Compare commits
254 Commits
d6ce07a8a0
...
feature/cr
Author | SHA1 | Date | |
---|---|---|---|
c6c744a3f3 | |||
8805fb0b78 | |||
804adb989e | |||
721e3e2c72 | |||
aeb54dd2c5 | |||
36aa358613 | |||
62d03494e6 | |||
645c347667 | |||
0287c5eb0e | |||
eace4c4f28 | |||
c81bbac2c5 | |||
88e9ebc916 | |||
06b7b25ef7 | |||
ee9334e753 | |||
dc30937c5e | |||
4a6d126f8e | |||
968303ea38 | |||
5148aca7ef | |||
3b4b9ae7c5 | |||
dc59884e66 | |||
bb133d1061 | |||
ad9dedb009 | |||
a44e84b8cb | |||
37532f10ce | |||
888bd97c97 | |||
73feabe55c | |||
8fc72e3164 | |||
7b392ac739 | |||
a94389bdcc | |||
3fa6e211fd | |||
acd8c0e26a | |||
7e989229ce | |||
3d4319377e | |||
e1024cadba | |||
140aca08da | |||
39de895f4c | |||
0011cdb33a | |||
a85bbd0400 | |||
0be3ea17ca | |||
21cef5b45a | |||
07c3a0f086 | |||
4f3e35acf8 | |||
b81eee425e | |||
1a8f52cc58 | |||
4fb7234df8 | |||
ba4900c257 | |||
9f939b16bc | |||
173f7a319c | |||
284dff3040 | |||
b4529f52fe | |||
6eac191db3 | |||
ed53eeef71 | |||
b10aced1e1 | |||
6fcd66ff71 | |||
60077df128 | |||
dacb84ee59 | |||
40146b69d8 | |||
1a3cd7febd | |||
fad28554bb | |||
d921738728 | |||
f012b6979c | |||
3bb863dd07 | |||
11ab97db50 | |||
59bc6540c6 | |||
fd6e5f50de | |||
bc0a4186b3 | |||
730f8b5121 | |||
86911f133f | |||
de9ac31dbe | |||
73b9e609dd | |||
ae94d3a9a7 | |||
d077b8fdd8 | |||
122e219397 | |||
49073861bc | |||
7ba629e826 | |||
7a872b76f8 | |||
e5fa3f2072 | |||
9d1160208f | |||
232952b63e | |||
79aee6b145 | |||
a88968f192 | |||
8316e39ff7 | |||
61802b7ec0 | |||
87ea82b16d | |||
2596d698d4 | |||
f7b046844e | |||
b0a802bffc | |||
b1e3288b94 | |||
02bb4d9f76 | |||
86ac349c5d | |||
686525eeff | |||
39d351e8a1 | |||
c152fd117d | |||
6958253c96 | |||
16074c2026 | |||
fd00dbf893 | |||
513b845de1 | |||
a96472553b | |||
55ef4aa6df | |||
b0a6e5fa08 | |||
ab63d1b819 | |||
f3a1e927ff | |||
6f29475d25 | |||
e988f55ba8 | |||
bb259be422 | |||
ac45bb0958 | |||
e3580c6170 | |||
a801d8ffa8 | |||
53d6029e84 | |||
239e2fdf49 | |||
ae45a87b8a | |||
9cabd42c53 | |||
d45374fe4a | |||
e350de1a3e | |||
8eb64ff444 | |||
e8b786e210 | |||
37dfd07ea9 | |||
0f872ec949 | |||
3b1ab8e595 | |||
e35da6fc63 | |||
da4363262c | |||
ebc787030f | |||
5b2cc939a5 | |||
f45faf4509 | |||
7433dd17f4 | |||
055d091447 | |||
1aa86ef16c | |||
dd5e738cab | |||
7e5a1afb90 | |||
175817190c | |||
31141c6ef1 | |||
e581c3a488 | |||
4ce4e816c1 | |||
f50a2a61fc | |||
ee6e4f1e32 | |||
40454d871f | |||
e503ae6d30 | |||
5233956a09 | |||
e7118e9182 | |||
e79da15d16 | |||
1bcaafd14e | |||
6a10c8a908 | |||
7f61158564 | |||
2f17e6d47a | |||
466d58b26b | |||
03f873ecf4 | |||
56cca145b4 | |||
3ecd55787a | |||
45e46cf6e9 | |||
c19d6d8244 | |||
c5250c5a45 | |||
e70c1c9685 | |||
b5d6f28178 | |||
14a54e691d | |||
d6eb7b8f84 | |||
025e0c4ff1 | |||
d76455787a | |||
252b732bd8 | |||
93ca89060c | |||
8e043fdd58 | |||
d87b8bcff2 | |||
4be1c00592 | |||
9b1303d10e | |||
36f2596dfb | |||
abf59c480f | |||
c521a23a16 | |||
b646968c16 | |||
a1afc7d736 | |||
799d084471 | |||
511ed7e78d | |||
0d1d10a103 | |||
de667a31ad | |||
ef2b1d393d | |||
0402d54fda | |||
d80dfc35fd | |||
9d47443573 | |||
806b42874c | |||
3c71ac8411 | |||
c2db5eb712 | |||
040771494a | |||
57c57b7620 | |||
a41ec520a2 | |||
9057768561 | |||
db3dc9a8af | |||
31a968ef87 | |||
9778d796a9 | |||
7a44938d6d | |||
689038a808 | |||
88ca15d995 | |||
249b335ccb | |||
8c33c50457 | |||
4f1cbbabe6 | |||
4f4e6bdf13 | |||
ebbece048e | |||
9987aa9d0b | |||
14cc093e51 | |||
18576ff7f2 | |||
bee9243407 | |||
8223b336ed | |||
1fd0da6778 | |||
6be344fc8d | |||
d46ee3894e | |||
b282f363ce | |||
4b494642f5 | |||
08c508862f | |||
3d63498b25 | |||
4ef6b01a92 | |||
7cf2c9c479 | |||
a11f3e24f8 | |||
adff6180ea | |||
99dd81531e | |||
4f18adf1da | |||
7e3f8a2764 | |||
3a94d7a7b7 | |||
9f8ae4b0fa | |||
d53ee0079e | |||
f844eb8caa | |||
fb645058ac | |||
261790e329 | |||
645c8edde7 | |||
c7b52155ac | |||
46a2c8998e | |||
fbba22cb07 | |||
f03c76c53b | |||
c7f5cb8773 | |||
206f8e4c50 | |||
03df5e4663 | |||
72906d205b | |||
c6f7471ebb | |||
a3550d10cb | |||
f22d25b101 | |||
b7b9afa1a5 | |||
835f05866c | |||
1aa2e55f22 | |||
3c777a92c0 | |||
7d893d27ec | |||
d0fcf951cc | |||
1e9959e3d1 | |||
ce821b6abe | |||
1de224ea77 | |||
103f4c8a9f | |||
124881d3a8 | |||
0b5d2a5fe6 | |||
332082c9fc | |||
0eaa9fe774 | |||
192e2e869f | |||
0fd9936db5 | |||
1a9d0fc00c | |||
a8dfca3c43 | |||
42e2bc35a5 | |||
7e2e5a56db | |||
01279dd023 | |||
5f1dcaabba | |||
37bdb32f43 |
6
.gitmodules
vendored
6
.gitmodules
vendored
@@ -1,6 +0,0 @@
|
|||||||
[submodule "infrastructure/external-dns/octodns"]
|
|
||||||
path = infrastructure/external-dns/octodns
|
|
||||||
url = ssh://git@git.kluster.moll.re:2222/remoll/dns.git
|
|
||||||
[submodule "apps/monitoring/dashboards"]
|
|
||||||
path = apps/monitoring/dashboards
|
|
||||||
url = ssh://git@git.kluster.moll.re:2222/remoll/grafana-dashboards.git
|
|
@@ -10,7 +10,7 @@ resources:
|
|||||||
images:
|
images:
|
||||||
- name: adguard/adguardhome
|
- name: adguard/adguardhome
|
||||||
newName: adguard/adguardhome
|
newName: adguard/adguardhome
|
||||||
newTag: v0.107.48
|
newTag: v0.107.53
|
||||||
|
|
||||||
namespace: adguard
|
namespace: adguard
|
||||||
|
|
||||||
|
42
apps/audiobookshelf/deployment.yaml
Normal file
42
apps/audiobookshelf/deployment.yaml
Normal file
@@ -0,0 +1,42 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: audiobookshelf
|
||||||
|
spec:
|
||||||
|
replicas: 1
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: audiobookshelf
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: audiobookshelf
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: audiobookshelf
|
||||||
|
image: audiobookshelf
|
||||||
|
ports:
|
||||||
|
- containerPort: 80
|
||||||
|
|
||||||
|
env:
|
||||||
|
- name: TZ
|
||||||
|
value: Europe/Berlin
|
||||||
|
- name: CONFIG_PATH
|
||||||
|
value: /data/config
|
||||||
|
- name: METADATA_PATH
|
||||||
|
value: /data/metadata
|
||||||
|
volumeMounts:
|
||||||
|
- name: data
|
||||||
|
mountPath: /data
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
cpu: "100m"
|
||||||
|
memory: "200Mi"
|
||||||
|
limits:
|
||||||
|
cpu: "2"
|
||||||
|
memory: "1Gi"
|
||||||
|
volumes:
|
||||||
|
- name: data
|
||||||
|
persistentVolumeClaim:
|
||||||
|
claimName: audiobookshelf-data
|
||||||
|
|
17
apps/audiobookshelf/ingress.yaml
Normal file
17
apps/audiobookshelf/ingress.yaml
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
apiVersion: traefik.io/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: audiobookshelf-ingressroute
|
||||||
|
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host(`audiobookshelf.kluster.moll.re`)
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: audiobookshelf-web
|
||||||
|
port: 80
|
||||||
|
|
||||||
|
tls:
|
||||||
|
certResolver: default-tls
|
@@ -1,17 +1,15 @@
|
|||||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
kind: Kustomization
|
kind: Kustomization
|
||||||
|
resources:
|
||||||
namespace: homepage
|
|
||||||
|
|
||||||
resources:
|
|
||||||
- namespace.yaml
|
- namespace.yaml
|
||||||
|
- pvc.yaml
|
||||||
- deployment.yaml
|
- deployment.yaml
|
||||||
- service.yaml
|
- service.yaml
|
||||||
- configmap.yaml
|
|
||||||
- ingress.yaml
|
- ingress.yaml
|
||||||
|
|
||||||
|
namespace: audiobookshelf
|
||||||
|
|
||||||
images:
|
images:
|
||||||
- name: homepage
|
- name: audiobookshelf
|
||||||
newName: ghcr.io/gethomepage/homepage
|
newName: ghcr.io/advplyr/audiobookshelf
|
||||||
newTag: v0.8.12
|
newTag: "2.15.0"
|
11
apps/audiobookshelf/pvc.yaml
Normal file
11
apps/audiobookshelf/pvc.yaml
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
kind: PersistentVolumeClaim
|
||||||
|
apiVersion: v1
|
||||||
|
metadata:
|
||||||
|
name: audiobookshelf-data
|
||||||
|
spec:
|
||||||
|
storageClassName: "nfs-client"
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteOnce
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: 10Gi
|
10
apps/audiobookshelf/service.yaml
Normal file
10
apps/audiobookshelf/service.yaml
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: audiobookshelf-web
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
app: audiobookshelf
|
||||||
|
ports:
|
||||||
|
- port: 80
|
||||||
|
targetPort: 80
|
@@ -13,4 +13,4 @@ namespace: files
|
|||||||
images:
|
images:
|
||||||
- name: ocis
|
- name: ocis
|
||||||
newName: owncloud/ocis
|
newName: owncloud/ocis
|
||||||
newTag: "5.0.3"
|
newTag: "5.0.8"
|
||||||
|
File diff suppressed because one or more lines are too long
@@ -13,4 +13,4 @@ resources:
|
|||||||
images:
|
images:
|
||||||
- name: actualbudget
|
- name: actualbudget
|
||||||
newName: actualbudget/actual-server
|
newName: actualbudget/actual-server
|
||||||
newTag: 24.5.0
|
newTag: 24.10.1
|
||||||
|
@@ -15,4 +15,4 @@ resources:
|
|||||||
images:
|
images:
|
||||||
- name: homeassistant/home-assistant
|
- name: homeassistant/home-assistant
|
||||||
newName: homeassistant/home-assistant
|
newName: homeassistant/home-assistant
|
||||||
newTag: "2024.5"
|
newTag: "2024.10"
|
||||||
|
@@ -2,6 +2,8 @@ apiVersion: v1
|
|||||||
kind: Service
|
kind: Service
|
||||||
metadata:
|
metadata:
|
||||||
name: homeassistant-web
|
name: homeassistant-web
|
||||||
|
labels:
|
||||||
|
app: homeassistant
|
||||||
spec:
|
spec:
|
||||||
selector:
|
selector:
|
||||||
app: homeassistant
|
app: homeassistant
|
||||||
|
@@ -1,98 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: ConfigMap
|
|
||||||
metadata:
|
|
||||||
name: config
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: homepage
|
|
||||||
data:
|
|
||||||
kubernetes.yaml: "" #|
|
|
||||||
# mode: cluster
|
|
||||||
settings.yaml: |
|
|
||||||
title: "Homepage"
|
|
||||||
background: https://images.unsplash.com/photo-1547327132-5d20850c62b5?q=80&w=3870&auto=format&fit=crop
|
|
||||||
cardBlur: sm
|
|
||||||
#settings.yaml: |
|
|
||||||
# providers:
|
|
||||||
# longhorn:
|
|
