Remove WireGuard integration from production deployment to simplify infrastructure: - Remove docker-compose-direct-access.yml (VPN-bound services) - Remove VPN-only middlewares from Grafana, Prometheus, Portainer - Remove WireGuard middleware definitions from Traefik - Remove WireGuard IPs (10.8.0.0/24) from Traefik forwarded headers All monitoring services now publicly accessible via subdomains: - grafana.michaelschiemer.de (with Grafana native auth) - prometheus.michaelschiemer.de (with Basic Auth) - portainer.michaelschiemer.de (with Portainer native auth) All services use Let's Encrypt SSL certificates via Traefik.
12 lines
165 B
Plaintext
12 lines
165 B
Plaintext
# WireGuard Client Configurations
|
|
# These contain private keys and should NEVER be committed!
|
|
|
|
*.conf
|
|
*.key
|
|
*.qr.txt
|
|
*.qr.png
|
|
|
|
# Allow README
|
|
!README.md
|
|
!.gitignore
|