Skip to content

Commit 2c485ee

Browse files
committed
Update configuration and post metadata for improved clarity and SEO
- Changed baseurl in config.toml to reflect the new domain. - Updated disqusShortname for consistency with the new blog name. - Enhanced metadata for multiple posts, including slugs, descriptions, and image references. - Standardized tag casing across posts for uniformity. - Adjusted weights for better content organization in the blog.
1 parent 3642eff commit 2c485ee

File tree

12 files changed

+226
-21
lines changed

12 files changed

+226
-21
lines changed

config/_default/config.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
# Change baseurl before deploy
2-
baseurl = "https://demo.stack.jimmycai.com"
2+
baseurl = "https://rajsingh.info"
33
languageCode = "en-us"
44
title = "Raj Singh"
55

@@ -12,7 +12,7 @@ defaultContentLanguage = "en"
1212
hasCJKLanguage = false
1313

1414
# Change it to your Disqus shortname before using
15-
disqusShortname = "hugo-theme-stack"
15+
disqusShortname = "rajsingh-blog"
1616

1717
[pagination]
1818
pagerSize = 5

content/post/argocd-tailscale/index.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,13 @@
11
---
22
title: "Multi-Cluster Kubernetes Setup with Tailscale and ArgoCD"
33
date: 2025-05-06 00:00:00+0000
4+
slug: multi-cluster-kubernetes-setup-with-tailscale-and-argocd
5+
description: "Learn how to connect multiple Kubernetes clusters using Tailscale and manage them centrally with ArgoCD for seamless multi-cluster GitOps deployments"
6+
image: argo-clusters.png
47
draft: false
5-
tags: ["Kubernetes", "Tailscale", "ArgoCD", "Networking", "DevOps"]
8+
tags: ["kubernetes", "tailscale", "argocd", "networking", "devops"]
69
categories: ["Kubernetes", "Tailscale"]
10+
weight: 3
711
---
812

913
This guide focuses on configuring the Tailscale Kubernetes operator to expose Kubernetes API servers across multiple clusters for ArgoCD multi-cluster management.
@@ -78,7 +82,7 @@ For egress proxies to communicate with Kubernetes API servers exposed by the Tai
7882
### Why ACL Grants Are Required
7983

8084
Without proper ACL grants:
81-
1. Access to remote Kubernetes API servers will be blocked by Tailscale\'s access controls
85+
1. Access to remote Kubernetes API servers will be blocked by Tailscale's access controls
8286
2. Tailscale Egress proxies will be unable to manage resources across clusters
8387
3. Cross-cluster API server communication will fail with authentication errors
8488

@@ -126,7 +130,7 @@ DNS configuration is a critical component that enables your ArgoCD cluster to re
126130
2. Communication between clusters would fail as hostname resolution would not work
127131
3. ArgoCD would be unable to connect to remote Kubernetes API servers
128132

129-
The Tailscale DNS nameserver provides resolution for all nodes in your Tailnet, enabling seamless cross-cluster communication through Tailscale\'s private network.
133+
The Tailscale DNS nameserver provides resolution for all nodes in your Tailnet, enabling seamless cross-cluster communication through Tailscale's private network.
130134

131135
### Implementation
132136

content/post/byod-gatewayapi-tailscale/index.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,13 @@
11
---
22
title: "BYO Domain Gateway API Tailscale Operator"
33
date: 2025-05-21 00:00:00+0000
4+
slug: byo-domain-gateway-api-tailscale-operator
5+
description: "Use custom domains with Tailscale services by integrating Kubernetes Gateway API, ExternalDNS, and CertManager for automated DNS and TLS management"
6+
image: gateway-traffic.png
47
draft: false
5-
tags: ["Kubernetes", "Tailscale", "GatewayAPI", "Networking", "DevOps"]
8+
tags: ["kubernetes", "tailscale", "gatewayapi", "networking", "devops"]
69
categories: ["Kubernetes", "Tailscale"]
10+
weight: 2
711
---
812

913
While Tailscale excels at making services accessible via its managed `*.ts.net` domain names, using your own custom domain (like `hello.example.com`) for services exposed through the Tailscale Kubernetes operator requires a different approach. Tailscale itself doesn't manage DNS records or issue TLS certificates for domains it doesn't control. This guide presents a robust solution to this by integrating the Kubernetes Gateway API (specifically with Envoy Gateway) with ExternalDNS and CertManager. This combination allows you to seamlessly use your custom domains for services on your tailnet, complete with automated DNS and TLS management.

content/post/cluster-architecture/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ image: cover.png
77
categories:
88
- Kubernetes
99
tags:
10-
- Kubernetes
11-
weight: 1
10+
- kubernetes
11+
weight: 6
1212
draft: false
1313
---
1414

content/post/tailscale-operator/index.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@ categories:
88
- Kubernetes
99
- Tailscale
1010
tags:
11-
- Kubernetes
12-
- Tailscale
13-
- Networking
14-
- Security
15-
weight: 1
11+
- kubernetes
12+
- tailscale
13+
- networking
14+
- security
15+
weight: 5
1616
draft: false
1717
---
1818

content/post/tsflow-tailscale/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ image: tsflow.png
77
categories:
88
- Tailscale
99
tags:
10-
- Tailscale
11-
weight: 1
10+
- tailscale
11+
weight: 4
1212
draft: false
1313
---
1414

350 KB
Loading
187 KB
Loading
212 KB
Loading
11.8 MB
Binary file not shown.

0 commit comments

Comments
 (0)