||||||
# url: https://longhorn.my.network
|
|
||||||
custom.css: ""
|
|
||||||
custom.js: ""
|
|
||||||
bookmarks.yaml: |
|
|
||||||
- Developer:
|
|
||||||
- Github:
|
|
||||||
- abbr: GH
|
|
||||||
href: https://github.com/moll-re
|
|
||||||
services.yaml: |
|
|
||||||
- Media:
|
|
||||||
- Jellyfin backend:
|
|
||||||
href: https://media-backend.kluster.moll.re
|
|
||||||
ping: media-backend.kluster.moll.re
|
|
||||||
- Jellyfin vue:
|
|
||||||
href: https://media.kluster.moll.re
|
|
||||||
ping: media.kluster.moll.re
|
|
||||||
- Immich:
|
|
||||||
href: https://immich.kluster.moll.re
|
|
||||||
ping: immich.kluster.moll.re
|
|
||||||
|
|
||||||
- Productivity:
|
|
||||||
- OwnCloud:
|
|
||||||
href: https://ocis.kluster.moll.re
|
|
||||||
ping: ocis.kluster.moll.re
|
|
||||||
- ToDo:
|
|
||||||
href: https://todos.kluster.moll.re
|
|
||||||
ping: todos.kluster.moll.re
|
|
||||||
- Finance:
|
|
||||||
href: https://finance.kluster.moll.re
|
|
||||||
ping: finance.kluster.moll.re
|
|
||||||
|
|
||||||
- Home:
|
|
||||||
- Home Assistant:
|
|
||||||
href: https://home.kluster.moll.re
|
|
||||||
ping: home.kluster.moll.re
|
|
||||||
- Grafana:
|
|
||||||
href: https://grafana.kluster.moll.re
|
|
||||||
ping: grafana.kluster.moll.re
|
|
||||||
- Recipes:
|
|
||||||
href: https://recipes.kluster.moll.re
|
|
||||||
ping: recipes.kluster.moll.re
|
|
||||||
|
|
||||||
- Infra:
|
|
||||||
- Gitea:
|
|
||||||
href: https://git.kluster.moll.re
|
|
||||||
ping: git.kluster.moll.re
|
|
||||||
- ArgoCD:
|
|
||||||
href: https://argocd.kluster.moll.re
|
|
||||||
ping: argocd.kluster.moll.re
|
|
||||||
|
|
||||||
widgets.yaml: |
|
|
||||||
# - kubernetes:
|
|
||||||
# cluster:
|
|
||||||
# show: true
|
|
||||||
# cpu: true
|
|
||||||
# memory: true
|
|
||||||
# showLabel: true
|
|
||||||
# label: "cluster"
|
|
||||||
# nodes:
|
|
||||||
# show: true
|
|
||||||
# cpu: true
|
|
||||||
# memory: true
|
|
||||||
# showLabel: true
|
|
||||||
- search:
|
|
||||||
provider: duckduckgo
|
|
||||||
- openmeteo:
|
|
||||||
label: Zürich # optional
|
|
||||||
latitude: 47.24236
|
|
||||||
longitude: 8.30439
|
|
||||||
units: metric # or imperial
|
|
||||||
cache: 30 # Time in minutes to cache API responses, to stay within limits
|
|
||||||
format: # optional, Intl.NumberFormat options
|
|
||||||
maximumFractionDigits: 1
|
|
||||||
- datetime:
|
|
||||||
locale: de
|
|
||||||
format:
|
|
||||||
dateStyle: long
|
|
||||||
timeStyle: short
|
|
||||||
- adguard:
|
|
||||||
url: http://adguard-home-web.adguard-home:3000
|
|
||||||
|
|
||||||
docker.yaml: ""
|
|
@@ -1,64 +0,0 @@
|
|||||||
apiVersion: apps/v1
|
|
||||||
kind: Deployment
|
|
||||||
metadata:
|
|
||||||
name: homepage
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: homepage
|
|
||||||
spec:
|
|
||||||
revisionHistoryLimit: 3
|
|
||||||
replicas: 1
|
|
||||||
strategy:
|
|
||||||
type: RollingUpdate
|
|
||||||
selector:
|
|
||||||
matchLabels:
|
|
||||||
app.kubernetes.io/name: homepage
|
|
||||||
template:
|
|
||||||
metadata:
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: homepage
|
|
||||||
spec:
|
|
||||||
# serviceAccountName: homepage
|
|
||||||
# automountServiceAccountToken: true
|
|
||||||
dnsPolicy: ClusterFirst
|
|
||||||
# enableServiceLinks: true
|
|
||||||
containers:
|
|
||||||
- name: homepage
|
|
||||||
image: homepage
|
|
||||||
imagePullPolicy: Always
|
|
||||||
ports:
|
|
||||||
- name: http
|
|
||||||
containerPort: 3000
|
|
||||||
protocol: TCP
|
|
||||||
volumeMounts:
|
|
||||||
- mountPath: /app/config/custom.js
|
|
||||||
name: config
|
|
||||||
subPath: custom.js
|
|
||||||
- mountPath: /app/config/custom.css
|
|
||||||
name: config
|
|
||||||
subPath: custom.css
|
|
||||||
- mountPath: /app/config/bookmarks.yaml
|
|
||||||
name: config
|
|
||||||
subPath: bookmarks.yaml
|
|
||||||
- mountPath: /app/config/docker.yaml
|
|
||||||
name: config
|
|
||||||
subPath: docker.yaml
|
|
||||||
- mountPath: /app/config/kubernetes.yaml
|
|
||||||
name: config
|
|
||||||
subPath: kubernetes.yaml
|
|
||||||
- mountPath: /app/config/services.yaml
|
|
||||||
name: config
|
|
||||||
subPath: services.yaml
|
|
||||||
- mountPath: /app/config/settings.yaml
|
|
||||||
name: config
|
|
||||||
subPath: settings.yaml
|
|
||||||
- mountPath: /app/config/widgets.yaml
|
|
||||||
name: config
|
|
||||||
subPath: widgets.yaml
|
|
||||||
- mountPath: /app/config/logs
|
|
||||||
name: logs
|
|
||||||
volumes:
|
|
||||||
- name: config
|
|
||||||
configMap:
|
|
||||||
name: config
|
|
||||||
- name: logs
|
|
||||||
emptyDir: {}
|
|
@@ -1,15 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: Service
|
|
||||||
metadata:
|
|
||||||
name: homepage-web
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: homepage
|
|
||||||
spec:
|
|
||||||
type: ClusterIP
|
|
||||||
ports:
|
|
||||||
- port: 3000
|
|
||||||
targetPort: http
|
|
||||||
protocol: TCP
|
|
||||||
name: http
|
|
||||||
selector:
|
|
||||||
app.kubernetes.io/name: homepage
|
|
@@ -1,24 +1,33 @@
|
|||||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
kind: Kustomization
|
kind: Kustomization
|
||||||
resources:
|
resources:
|
||||||
- namespace.yaml
|
- namespace.yaml
|
||||||
- ingress.yaml
|
- ingress.yaml
|
||||||
- pvc.yaml
|
- pvc.yaml
|
||||||
- postgres.yaml
|
- postgres.yaml
|
||||||
- postgres.sealedsecret.yaml
|
- postgres.sealedsecret.yaml
|
||||||
|
|
||||||
|
|
||||||
namespace: immich
|
namespace: immich
|
||||||
|
|
||||||
|
|
||||||
helmCharts:
|
helmCharts:
|
||||||
- name: immich
|
- name: immich
|
||||||
releaseName: immich
|
releaseName: immich
|
||||||
version: 0.6.0
|
version: 0.8.1
|
||||||
valuesFile: values.yaml
|
valuesFile: values.yaml
|
||||||
repo: https://immich-app.github.io/immich-charts
|
repo: https://immich-app.github.io/immich-charts
|
||||||
|
|
||||||
|
|
||||||
images:
|
images:
|
||||||
- name: ghcr.io/immich-app/immich-machine-learning
|
- name: ghcr.io/immich-app/immich-machine-learning
|
||||||
newTag: v1.103.1
|
newTag: v1.117.0
|
||||||
- name: ghcr.io/immich-app/immich-server
|
- name: ghcr.io/immich-app/immich-server
|
||||||
newTag: v1.103.1
|
newTag: v1.117.0
|
||||||
|
|
||||||
|
|
||||||
|
patches:
|
||||||
|
- path: patch-redis-pvc.yaml
|
||||||
|
target:
|
||||||
|
kind: StatefulSet
|
||||||
|
name: immich-redis-master
|
17
apps/immich/patch-redis-pvc.yaml
Normal file
17
apps/immich/patch-redis-pvc.yaml
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: StatefulSet
|
||||||
|
metadata:
|
||||||
|
name: immich-redis-master
|
||||||
|
spec:
|
||||||
|
volumeClaimTemplates:
|
||||||
|
- apiVersion: v1
|
||||||
|
kind: PersistentVolumeClaim
|
||||||
|
metadata:
|
||||||
|
name: redis-data
|
||||||
|
spec:
|
||||||
|
storageClassName: nfs-client
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteMany
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: 2Gi
|
@@ -1,4 +1,3 @@
|
|||||||
|
|
||||||
apiVersion: postgresql.cnpg.io/v1
|
apiVersion: postgresql.cnpg.io/v1
|
||||||
kind: Cluster
|
kind: Cluster
|
||||||
metadata:
|
metadata:
|
||||||
@@ -13,18 +12,24 @@ spec:
|
|||||||
secret:
|
secret:
|
||||||
name: postgres-password
|
name: postgres-password
|
||||||
|
|
||||||
|
# Enable the VECTORS extension
|
||||||
|
postInitSQL:
|
||||||
|
- CREATE EXTENSION IF NOT EXISTS "vectors";
|
||||||
|
|
||||||
postgresql:
|
postgresql:
|
||||||
shared_preload_libraries:
|
shared_preload_libraries:
|
||||||
- "vectors.so"
|
- "vectors.so"
|
||||||
|
|
||||||
|
# Persistent storage configuration
|
||||||
storage:
|
storage:
|
||||||
size: 1Gi
|
size: 2Gi
|
||||||
pvcTemplate:
|
pvcTemplate:
|
||||||
storageClassName: ""
|
accessModes:
|
||||||
|
- ReadWriteOnce
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
storage: "1Gi"
|
storage: 2Gi
|
||||||
volumeName: immich-postgres
|
storageClassName: nfs-client
|
||||||
|
volumeMode: Filesystem
|
||||||
monitoring:
|
monitoring:
|
||||||
enablePodMonitor: true
|
enablePodMonitor: true
|
||||||
|
@@ -1,40 +1,11 @@
|
|||||||
---
|
|
||||||
apiVersion: v1
|
|
||||||
kind: PersistentVolume
|
|
||||||
metadata:
|
|
||||||
name: immich-nfs
|
|
||||||
spec:
|
|
||||||
capacity:
|
|
||||||
storage: "50Gi"
|
|
||||||
accessModes:
|
|
||||||
- ReadWriteOnce
|
|
||||||
nfs:
|
|
||||||
path: /kluster/immich
|
|
||||||
server: 192.168.1.157
|
|
||||||
---
|
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: PersistentVolumeClaim
|
kind: PersistentVolumeClaim
|
||||||
metadata:
|
metadata:
|
||||||
name: immich-nfs
|
name: data
|
||||||
spec:
|
spec:
|
||||||
storageClassName: ""
|
storageClassName: "nfs-client"
|
||||||
accessModes:
|
accessModes:
|
||||||
- ReadWriteOnce
|
- ReadWriteOnce
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
storage: "50Gi"
|
storage: "100Gi"
|
||||||
volumeName: immich-nfs
|
|
||||||
---
|
|
||||||
apiVersion: v1
|
|
||||||
kind: PersistentVolume
|
|
||||||
metadata:
|
|
||||||
name: immich-postgres
|
|
||||||
spec:
|
|
||||||
capacity:
|
|
||||||
storage: "1Gi"
|
|
||||||
accessModes:
|
|
||||||
- ReadWriteOnce
|
|
||||||
nfs:
|
|
||||||
path: /kluster/immich-postgres
|
|
||||||
server: 192.168.1.157
|
|
||||||
# later used by cnpg
|
|
||||||
|
@@ -22,16 +22,19 @@ env:
|
|||||||
secretKeyRef:
|
secretKeyRef:
|
||||||
name: postgres-password
|
name: postgres-password
|
||||||
key: password
|
key: password
|
||||||
IMMICH_WEB_URL: '{{ printf "http://%s-web:3000" .Release.Name }}'
|
|
||||||
IMMICH_MACHINE_LEARNING_URL: '{{ printf "http://%s-machine-learning:3003" .Release.Name }}'
|
IMMICH_MACHINE_LEARNING_URL: '{{ printf "http://%s-machine-learning:3003" .Release.Name }}'
|
||||||
|
IMMICH_METRICS: true
|
||||||
|
|
||||||
immich:
|
immich:
|
||||||
|
metrics:
|
||||||
|
# Enabling this will create the service monitors needed to monitor immich with the prometheus operator
|
||||||
|
enabled: true
|
||||||
persistence:
|
persistence:
