Compare commits
26 Commits
a26d8d5ef9
...
renovate/g
Author | SHA1 | Date | |
---|---|---|---|
17bbf8710e | |||
1c3fdde1dd | |||
4582b19aaf | |||
fe46e81fd9 | |||
3064d4ec7a | |||
3aa05f3e30 | |||
a2cff0bf55 | |||
b54b6b0f60 | |||
e98d7330f1 | |||
08ed1eafa6 | |||
71d881830f | |||
18790396bd | |||
82fbc99fd0 | |||
2e88ded94d | |||
6251c63353 | |||
a62f8b93ea | |||
86d192d66e | |||
2dc36ce24e | |||
522922ff94 | |||
3d06570212 | |||
9c212b9dae | |||
819a21021c | |||
7f41a6590a | |||
1bf165bb4a | |||
a2228fce9a | |||
e41c4058d7 |
11
README.md
11
README.md
@@ -1,7 +1,7 @@
|
||||
# Kluster setup and IaaC using argoCD
|
||||
|
||||
|
||||
### Initial setup
|
||||
### Description
|
||||
#### Requirements:
|
||||
- A running k3s instance
|
||||
- `sealedsecrets` deployed
|
||||
@@ -27,20 +27,21 @@ The app-of-apps will bootstrap a fully featured cluster with the following compo
|
||||
- immich
|
||||
- ...
|
||||
|
||||
#### Recap
|
||||
- install sealedsecrets see [README](./infrastructure/sealedsecrets/README.md)
|
||||
## Setup instructions
|
||||
1. install sealedsecrets see [README](./infrastructure/sealedsecrets/README.md)
|
||||
```bash
|
||||
kubectl apply -k infrastructure/sealedsecrets
|
||||
kubectl apply -f infrastructure/sealedsecrets/main.key
|
||||
kubectl delete pod -n kube-system -l name=sealed-secrets-controller
|
||||
```
|
||||
- install argocd
|
||||
1. install argocd and the app-of-apps bundled with it
|
||||
```bash
|
||||
kubectl apply -k infrastructure/argocd
|
||||
```
|
||||
- wait...
|
||||
|
||||
|
||||
> NOTE: The argocd kustomization already mentions some CRDs available only after the full bootstrapping (traefik). You might have to apply the last step twice
|
||||
|
||||
### Adding an application
|
||||
todo
|
||||
|
||||
|
@@ -10,7 +10,7 @@ resources:
|
||||
images:
|
||||
- name: adguard/adguardhome
|
||||
newName: adguard/adguardhome
|
||||
newTag: v0.107.63
|
||||
newTag: v0.107.65
|
||||
|
||||
namespace: adguard
|
||||
|
||||
|
@@ -12,4 +12,4 @@ namespace: audiobookshelf
|
||||
images:
|
||||
- name: audiobookshelf
|
||||
newName: ghcr.io/advplyr/audiobookshelf
|
||||
newTag: "2.26.1"
|
||||
newTag: "2.26.3"
|
||||
|
@@ -12,4 +12,4 @@ namespace: code-server
|
||||
images:
|
||||
- name: code-server
|
||||
newName: ghcr.io/coder/code-server
|
||||
newTag: 4.101.2-fedora
|
||||
newTag: 4.103.2-fedora
|
||||
|
@@ -22,9 +22,9 @@ helmCharts:
|
||||
|
||||
images:
|
||||
- name: ghcr.io/immich-app/immich-machine-learning
|
||||
newTag: v1.135.3
|
||||
newTag: v1.136.0
|
||||
- name: ghcr.io/immich-app/immich-server
|
||||
newTag: v1.135.3
|
||||
newTag: v1.136.0
|
||||
|
||||
|
||||
patches:
|
||||
|
@@ -42,7 +42,7 @@ spec:
|
||||
name: curseforge-api
|
||||
key: key
|
||||
- name: CF_PAGE_URL
|
||||
value: "https://www.curseforge.com/minecraft/modpacks/vault-hunters-1-18-2/files/5925838"
|
||||
value: "https://www.curseforge.com/minecraft/modpacks/vault-hunters-1-18-2/files/6807187"
|
||||
- name: VERSION
|
||||
value: "1.18.2"
|
||||
- name: INIT_MEMORY
|
||||
|
@@ -21,4 +21,4 @@ images:
|
||||
