feat: standardize traefik.docker.network labels across all docker-compose files
- Add traefik.docker.network=traefik-network label to all local services with traefik.enable=true - Ensures consistent network selection for Traefik IP discovery - Prevents routing conflicts when services are on multiple networks - Updated 12 docker-compose files with 32+ service labels - Maintains dual network access (homelab-network + traefik-network) for web UIs
This commit is contained in:
@@ -34,6 +34,7 @@ services:
|
|||||||
- "homelab.category=alternatives"
|
- "homelab.category=alternatives"
|
||||||
- "homelab.description=Docker container management UI (Alternative to Dockge)"
|
- "homelab.description=Docker container management UI (Alternative to Dockge)"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.portainer.rule=Host(`portainer.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.portainer.rule=Host(`portainer.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.portainer.entrypoints=websecure"
|
- "traefik.http.routers.portainer.entrypoints=websecure"
|
||||||
- "traefik.http.routers.portainer.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.portainer.tls.certresolver=letsencrypt"
|
||||||
@@ -73,6 +74,7 @@ services:
|
|||||||
- "homelab.category=alternatives"
|
- "homelab.category=alternatives"
|
||||||
- "homelab.description=SSO/Identity provider with web UI (Alternative to Authelia)"
|
- "homelab.description=SSO/Identity provider with web UI (Alternative to Authelia)"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.authentik.rule=Host(`authentik.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.authentik.rule=Host(`authentik.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.authentik.entrypoints=websecure"
|
- "traefik.http.routers.authentik.entrypoints=websecure"
|
||||||
- "traefik.http.routers.authentik.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.authentik.tls.certresolver=letsencrypt"
|
||||||
@@ -211,6 +213,7 @@ services:
|
|||||||
- "homelab.description=Alternative media streaming server to Jellyfin"
|
- "homelab.description=Alternative media streaming server to Jellyfin"
|
||||||
# Traefik labels - NO Authelia for app access
|
# Traefik labels - NO Authelia for app access
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.plex.rule=Host(`plex.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.plex.rule=Host(`plex.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.plex.entrypoints=websecure"
|
- "traefik.http.routers.plex.entrypoints=websecure"
|
||||||
- "traefik.http.routers.plex.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.plex.tls.certresolver=letsencrypt"
|
||||||
|
|||||||
@@ -50,6 +50,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.dockge.rule=Host(`dockge.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.dockge.rule=Host(`dockge.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.dockge.entrypoints=websecure"
|
- "traefik.http.routers.dockge.entrypoints=websecure"
|
||||||
- "traefik.http.routers.dockge.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.dockge.tls.certresolver=letsencrypt"
|
||||||
|
|||||||
@@ -76,6 +76,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.esphome.rule=Host(`esphome.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.esphome.rule=Host(`esphome.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.esphome.entrypoints=websecure"
|
- "traefik.http.routers.esphome.entrypoints=websecure"
|
||||||
- "traefik.http.routers.esphome.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.esphome.tls.certresolver=letsencrypt"
|
||||||
@@ -107,6 +108,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.tasmoadmin.rule=Host(`tasmoadmin.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.tasmoadmin.rule=Host(`tasmoadmin.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.tasmoadmin.entrypoints=websecure"
|
- "traefik.http.routers.tasmoadmin.entrypoints=websecure"
|
||||||
- "traefik.http.routers.tasmoadmin.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.tasmoadmin.tls.certresolver=letsencrypt"
|
||||||
@@ -139,6 +141,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.motioneye.rule=Host(`motioneye.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.motioneye.rule=Host(`motioneye.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.motioneye.entrypoints=websecure"
|
- "traefik.http.routers.motioneye.entrypoints=websecure"
|
||||||
- "traefik.http.routers.motioneye.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.motioneye.tls.certresolver=letsencrypt"
|
||||||