|
||||||
# Main data store for all photos shared between different components.
|
# Main data store for all photos shared between different components.
|
||||||
library:
|
library:
|
||||||
# Automatically creating the library volume is not supported by this chart
|
# Automatically creating the library volume is not supported by this chart
|
||||||
# You have to specify an existing PVC to use
|
# You have to specify an existing PVC to use
|
||||||
existingClaim: immich-nfs
|
existingClaim: data
|
||||||
|
|
||||||
# Dependencies
|
# Dependencies
|
||||||
|
|
||||||
@@ -52,16 +55,6 @@ server:
|
|||||||
main:
|
main:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
microservices:
|
|
||||||
enabled: true
|
|
||||||
persistence:
|
|
||||||
geodata-cache:
|
|
||||||
enabled: true
|
|
||||||
size: 1Gi
|
|
||||||
# Optional: Set this to pvc to avoid downloading the geodata every start.
|
|
||||||
type: emptyDir
|
|
||||||
accessMode: ReadWriteMany
|
|
||||||
|
|
||||||
machine-learning:
|
machine-learning:
|
||||||
enabled: true
|
enabled: true
|
||||||
persistence:
|
persistence:
|
||||||
|
@@ -18,6 +18,9 @@ spec:
|
|||||||
limits:
|
limits:
|
||||||
memory: "2Gi"
|
memory: "2Gi"
|
||||||
cpu: "2"
|
cpu: "2"
|
||||||
|
requests:
|
||||||
|
memory: "128Mi"
|
||||||
|
cpu: "250m"
|
||||||
ports:
|
ports:
|
||||||
- containerPort: 8096
|
- containerPort: 8096
|
||||||
name: jellyfin
|
name: jellyfin
|
@@ -1,24 +1,5 @@
|
|||||||
apiVersion: traefik.io/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
|
||||||
name: jellyfin-vue-ingress
|
|
||||||
namespace: media
|
|
||||||
spec:
|
|
||||||
entryPoints:
|
|
||||||
- websecure
|
|
||||||
routes:
|
|
||||||
- match: Host(`media.kluster.moll.re`)
|
|
||||||
middlewares:
|
|
||||||
- name: jellyfin-websocket
|
|
||||||
kind: Rule
|
|
||||||
services:
|
|
||||||
- name: jellyfin-web
|
|
||||||
port: 80
|
|
||||||
tls:
|
|
||||||
certResolver: default-tls
|
|
||||||
---
|
|
||||||
apiVersion: traefik.io/v1alpha1
|
|
||||||
kind: IngressRoute
|
|
||||||
metadata:
|
metadata:
|
||||||
name: jellyfin-backend-ingress
|
name: jellyfin-backend-ingress
|
||||||
namespace: media
|
namespace: media
|
||||||
@@ -26,7 +7,7 @@ spec:
|
|||||||
entryPoints:
|
entryPoints:
|
||||||
- websecure
|
- websecure
|
||||||
routes:
|
routes:
|
||||||
- match: Host(`media-backend.kluster.moll.re`) && !Path(`/metrics`)
|
- match: Host(`media.kluster.moll.re`) && !Path(`/metrics`)
|
||||||
middlewares:
|
middlewares:
|
||||||
- name: jellyfin-websocket
|
- name: jellyfin-websocket
|
||||||
- name: jellyfin-server-headers
|
- name: jellyfin-server-headers
|
||||||
|
@@ -1,17 +0,0 @@
|
|||||||
apiVersion: monitoring.coreos.com/v1
|
|
||||||
kind: ServiceMonitor
|
|
||||||
metadata:
|
|
||||||
name: jellyfin
|
|
||||||
labels:
|
|
||||||
metrics: prometheus
|
|
||||||
spec:
|
|
||||||
selector:
|
|
||||||
matchLabels:
|
|
||||||
app: jellyfin-server-service
|
|
||||||
endpoints:
|
|
||||||
- path: /metrics
|
|
||||||
targetPort: jellyfin
|
|
||||||
|
|
||||||
# this exposes metrics on port 8096 as enabled in the jellyfin config
|
|
||||||
# https://jellyfin.org/docs/general/networking/monitoring/
|
|
||||||
# the metrics are available at /metrics but blocked by the ingress
|
|
@@ -5,16 +5,11 @@ namespace: media
|
|||||||
resources:
|
resources:
|
||||||
- namespace.yaml
|
- namespace.yaml
|
||||||
- pvc.yaml
|
- pvc.yaml
|
||||||
- server.deployment.yaml
|
- deployment.yaml
|
||||||
- server.service.yaml
|
- service.yaml
|
||||||
- web.deployment.yaml
|
|
||||||
- web.service.yaml
|
|
||||||
- ingress.yaml
|
- ingress.yaml
|
||||||
|
|
||||||
images:
|
images:
|
||||||
- name: jellyfin/jellyfin
|
- name: jellyfin/jellyfin
|
||||||
newName: jellyfin/jellyfin
|
newName: jellyfin/jellyfin
|
||||||
newTag: 10.8.13
|
newTag: 10.9.11
|
||||||
- name: ghcr.io/jellyfin/jellyfin-vue
|
|
||||||
newName: ghcr.io/jellyfin/jellyfin-vue
|
|
||||||
newTag: stable-rc.0.3.1
|
|
||||||
|
@@ -1,27 +0,0 @@
|
|||||||
apiVersion: apps/v1
|
|
||||||
kind: Deployment
|
|
||||||
metadata:
|
|
||||||
name: jellyfin-web
|
|
||||||
spec:
|
|
||||||
selector:
|
|
||||||
matchLabels:
|
|
||||||
app: jellyfin-web
|
|
||||||
template:
|
|
||||||
metadata:
|
|
||||||
labels:
|
|
||||||
app: jellyfin-web
|
|
||||||
spec:
|
|
||||||
containers:
|
|
||||||
- name: jellyfin-web
|
|
||||||
image: ghcr.io/jellyfin/jellyfin-vue
|
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
memory: "128Mi"
|
|
||||||
cpu: "30m"
|
|
||||||
ports:
|
|
||||||
- containerPort: 80
|
|
||||||
env:
|
|
||||||
- name: TZ
|
|
||||||
value: Europe/Berlin
|
|
||||||
- name: DEFAULT_SERVERS
|
|
||||||
value: "https://media-backend.kluster.moll.re"
|
|
@@ -1,12 +0,0 @@
|
|||||||
|
|
||||||
apiVersion: v1
|
|
||||||
kind: Service
|
|
||||||
metadata:
|
|
||||||
name: jellyfin-web
|
|
||||||
spec:
|
|
||||||
selector:
|
|
||||||
app: jellyfin-web
|
|
||||||
ports:
|
|
||||||
- protocol: TCP
|
|
||||||
port: 80
|
|
||||||
targetPort: 80
|
|
7
apps/minecraft/README.md
Normal file
7
apps/minecraft/README.md
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
## Sending a command
|
||||||
|
```
|
||||||
|
kubectl exec -it -n minecraft deploy/minecraft-server -- /bin/bash
|
||||||
|
mc-send-to-console /help
|
||||||
|
# or directly
|
||||||
|
kubectl exec -it -n minecraft deploy/minecraft-server -- mc-send-to-console /help
|
||||||
|
```
|
16
apps/minecraft/curseforge.sealedsecret.yaml
Normal file
16
apps/minecraft/curseforge.sealedsecret.yaml
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
---
|
||||||
|
apiVersion: bitnami.com/v1alpha1
|
||||||
|
kind: SealedSecret
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: curseforge-api
|
||||||
|
namespace: minecraft
|
||||||
|
spec:
|
||||||
|
encryptedData:
|
||||||
|
key: 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
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: curseforge-api
|
||||||
|
namespace: minecraft
|
||||||
|
type: Opaque
|
57
apps/minecraft/job.yaml
Normal file
57
apps/minecraft/job.yaml
Normal file
@@ -0,0 +1,57 @@
|
|||||||
|
apiVersion: batch/v1
|
||||||
|
kind: Job
|
||||||
|
metadata:
|
||||||
|
name: start-server
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
restartPolicy: OnFailure
|
||||||
|
containers:
|
||||||
|
- name: minecraft-server
|
||||||
|
image: minecraft
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: "10000Mi"
|
||||||
|
cpu: "5"
|
||||||
|
requests:
|
||||||
|
memory: "1500Mi"
|
||||||
|
cpu: "500m"
|
||||||
|
ports:
|
||||||
|
- containerPort: 25565
|
||||||
|
env:
|
||||||
|
- name: EULA
|
||||||
|
value: "TRUE"
|
||||||
|
- name: TYPE
|
||||||
|
value: "AUTO_CURSEFORGE"
|
||||||
|
- name: CF_API_KEY
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: curseforge-api
|
||||||
|
key: key
|
||||||
|
- name: CF_PAGE_URL
|
||||||
|
value: "https://www.curseforge.com/minecraft/modpacks/vault-hunters-1-18-2/files/5413446"
|
||||||
|
- name: VERSION
|
||||||
|
value: "1.18.2"
|
||||||
|
- name: INIT_MEMORY
|
||||||
|
value: "1G"
|
||||||
|
- name: MAX_MEMORY
|
||||||
|
value: "8G"
|
||||||
|
- name: MOTD
|
||||||
|
value: "VaultHunters baby!"
|
||||||
|
- name: ENABLE_RCON
|
||||||
|
value: "false"
|
||||||
|
- name: CREATE_CONSOLE_IN_PIPE
|
||||||
|
value: "true"
|
||||||
|
- name: ONLINE_MODE
|
||||||
|
value: "true"
|
||||||
|
- name: ENABLE_AUTOSTOP
|
||||||
|
value: "true"
|
||||||
|
|
||||||
|
volumeMounts:
|
||||||
|
- name: minecraft-data
|
||||||
|
mountPath: /data
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
- name: minecraft-data
|
||||||
|
persistentVolumeClaim:
|
||||||
|
claimName: minecraft-data
|
17
apps/minecraft/kustomization.yaml
Normal file
17
apps/minecraft/kustomization.yaml
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
|
||||||
|
namespace: minecraft
|
||||||
|
|
||||||
|
resources:
|
||||||
|
- namespace.yaml
|
||||||
|
- pvc.yaml
|
||||||
|
- job.yaml
|
||||||
|
- service.yaml
|
||||||
|
- curseforge.sealedsecret.yaml
|
||||||
|
|
||||||
|
|
||||||
|
images:
|
||||||
|
- name: minecraft
|
||||||
|
newName: itzg/minecraft-server
|
||||||
|
newTag: java21
|
4
apps/minecraft/namespace.yaml
Normal file
4
apps/minecraft/namespace.yaml
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Namespace
|
||||||
|
metadata:
|
||||||
|
name: placeholder
|
11
apps/minecraft/pvc.yaml
Normal file
11
apps/minecraft/pvc.yaml
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
kind: PersistentVolumeClaim
|
||||||
|
apiVersion: v1
|
||||||
|
metadata:
|
||||||
|
name: minecraft-data
|
||||||
|
spec:
|
||||||
|
storageClassName: "nfs-client"
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteOnce
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: 1Gi
|
12
apps/minecraft/service.yaml
Normal file
12
apps/minecraft/service.yaml
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: minecraft-server
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
app: minecraft-server
|
||||||
|
ports:
|
||||||
|
- port: 25565
|
||||||
|
targetPort: 25565
|
||||||
|
type: LoadBalancer
|
||||||
|
loadBalancerIP: 192.168.3.4
|
Submodule apps/monitoring/dashboards deleted from 984a69be34
@@ -7,8 +7,8 @@ metadata:
|
|||||||
namespace: monitoring
|
namespace: monitoring
|
||||||
spec:
|
spec:
|
||||||
encryptedData:
|
encryptedData:
|
||||||
password: AgBe8isrCWd5MuaQq5CpA+P3fDizCCDo23BVauaBJLuMRIYbVwpfahaJW7Ocj3LTXwdeVVPBrOk2D6vESUXu6I0EWc3y/NFN4ZezScxMcjmeaAb+z1zWwdH0FynTPJYOxv1fis1FDTkXDmGy3FXo5NDK9ET899TtulKFkh7UqSxdrRWbD3pegJgqKGPIqDCTAxZN/ssiccfWGS4lHqQBJkXn8DeampcKwjOCvgaBdilF03GoSfpgsqa2Iw2SfTDEobWBWVMMK/RB3/Oi/YJkGwMW3ECUxvTDam8gb0RFA1xjWXoYTLVVP5fK7q7x63ns51HebloxAP1GBrt138N/iDrfbGfjNP8Lx0NFl5y5bTgYN/z8DVTOFf90xxWe+YYERdwllg0Ci1JLNbA+NszXTD4L/HC7a8XuBfjRzxMTeymNjR76jzfPkH6v1EvesOduTfSrahPgS0qS+eGOier1rHxj3EBRhOScY1ut5Bq4oJMNId9nMVbVa6xyq2HyxuJHXV+j6h5FGHmEXn9gIR7wGp8RhtPhKgVGLrHcbHZ5Th2E7eomz1T2NK/ezNP8ZhcwOj/lyGywlW0vhU798zpWhMf57k2OPeuMlfs8Y8y74epBdyBjsrMR4EDctF8RZR3vraxENiMJ6kk1gqKj04ir6HwL7blqwiybIFFnJrp2j7MzgjS4SQ687qMX5Zf5XT03aEE+9W9Epy73tT7zVQKdENCQlcm5
|
