add: Internal DNS for kavcorp.com domains via Pi-hole

- Added *.kavcorp.com DNS entries pointing to Traefik (10.4.2.10)
- Internal clients can use https://jellyfin.kavcorp.com with valid certs
- Same URLs work internally and externally, no port numbers needed
- Also added Traefik internal entrypoint on :8080 for .kav HTTP access

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
This commit is contained in:
2025-12-28 22:04:18 -05:00
parent e4506d6a07
commit 3f0c050ff6
2 changed files with 11 additions and 11 deletions

View File

@@ -4,12 +4,11 @@
## 2025-12-28
### Internal .kav Routing via Traefik
- Added Traefik `internal` entrypoint on port 8080 for .kav domain routing
- Created `/etc/traefik/conf.d/internal-kav.yaml` with routes for all services
- Updated Pi-hole DNS to point service .kav domains to Traefik (10.4.2.10)
- Services now accessible at `http://<service>.kav:8080/` without per-service ports
- Direct access retained for: Proxmox nodes, kavnas, docker hosts, mqtt, zwave
### Internal DNS for kavcorp.com Domains
- Added Pi-hole DNS entries for `*.kavcorp.com` pointing to Traefik (10.4.2.10)
- Internal clients can now access `https://jellyfin.kavcorp.com` etc. with valid Let's Encrypt certs
- No port numbers needed, same URLs work internally and externally
- Also added Traefik `internal` entrypoint on port 8080 for .kav HTTP access (optional)
### Guest VLAN Media Access
- Added firewall rules allowing Guest VLAN to access Jellyseerr (10.4.2.25) and Jellyfin (10.4.2.26)

View File

@@ -55,12 +55,13 @@
- `.local` - Conflicts with mDNS/Bonjour
- `.home.arpa` - RFC 8375 compliant but verbose
**Usage**: Services accessible via `http://<service>.kav:8080/` (routed through Traefik)
**Usage**:
- **HTTPS (recommended)**: `https://<service>.kavcorp.com` - valid Let's Encrypt certs, works internally and externally
- **HTTP (optional)**: `http://<service>.kav:8080/` - internal only, no certs needed
**Internal Routing via Traefik**:
- Pi-hole resolves `.kav` domains to Traefik (10.4.2.10)
- Traefik `internal` entrypoint on port 8080 routes to backend services
- No port numbers needed per-service, just use `:8080` for all
**Internal DNS Configuration**:
- Pi-hole resolves `*.kavcorp.com` to Traefik (10.4.2.10) for internal HTTPS access
- Pi-hole resolves `.kav` domains to Traefik for HTTP:8080 access
- Direct access (no Traefik): pm1-4.kav, elantris.kav, kavnas.kav, docker hosts, mqtt.kav, zwave.kav
### SSH Access Policy