@@ -179,6 +182,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.nodered.rule=Host(`nodered.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.nodered.rule=Host(`nodered.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.nodered.entrypoints=websecure"
|
- "traefik.http.routers.nodered.entrypoints=websecure"
|
||||||
- "traefik.http.routers.nodered.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.nodered.tls.certresolver=letsencrypt"
|
||||||
|
|||||||
@@ -86,6 +86,7 @@ services:
|
|||||||
# - Routes are configured via external YAML files on the core server
|
# - Routes are configured via external YAML files on the core server
|
||||||
# - This prevents conflicts between Docker labels and file provider
|
# - This prevents conflicts between Docker labels and file provider
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.pihole.rule=Host(`pihole.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.pihole.rule=Host(`pihole.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.pihole.entrypoints=websecure"
|
- "traefik.http.routers.pihole.entrypoints=websecure"
|
||||||
- "traefik.http.routers.pihole.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.pihole.tls.certresolver=letsencrypt"
|
||||||
@@ -154,6 +155,7 @@ services:
|
|||||||
- "homelab.category=infrastructure"
|
- "homelab.category=infrastructure"
|
||||||
- "homelab.description=Real-time Docker log viewer"
|
- "homelab.description=Real-time Docker log viewer"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
# Router configuration
|
# Router configuration
|
||||||
- "traefik.http.routers.dozzle.rule=Host(`dozzle.jasper.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.dozzle.rule=Host(`dozzle.jasper.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.dozzle.entrypoints=websecure"
|
- "traefik.http.routers.dozzle.entrypoints=websecure"
|
||||||
@@ -206,6 +208,7 @@ services:
|
|||||||
- "homelab.category=infrastructure"
|
- "homelab.category=infrastructure"
|
||||||
- "homelab.description=System and Docker monitoring"
|
- "homelab.description=System and Docker monitoring"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
# Router configuration
|
# Router configuration
|
||||||
- "traefik.http.routers.glances.rule=Host(`glances.jasper.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.glances.rule=Host(`glances.jasper.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.glances.entrypoints=websecure"
|
- "traefik.http.routers.glances.entrypoints=websecure"
|
||||||
@@ -262,6 +265,7 @@ services:
|
|||||||
- "homelab.category=infrastructure"
|
- "homelab.category=infrastructure"
|
||||||
- "homelab.description=VS Code in browser"
|
- "homelab.description=VS Code in browser"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
# Router configuration
|
# Router configuration
|
||||||
- "traefik.http.routers.code-server.rule=Host(`code.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.code-server.rule=Host(`code.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.code-server.entrypoints=websecure"
|
- "traefik.http.routers.code-server.entrypoints=websecure"
|
||||||
|
|||||||
@@ -44,6 +44,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.sonarr.rule=Host(`sonarr.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.sonarr.rule=Host(`sonarr.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.sonarr.entrypoints=websecure"
|
- "traefik.http.routers.sonarr.entrypoints=websecure"
|
||||||
- "traefik.http.routers.sonarr.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.sonarr.tls.certresolver=letsencrypt"
|
||||||
@@ -89,6 +90,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.radarr.rule=Host(`radarr.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.radarr.rule=Host(`radarr.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.radarr.entrypoints=websecure"
|
- "traefik.http.routers.radarr.entrypoints=websecure"
|
||||||
- "traefik.http.routers.radarr.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.radarr.tls.certresolver=letsencrypt"
|
||||||
@@ -132,6 +134,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.prowlarr.rule=Host(`prowlarr.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.prowlarr.rule=Host(`prowlarr.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.prowlarr.entrypoints=websecure"
|
- "traefik.http.routers.prowlarr.entrypoints=websecure"
|
||||||
- "traefik.http.routers.prowlarr.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.prowlarr.tls.certresolver=letsencrypt"
|
||||||