password: AgAwMLnsYN1y8JQSqgGQbNG/8jKensTDsEw6ogITdkhDRlJcg8HQ5t7a6xLzNCrLHLJiQW8YOoyLT4lvFkBRMOa2EYcrDvBiRD0PjygWLIscKa7dA+jpAUf/icD9zsiDnTym2yf+VUANcmEgE6DiNvlcsrcmYqiR4pKVUTDlKPNOjOpTJ3nXETb3/sbt69E0JSGwtkvusYQSXKLU9KLbciihv+ycdkdlC9xy9myd4+vYZYXSh/eAvyZeb/hsmdSX7yaASmupMvet6Qsdt99PNzFQxtbQH+LQvYalVZ8bjWZQvCN/p0bA4H15otKBfe8rtEwVthgvyEvo6TK0Mg0pFY/b3AOGFmImnT3rDmgG6S8KTZH0Jce17ksFqvELQmHjqHuYpQsPDl44glM8kWRJ9Mf/Z424LRwZlJNVcOkuVl4qFqPUjzd2rWIyF0RaD0BE012C0ThJxKn2l17lVJbNtdUiR3qNpW01ot2m0CgKd2kXbjDmgRgAll4WgrukfCIn9ZnE0gVCFLJuK3MOQAaipFYy/bDO0izwl9T8nldgcI8OfiC3NTk2O+Es5jJRXu0oJGaC3HrTB7wXiwOoELvAsxLTPxKBiN9mCHCMtZX0PEtrio0dFRQ6Pi5xPng0KVT0I9dvGNsPdhPETNOB913WEvbgP8Gt3cj016nCzk51eUsYbXPpNL2B4kmbIhecqW/8kwKQPwYjVlBSXj3NxjzwMY6PvOl1
|
||||||
user: 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
|
user: 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
|
||||||
template:
|
template:
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
|
16
apps/monitoring/grafana-auth.sealedsecret.yaml
Normal file
16
apps/monitoring/grafana-auth.sealedsecret.yaml
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
---
|
||||||
|
apiVersion: bitnami.com/v1alpha1
|
||||||
|
kind: SealedSecret
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: grafana-auth
|
||||||
|
namespace: monitoring
|
||||||
|
spec:
|
||||||
|
encryptedData:
|
||||||
|
client_secret: AgCcKsnS3u2eI+fNVC9hAZ3QRFOHFErAzs5aQgX51CSdJwM03SZUoTyrDi5JPcHUVyS3MbevFH5piMhDTARMI3bLOjYlcwMbpf77JCPa7o95Y9asA/FW3lXicYt3biN9xBXJBz7Ws3fVRtEzyf6DmbGedT9gaX8aPwrUVbP19RdyJiuu76oB1A/jdUkX4K+X6kVvmoP/BWdypk/kdQJrzBNt00DIXF4NHfYey36AuhpBtqYZs4faA/tBXMXLE4RxPNtcHwNfVjnRj3v3qzNufD1fnweJvLq2UfLMrQjoR9XDVnM0zkpautylkI7yrvcoEH7ljnf6b1FMogOEZUfH1BIdqTd/WwrrlCqE58OPfJWthIfN+pQ8LvdHsGo3jc9gXvfXS2cStyhP06eTZ4D79kG+RtDQGOsD/Wpx7EcM6hbB3+dIjcs3wEAIGjpIVtY9JayW8YeRnFApMuhDST1+hscm+LdoGvaSTlAuGzv9BbVrPX/Fo9XKeYHlbG/x71Er+vF8WbW0wUa46MHLvbEy376XIdJDYi+vjl4eqznZ6YhvPbawhoKXT8ZcKUcUAjVcMue/O/jCSPZplbn3vdSCeqPTiqVqDw9PTMIeWFUepgPMxiGpFRAqdwIecFBnYItq0dXoGlFrZpo0S6AECgZjxzUR5EgdkdPlDDs2CN+d9yP7f2S+gmL7AIlQr74NW1GrTGw2x/rD4IJhunh7
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: grafana-auth
|
||||||
|
namespace: monitoring
|
||||||
|
type: Opaque
|
@@ -1,25 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: PersistentVolume
|
|
||||||
metadata:
|
|
||||||
name: grafana-nfs
|
|
||||||
spec:
|
|
||||||
capacity:
|
|
||||||
storage: "1Gi"
|
|
||||||
accessModes:
|
|
||||||
- ReadWriteOnce
|
|
||||||
nfs:
|
|
||||||
path: /export/kluster/grafana
|
|
||||||
server: 192.168.1.157
|
|
||||||
---
|
|
||||||
apiVersion: v1
|
|
||||||
kind: PersistentVolumeClaim
|
|
||||||
metadata:
|
|
||||||
name: grafana-nfs
|
|
||||||
spec:
|
|
||||||
storageClassName: ""
|
|
||||||
accessModes:
|
|
||||||
- ReadWriteOnce
|
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
storage: "1Gi"
|
|
||||||
volumeName: grafana-nfs
|
|
@@ -16,6 +16,12 @@ serviceMonitor:
|
|||||||
##
|
##
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
|
envValueFrom:
|
||||||
|
AUTH_GRAFANA_CLIENT_SECRET:
|
||||||
|
secretKeyRef:
|
||||||
|
name: grafana-auth
|
||||||
|
key: client_secret
|
||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
@@ -31,7 +37,7 @@ datasources:
|
|||||||
datasources:
|
datasources:
|
||||||
- name: Thanos
|
- name: Thanos
|
||||||
type: prometheus
|
type: prometheus
|
||||||
url: http://thanos-querier.prometheus.svc:9090
|
url: http://thanos-querier.prometheus.svc:10902
|
||||||
isDefault: true
|
isDefault: true
|
||||||
- name: Prometheus
|
- name: Prometheus
|
||||||
type: prometheus
|
type: prometheus
|
||||||
@@ -67,3 +73,21 @@ grafana.ini:
|
|||||||
default_theme: dark
|
default_theme: dark
|
||||||
unified_alerting:
|
unified_alerting:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
analytics:
|
||||||
|
check_for_updates: false
|
||||||
|
server:
|
||||||
|
domain: grafana.kluster.moll.re
|
||||||
|
root_url: https://grafana.kluster.moll.re
|
||||||
|
auth.generic_oauth:
|
||||||
|
name: Authelia
|
||||||
|
enabled: true
|
||||||
|
allow_sign_up: true
|
||||||
|
client_id: grafana
|
||||||
|
client_secret: ${AUTH_GRAFANA_CLIENT_SECRET}
|
||||||
|
scopes: openid profile email groups
|
||||||
|
auth_url: https://auth.kluster.moll.re/api/oidc/authorization
|
||||||
|
token_url: https://auth.kluster.moll.re/api/oidc/token
|
||||||
|
api_url: https://auth.kluster.moll.re/api/oidc/authorization/userinfo
|
||||||
|
tls_skip_verify_insecure: true
|
||||||
|
auto_login: true
|
||||||
|
use_pkce: true
|
@@ -1,25 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: PersistentVolume
|
|
||||||
metadata:
|
|
||||||
name: influxdb-nfs
|
|
||||||
spec:
|
|
||||||
capacity:
|
|
||||||
storage: "10Gi"
|
|
||||||
accessModes:
|
|
||||||
- ReadWriteOnce
|
|
||||||
nfs:
|
|
||||||
path: /export/kluster/influxdb
|
|
||||||
server: 192.168.1.157
|
|
||||||
---
|
|
||||||
apiVersion: v1
|
|
||||||
kind: PersistentVolumeClaim
|
|
||||||
metadata:
|
|
||||||
name: influxdb-nfs
|
|
||||||
spec:
|
|
||||||
storageClassName: ""
|
|
||||||
accessModes:
|
|
||||||
- ReadWriteOnce
|
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
storage: "10Gi"
|
|
||||||
volumeName: influxdb-nfs
|
|
@@ -1,26 +0,0 @@
|
|||||||
## Create default user through docker entrypoint
|
|
||||||
## Defaults indicated below
|
|
||||||
##
|
|
||||||
adminUser:
|
|
||||||
organization: "influxdata"
|
|
||||||
bucket: "default"
|
|
||||||
user: "admin"
|
|
||||||
retention_policy: "0s"
|
|
||||||
## Leave empty to generate a random password and token.
|
|
||||||
## Or fill any of these values to use fixed values.
|
|
||||||
password: ""
|
|
||||||
token: ""
|
|
||||||
|
|
||||||
|
|
||||||
## Persist data to a persistent volume
|
|
||||||
##
|
|
||||||
persistence:
|
|
||||||
enabled: true
|
|
||||||
## If true will use an existing PVC instead of creating one
|
|
||||||
useExisting: true
|
|
||||||
## Name of existing PVC to be used in the influx deployment
|
|
||||||
name: influxdb-nfs
|
|
||||||
|
|
||||||
|
|
||||||
ingress:
|
|
||||||
enabled: false
|
|
@@ -5,16 +5,17 @@ namespace: monitoring
|
|||||||
|
|
||||||
resources:
|
resources:
|
||||||
- namespace.yaml
|
- namespace.yaml
|
||||||
- grafana.pvc.yaml
|
|
||||||
# - influxdb.pvc.yaml
|
|
||||||
- grafana.ingress.yaml
|
- grafana.ingress.yaml
|
||||||
- grafana-admin.sealedsecret.yaml
|
- grafana-admin.sealedsecret.yaml
|
||||||
- dashboards/
|
- grafana-auth.sealedsecret.yaml
|
||||||
|
# grafana dashboards are provisioned from a git repository
|
||||||
|
# in the initial bootstrap of the app of apps, the git repo won't be available, so this sync will initially fail
|
||||||
|
- https://git.kluster.moll.re/remoll/grafana-dashboards//?timeout=10&ref=main
|
||||||
|
|
||||||
|
|
||||||
helmCharts:
|
helmCharts:
|
||||||
- releaseName: grafana
|
- releaseName: grafana
|
||||||
name: grafana
|
name: grafana
|
||||||
repo: https://grafana.github.io/helm-charts
|
repo: https://grafana.github.io/helm-charts
|
||||||
version: 7.3.9
|
version: 8.5.4
|
||||||
valuesFile: grafana.values.yaml
|
valuesFile: grafana.values.yaml
|
||||||
|
@@ -1,52 +0,0 @@
|
|||||||
env:
|
|
||||||
- name: HOSTNAME
|
|
||||||
value: "telegraf-speedtest"
|
|
||||||
|
|
||||||
service:
|
|
||||||
enabled: false
|
|
||||||
rbac:
|
|
||||||
# Specifies whether RBAC resources should be created
|
|
||||||
create: false
|
|
||||||
|
|
||||||
serviceAccount:
|
|
||||||
# Specifies whether a ServiceAccount should be created
|
|
||||||
create: false
|
|
||||||
|
|
||||||
|
|
||||||
## Exposed telegraf configuration
|
|
||||||
## For full list of possible values see `/docs/all-config-values.yaml` and `/docs/all-config-values.toml`
|
|
||||||
## ref: https://docs.influxdata.com/telegraf/v1.1/administration/configuration/
|
|
||||||
config:
|
|
||||||
agent:
|
|
||||||
interval: "2h"
|
|
||||||
round_interval: true
|
|
||||||
metric_batch_size: 1000
|
|
||||||
metric_buffer_limit: 10000
|
|
||||||
collection_jitter: "0s"
|
|
||||||
flush_interval: "10s"
|
|
||||||
flush_jitter: "0s"
|
|
||||||
precision: ""
|
|
||||||
debug: false
|
|
||||||
quiet: false
|
|
||||||
logfile: ""
|
|
||||||
hostname: "$HOSTNAME"
|
|
||||||
omit_hostname: false
|
|
||||||
processors:
|
|
||||||
- enum:
|
|
||||||
mapping:
|
|
||||||
field: "status"
|
|
||||||
dest: "status_code"
|
|
||||||
value_mappings:
|
|
||||||
healthy: 1
|
|
||||||
problem: 2
|
|
||||||
critical: 3
|
|
||||||
outputs:
|
|
||||||
- influxdb_v2:
|
|
||||||
urls:
|
|
||||||
- "http://influxdb-influxdb2.monitoring:80"
|
|
||||||
token: We64mk4L4bqYCL77x3fAUSYfOse9Kktyf2eBLyrryG9c3-y8PQFiKPIh9EvSWuq78QSQz6hUcsm7XSFR2Zj1MA==
|
|
||||||
organization: "influxdata"
|
|
||||||
bucket: "homeassistant"
|
|
||||||
inputs:
|
|
||||||
- internet_speed:
|
|
||||||
enable_file_download: false
|
|
@@ -13,4 +13,4 @@ resources:
|
|||||||
images:
|
images:
|
||||||
- name: binwiederhier/ntfy
|
- name: binwiederhier/ntfy
|
||||||
newName: binwiederhier/ntfy
|
newName: binwiederhier/ntfy
|
||||||
newTag: v2.10.0
|
newTag: v2.11.0
|
||||||
|
63
apps/paperless/deployment.yaml
Normal file
63
apps/paperless/deployment.yaml
Normal file
@@ -0,0 +1,63 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: paperless
|
||||||
|
spec:
|
||||||
|
replicas: 1
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: paperless
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: paperless
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: paperless
|
||||||
|
image: paperless
|
||||||
|
ports:
|
||||||
|
- containerPort: 8000
|
||||||
|
env:
|
||||||
|
- name: PAPERLESS_REDIS
|
||||||
|
value: redis://redis-master:6379
|
||||||
|
- name: PAPERLESS_TIME_ZONE
|
||||||
|
value: Europe/Berlin
|
||||||
|
- name: PAPERLESS_OCR_LANGUAGE
|
||||||
|
value: deu+eng+fra
|
||||||
|
- name: PAPERLESS_URL
|
||||||
|
value: https://paperless.kluster.moll.re
|
||||||
|
- name: PAPERLESS_OCR_USER_ARGS
|
||||||
|
value: '{"invalidate_digital_signatures": true}'
|
||||||
|
- name: PAPERLESS_SECRET_KEY
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: paperless-secret-key
|
||||||
|
key: key
|
||||||
|
- name: PAPERLESS_DATA_DIR
|
||||||
|
value: /data
|
||||||
|
- name: PAPERLESS_MEDIA_ROOT
|
||||||
|
value: /data
|
||||||
|
- name: PAPERLESS_APPS
|
||||||
|
value: allauth.socialaccount.providers.openid_connect
|
||||||
|
- name: PAPERLESS_SOCIALACCOUNT_PROVIDERS
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: paperless-oauth
|
||||||
|
key: provider-config
|
||||||
|
# - name: PAPERLESS_DISABLE_REGULAR_LOGIN
|
||||||
|
# value: "True"
|
||||||
|
volumeMounts:
|
||||||
|
- name: data
|
||||||
|
mountPath: /data
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