newTag: "3.22"
|
||||
- name: rsync
|
||||
newName: eeacms/rsync
|
||||
newTag: "2.6"
|
||||
newTag: "2.7"
|
||||
|
@@ -21,7 +21,7 @@ helmCharts:
|
||||
- name: redis
|
||||
releaseName: redis
|
||||
repo: https://charts.bitnami.com/bitnami
|
||||
version: 21.2.12
|
||||
version: 21.2.14
|
||||
valuesInline:
|
||||
auth:
|
||||
enabled: false
|
||||
|
@@ -13,5 +13,5 @@ resources:
|
||||
|
||||
images:
|
||||
- name: mealie
|
||||
newTag: v3.0.1
|
||||
newTag: v3.0.2
|
||||
newName: ghcr.io/mealie-recipes/mealie
|
||||
|
@@ -14,4 +14,4 @@ namespace: stump
|
||||
images:
|
||||
- name: stump
|
||||
newName: aaronleopold/stump
|
||||
newTag: "0.0.10"
|
||||
newTag: "0.0.11"
|
||||
|
@@ -4,7 +4,7 @@ kind: Kustomization
|
||||
namespace: argocd
|
||||
resources:
|
||||
- namespace.yaml
|
||||
- https://github.com/argoproj/argo-cd//manifests/cluster-install?timeout=120&ref=v3.0.11
|
||||
- https://github.com/argoproj/argo-cd//manifests/cluster-install?timeout=120&ref=v3.0.12
|
||||
- ingress.yaml
|
||||
- argo-apps.application.yaml
|
||||
- bootstrap-repo.sealedsecret.yaml
|
||||
|
@@ -27,6 +27,6 @@ images:
|
||||
helmCharts:
|
||||
- name: authelia
|
||||
releaseName: authelia
|
||||
version: 0.10.41
|
||||
version: 0.10.42
|
||||
repo: https://charts.authelia.com
|
||||
valuesFile: authelia.values.yaml
|
||||
|
@@ -23,6 +23,6 @@ helmCharts:
|
||||
- name: gitea
|
||||
namespace: gitea # needs to be set explicitly for svc to be referenced correctly
|
||||
releaseName: gitea
|
||||
version: 12.0.0
|
||||
version: 12.1.2
|
||||
valuesFile: gitea.values.yaml
|
||||
repo: https://dl.gitea.io/charts/
|
||||
|
@@ -2,7 +2,6 @@ apiVersion: metallb.io/v1beta1
|
||||
kind: IPAddressPool
|
||||
metadata:
|
||||
name: default
|
||||
namespace: metallb-system
|
||||
spec:
|
||||
addresses:
|
||||
- 192.168.3.0/24
|
||||
@@ -10,5 +9,8 @@ spec:
|
||||
apiVersion: metallb.io/v1beta1
|
||||
kind: L2Advertisement
|
||||
metadata:
|
||||
name: empty
|
||||
namespace: metallb-system
|
||||
name: default
|
||||
# selector is left empty on purpose to match all IPAddressPools
|
||||
# spec:
|
||||
# ipAddressPools:
|
||||
# - default
|
||||
|
@@ -1,15 +1,12 @@
|
||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
resources:
|
||||
- namespace.yaml
|
||||
- ipaddresspool.yaml
|
||||
|
||||
namespace: metallb-system
|
||||
|
||||
resources:
|
||||
# - namespace.yaml
|
||||
# namespace is already included in the remote kustomization
|
||||
# - github.com/metallb/metallb/config/native?ref=v0.15.2
|
||||
- github.com/metallb/metallb/config/frr?ref=v0.15.2
|
||||
- ipaddresspool.yaml
|
||||
|
||||
helmCharts:
|
||||
- name: metallb
|
||||
repo: https://metallb.github.io/metallb
|
||||
version: 0.15.2
|
||||
releaseName: metallb
|
||||
valuesFile: values.yaml
|
||||
|
@@ -1,6 +1,6 @@
|
||||
apiVersion: v1
|
||||
kind: Namespace
|
||||
metadata:
|
||||
name: placeholder
|
||||
labels:
|
||||
pod-security.kubernetes.io/enforce: privileged
|
||||
name: metallb-system
|
||||
# labels:
|
||||
# pod-security.kubernetes.io/enforce: privileged
|
||||
|
