Commit Graph

28 Commits

Author SHA1 Message Date
f62c02a152 REVERT(repo): remove unused controllers yaml
- ArgoCD deployments are not managed by this repo
- Use 'kubectl scale' to disable unused controllers instead
2026-01-04 23:28:29 +09:00
00dcd5aeea CHORE(argocd): disable unused ArgoCD controllers
- notifications: Not using alerts
- applicationset: Not using ApplicationSet templates
- dex: Using Authelia SSO instead
- Saves ~200-300 MiB memory and removes 3-minute reconciliation loop
2026-01-04 23:28:29 +09:00
bce82706d3 CHORE(argocd): set argocd reconciliation interval
- to 24h
- Reduce memory usage from frequent reconciliation (was 3min default)
- 53 applications checked every 3min caused ~1GiB memory fluctuation
- Manual Refresh/Sync still available when needed
2026-01-04 23:28:29 +09:00
7ca0f35d92 REFACTOR(traefik): change traefik anti-affinity
- from hard to soft
- Use preferredDuringSchedulingIgnoredDuringExecution instead of
  required
- Allows pods to be scheduled on same node if necessary
- Still prefers distribution across nodes (weight: 100)
2026-01-04 23:28:29 +09:00
a1a04340a9 FEAT(traefik): enable cross-namespace middleware
- for Traefik 37.x
Traefik 37.x disables cross-namespace middleware references by default.
Added --providers.kubernetescrd.allowCrossNamespace=true to fix 404
errors
when using authelia middleware from kube-system namespace.
2026-01-04 23:28:29 +09:00
276510f299 FIX(traefik): enable traefik dashboard API
- insecure mode
Dashboard was returning 404 because api.insecure was set to false,
which disables the dashboard API on port 8080.
2026-01-04 23:28:29 +09:00
17b56a0368 CHORE(traefik): update dashboard port to 8080
- Update port number for Traefik v3 compatibility
- Change dashboard port configuration
2026-01-04 23:28:29 +09:00
95ced702aa REVERT(traefik): revert Traefik node affinity
- Revert node affinity changes due to CRD upgrade issues
- Fix scheduling problems
2026-01-04 23:28:29 +09:00
e9360cdc54 CHORE(traefik): exclude worker-1 from deploy
- Add node anti-affinity for worker-1
- Fix API issues on worker-1
2026-01-04 23:28:29 +09:00
408f1cc16b FEAT(authelia): add SSO to Vault and ArgoCD
- Add Authelia SSO to vault and argocd ingress
- Enable single sign-on authentication
2026-01-04 23:28:29 +09:00
fa5b6fd188 FEAT(traefik): add master node toleration
- for svclb-traefik
- Enables traefik LoadBalancer on master node with NoExecute taint
- Uses K3s svccontroller annotation for svclb tolerations
2026-01-04 23:28:29 +09:00
7772f6547f REFACTOR(authelia): remove kanidm
- and restore authelia
- Delete kanidm folder
- Remove oauth2-proxy from velero
- Restore velero ingress to use authelia middleware
- Update kustomization.yaml to use authelia instead of kanidm
2026-01-04 23:28:29 +09:00
f631b08375 REFACTOR(coredns): remove CoreDNS HelmChartConfig
- Not managed by Helm in this repo
- CoreDNS managed by K3s
2026-01-04 23:28:29 +09:00
d8011a4039 PERF(authentik): increase replicas for HA
- Traefik, CoreDNS, Authentik
- Traefik: 2 replicas
- CoreDNS: 2 replicas (new HelmChartConfig)
- Authentik: 2 replicas for server and worker
- Vault: Keep file storage (standalone)
2026-01-04 23:28:29 +09:00
eb76a4eb28 FEAT(traefik): add Traefik UI
- Add Traefik dashboard configuration
- Enable web UI access
2026-01-04 23:28:29 +09:00
59ae6fb777 REFACTOR(argocd): remove serversideapply
- from argocd applications
- Fixes OutOfSync issues caused by operator-added default values
- ServerSideApply causes stricter field management that conflicts with
  CRD defaults
2026-01-04 23:28:29 +09:00
d80a212e6e REFACTOR(traefik): switch from HAProxy
- to Traefik ingress controller
- Update all ingress files to use ingressClassName: traefik
- Update cert-manager ClusterIssuer to use traefik class
- Remove haproxy.org annotations from ingress files
- Update vault helm-values to use traefik
2026-01-04 23:28:29 +09:00
f2325ffcc9 REFACTOR(gitea): migrate repoURL to GitHub
- Update repository URL to GitHub
- Change source control provider
2026-01-04 23:28:29 +09:00
a3f5f038b2 FIX(argocd): restore namespace.yaml for ArgoCD
- Restore namespace configuration for ArgoCD
- Special case for ArgoCD namespace
2026-01-04 23:28:29 +09:00
1d7970a42f REFACTOR(goldilocks): use managedNS for labels
- Remove namespace.yaml files
- Add managedNamespaceMetadata with Goldilocks label
- Set CreateNamespace=true in syncOptions
- Update kustomization.yaml to remove namespace.yaml references
2026-01-04 23:28:29 +09:00
521d5491ff FEAT(cert-manager): integrate cert-manager
- Add cert-manager configuration
- Enable TLS certificate management
2026-01-04 23:28:29 +09:00
7955466676 FIX(argocd): helm valueFiles paths in ArgoCD
- Applications
- Update valueFiles paths from helm-values/<app>.yaml to helm-
  values.yaml
- Fixes ComparisonError after folder restructuring

Applications fixed:
- cert-manager
- cnpg
- external-secrets
- vault
- vpa
- velero
2025-12-29 02:29:50 +09:00
ce2ee8d39e REFACTOR(repo): restructure infra folder structure
- Remove argocd/, helm-values/, ingress/ subdirectories
- Move files to parent directory with standardized names
- Add namespace.yaml to all apps with Goldilocks labels
- Preserve vault/ subdirectories (falco, velero)
- Update main kustomization.yaml to reference argocd.yaml files directly
- Comment out argocd.yaml in each app's kustomization.yaml to prevent
  circular reference

Applications restructured:
- cert-manager (2 ArgoCD apps)
- external-secrets
- reloader
- vault (2 ArgoCD apps)
- velero (2 ArgoCD apps)
- falco
- cnpg
- haproxy
- metallb
- vpa
- argocd
2025-12-29 02:21:00 +09:00
0c79aea82f FIX(cert-manager): cert-manager
- to use haproxy ingress class
Changed from nginx to haproxy to match the current ingress controller.
This resolves the ArgoCD sync loop in cluster-infrastructure.
2025-12-28 16:46:43 +09:00
157e69d9cb CHORE(traefik): split centralized ingress to per-application
- Moved ArgoCD ingress to argocd/ingress/
- Moved Velero ingress to velero/ingress/
- Removed centralized ingress/ingresses.yaml
- Each application now manages its own ingress independently
2025-12-25 20:20:35 +09:00
bdf974ac3e FEAT(argocd): add argocd insecure mode config
- Created argocd-cmd-params-cm ConfigMap
- Set server.insecure: true to fix redirect loop
- ArgoCD will run in insecure mode (ingress handles TLS)
2025-12-25 20:01:19 +09:00
ed6410ee90 CHORE(argocd): update ArgoCD applications to point to cluster-infrastructure
- Update repoURL to cluster-infrastructure repo
- Change source repository reference
2025-12-17 15:12:46 +09:00
8c43c992f0 INIT(repo): cluster infrastructure setup 2025-12-17 15:04:56 +09:00