cpu: "100m"
|
||||||
|
memory: "200Mi"
|
||||||
|
limits:
|
||||||
|
cpu: "2"
|
||||||
|
memory: "1Gi"
|
||||||
|
volumes:
|
||||||
|
- name: data
|
||||||
|
persistentVolumeClaim:
|
||||||
|
claimName: paperless-data
|
||||||
|
|
17
apps/paperless/ingress.yaml
Normal file
17
apps/paperless/ingress.yaml
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
apiVersion: traefik.io/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: paperless-ingressroute
|
||||||
|
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host(`paperless.kluster.moll.re`)
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: paperless-web
|
||||||
|
port: 8000
|
||||||
|
|
||||||
|
tls:
|
||||||
|
certResolver: default-tls
|
32
apps/paperless/kustomization.yaml
Normal file
32
apps/paperless/kustomization.yaml
Normal file
@@ -0,0 +1,32 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
resources:
|
||||||
|
- namespace.yaml
|
||||||
|
- pvc.yaml
|
||||||
|
- deployment.yaml
|
||||||
|
- service.yaml
|
||||||
|
- ingress.yaml
|
||||||
|
- paperless-secret-key.sealedsecret.yaml
|
||||||
|
- paperless-oauth.sealedsecret.yaml
|
||||||
|
|
||||||
|
namespace: paperless
|
||||||
|
|
||||||
|
images:
|
||||||
|
- name: paperless
|
||||||
|
newName: ghcr.io/paperless-ngx/paperless-ngx
|
||||||
|
newTag: "2.12.1"
|
||||||
|
|
||||||
|
|
||||||
|
helmCharts:
|
||||||
|
- name: redis
|
||||||
|
releaseName: redis
|
||||||
|
repo: https://charts.bitnami.com/bitnami
|
||||||
|
version: 20.1.5
|
||||||
|
valuesInline:
|
||||||
|
auth:
|
||||||
|
enabled: false
|
||||||
|
replica:
|
||||||
|
replicaCount: 0
|
||||||
|
master:
|
||||||
|
persistence:
|
||||||
|
storageClass: "nfs-client"
|
4
apps/paperless/namespace.yaml
Normal file
4
apps/paperless/namespace.yaml
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Namespace
|
||||||
|
metadata:
|
||||||
|
name: placeholder
|
15
apps/paperless/paperless-oauth.sealedsecret.yaml
Normal file
15
apps/paperless/paperless-oauth.sealedsecret.yaml
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
apiVersion: bitnami.com/v1alpha1
|
||||||
|
kind: SealedSecret
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: paperless-oauth
|
||||||
|
namespace: paperless
|
||||||
|
spec:
|
||||||
|
encryptedData:
|
||||||
|
provider-config: AgBI9IcNOfBevjUtIMwNTd0MTnr1WGxMKJ0cPnHzAS3cddmI+LTrkxxdRBuz2PFKTrhJ6/vh/2tiI9FBWMVm/YqTB64drbF3v13GfZMk/9c7W4SFyMoMcoE4xe6gs4SOm1ggTVxWT6O8IQ0gt7+FRUFaiLmwa08dxTkzrT0/zfQfYg+0aV8qS0eCJIrQk/IA1N31RpUoNV5Jl6vF7oE+cKIVyZ6LVMdecmFnuUgU+1qTC7ncgxxhWQekDQXJQnfYpgsQTF5GaHkGV8kvqJOa2Ohnk7MIeQEz5WuiKaXzU1ZMCYq3D8q/kaf/itLLBlL5MQh/hkuksCVG13aWxvulA/zIw3rSDujjZcSrD8LWH6oCMCn8zVcZjYQQBcTKUYEyYNvHLsmm0fOFIkUmFfBOS4WdHhjsBudz+941Wuc2EX5i6eLind7dk6gOlCL1HEyvbQRV6W50T104DQSNHslRG9CIjPh0BueGJ5fiaFoQa/UuM/JI8R/7cv3y5VkCG6j4gax9FVFgZKxPMtOTxB3gKolT25JHPDOqbDo996T4lsmiYRrYShni4JFZ8ALhcr7pKwlg+gVbDVaqMrVaSz1xzTP0MNxPMsojXVLtG3/Zv0/iXSVW4DPY67pFITEbZBWB3bHLvL9MiwKbWNwsDwPUylWkXTTFHsNbuRUnAXhRxcLn43uIv98JFTQcMVl2J9qrYkHm7w0FVImUr3oC+Ny/Z6j89ARposNx27B4FBgW7H7+yWMKRsAObC8cAjBOkBdXue0x5bEl7Al2BRRG7/WUKHXZvTOlvlj7GFTpLOQbPYjnBo8V8h42uOjGbiMLaCeN5sWlMtWD+7mpHV3XGdcGtPAZlIzgpUs2si/XIRNun2oDoUmJhb7YcGmugodcAK9+aYBThIkNU3guXdrM6Vc7CO2RP8PFpKBpcI9pUHgYA8dyYY+TaBqfYGrKFlGgoVcgh6oVkeOuctTX90XkojVFfqkCqab93faMh2pGCGcH4IZ81sdTYeWwNIvz1RGoi9GhUhQU5NfDeUBn2eHdOpfdsf4FkWe0kgE6TBPlQx7GQy56FldIc0G4QA8H8utL3E/MXYrao70ek/GHIxuev1/hzljJDk+5HJz5itBtKiW4s/5j2ZMD7MMBu/voDQW14XEK5pM9EbwmC6kRg6ljXvTlnUVmw1s04iUvIzF/dO6bCgaOEwFPjZj8oZs0dt64Ov+ZPLwTrmezFgHtfh4dyiRgHt4cO/WYFmzzYwd532p2De3JqjHUzT0iQIpkaz4jrF7+fdtDxtj7XgkJIg==
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: paperless-oauth
|
||||||
|
namespace: paperless
|
15
apps/paperless/paperless-secret-key.sealedsecret.yaml
Normal file
15
apps/paperless/paperless-secret-key.sealedsecret.yaml
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
apiVersion: bitnami.com/v1alpha1
|
||||||
|
kind: SealedSecret
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: paperless-secret-key
|
||||||
|
namespace: paperless
|
||||||
|
spec:
|
||||||
|
encryptedData:
|
||||||
|
key: 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
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: paperless-secret-key
|
||||||
|
namespace: paperless
|
11
apps/paperless/pvc.yaml
Normal file
11
apps/paperless/pvc.yaml
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
kind: PersistentVolumeClaim
|
||||||
|
apiVersion: v1
|
||||||
|
metadata:
|
||||||
|
name: paperless-data
|
||||||
|
spec:
|
||||||
|
storageClassName: "nfs-client"
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteOnce
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: 10Gi
|
10
apps/paperless/service.yaml
Normal file
10
apps/paperless/service.yaml
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: paperless-web
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
app: paperless
|
||||||
|
ports:
|
||||||
|
- port: 8000
|
||||||
|
targetPort: 8000
|
@@ -21,12 +21,15 @@ spec:
|
|||||||
ports:
|
ports:
|
||||||
- containerPort: 9000
|
- containerPort: 9000
|
||||||
env:
|
env:
|
||||||
- name: ALLOW_SIGNUP
|
|
||||||
value: "true"
|
|
||||||
- name: TZ
|
- name: TZ
|
||||||
value: Europe/Paris
|
value: Europe/Paris
|
||||||
- name: BASE_URL
|
- name: BASE_URL
|
||||||
value: https://recipes.kluster.moll.re
|
value: https://recipes.kluster.moll.re
|
||||||
|
- name: ALLOW_SIGNUP
|
||||||
|
value: "true"
|
||||||
|
envFrom:
|
||||||
|
- secretRef:
|
||||||
|
name: mealie-oauth
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- name: mealie-data
|
- name: mealie-data
|
||||||
mountPath: /app/data
|
mountPath: /app/data
|
||||||
|
@@ -6,11 +6,12 @@ namespace: recipes
|
|||||||
resources:
|
resources:
|
||||||
- namespace.yaml
|
- namespace.yaml
|
||||||
- deployment.yaml
|
- deployment.yaml
|
||||||
|
- mealie-oauth.sealedsecret.yaml
|
||||||
- pvc.yaml
|
- pvc.yaml
|
||||||
- service.yaml
|
- service.yaml
|
||||||
- ingress.yaml
|
- ingress.yaml
|
||||||
|
|
||||||
images:
|
images:
|
||||||
- name: mealie
|
- name: mealie
|
||||||
newTag: v1.6.0
|
newTag: v1.12.0
|
||||||
newName: ghcr.io/mealie-recipes/mealie
|
newName: ghcr.io/mealie-recipes/mealie
|
26
apps/recipes/mealie-oauth.sealedsecret.yaml
Normal file
26
apps/recipes/mealie-oauth.sealedsecret.yaml
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
---
|
||||||
|
apiVersion: bitnami.com/v1alpha1
|
||||||
|
kind: SealedSecret
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: mealie-oauth
|
||||||
|
namespace: recipes
|
||||||
|
spec:
|
||||||
|
encryptedData:
|
||||||
|
OIDC_ADMIN_GROUP: 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
|
||||||
|
OIDC_AUTH_ENABLED: AgAQ48wodtQ11peCbSpBL61n28GMeMJPq6cmb0a39x/n+AJGOZbjcE2e/xdFu06J+ahHTehi2QtwWxlRBi4Op6sbjdn5cXkTZ+8vGB3v/JQZQzJpGraFT1WTPZ9onYXTLl8iGsZSteF3iaxSOMzLswMahDvk/DCNrIY78mkTpqSC3Pggf9GnAWTQKOnuTFYyStBaL9ExyDBiJkbFahm/bC8h7QG9OXD93bDQrApS/W6LF+3CU6TOKj1VXmeVuMpxGdasC4B5ShL9kvBz66i5P7BJYjPfTEJfIACIFzZQmLJwxzfST1kV0urdQ9PZmcvQLapxGI4xUssD275hSPrUE6XXMLyo0BzVEBPq5QsMW5UZB1sOPQMcIajdzWagByFJWcBU1mFMwJXVUHQXlsMDEl1pDTGbSS660XCS1aAtmVb19ToXH/GIEkWlohiNpVqI+D8ypoAwMzF1FnHGvyxF6maHV4vZA4zDE7bT4S+E6dEmXM2cc0essUDlbwgOTLi/3fuqxIar3Dub857H0B9++SeriHrSUJD1A/9IOZQQNsAOwEOylK+9BuyhHYFVzk9l2lKnCRYqif75wusyoly+4yBS69LGzg4mc4Bk6LejZe91VnZLlZB3M6fZzS87qWoSKuEibxJ469KVrCPNc5mn33gfg5nW/05rSYcBnl1VazPmA18sZyX1nWnQUwwErg98jGn7Ft0q
|
||||||
|
OIDC_AUTO_REDIRECT: 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
|
||||||
|
OIDC_CLIENT_ID: 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
|
||||||
|
OIDC_CONFIGURATION_URL: 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
|
||||||
|
OIDC_GROUPS_CLAIM: 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
|
||||||
|
OIDC_PROVIDER_NAME: AgBHYuK2JYedcaHwDca/c1RKzq8YgO9cJ0lXPY2+ain+lwFJwZ7oMOPevVOq3RoUHznEYbRxKw0CLE+110NFr16bav4bn4pXRD5CeqQDAWPIxxouu+w2NgWijnqfKnVYrtrprQlfGO9mYsZiEGj/sbftX2Wd73L7oXp/6Ab+28rnxtv3KF46wXo8yfqzOGf+QRQKdT+2pv58zjN3UCGrSANirLHvmY8+a73YiVW8/xuJZN4og3JbPW65FwBpgnvQCaHKFTbPyPIpILx7sKz2yxGzT6Jt2PeSjdwou/fT70tmrwOVucbHJkKUsd/jkI0gzRPLr9Fo5LcALAKQsn70hNQIRgTFgCy4ILurJMBKeYtHkNMdnBwKRh4NlTgJB2vNXq604480ta20Z3E2m3DUxW6XPFTQN9uC5/7IT0e/F4UgQai6HENwAqIPGuOM4eKeouw8pr+RoLMI76Z0B6xWhLRqxrZknzwzOngpaku8w9SeJPkifSFwxxFjacAqFrMwLGT1kg/KIJcBa3BUK8gVRLzqJd9hq1hQtavmm6T3W9PW8yCG3IP4b/Kxsm0+B1pXSaFC2a3elFu5lgw7JeJO22NwPmCUw3cX/zfYcn4u1MSsn2Wlr5tLNwjfpeGXb0w9eGStEZNKpj/OLo5W6sxdO1PIdCRd/IdxFuDd3q3G9cJTP7aMjeWSQhr7bzgzx1K78zZ9h4Qiw4YXrw==
|
||||||
|
OIDC_REMEMBER_ME: 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
|
||||||
|
OIDC_SIGNUP_ENABLED: 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
|
||||||
|
OIDC_USER_CLAIM: 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
|
||||||
|
OIDC_USER_GROUP: AgCTGx9h4At2lcx4tN5YUBN2PRHG9ex3curTTq4kid+kKQXRUOYckYC3LNzC7aIbJ8byhFHtJVF/T37olPkgJjWzPN6C16C9eGDv8bgq6JnG9faveeXr2zjcceZ9O3bSb4sRxlQ5Zke1Asc2olYP/H6br4VPDdKkDsJ5h5/B/W/dd9FDXuPAbTp32bK/l+3YStR4Zpmaldt4hostPu9TXfE+UxJqcLCFMtQuHsHEtFV3Pimt0XIkoNPsodpKKoAhje8vNwk5YYSlhzH13XgZvKcP43z8bfekicOgRNM6T27sVGRrFM4sE635406sOXWXbxJzwlBQJTqajCtX+tAtei3LHdr0l1sjjyMDzlREUq6RYt/6klMZrLW5gsdma769AFA76JX+e+wjekmv72/aqUVn9635IamFM1J6+jIWKdWo76vJwzR/EisO12vkSbocSoAEsUxc3rGMN2aLZEvo0LjsjENKlj8fNxog5i+4jO9Bc0AXEQaFhlQwPdIKlylQPhrSiW/cnDG1WemDn+e77a9NiOkDxMXGequzdC5KyIeIrSjITXpg1MQNa039yIKkjfVL0uMsH7OL7+qzKPSPm5LOABBxKducSHHK4t364YD+8e7KeQStHjaCTpcxgf43at4BKuQ31Ty2bWfpMRofGRBvJPusgjXrdutNEAIVrzFfW11o0Yx06U7CRF5198yXHCig3zKgxgQW
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: mealie-oauth
|
||||||
|
namespace: recipes
|
||||||
|
type: Opaque
|
21
infrastructure/argocd/argocd-oauth.configmap.yaml
Normal file
21
infrastructure/argocd/argocd-oauth.configmap.yaml
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: ConfigMap
|
||||||
|
metadata:
|
||||||
|
name: argocd-cm
|
||||||
|
data:
|
||||||
|
url: https://argocd.kluster.moll.re
|
||||||
|
|
||||||
|
oidc.config: |
|
||||||
|
name: Authelia
|
||||||
|
issuer: https://auth.kluster.moll.re
|
||||||
|
clientID: argocd
|
||||||
|
# If you want to store sensitive data in another Kubernetes Secret, instead of argocd-secret. ArgoCD knows to check the keys under data in your Kubernetes Secret for a corresponding key whenever a value in a configmap or secret starts with $, then your Kubernetes Secret name and : (colon).