@@ -171,6 +174,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.readarr.rule=Host(`readarr.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.readarr.rule=Host(`readarr.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.readarr.entrypoints=websecure"
|
- "traefik.http.routers.readarr.entrypoints=websecure"
|
||||||
- "traefik.http.routers.readarr.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.readarr.tls.certresolver=letsencrypt"
|
||||||
@@ -210,6 +214,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.lidarr.rule=Host(`lidarr.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.lidarr.rule=Host(`lidarr.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.lidarr.entrypoints=websecure"
|
- "traefik.http.routers.lidarr.entrypoints=websecure"
|
||||||
- "traefik.http.routers.lidarr.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.lidarr.tls.certresolver=letsencrypt"
|
||||||
@@ -250,6 +255,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.lazylibrarian.rule=Host(`lazylibrarian.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.lazylibrarian.rule=Host(`lazylibrarian.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.lazylibrarian.entrypoints=websecure"
|
- "traefik.http.routers.lazylibrarian.entrypoints=websecure"
|
||||||
- "traefik.http.routers.lazylibrarian.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.lazylibrarian.tls.certresolver=letsencrypt"
|
||||||
@@ -289,6 +295,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.mylar.rule=Host(`mylar.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.mylar.rule=Host(`mylar.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.mylar.entrypoints=websecure"
|
- "traefik.http.routers.mylar.entrypoints=websecure"
|
||||||
- "traefik.http.routers.mylar.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.mylar.tls.certresolver=letsencrypt"
|
||||||
@@ -331,6 +338,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.jellyseerr.rule=Host(`jellyseerr.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.jellyseerr.rule=Host(`jellyseerr.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.jellyseerr.entrypoints=websecure"
|
- "traefik.http.routers.jellyseerr.entrypoints=websecure"
|
||||||
- "traefik.http.routers.jellyseerr.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.jellyseerr.tls.certresolver=letsencrypt"
|
||||||
|
|||||||
@@ -61,6 +61,7 @@ services:
|
|||||||
- "homelab.category=media"
|
- "homelab.category=media"
|
||||||
- "homelab.description=Open-source media streaming server"
|
- "homelab.description=Open-source media streaming server"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
# Router configuration
|
# Router configuration
|
||||||
- "traefik.http.routers.jellyfin.rule=Host(`jellyfin.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.jellyfin.rule=Host(`jellyfin.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.jellyfin.entrypoints=websecure"
|
- "traefik.http.routers.jellyfin.entrypoints=websecure"
|
||||||
@@ -109,6 +110,7 @@ services:
|
|||||||
- "homelab.category=media"
|
- "homelab.category=media"
|
||||||
- "homelab.description=Ebook reader and library management"
|
- "homelab.description=Ebook reader and library management"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
# Router configuration
|
# Router configuration
|
||||||
- "traefik.http.routers.calibre.rule=Host(`calibre.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.calibre.rule=Host(`calibre.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.calibre.entrypoints=websecure"
|
- "traefik.http.routers.calibre.entrypoints=websecure"
|
||||||
|
|||||||
@@ -58,6 +58,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.prometheus.rule=Host(`prometheus.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.prometheus.rule=Host(`prometheus.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.prometheus.entrypoints=websecure"
|
- "traefik.http.routers.prometheus.entrypoints=websecure"
|
||||||
- "traefik.http.routers.prometheus.tls=true"
|
- "traefik.http.routers.prometheus.tls=true"
|
||||||
@@ -107,6 +108,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.grafana.rule=Host(`grafana.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.grafana.rule=Host(`grafana.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.grafana.entrypoints=websecure"
|
- "traefik.http.routers.grafana.entrypoints=websecure"
|
||||||
- "traefik.http.routers.grafana.tls=true"
|
- "traefik.http.routers.grafana.tls=true"
|
||||||
@@ -167,6 +169,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.cadvisor.rule=Host(`cadvisor.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.cadvisor.rule=Host(`cadvisor.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.cadvisor.entrypoints=websecure"