@@ -6,7 +6,7 @@ namespace: monitoring
|
||||
resources:
|
||||
- namespace.yaml
|
||||
# prometheus-operator crds
|
||||
- https://github.com/prometheus-operator/prometheus-operator?ref=v0.83.0
|
||||
- https://github.com/prometheus-operator/prometheus-operator?ref=v0.84.0
|
||||
# single prometheus instance with a thanos sidecar
|
||||
- prometheus.yaml
|
||||
- thanos-store.statefulset.yaml
|
||||
@@ -17,7 +17,7 @@ resources:
|
||||
images:
|
||||
- name: thanos
|
||||
newName: quay.io/thanos/thanos
|
||||
newTag: v0.39.1
|
||||
newTag: v0.39.2
|
||||
|
||||
|
||||
helmCharts:
|
||||
@@ -29,5 +29,5 @@ helmCharts:
|
||||
- name: prometheus-node-exporter
|
||||
releaseName: prometheus-node-exporter
|
||||
repo: https://prometheus-community.github.io/helm-charts
|
||||
version: 4.47.1
|
||||
version: 4.47.3
|
||||
valuesFile: prometheus-node-exporter.values.yaml
|
||||
|
@@ -5,15 +5,15 @@ metadata:
|
||||
data:
|
||||
traefik.toml: |
|
||||
[ping]
|
||||
|
||||
|
||||
[global]
|
||||
checkNewVersion = false
|
||||
# renovate does that
|
||||
sendAnonymousUsage = false
|
||||
|
||||
|
||||
[log]
|
||||
level = "INFO"
|
||||
|
||||
|
||||
[accessLog]
|
||||
[accessLog.fields]
|
||||
defaultMode = "keep"
|
||||
@@ -41,17 +41,17 @@ data:
|
||||
dashboard = true
|
||||
insecure = true
|
||||
debug = false
|
||||
|
||||
|
||||
[providers]
|
||||
[providers.kubernetesCRD]
|
||||
allowCrossNamespace = true
|
||||
[providers.kubernetesIngress]
|
||||
allowExternalNameServices = true
|
||||
ingressClass = "traefik"
|
||||
ingressClass = "traefik"
|
||||
|
||||
[serversTransport]
|
||||
insecureSkipVerify = true
|
||||
|
||||
|
||||
[entryPoints]
|
||||
[entryPoints.web]
|
||||
address = ":8000"
|
||||
@@ -66,13 +66,13 @@ data:
|
||||
[entryPoints.websecure.forwardedHeaders]
|
||||
insecure = true
|
||||
# forward ip headers no matter where they come from
|
||||
|
||||
|
||||
[entryPoints.metrics]
|
||||
address = ":9100"
|
||||
|
||||
|
||||
[entryPoints.traefik]
|
||||
address = ":9000"
|
||||
|
||||
address = ":8080"
|
||||
|
||||
[entryPoints.dnsovertls]
|
||||
address = ":8853"
|
||||
# route dns over https to other pods but provide own certificate
|
||||
|
@@ -23,8 +23,7 @@ ingressClass:
|
||||
# true is not unit-testable yet, pending https://github.com/rancher/helm-unittest/pull/12
|
||||
enabled: true
|
||||
isDefaultClass: true
|
||||
# Use to force a networking.k8s.io API Version for certain CI/CD applications. E.g. "v1beta1"
|
||||
fallbackApiVersion: ""
|
||||
|
||||
|
||||
# Activate Pilot integration
|
||||
pilot:
|
||||
@@ -67,10 +66,11 @@ providers:
|
||||
kubernetesIngress:
|
||||
enabled: true
|
||||
allowExternalNameServices: true
|
||||
ingressClass: traefik
|
||||
# Ingresses missing the annotation, having an empty value, or the value traefik are processed by default.
|
||||
# ingressClass: traefik
|
||||
# labelSelector: environment=production,method=traefik
|
||||
|
||||
|
||||
|
||||
|
||||
# Additional volumeMounts to add to the Traefik container
|
||||
additionalVolumeMounts:
|
||||
|
Reference in New Issue
Block a user