|
||||||
|
clientSecret: $argocd-oauth:client-secret
|
||||||
|
|
||||||
|
skipAudienceCheckWhenTokenHasNoAudience: true
|
||||||
|
|
||||||
|
# Optional set of OIDC scopes to request. If omitted, defaults to: ["openid", "profile", "email", "groups"]
|
||||||
|
requestedScopes: ["openid", "profile", "email", "groups"]
|
||||||
|
|
||||||
|
# Optional set of OIDC claims to request on the ID token.
|
||||||
|
requestedIDTokenClaims: {"groups": {"essential": true}}
|
16
infrastructure/argocd/argocd-oauth.sealedsecret.yaml
Normal file
16
infrastructure/argocd/argocd-oauth.sealedsecret.yaml
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
---
|
||||||
|
apiVersion: bitnami.com/v1alpha1
|
||||||
|
kind: SealedSecret
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: argocd-oauth
|
||||||
|
namespace: argocd
|
||||||
|
spec:
|
||||||
|
encryptedData:
|
||||||
|
client-secret: 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
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: argocd-oauth
|
||||||
|
namespace: argocd
|
||||||
|
type: Opaque
|
@@ -8,8 +8,10 @@ resources:
|
|||||||
- ingress.yaml
|
- ingress.yaml
|
||||||
- argo-apps.application.yaml
|
- argo-apps.application.yaml
|
||||||
- bootstrap-repo.sealedsecret.yaml
|
- bootstrap-repo.sealedsecret.yaml
|
||||||
|
- argocd-oauth.sealedsecret.yaml
|
||||||
|
|
||||||
|
|
||||||
patches:
|
patches:
|
||||||
- path: known-hosts.configmap.yaml
|
- path: known-hosts.configmap.yaml
|
||||||
- path: argocd.configmap.yaml
|
- path: argocd.configmap.yaml
|
||||||
|
- path: argocd-oauth.configmap.yaml
|
||||||
|
16
infrastructure/authelia/authelia-ldap.sealedsecret.yaml
Normal file
16
infrastructure/authelia/authelia-ldap.sealedsecret.yaml
Normal file
File diff suppressed because one or more lines are too long
16
infrastructure/authelia/authelia-oidc.sealedsecret.yaml
Normal file
16
infrastructure/authelia/authelia-oidc.sealedsecret.yaml
Normal file
File diff suppressed because one or more lines are too long
16
infrastructure/authelia/authelia-smtp.sealedsecret.yaml
Normal file
16
infrastructure/authelia/authelia-smtp.sealedsecret.yaml
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
---
|
||||||
|
apiVersion: bitnami.com/v1alpha1
|
||||||
|
kind: SealedSecret
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: authelia-smtp
|
||||||
|
namespace: authelia
|
||||||
|
spec:
|
||||||
|
encryptedData:
|
||||||
|
smtp.yml: AgAHiNwse+aFYVoun500VoUTUKg22yDSn+cD9pLO4HKG26nqmOxkiTSi5BELpzWouqHXiHNwYLEKPv13ZFJX6AFfFskspBfe+svLvLSzEvtH8kNCSJar0G5jcACEk27xcCxTN0nhmjc6L9lmZF8UUth7l5Mrsl0EG+79pCNYhUtjy16g7HdbmYgmgrY6d7VWCen2R4HZK4A9zPx+8HEsoMzUD0mG+uKKKfmqYaxJ563Gzp7trDcQRXd4tmea9MM8t+bk9TYCDvBj9JbsNuIdzFk8MArlvlesDYqiJj/8wny49NoVyX8vvGVDF3Y5s+OmKA9+MoBIYNc4oT4FLcc14wpnMnk5WgbKtTYfExcGTdTWuTTVWPsF18dvbKTU3C6dnf2kh9T8CydIdu27jwrBbChWffxNbh5nlLlQT3Xvogai8o6qhMn+EqTnw/u93OIxNzPEooVP349VVW/mlhGX3od/IlVzXiIlQIxL5EP2pRCXL2T1KONvkpbClJ/BTuwfjRZTXz3ZaRhaTPdBAZ+bpkRkt+kEAecjqaf9EF+pHy+dOaR4tIrwBWBbrAy47iV4e/Q60B97bRHzgo9N1uaYonGmyzmyVc9TXIkhf7PIlu/cSyDaHKdobVx0AA0p2usi5D1QYMcS9fngXyM1U9imO6QiYopysxQ9gJL8rfuySRJ/YQ6JJ71fLdMxsiQ0r21D7v7LEdJK5SKLovpnmPgk4PBoL9E4ZPE6g5zRXZFj1IxpKkOqRMpyBzBvas9Q1OFFs0Y79kGtyWIXb7Z2HGYmMU1us9Pm95xVF/V34sAtMIEz7qi+SaXQHFvyqbaiJ48U8qHhHL5y+lt9e8PGmQo0tRWfHMejs5BCcFAEZKDiif6zUEsjV/WC9WKO9NUjvRiu0CYCq5z9QzKaZQqWo0LPeM6DMY8pT3w4OqpJ/OLyMfbdoWT/uQ1JW5npApGifL0lhWRIkQHCG7oZA/BkJfbiexV8jwtToS+UX/s9HkbkuQ/O4zDte8qg/Xzh5TOj5AxlAPN6wGCwd6t1RTSITSKVMnTpFabkEvPYnGeiyWU8TrckvaKmhRUNoj2ZWQCCffHKp/bimEHxRqFnW6B+cu35reTjFc2dqp12EhCBR727G0EARx3Gt/LSdPh8OYt+Bs0rLaHiUrCJh4HRBJPmg0PARVwDL7OWx6pwtclnrALmfELKKaopy6yFctDogOtkvxHbL8DNhJqNuQJo6ttzlHhz4bnQcWb2K92HIw==
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: authelia-smtp
|
||||||
|
namespace: authelia
|
||||||
|
type: Opaque
|
85
infrastructure/authelia/authelia.values.yaml
Normal file
85
infrastructure/authelia/authelia.values.yaml
Normal file
@@ -0,0 +1,85 @@
|
|||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
|
||||||
|
pod:
|
||||||
|
kind: 'Deployment'
|
||||||
|
replicas: 1
|
||||||
|
extraVolumes:
|
||||||
|
- name: config-ldap
|
||||||
|
secret:
|
||||||
|
secretName: authelia-ldap
|
||||||
|
- name: config-oidc
|
||||||
|
secret:
|
||||||
|
secretName: authelia-oidc
|
||||||
|
- name: config-smtp
|
||||||
|
secret:
|
||||||
|
secretName: authelia-smtp
|
||||||
|
|
||||||
|
extraVolumeMounts:
|
||||||
|
- name: config-ldap
|
||||||
|
mountPath: /extra-config/ldap.yml
|
||||||
|
readOnly: true
|
||||||
|
- name: config-oidc
|
||||||
|
mountPath: /extra-config/oidc.yml
|
||||||
|
readOnly: true
|
||||||
|
- name: config-smtp
|
||||||
|
mountPath: /extra-config/smtp.yml
|
||||||
|
readOnly: true
|
||||||
|
|
||||||
|
|
||||||
|
##
|
||||||
|
## Authelia Config Map Generator
|
||||||
|
##
|
||||||
|
configMap:
|
||||||
|
|
||||||
|
# Enable the configMap source for the Authelia config.
|
||||||
|
# If this is false you need to provide a volumeMount via PV/PVC or other means that mounts to /config.
|
||||||
|
disabled: false
|
||||||
|
key: 'configuration.yml'
|
||||||
|
# do not use a pre-existing configMap
|
||||||
|
# BUT, include sub-maps wich OVERRIDE the values generated by the helm chart
|
||||||
|
extraConfigs:
|
||||||
|
- /extra-config/ldap.yml
|
||||||
|
- /extra-config/oidc.yml
|
||||||
|
- /extra-config/smtp.yml
|
||||||
|
|
||||||
|
session:
|
||||||
|
cookies:
|
||||||
|
- name: authelia_session
|
||||||
|
domain: auth.kluster.moll.re
|
||||||
|
storage:
|
||||||
|
encryption_key:
|
||||||
|
value: 'authelia-encryption-key'
|
||||||
|
local:
|
||||||
|
enabled: true
|
||||||
|
file: /config/db.sqlite3
|
||||||
|
|
||||||
|
|
||||||
|
##
|
||||||
|
## Authelia Secret Configuration.
|
||||||
|
##
|
||||||
|
secret:
|
||||||
|
|
||||||
|
disabled: false
|
||||||
|
|
||||||
|
existingSecret: ''
|
||||||
|
|
||||||
|
|
||||||
|
certificates:
|
||||||
|
# don't use the pre-existing secret
|
||||||
|
existingSecret: ''
|
||||||
|
|
||||||
|
##
|
||||||
|
## Authelia Persistence Configuration.
|
||||||
|
##
|
||||||
|
## Useful in scenarios where you need persistent storage.
|
||||||
|
## Auth Provider Use Case: file; we recommend you use the ldap provider instead.
|
||||||
|
## Storage Provider Use Case: local; we recommend you use the mysql/mariadb or postgres provider instead.
|
||||||
|
## Configuration Use Case: when you want to manually configure the configuration entirely (set configMap.enabled = false).
