl01tl/manifests/garage/HTTPRoute-garage-s3.yaml b/clusters/cl01tl/manifests/garage/HTTPRoute-garage-s3.yaml index 1bb3373e5..4ee546b4e 100644 --- a/clusters/cl01tl/manifests/garage/HTTPRoute-garage-s3.yaml +++ b/clusters/cl01tl/manifests/garage/HTTPRoute-garage-s3.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: garage-s3 diff --git a/clusters/cl01tl/manifests/garage/HTTPRoute-garage-webui.yaml b/clusters/cl01tl/manifests/garage/HTTPRoute-garage-webui.yaml index 178f8442e..e5bbb5da4 100644 --- a/clusters/cl01tl/manifests/garage/HTTPRoute-garage-webui.yaml +++ b/clusters/cl01tl/manifests/garage/HTTPRoute-garage-webui.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: garage-webui diff --git a/clusters/cl01tl/manifests/grimmory/HTTPRoute-grimmory.yaml b/clusters/cl01tl/manifests/grimmory/HTTPRoute-grimmory.yaml index aaeb3ffe2..73ae7eb92 100644 --- a/clusters/cl01tl/manifests/grimmory/HTTPRoute-grimmory.yaml +++ b/clusters/cl01tl/manifests/grimmory/HTTPRoute-grimmory.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: grimmory diff --git a/clusters/cl01tl/manifests/home-assistant/HTTPRoute-home-assistant-code-server.yaml b/clusters/cl01tl/manifests/home-assistant/HTTPRoute-home-assistant-code-server.yaml index 1428ac4c4..2350e7cbe 100644 --- a/clusters/cl01tl/manifests/home-assistant/HTTPRoute-home-assistant-code-server.yaml +++ b/clusters/cl01tl/manifests/home-assistant/HTTPRoute-home-assistant-code-server.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: home-assistant-code-server diff --git a/clusters/cl01tl/manifests/home-assistant/HTTPRoute-home-assistant-main.yaml b/clusters/cl01tl/manifests/home-assistant/HTTPRoute-home-assistant-main.yaml index 426946033..f6b2272b8 100644 --- a/clusters/cl01tl/manifests/home-assistant/HTTPRoute-home-assistant-main.yaml +++ b/clusters/cl01tl/manifests/home-assistant/HTTPRoute-home-assistant-main.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: home-assistant-main diff --git a/clusters/cl01tl/manifests/homepage/HTTPRoute-homepage.yaml b/clusters/cl01tl/manifests/homepage/HTTPRoute-homepage.yaml index 5d2202791..985a7d55e 100644 --- a/clusters/cl01tl/manifests/homepage/HTTPRoute-homepage.yaml +++ b/clusters/cl01tl/manifests/homepage/HTTPRoute-homepage.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: homepage diff --git a/clusters/cl01tl/manifests/houndarr/HTTPRoute-houndarr.yaml b/clusters/cl01tl/manifests/houndarr/HTTPRoute-houndarr.yaml index 62ae196e1..34231d283 100644 --- a/clusters/cl01tl/manifests/houndarr/HTTPRoute-houndarr.yaml +++ b/clusters/cl01tl/manifests/houndarr/HTTPRoute-houndarr.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: houndarr diff --git a/clusters/cl01tl/manifests/immich/HTTPRoute-immich.yaml b/clusters/cl01tl/manifests/immich/HTTPRoute-immich.yaml index b8475cbe9..76e2b6d44 100644 --- a/clusters/cl01tl/manifests/immich/HTTPRoute-immich.yaml +++ b/clusters/cl01tl/manifests/immich/HTTPRoute-immich.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: immich diff --git a/clusters/cl01tl/manifests/jellyfin/HTTPRoute-jellyfin.yaml b/clusters/cl01tl/manifests/jellyfin/HTTPRoute-jellyfin.yaml index 5d5d2b096..14946a525 100644 --- a/clusters/cl01tl/manifests/jellyfin/HTTPRoute-jellyfin.yaml +++ b/clusters/cl01tl/manifests/jellyfin/HTTPRoute-jellyfin.