Enable HTTPS with Let’s Encrypt DNS-01 Challenge in Traefik on Kubernetes
This post builds on my previous guide: Self-Managed Kubernetes Cluster on AWS (with Traefik & MetalLB) If you haven’t set […]
This post builds on my previous guide: Self-Managed Kubernetes Cluster on AWS (with Traefik & MetalLB) If you haven’t set […]
In this guide, we’ll configure HAProxy on OPNsense to support TLS passthrough with SNI-based routing. This allows secure HTTPS traffic
Generate the jenkins-kubeconfig.yaml: Sample pipeline using Kubernetes agent: Jenkins will now spin up pods in Kubernetes to execute jobs
Then, attach this instance profile to your EC2 instances Create a PersistentVolumeClaim (PVC) using the new StorageClass: Create a Pod
Architecture Overview: Edit /etc/containerd/config.toml and ensure: Set up kubectl: Configure MetalLB (10.0.128.240 is a secondary IP added to your control-plane
PART 1 — Set Up WireGuard on OPNsense PART 2 — Generate Client Key Pair & Config (Using OPNsense Peer
Overview Component Value Internal domain maksonlee.com DNS server IP 10.0.128.4 (OPNsense LAN IP) System DNS 127.0.0.1 (loopback) Forwarder AWS DNS
You’ll need this to allow OPNsense to modify DNS records for validation. You may need to re-login to the WebGUI
Architecture Overview: Interface Subnet Private IP Public IP WAN (ena0) test-subnet-public1-ap-south-1a 10.0.0.4 Yes LAN (ena1) test-subnet-private1-ap-south-1a 10.0.128.4 No ⚠️ Do