|
||||||
|
##
|
||||||
|
persistence:
|
||||||
|
enabled: true
|
||||||
|
storageClass: 'nfs-client'
|
||||||
|
|
@@ -1,16 +1,17 @@
|
|||||||
apiVersion: traefik.io/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: homepage-ingressroute
|
name: authelia-ingressroute
|
||||||
|
|
||||||
spec:
|
spec:
|
||||||
entryPoints:
|
entryPoints:
|
||||||
- websecure
|
- websecure
|
||||||
routes:
|
routes:
|
||||||
- match: Host(`start.kluster.moll.re`)
|
- match: Host(`auth.kluster.moll.re`)
|
||||||
kind: Rule
|
kind: Rule
|
||||||
services:
|
services:
|
||||||
- name: homepage-web
|
- name: authelia
|
||||||
port: 3000
|
port: 80
|
||||||
|
|
||||||
tls:
|
tls:
|
||||||
certResolver: default-tls
|
certResolver: default-tls
|
31
infrastructure/authelia/kustomization.yaml
Normal file
31
infrastructure/authelia/kustomization.yaml
Normal file
@@ -0,0 +1,31 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
|
||||||
|
namespace: authelia
|
||||||
|
|
||||||
|
resources:
|
||||||
|
- namespace.yaml
|
||||||
|
# # As a user management tool, we use LDAP, more specifically, ligh ldap
|
||||||
|
- lldap-credentials.sealedsecret.yaml
|
||||||
|
- lldap.pvc.yaml
|
||||||
|
- lldap.deployment.yaml
|
||||||
|
- lldap.service.yaml
|
||||||
|
# Authelia itself is installed as a helm chart
|
||||||
|
- authelia-ldap.sealedsecret.yaml
|
||||||
|
- authelia-oidc.sealedsecret.yaml
|
||||||
|
- authelia-smtp.sealedsecret.yaml
|
||||||
|
- ingress.yaml
|
||||||
|
|
||||||
|
|
||||||
|
images:
|
||||||
|
- name: lldap
|
||||||
|
newName: nitnelave/lldap
|
||||||
|
newTag: latest
|
||||||
|
|
||||||
|
|
||||||
|
helmCharts:
|
||||||
|
- name: authelia
|
||||||
|
releaseName: authelia
|
||||||
|
version: 0.9.9
|
||||||
|
repo: https://charts.authelia.com
|
||||||
|
valuesFile: authelia.values.yaml
|
18
infrastructure/authelia/lldap-credentials.sealedsecret.yaml
Normal file
18
infrastructure/authelia/lldap-credentials.sealedsecret.yaml
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
---
|
||||||
|
apiVersion: bitnami.com/v1alpha1
|
||||||
|
kind: SealedSecret
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: lldap-credentials
|
||||||
|
namespace: authelia
|
||||||
|
spec:
|
||||||
|
encryptedData:
|
||||||
|
base-dn: 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
|
||||||
|
jwt-secret: AgCI0LA/Y2ZTUl1VZax9Wqd5DxC9OFDe3NfWH9Mr85N5xbF6X5oe49fjW0GTjBE2cytN4aCUy+Gu5kAuo2qgfF1p5XyFY42Tg8q8fyF+LMN0Uu3JlgyA1D3ql0ePc5kNKxD8TRsfcWZOX/KtIWiZxceQ4YJi+OY/7llso3ZiGRCwzV1pXPoFd7A9dSA0qbUklpFI/58VkAUJ1HSel5oCx0JUfxZZAHQaCo72ZPqhbAskOZ4ofH1hzq66NJG5VbOhtBWkPDi4e82OOgT1VqiOiVOUC3w0GAvt6S1SD5P3N2FRqUbRag02rETnja/uahRKDHvLJG82zHXDVGxt5aZQ7bKRYe93gizCaZ4mTfAgrEaz9ys3ywRNr8UL7Cda18YWghvyOqDJSNePn6tUsntc2wA5rRhkPV3NKEhi0Tskqalc8zKXTf4MrX1WJSKw2D8i2l1B6Z7/UhjncAZKaAz7pky33QlitaDtp4Jg4k/ERcqcODB8jG+7oW17At96tXpiqCu6LUki4gkMrtsojRyaVHhl12w4XjVUHW9DyyzELlUT3CluF42wN9zyqDuyhPsuuIr4JrrhNrjvhFU6dcWppvjOvaZMIBvHH5A77F7LDVoCcLwYlrqmpnpxmateeIQHC8IId2JcFlg5CbD3abN9CjtUpoK8ZDRiEt3ULNkyOZ7z1hSfwa9TpJ//HkpWoXsO1b16+ZcNUdM=
|
||||||
|
ldap-user-pass: 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
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: lldap-credentials
|
||||||
|
namespace: authelia
|
||||||
|
type: Opaque
|
54
infrastructure/authelia/lldap.deployment.yaml
Normal file
54
infrastructure/authelia/lldap.deployment.yaml
Normal file
@@ -0,0 +1,54 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: lldap
|
||||||
|
name: lldap
|
||||||
|
spec:
|
||||||
|
replicas: 1
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: lldap
|
||||||
|
strategy:
|
||||||
|
type: Recreate
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: lldap
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- env:
|
||||||
|
- name: GID
|
||||||
|
value: "1001"
|
||||||
|
- name: LLDAP_JWT_SECRET
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: lldap-credentials
|
||||||
|
key: jwt-secret
|
||||||
|
- name: LLDAP_LDAP_BASE_DN
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: lldap-credentials
|
||||||
|
key: base-dn
|
||||||
|
- name: LLDAP_LDAP_USER_PASS
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: lldap-credentials
|
||||||
|
key: ldap-user-pass
|
||||||
|
- name: TZ
|
||||||
|
value: Europe/Berlin
|
||||||
|
- name: UID
|
||||||
|
value: "1001"
|
||||||
|
image: lldap
|
||||||
|
name: lldap
|
||||||
|
ports:
|
||||||
|
- containerPort: 3890
|
||||||
|
- containerPort: 17170
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /data
|
||||||
|
name: lldap-data
|
||||||
|
restartPolicy: Always
|
||||||
|
volumes:
|
||||||
|
- name: lldap-data
|
||||||
|
persistentVolumeClaim:
|
||||||
|
claimName: lldap-data
|
0
infrastructure/authelia/lldap.ingress.yaml
Normal file
0
infrastructure/authelia/lldap.ingress.yaml
Normal file
11
infrastructure/authelia/lldap.pvc.yaml
Normal file
11
infrastructure/authelia/lldap.pvc.yaml
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
kind: PersistentVolumeClaim
|
||||||
|
apiVersion: v1
|
||||||
|
metadata:
|
||||||
|
name: lldap-data
|
||||||
|
spec:
|
||||||
|
storageClassName: "nfs-client"
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteOnce
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: 1Gi
|
10
infrastructure/authelia/lldap.service.yaml
Normal file
10
infrastructure/authelia/lldap.service.yaml
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: lldap
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
app: lldap
|
||||||
|
ports:
|
||||||
|
- port: 3890
|
||||||
|
targetPort: 3890
|
4
infrastructure/authelia/namespace.yaml
Normal file
4
infrastructure/authelia/namespace.yaml
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Namespace
|
||||||
|
metadata:
|
||||||
|
name: placeholder
|
@@ -1,15 +1,8 @@
|
|||||||
# How to restore
|
# How to initialize a new target
|
||||||
|
I used multiple targets for backup. Each target needs to be initialized with a repository.
|
||||||
|
|
||||||
1. Port forward the rest api for gcloud
|
After the target (bucket or other) is created, run the following command **locally** to initialize the target:
|
||||||
```bash
|
|
||||||
kubectl port-forward -n backup service/rclone-gcloud 8000
|
|
||||||
```
|
|
||||||
|
|
||||||
2. Load the snapshots locally
|
```bash
|
||||||
```bash
|
restic -r <target> init
|
||||||
restic -r rest:http://127.0.0.1:8000/kluster mount /mnt/restic
|
```
|
||||||
```
|
|
||||||
(The password is in a secret)
|
|
||||||
|
|
||||||
3. Copy relevant files to the correct location on the NAS
|
|
||||||
|
|
||||||
|
@@ -0,0 +1,19 @@
|
|||||||
|
---
|
||||||
|
apiVersion: bitnami.com/v1alpha1
|
||||||
|
kind: SealedSecret
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: backblaze-credentials
|
||||||
|
namespace: backup
|
||||||
|
spec:
|
||||||
|
encryptedData:
|
||||||
|
bucket-id: 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
|
||||||
|
key-id: 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
|
||||||
|
key-secret: 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
|
||||||
|
repository-string: AgBuD/n5Pnz2AwkFUR6ChGSPMTahm5fdStTay2dD12g+IJC+zNKGlY96rxy1RRLpGJi9sj5UzqIjWd2ke+BB9Xx3RfNygh+hjQEqwb15Z5w8Vo2j7iNRYdjqm/q/ug337Ycc+p2AAxEaA4GZln+Ujq7Xh0m0mOg58N640A+zuav5Xg8dQvUoO5vrqcx8lKzUwZuEayjubZPOZDtED14bTj8FWp6a8A88PjvH+xX9ZCi+omuplHFD8+iJyHewMaPq8CPxsa90J/jHR0FyEzkPcx3/zxryeodQFSiCtvMEb4TZsABMYGlFWOdJwqTcPvqSLRZH9Emx7NmaapknERxuoozDegl/KYF8GpshizBcHaV2YEPxNFiAcPMAqmLTJc0E8SbtGcWeilVdqz2z0+Ezqs0VL5DRICBVFg+HT01bYg3yL8FYd3dfeXepijXurMJodL+pORy0y6NeS9dSvOTqoGr7mf/SeaXSMG+cdHw1+V88CVozqFgV7yLe3NzoOPSIgjyoHckpprZSZHfYF9bgX4r8tT1vrlZqN/KlBcbyYsexYK9+s866b9rpZppvgYx1I50sWm+bAeMEYrVBy2sm6fAbpb1U+3+j9CICVnJ0E1VRyOCRCvh3ncpCRgDhvXAfZTMujxGWR6m9nAi6ixp6nLx3oWsgnszK0kAoxKoHTFiNGzdpr9M092ziBnjPosmLp4fV/HdmWKlldWMsbo0HkdMmPQlKQXmtzZ09WgeSHRh1T/3rSybzwXfukh1tj1IcVIM=
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: backblaze-credentials
|
||||||
|
namespace: backup
|
||||||
|
type: Opaque
|
@@ -1,7 +1,7 @@
|
|||||||
apiVersion: batch/v1
|
apiVersion: batch/v1
|
||||||
kind: CronJob
|
kind: CronJob
|
||||||
metadata:
|
metadata:
|
||||||
name: restic-rclone-gdrive
|
name: restic-backblaze
|
||||||
|
|
||||||
spec:
|
spec:
|
||||||
successfulJobsHistoryLimit: 2
|
successfulJobsHistoryLimit: 2
|
||||||
@@ -12,7 +12,7 @@ spec:
|
|||||||
template:
|
template:
|
||||||
spec:
|
spec:
|
||||||
restartPolicy: Never
|
restartPolicy: Never
|
||||||
hostname: restic-k3s-pod
|
hostname: restic-kluster
|
||||||
# used by restic to identify the host
|
# used by restic to identify the host
|
||||||
containers:
|
containers:
|
||||||
# run after completion of initContainers
|
# run after completion of initContainers
|
||||||
@@ -46,14 +46,27 @@ spec:
|
|||||||
name: backup-nfs-access
|
name: backup-nfs-access
|
||||||
|
|
||||||
env:
|
env:
|
||||||
- name: RESTIC_REPOSITORY
|
# secrets live in the same namespace as per kustomization.yaml
|
||||||
value: rest:http://rclone-gcloud:8000/kluster
|
|
||||||
# lives in the same namespace
|
|
||||||
- name: RESTIC_PASSWORD
|
- name: RESTIC_PASSWORD
|
||||||
valueFrom:
|
valueFrom:
|
||||||
secretKeyRef:
|
secretKeyRef:
|
||||||
name: restic-gdrive-credentials
|
name: restic-gdrive-credentials
|
||||||
key: restic-password
|
key: restic-password
|
||||||
|
- name: RESTIC_REPOSITORY
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: backblaze-credentials
|
||||||
|
key: repository-string
|
||||||
|
- name: AWS_ACCESS_KEY_ID
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: backblaze-credentials
|
||||||
|
key: key-id
|
||||||
|
- name: AWS_SECRET_ACCESS_KEY
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: backblaze-credentials
|
||||||
|
key: key-secret
|
||||||
volumes:
|
volumes:
|
||||||
- name: backup-nfs-access
|
- name: backup-nfs-access
|
||||||
persistentVolumeClaim:
|
persistentVolumeClaim:
|
||||||
|
@@ -1,8 +0,0 @@
|
|||||||
```
|
|
||||||
k kustomize backup/overlays/backup | k apply -f -
|
|
||||||
> secret/restic-credentials-backup created
|
|
||||||
> cronjob.batch/restic-backblaze-backup created
|
|
||||||
k kustomize backup/overlays/prune | k apply -f -
|
|
||||||
> secret/restic-credentials-prune created
|
|
||||||
> cronjob.batch/restic-backblaze-prune created
|
|
||||||
```
|
|
@@ -13,12 +13,12 @@ patches:
|
|||||||
- path: restic-commands.yaml
|
- path: restic-commands.yaml
|
||||||
target:
|
target:
|
||||||
kind: CronJob
|
kind: CronJob
|
||||||
name: restic-rclone-gdrive
|
name: restic-backblaze
|
||||||
- target:
|
- target:
|
||||||
kind: CronJob
|
kind: CronJob
|
||||||
name: restic-rclone-gdrive
|
name: restic-backblaze
|
||||||
# replace the name of the cronjob
|
# replace the name of the cronjob
|
||||||
patch: |-
|
patch: |-
|
||||||
- op: replace
|
- op: replace
|
||||||
path: /metadata/name
|
path: /metadata/name
|
||||||
value: restic-gdrive-backup
|
value: restic-backblaze-backup
|
@@ -1,7 +1,7 @@
|
|||||||
apiVersion: batch/v1
|
apiVersion: batch/v1
|
||||||
kind: CronJob
|
kind: CronJob
|
||||||
metadata:
|
metadata:
|
||||||
name: restic-gdrive-backup
|
name: restic-backblaze-backup
|
||||||
spec:
|
spec:
|
||||||
schedule: "0 2 * * *"
|
schedule: "0 2 * * *"
|
||||||
# at 2:00, every day
|
# at 2:00, every day
|
||||||
@@ -27,4 +27,4 @@ spec:
|
|||||||
- name: ntfy-command-send
|
- name: ntfy-command-send
|
||||||