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: jellyfin diff --git a/clusters/cl01tl/manifests/jellystat/HTTPRoute-jellystat.yaml b/clusters/cl01tl/manifests/jellystat/HTTPRoute-jellystat.yaml index c8c409790..a4f587fc0 100644 --- a/clusters/cl01tl/manifests/jellystat/HTTPRoute-jellystat.yaml +++ b/clusters/cl01tl/manifests/jellystat/HTTPRoute-jellystat.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: jellystat diff --git a/clusters/cl01tl/manifests/kiwix/HTTPRoute-kiwix.yaml b/clusters/cl01tl/manifests/kiwix/HTTPRoute-kiwix.yaml index 09c808dbb..6c931c9ab 100644 --- a/clusters/cl01tl/manifests/kiwix/HTTPRoute-kiwix.yaml +++ b/clusters/cl01tl/manifests/kiwix/HTTPRoute-kiwix.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: kiwix diff --git a/clusters/cl01tl/manifests/komodo/HTTPRoute-komodo.yaml b/clusters/cl01tl/manifests/komodo/HTTPRoute-komodo.yaml index de29d58ee..522f77454 100644 --- a/clusters/cl01tl/manifests/komodo/HTTPRoute-komodo.yaml +++ b/clusters/cl01tl/manifests/komodo/HTTPRoute-komodo.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: komodo diff --git a/clusters/cl01tl/manifests/languagetool/HTTPRoute-languagetool.yaml b/clusters/cl01tl/manifests/languagetool/HTTPRoute-languagetool.yaml index 362014d0b..81e83a5ef 100644 --- a/clusters/cl01tl/manifests/languagetool/HTTPRoute-languagetool.yaml +++ b/clusters/cl01tl/manifests/languagetool/HTTPRoute-languagetool.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: languagetool diff --git a/clusters/cl01tl/manifests/lidarr/HTTPRoute-lidarr.yaml b/clusters/cl01tl/manifests/lidarr/HTTPRoute-lidarr.yaml index 15c2fc97c..81bb66555 100644 --- a/clusters/cl01tl/manifests/lidarr/HTTPRoute-lidarr.yaml +++ b/clusters/cl01tl/manifests/lidarr/HTTPRoute-lidarr.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: lidarr diff --git a/clusters/cl01tl/manifests/medialyze/HTTPRoute-medialyze.yaml b/clusters/cl01tl/manifests/medialyze/HTTPRoute-medialyze.yaml index 598d376a7..004f53e04 100644 --- a/clusters/cl01tl/manifests/medialyze/HTTPRoute-medialyze.yaml +++ b/clusters/cl01tl/manifests/medialyze/HTTPRoute-medialyze.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: medialyze diff --git a/clusters/cl01tl/manifests/music-grabber/HTTPRoute-music-grabber.yaml b/clusters/cl01tl/manifests/music-grabber/HTTPRoute-music-grabber.yaml index a18a72973..375f40fa0 100644 --- a/clusters/cl01tl/manifests/music-grabber/HTTPRoute-music-grabber.yaml +++ b/clusters/cl01tl/manifests/music-grabber/HTTPRoute-music-grabber.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: music-grabber diff --git a/clusters/cl01tl/manifests/navidrome/HTTPRoute-navidrome-feishin.yaml b/clusters/cl01tl/manifests/navidrome/HTTPRoute-navidrome-feishin.yaml index 5ba9ce82d..e1ce6ed26 100644 --- a/clusters/cl01tl/manifests/navidrome/HTTPRoute-navidrome-feishin.yaml +++ b/clusters/cl01tl/manifests/navidrome/HTTPRoute-navidrome-feishin.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: navidrome-feishin diff --git a/clusters/cl01tl/manifests/navidrome/HTTPRoute-navidrome-main.yaml b/clusters/cl01tl/manifests/navidrome/HTTPRoute-navidrome-main.yaml index 4393df43f..71fef27d5 100644 --- a/clusters/cl01tl/manifests/navidrome/HTTPRoute-navidrome-main.yaml +++ b/clusters/cl01tl/manifests/navidrome/HTTPRoute-navidrome-main.