|
- "traefik.http.routers.cadvisor.entrypoints=websecure"
|
||||||
- "traefik.http.routers.cadvisor.tls=true"
|
- "traefik.http.routers.cadvisor.tls=true"
|
||||||
@@ -207,6 +210,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.uptime-kuma.rule=Host(`uptime-kuma.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.uptime-kuma.rule=Host(`uptime-kuma.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.uptime-kuma.entrypoints=websecure"
|
- "traefik.http.routers.uptime-kuma.entrypoints=websecure"
|
||||||
- "traefik.http.routers.uptime-kuma.tls=true"
|
- "traefik.http.routers.uptime-kuma.tls=true"
|
||||||
@@ -248,6 +252,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.loki.rule=Host(`loki.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.loki.rule=Host(`loki.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.loki.entrypoints=websecure"
|
- "traefik.http.routers.loki.entrypoints=websecure"
|
||||||
- "traefik.http.routers.loki.tls=true"
|
- "traefik.http.routers.loki.tls=true"
|
||||||
|
|||||||
@@ -59,6 +59,7 @@ services:
|
|||||||
- "homelab.category=productivity"
|
- "homelab.category=productivity"
|
||||||
- "homelab.description=File sync and collaboration"
|
- "homelab.description=File sync and collaboration"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
# Router configuration
|
# Router configuration
|
||||||
- "traefik.http.routers.nextcloud.rule=Host(`nextcloud.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.nextcloud.rule=Host(`nextcloud.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.nextcloud.entrypoints=websecure"
|
- "traefik.http.routers.nextcloud.entrypoints=websecure"
|
||||||
@@ -115,6 +116,7 @@ services:
|
|||||||
- "homelab.category=productivity"
|
- "homelab.category=productivity"
|
||||||
- "homelab.description=Recipe manager and meal planner"
|
- "homelab.description=Recipe manager and meal planner"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
# Router configuration
|
# Router configuration
|
||||||
- "traefik.http.routers.mealie.rule=Host(`mealie.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.mealie.rule=Host(`mealie.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.mealie.entrypoints=websecure"
|
- "traefik.http.routers.mealie.entrypoints=websecure"
|
||||||
@@ -160,6 +162,7 @@ services:
|
|||||||
- "homelab.category=productivity"
|
- "homelab.category=productivity"
|
||||||
- "homelab.description=Blog and website platform"
|
- "homelab.description=Blog and website platform"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
# Router configuration
|
# Router configuration
|
||||||
- "traefik.http.routers.wordpress.rule=Host(`wordpress.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.wordpress.rule=Host(`wordpress.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.wordpress.entrypoints=websecure"
|
- "traefik.http.routers.wordpress.entrypoints=websecure"
|
||||||
@@ -236,6 +239,7 @@ services:
|
|||||||
- "homelab.category=productivity"
|
- "homelab.category=productivity"
|
||||||
- "homelab.description=Self-hosted Git service"
|
- "homelab.description=Self-hosted Git service"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
# Router configuration
|
# Router configuration
|
||||||
- "traefik.http.routers.gitea.rule=Host(`gitea.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.gitea.rule=Host(`gitea.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.gitea.entrypoints=websecure"
|
- "traefik.http.routers.gitea.entrypoints=websecure"
|
||||||
@@ -302,6 +306,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.jupyter.rule=Host(`jupyter.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.jupyter.rule=Host(`jupyter.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.jupyter.entrypoints=websecure"
|
- "traefik.http.routers.jupyter.entrypoints=websecure"
|
||||||
- "traefik.http.routers.jupyter.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.jupyter.tls.certresolver=letsencrypt"
|
||||||
|
|||||||
@@ -35,6 +35,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.tdarr.rule=Host(`tdarr.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.tdarr.rule=Host(`tdarr.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.tdarr.entrypoints=websecure"
|
- "traefik.http.routers.tdarr.entrypoints=websecure"
|
||||||
- "traefik.http.routers.tdarr.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.tdarr.tls.certresolver=letsencrypt"
|
||||||
@@ -103,6 +104,7 @@ services:
|
|||||||
# If Traefik is on a remote server: these labels are NOT USED;
|
# If Traefik is on a remote server: these labels are NOT USED;
|
||||||
# configure external yml files in /traefik/dynamic folder instead.
|
# configure external yml files in /traefik/dynamic folder instead.
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
- "traefik.http.routers.unmanic.rule=Host(`unmanic.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.unmanic.rule=Host(`unmanic.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.unmanic.entrypoints=websecure"
|
- "traefik.http.routers.unmanic.entrypoints=websecure"
|
||||||
- "traefik.http.routers.unmanic.tls.certresolver=letsencrypt"
|
- "traefik.http.routers.unmanic.tls.certresolver=letsencrypt"
|
||||||
|
|||||||
@@ -42,6 +42,7 @@ services:
|
|||||||
- "homelab.category=utilities"
|
- "homelab.category=utilities"
|
||||||
- "homelab.description=Backup management with restic"
|
- "homelab.description=Backup management with restic"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
# Router configuration
|
# Router configuration
|
||||||
- "traefik.http.routers.backrest.rule=Host(`backrest.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.backrest.rule=Host(`backrest.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.backrest.entrypoints=websecure"
|
- "traefik.http.routers.backrest.entrypoints=websecure"
|
||||||
@@ -87,6 +88,7 @@ services:
|
|||||||
- "homelab.category=utilities"
|
- "homelab.category=utilities"
|
||||||
- "homelab.description=Backup software with encryption"
|
- "homelab.description=Backup software with encryption"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
# Router configuration
|
# Router configuration
|
||||||
- "traefik.http.routers.duplicati.rule=Host(`duplicati.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.duplicati.rule=Host(`duplicati.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.duplicati.entrypoints=websecure"
|
- "traefik.http.routers.duplicati.entrypoints=websecure"
|
||||||
|
|||||||
@@ -45,6 +45,7 @@ services:
|
|||||||
- "homelab.category=downloaders"
|
- "homelab.category=downloaders"
|
||||||
- "homelab.description=VPN client for secure downloads"
|
- "homelab.description=VPN client for secure downloads"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
# Router configuration
|
# Router configuration
|
||||||
- "traefik.http.routers.qbittorrent.rule=Host(`qbit.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.qbittorrent.rule=Host(`qbit.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.qbittorrent.entrypoints=websecure"
|
- "traefik.http.routers.qbittorrent.entrypoints=websecure"
|
||||||
|
|||||||
@@ -24,6 +24,7 @@ services:
|
|||||||
- "homelab.category=productivity"
|
- "homelab.category=productivity"
|
||||||
- "homelab.description=File-based wiki"
|
- "homelab.description=File-based wiki"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
# Router configuration
|
# Router configuration
|
||||||
- "traefik.http.routers.dokuwiki.rule=Host(`dokuwiki.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.dokuwiki.rule=Host(`dokuwiki.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.dokuwiki.entrypoints=websecure"
|
- "traefik.http.routers.dokuwiki.entrypoints=websecure"
|
||||||
@@ -75,6 +76,7 @@ services:
|
|||||||
- "homelab.category=productivity"
|
- "homelab.category=productivity"
|
||||||
- "homelab.description=Documentation and wiki platform"
|
- "homelab.description=Documentation and wiki platform"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
# Router configuration
|
# Router configuration
|
||||||
- "traefik.http.routers.bookstack.rule=Host(`bookstack.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.bookstack.rule=Host(`bookstack.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.bookstack.entrypoints=websecure"
|
- "traefik.http.routers.bookstack.entrypoints=websecure"
|
||||||
@@ -138,6 +140,7 @@ services:
|
|||||||
- "homelab.category=productivity"
|
- "homelab.category=productivity"
|
||||||
- "homelab.description=MediaWiki platform"
|
- "homelab.description=MediaWiki platform"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.docker.network=traefik-network"
|
||||||
# Router configuration
|
# Router configuration
|
||||||
- "traefik.http.routers.mediawiki.rule=Host(`mediawiki.kelinreij.duckdns.org`)"
|
- "traefik.http.routers.mediawiki.rule=Host(`mediawiki.kelinreij.duckdns.org`)"
|
||||||
- "traefik.http.routers.mediawiki.entrypoints=websecure"
|
- "traefik.http.routers.mediawiki.entrypoints=websecure"
|
||||||
|
|||||||
Reference in New Issue
Block a user