No description
  • HCL 76.5%
  • Jinja 12.3%
  • Makefile 11.2%
Find a file
2025-11-17 12:30:33 +01:00
.gitsecret Add ASN blocking 2025-04-14 09:03:18 +02:00
ansible Add elrusc.casa domain 2025-11-17 12:30:33 +01:00
modules Ignore source_id 2025-05-24 20:38:34 +02:00
.gitignore Add ASN blocking 2025-04-14 09:03:18 +02:00
.opentofu-version Initial commit 2025-04-02 12:36:53 +02:00
.terraform.lock.hcl Add vault.aleix.cloud domain 2025-05-24 21:05:19 +02:00
backend.tf Initial commit 2025-04-02 12:36:53 +02:00
diagram.png Improve documentation 2025-04-14 09:21:41 +02:00
locals.tf Add elrusc.casa domain 2025-11-17 12:30:33 +01:00
main.tf Improve documentation 2025-04-14 09:21:41 +02:00
providers.tf Initial commit 2025-04-02 12:36:53 +02:00
README.md Improve documentation 2025-04-14 09:21:41 +02:00
terraform.tfvars.sample Improve documentation 2025-04-14 09:21:41 +02:00
terraform.tfvars.secret Improve documentation 2025-04-14 09:21:41 +02:00
variables.tf Initial commit 2025-04-02 12:36:53 +02:00

infra-ingress

This stack creates one (or multiple) Linux instances on Oracle Cloud Infrastructure (OCI) that will work as a reverse proxy, acting as a Cloudflare Tunnel replacement.

Routing

Each ingress instance is registered into my Tailscale network. Traffic between instances is done through Tailscale.

diagram

The ingress instance runs a Caddy service that maps each request to the corresponding backend service.

Terraform

This stack creates one or more Oracle Cloud instance(s), and creates their corresponding FQDNs (i0.aleix.cloud) on Cloudflare.

This stack also maps domains that needs to be routed, at the Cloudflare DNS level (without proxy).

Check locals.tf file, where instances and proxies are map.

Ansible

Check Ansible Documentation