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: navidrome-main diff --git a/clusters/cl01tl/manifests/ntfy/HTTPRoute-ntfy.yaml b/clusters/cl01tl/manifests/ntfy/HTTPRoute-ntfy.yaml index 568a1094c..f0ff14a89 100644 --- a/clusters/cl01tl/manifests/ntfy/HTTPRoute-ntfy.yaml +++ b/clusters/cl01tl/manifests/ntfy/HTTPRoute-ntfy.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: ntfy diff --git a/clusters/cl01tl/manifests/ollama/HTTPRoute-ollama.yaml b/clusters/cl01tl/manifests/ollama/HTTPRoute-ollama.yaml index 81f72195c..eaf411d18 100644 --- a/clusters/cl01tl/manifests/ollama/HTTPRoute-ollama.yaml +++ b/clusters/cl01tl/manifests/ollama/HTTPRoute-ollama.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: ollama diff --git a/clusters/cl01tl/manifests/omni-tools/HTTPRoute-omni-tools.yaml b/clusters/cl01tl/manifests/omni-tools/HTTPRoute-omni-tools.yaml index f39003c4f..d28d45675 100644 --- a/clusters/cl01tl/manifests/omni-tools/HTTPRoute-omni-tools.yaml +++ b/clusters/cl01tl/manifests/omni-tools/HTTPRoute-omni-tools.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: omni-tools diff --git a/clusters/cl01tl/manifests/paperless-ngx/HTTPRoute-paperless-ngx.yaml b/clusters/cl01tl/manifests/paperless-ngx/HTTPRoute-paperless-ngx.yaml index 4dc7a4c9f..1b13616a2 100644 --- a/clusters/cl01tl/manifests/paperless-ngx/HTTPRoute-paperless-ngx.yaml +++ b/clusters/cl01tl/manifests/paperless-ngx/HTTPRoute-paperless-ngx.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: paperless-ngx diff --git a/clusters/cl01tl/manifests/plex/HTTPRoute-plex.yaml b/clusters/cl01tl/manifests/plex/HTTPRoute-plex.yaml index 9e86b2585..186a20e34 100644 --- a/clusters/cl01tl/manifests/plex/HTTPRoute-plex.yaml +++ b/clusters/cl01tl/manifests/plex/HTTPRoute-plex.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: plex diff --git a/clusters/cl01tl/manifests/postiz/HTTPRoute-postiz.yaml b/clusters/cl01tl/manifests/postiz/HTTPRoute-postiz.yaml index 2e780179c..af951b6b2 100644 --- a/clusters/cl01tl/manifests/postiz/HTTPRoute-postiz.yaml +++ b/clusters/cl01tl/manifests/postiz/HTTPRoute-postiz.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: postiz diff --git a/clusters/cl01tl/manifests/prowlarr/HTTPRoute-prowlarr.yaml b/clusters/cl01tl/manifests/prowlarr/HTTPRoute-prowlarr.yaml index 112120dc7..ed225967a 100644 --- a/clusters/cl01tl/manifests/prowlarr/HTTPRoute-prowlarr.yaml +++ b/clusters/cl01tl/manifests/prowlarr/HTTPRoute-prowlarr.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: prowlarr diff --git a/clusters/cl01tl/manifests/qbittorrent/HTTPRoute-qbittorrent-main.yaml b/clusters/cl01tl/manifests/qbittorrent/HTTPRoute-qbittorrent-main.yaml index 5ccc8c469..2f3e082ee 100644 --- a/clusters/cl01tl/manifests/qbittorrent/HTTPRoute-qbittorrent-main.yaml +++ b/clusters/cl01tl/manifests/qbittorrent/HTTPRoute-qbittorrent-main.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: qbittorrent-main diff --git a/clusters/cl01tl/manifests/qbittorrent/HTTPRoute-qbittorrent-qui.yaml b/clusters/cl01tl/manifests/qbittorrent/HTTPRoute-qbittorrent-qui.yaml index 3f9d46717..bcbbd3b9a 100644 --- a/clusters/cl01tl/manifests/qbittorrent/HTTPRoute-qbittorrent-qui.yaml +++ b/clusters/cl01tl/manifests/qbittorrent/HTTPRoute-qbittorrent-qui.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: qbittorrent-qui diff --git a/clusters/cl01tl/manifests/radarr-4k/HTTPRoute-radarr-4k.yaml b/clusters/cl01tl/manifests/radarr-4k/HTTPRoute-radarr-4k.yaml index ad0b67c1c..32a7c0082 100644 --- a/clusters/cl01tl/manifests/radarr-4k/HTTPRoute-radarr-4k.yaml +++ b/clusters/cl01tl/manifests/radarr-4k/HTTPRoute-radarr-4k.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: radarr-4k diff --git a/clusters/cl01tl/manifests/radarr-anime/HTTPRoute-radarr-anime.yaml b/clusters/cl01tl/manifests/radarr-anime/HTTPRoute-radarr-anime.yaml index e33421c67..c817a7c00 100644 --- a/clusters/cl01tl/manifests/radarr-anime/HTTPRoute-radarr-anime.yaml +++ b/clusters/cl01tl/manifests/radarr-anime/HTTPRoute-radarr-anime.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: radarr-anime diff --git a/clusters/cl01tl/manifests/radarr-standup/HTTPRoute-radarr-standup.yaml b/clusters/cl01tl/manifests/radarr-standup/HTTPRoute-radarr-standup.yaml index 1edff47a2..4b91eb0b8 100644 --- a/clusters/cl01tl/manifests/radarr-standup/HTTPRoute-radarr-standup.yaml +++ b/clusters/cl01tl/manifests/radarr-standup/HTTPRoute-radarr-standup.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: radarr-standup diff --git a/clusters/cl01tl/manifests/radarr/HTTPRoute-radarr.yaml b/clusters/cl01tl/manifests/radarr/HTTPRoute-radarr.yaml index 72f9a2149..4186b94ff 100644 --- a/clusters/cl01tl/manifests/radarr/HTTPRoute-radarr.yaml +++ b/clusters/cl01tl/manifests/radarr/HTTPRoute-radarr.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: radarr diff --git a/clusters/cl01tl/manifests/roundcube/HTTPRoute-roundcube.yaml b/clusters/cl01tl/manifests/roundcube/HTTPRoute-roundcube.yaml index 06d840c71..873b37337 100644 --- a/clusters/cl01tl/manifests/roundcube/HTTPRoute-roundcube.yaml +++ b/clusters/cl01tl/manifests/roundcube/HTTPRoute-roundcube.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: roundcube diff --git a/clusters/cl01tl/manifests/searxng/HTTPRoute-searxng.yaml b/clusters/cl01tl/manifests/searxng/HTTPRoute-searxng.yaml index 4047148fc..5b9bcd87d 100644 --- a/clusters/cl01tl/manifests/searxng/HTTPRoute-searxng.yaml +++ b/clusters/cl01tl/manifests/searxng/HTTPRoute-searxng.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: searxng diff --git a/clusters/cl01tl/manifests/shelfmark/HTTPRoute-shelfmark.yaml b/clusters/cl01tl/manifests/shelfmark/HTTPRoute-shelfmark.yaml index 5ef923635..5fee43f1f 100644 --- a/clusters/cl01tl/manifests/shelfmark/HTTPRoute-shelfmark.yaml +++ b/clusters/cl01tl/manifests/shelfmark/HTTPRoute-shelfmark.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: shelfmark diff --git a/clusters/cl01tl/manifests/slskd/HTTPRoute-slskd.yaml b/clusters/cl01tl/manifests/slskd/HTTPRoute-slskd.yaml index 8203069a5..757be5f97 100644 --- a/clusters/cl01tl/manifests/slskd/HTTPRoute-slskd.yaml +++ b/clusters/cl01tl/manifests/slskd/HTTPRoute-slskd.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: slskd diff --git a/clusters/cl01tl/manifests/sonarr-4k/HTTPRoute-sonarr-4k.yaml b/clusters/cl01tl/manifests/sonarr-4k/HTTPRoute-sonarr-4k.yaml index 19ecfa515..d990ea045 100644 --- a/clusters/cl01tl/manifests/sonarr-4k/HTTPRoute-sonarr-4k.yaml +++ b/clusters/cl01tl/manifests/sonarr-4k/HTTPRoute-sonarr-4k.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: sonarr-4k diff --git a/clusters/cl01tl/manifests/sonarr-anime/HTTPRoute-sonarr-anime.yaml b/clusters/cl01tl/manifests/sonarr-anime/HTTPRoute-sonarr-anime.yaml index 5546810fd..001dba79a 100644 --- a/clusters/cl01tl/manifests/sonarr-anime/HTTPRoute-sonarr-anime.yaml +++ b/clusters/cl01tl/manifests/sonarr-anime/HTTPRoute-sonarr-anime.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: sonarr-anime diff --git a/clusters/cl01tl/manifests/sonarr/HTTPRoute-sonarr.yaml b/clusters/cl01tl/manifests/sonarr/HTTPRoute-sonarr.yaml index f0fe9e76b..fc34e63d3 100644 --- a/clusters/cl01tl/manifests/sonarr/HTTPRoute-sonarr.yaml +++ b/clusters/cl01tl/manifests/sonarr/HTTPRoute-sonarr.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: sonarr diff --git a/clusters/cl01tl/manifests/stalwart/HTTPRoute-stalwart.yaml b/clusters/cl01tl/manifests/stalwart/HTTPRoute-stalwart.yaml index 560d60223..db3f314f2 100644 --- a/clusters/cl01tl/manifests/stalwart/HTTPRoute-stalwart.yaml +++ b/clusters/cl01tl/manifests/stalwart/HTTPRoute-stalwart.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: stalwart diff --git a/clusters/cl01tl/manifests/tdarr/HTTPRoute-tdarr.yaml b/clusters/cl01tl/manifests/tdarr/HTTPRoute-tdarr.yaml index f360c3189..a91942053 100644 --- a/clusters/cl01tl/manifests/tdarr/HTTPRoute-tdarr.yaml +++ b/clusters/cl01tl/manifests/tdarr/HTTPRoute-tdarr.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: tdarr diff --git a/clusters/cl01tl/manifests/tubearchivist/HTTPRoute-tubearchivist.yaml b/clusters/cl01tl/manifests/tubearchivist/HTTPRoute-tubearchivist.yaml index 2dae0be37..2c1872d87 100644 --- a/clusters/cl01tl/manifests/tubearchivist/HTTPRoute-tubearchivist.yaml +++ b/clusters/cl01tl/manifests/tubearchivist/HTTPRoute-tubearchivist.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: tubearchivist diff --git a/clusters/cl01tl/manifests/whodb/HTTPRoute-whodb.yaml b/clusters/cl01tl/manifests/whodb/HTTPRoute-whodb.yaml index cbb3f60a6..146c6f813 100644 --- a/clusters/cl01tl/manifests/whodb/HTTPRoute-whodb.yaml +++ b/clusters/cl01tl/manifests/whodb/HTTPRoute-whodb.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: whodb diff --git a/clusters/cl01tl/manifests/yamtrack/HTTPRoute-yamtrack.yaml b/clusters/cl01tl/manifests/yamtrack/HTTPRoute-yamtrack.yaml index 0a8998409..738c48187 100644 --- a/clusters/cl01tl/manifests/yamtrack/HTTPRoute-yamtrack.yaml +++ b/clusters/cl01tl/manifests/yamtrack/HTTPRoute-yamtrack.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: yamtrack diff --git a/clusters/cl01tl/manifests/yubal/HTTPRoute-yubal.yaml b/clusters/cl01tl/manifests/yubal/HTTPRoute-yubal.yaml index ea6bb3dad..6fab154ff 100644 --- a/clusters/cl01tl/manifests/yubal/HTTPRoute-yubal.yaml +++ b/clusters/cl01tl/manifests/yubal/HTTPRoute-yubal.yaml @@ -1,4 +1,4 @@ -apiVersion: gateway.networking.k8s.io/v1 +apiVersion: gateway.networking.k8s.io/v1alpha2 kind: HTTPRoute metadata: name: yubal -- 2.49.1