env:
|
env:
|
||||||
- name: OPERATION
|
- name: OPERATION
|
||||||
value: "Restic backup to gdrive"
|
value: "Restic backup to backblaze"
|
@@ -11,12 +11,12 @@ patches:
|
|||||||
- path: restic-commands.yaml
|
- path: restic-commands.yaml
|
||||||
target:
|
target:
|
||||||
kind: CronJob
|
kind: CronJob
|
||||||
name: restic-rclone-gdrive
|
name: restic-backblaze
|
||||||
- target:
|
- target:
|
||||||
kind: CronJob
|
kind: CronJob
|
||||||
name: restic-rclone-gdrive
|
name: restic-backblaze
|
||||||
# replace the name of the cronjob
|
# replace the name of the cronjob
|
||||||
patch: |-
|
patch: |-
|
||||||
- op: replace
|
- op: replace
|
||||||
path: /metadata/name
|
path: /metadata/name
|
||||||
value: restic-gdrive-prune
|
value: restic-backblaze-prune
|
@@ -1,7 +1,7 @@
|
|||||||
apiVersion: batch/v1
|
apiVersion: batch/v1
|
||||||
kind: CronJob
|
kind: CronJob
|
||||||
metadata:
|
metadata:
|
||||||
name: restic-gdrive-prune
|
name: restic-backblaze-prune
|
||||||
spec:
|
spec:
|
||||||
schedule: "0 0 1/15 * *"
|
schedule: "0 0 1/15 * *"
|
||||||
# at midnight, the first and 15. of every month
|
# at midnight, the first and 15. of every month
|
||||||
@@ -17,13 +17,15 @@ spec:
|
|||||||
# RESTIC_ARGS Can be for instance: --verbose --dry-run
|
# RESTIC_ARGS Can be for instance: --verbose --dry-run
|
||||||
# RESTIC_REPOSITORY is set in the secret
|
# RESTIC_REPOSITORY is set in the secret
|
||||||
- >-
|
- >-
|
||||||
|
restic unlock
|
||||||
|
&&
|
||||||
restic forget
|
restic forget
|
||||||
-r $(RESTIC_REPOSITORY)
|
-r $(RESTIC_REPOSITORY)
|
||||||
--verbose=2
|
--verbose=2
|
||||||
--keep-daily 7 --keep-weekly 5
|
--keep-daily 7 --keep-weekly 10
|
||||||
--prune
|
--prune
|
||||||
containers:
|
containers:
|
||||||
- name: ntfy-command-send
|
- name: ntfy-command-send
|
||||||
env:
|
env:
|
||||||
- name: OPERATION
|
- name: OPERATION
|
||||||
value: "Restic prune on gdrive"
|
value: "Restic prune on backblaze"
|
@@ -8,7 +8,6 @@ resources:
|
|||||||
- namespace.yaml
|
- namespace.yaml
|
||||||
- pvc.yaml
|
- pvc.yaml
|
||||||
- restic-password.sealedsecret.yaml
|
- restic-password.sealedsecret.yaml
|
||||||
- rclone-config.sealedsecret.yaml
|
- backblaze-credentials.sealedsecret.yaml
|
||||||
- rclone-gcloud.deployment.yaml
|
|
||||||
- cronjobs-overlays/prune/
|
- cronjobs-overlays/prune/
|
||||||
- cronjobs-overlays/backup/
|
- cronjobs-overlays/backup/
|
||||||
|
@@ -1,32 +0,0 @@
|
|||||||
apiVersion: batch/v1
|
|
||||||
kind: CronJob
|
|
||||||
metadata:
|
|
||||||
name: postgres-backup
|
|
||||||
spec:
|
|
||||||
# Backup the database every day at 1AM
|
|
||||||
schedule: "0 1 * * *"
|
|
||||||
jobTemplate:
|
|
||||||
spec:
|
|
||||||
template:
|
|
||||||
spec:
|
|
||||||
containers:
|
|
||||||
- name: postgres-backup
|
|
||||||
image: postgres:15
|
|
||||||
command: ["/bin/sh"]
|
|
||||||
args:
|
|
||||||
- '-c'
|
|
||||||
- 'pg_dumpall -U postgres -h postgres-postgresql.postgres > /backup/backup-$(date +"%m-%d-%Y-%H-%M").sql'
|
|
||||||
env:
|
|
||||||
- name: PGPASSWORD
|
|
||||||
valueFrom:
|
|
||||||
secretKeyRef:
|
|
||||||
name: postgres-password
|
|
||||||
key: password
|
|
||||||
volumeMounts:
|
|
||||||
- mountPath: /backup
|
|
||||||
name: postgres-backup-claim
|
|
||||||
restartPolicy: Never
|
|
||||||
volumes:
|
|
||||||
- name: postgres-backup-claim
|
|
||||||
persistentVolumeClaim:
|
|
||||||
claimName: postgres-backup-claim
|
|
@@ -1,9 +0,0 @@
|
|||||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
|
||||||
kind: Kustomization
|
|
||||||
|
|
||||||
namespace: backup
|
|
||||||
|
|
||||||
resources:
|
|
||||||
- postgres.sealedsecret.yaml
|
|
||||||
- pvc.yaml
|
|
||||||
- cronjob.yaml
|
|
@@ -1,21 +0,0 @@
|
|||||||
{
|
|
||||||
"kind": "SealedSecret",
|
|
||||||
"apiVersion": "bitnami.com/v1alpha1",
|
|
||||||
"metadata": {
|
|
||||||
"name": "postgres-password",
|
|
||||||
"namespace": "backup",
|
|
||||||
"creationTimestamp": null
|
|
||||||
},
|
|
||||||
"spec": {
|
|
||||||
"template": {
|
|
||||||
"metadata": {
|
|
||||||
"name": "postgres-password",
|
|
||||||
"namespace": "backup",
|
|
||||||
"creationTimestamp": null
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"encryptedData": {
|
|
||||||
"password": "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"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@@ -1,27 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: PersistentVolume
|
|
||||||
metadata:
|
|
||||||
name: pg-backup-data
|
|
||||||
spec:
|
|
||||||
capacity:
|
|
||||||
storage: "50Gi"
|
|
||||||
accessModes:
|
|
||||||
- ReadWriteOnce
|
|
||||||
nfs:
|
|
||||||
path: /kluster/pg-backup
|
|
||||||
server: 192.168.1.157
|
|
||||||
---
|
|
||||||
kind: PersistentVolumeClaim
|
|
||||||
apiVersion: v1
|
|
||||||
|
|
||||||
metadata:
|
|
||||||
name: postgres-backup-claim
|
|
||||||
|
|
||||||
spec:
|
|
||||||
storageClassName: ""
|
|
||||||
accessModes:
|
|
||||||
- ReadWriteOnce
|
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
storage: 10Gi
|
|
||||||
volumeName: pg-backup-data
|
|
@@ -1,22 +0,0 @@
|
|||||||
{
|
|
||||||
"kind": "SealedSecret",
|
|
||||||
"apiVersion": "bitnami.com/v1alpha1",
|
|
||||||
"metadata": {
|
|
||||||
"name": "rclone-config-files",
|
|
||||||
"namespace": "backup",
|
|
||||||
"creationTimestamp": null
|
|
||||||
},
|
|
||||||
"spec": {
|
|
||||||
"template": {
|
|
||||||
"metadata": {
|
|
||||||
"name": "rclone-config-files",
|
|
||||||
"namespace": "backup",
|
|
||||||
"creationTimestamp": null
|
|
||||||
},
|
|
||||||
"type": "Opaque"
|
|
||||||
},
|
|
||||||
"encryptedData": {
|
|
||||||
"rclone.conf": "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"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@@ -1,54 +0,0 @@
|
|||||||
apiVersion: apps/v1
|
|
||||||
kind: Deployment
|
|
||||||
metadata:
|
|
||||||
name: rclone-gcloud
|
|
||||||
|
|
||||||
spec:
|
|
||||||
selector:
|
|
||||||
matchLabels:
|
|
||||||
app: rclone-gcloud
|
|
||||||
template:
|
|
||||||
metadata:
|
|
||||||
labels:
|
|
||||||
app: rclone-gcloud
|
|
||||||
spec:
|
|
||||||
containers:
|
|
||||||
- name: rclone
|
|
||||||
image: rclone/rclone:latest
|
|
||||||
command: ["/bin/sh", "-c"]
|
|
||||||
args: # mounted as a secret
|
|
||||||
# >- strips newlines
|
|
||||||
# sleep infinity
|
|
||||||
- >-
|
|
||||||
rclone
|
|
||||||
--config /config/rclone.conf
|
|
||||||
serve restic
|
|
||||||
--addr :8000
|
|
||||||
-v
|
|
||||||
ETHZ-gdrive:backup
|
|
||||||
|
|
||||||
volumeMounts:
|
|
||||||
# from secret
|
|
||||||
- name: rclone-config
|
|
||||||
mountPath: /config
|
|
||||||
readOnly: true
|
|
||||||
volumes:
|
|
||||||
- name: rclone-config
|
|
||||||
secret:
|
|
||||||
secretName: rclone-config-files
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: v1
|
|
||||||
kind: Service
|
|
||||||
metadata:
|
|
||||||
name: rclone-gcloud
|
|
||||||
|
|
||||||
spec:
|
|
||||||
selector:
|
|
||||||
app: rclone-gcloud
|
|
||||||
ports:
|
|
||||||
- protocol: TCP
|
|
||||||
port: 8000
|
|
||||||
targetPort: 8000
|
|
||||||
|
|
||||||
|
|
15
infrastructure/crowdsec/bouncer-api-key.sealedsecret.yaml
Normal file
15
infrastructure/crowdsec/bouncer-api-key.sealedsecret.yaml
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
apiVersion: bitnami.com/v1alpha1
|
||||||
|
kind: SealedSecret
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: bouncer-api-key
|
||||||
|
namespace: crowdsec
|
||||||
|
spec:
|
||||||
|
encryptedData:
|
||||||
|
BOUNCER_KEY_TRAEFIK: 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
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: bouncer-api-key
|
||||||
|
namespace: crowdsec
|
12
infrastructure/crowdsec/bouncer.middleware.yaml
Normal file
12
infrastructure/crowdsec/bouncer.middleware.yaml
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
|
kind: Middleware
|
||||||
|
metadata:
|
||||||
|
name: bouncer
|
||||||
|
spec:
|
||||||
|
plugin:
|
||||||
|
bouncer:
|
||||||
|
enabled: true
|
||||||
|
crowdsecMode: stream
|
||||||
|
crowdsecLapiScheme: https
|
||||||
|
crowdsecLapiHost: crowdsec-service.crowdsec:8080
|
||||||
|
crowdsecLapiKey: saödlkfhhqäüweo1p30947ß4rfepoihäp
|
15
infrastructure/crowdsec/dashboard-api-key.sealedsecret.yaml
Normal file
15
infrastructure/crowdsec/dashboard-api-key.sealedsecret.yaml
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
apiVersion: bitnami.com/v1alpha1
|
||||||
|
kind: SealedSecret
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: dashboard-api-key
|
||||||
|
namespace: crowdsec
|
||||||
|
spec:
|
||||||
|
encryptedData:
|
||||||
|
ENROLL_KEY: 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
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: dashboard-api-key
|
||||||
|
namespace: crowdsec
|
18
infrastructure/crowdsec/kustomization.yaml
Normal file
18
infrastructure/crowdsec/kustomization.yaml
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
resources:
|
||||||
|
- namespace.yaml
|
||||||
|
- dashboard-api-key.sealedsecret.yaml
|
||||||
|
- bouncer-api-key.sealedsecret.yaml
|
||||||
|
- bouncer.middleware.yaml
|
||||||
|
|
||||||
|
|
||||||
|
namespace: crowdsec
|
||||||
|
|
||||||
|
|
||||||
|
helmCharts:
|
||||||
|
- name: crowdsec
|
||||||
|
releaseName: crowdsec
|
||||||
|
version: 0.12.0
|
||||||
|
valuesFile: values.yaml
|
||||||
|
repo: https://crowdsecurity.github.io/helm-charts
|
4
infrastructure/crowdsec/namespace.yaml
Normal file
4
infrastructure/crowdsec/namespace.yaml
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Namespace
|
||||||
|
metadata:
|
||||||
|
name: placeholder
|
93
infrastructure/crowdsec/values.yaml
Normal file
93
infrastructure/crowdsec/values.yaml
Normal file
@@ -0,0 +1,93 @@
|
|||||||
|
# -- for raw logs format: json or cri (docker|containerd)
|
||||||
|
container_runtime: containerd
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
# lapi will deploy pod with crowdsec lapi and dashboard as deployment
|
||||||
|
lapi:
|
||||||
|
# -- replicas for local API
|
||||||
|
replicas: 1
|
||||||
|
# -- environment variables from crowdsecurity/crowdsec docker image
|
||||||
|
env:
|
||||||
|
- name: ENROLL_INSTANCE_NAME
|
||||||
|
value: "kluster"
|
||||||
|
|
||||||
|
# Allows you to load environment variables from kubernetes secret or config map
|
||||||
|
envFrom:
|
||||||
|
- secretRef:
|
||||||
|
name: dashboard-api-key
|
||||||
|
- secretRef:
|
||||||
|
name: bouncer-api-key
|
||||||
|
|
||||||
|
|
||||||
|
dashboard:
|
||||||
|
# -- Enable Metabase Dashboard (by default disabled)
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
# -- Enable persistent volumes
|
||||||
|
persistentVolume:
|
||||||
|
# -- Persistent volume for data folder. Stores e.g. registered bouncer api keys
|
||||||
|
data:
|
||||||
|
enabled: true
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteOnce
|
||||||
|
storageClassName: "nfs-client"
|
||||||
|
size: 1Gi
|
||||||
|
# -- Persistent volume for config folder. Stores e.g. online api credentials
|
||||||
|
config:
|
||||||
|
enabled: true
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteOnce
|
||||||
|
storageClassName: "nfs-client"
|
||||||
|
size: 100Mi
|
||||||
|
|
||||||
|
|
||||||
|
# -- Enable service monitoring (exposes "metrics" port "6060" for Prometheus)
|
||||||
|
metrics:
|
||||||
|
enabled: true
|
||||||
|
# -- Creates a ServiceMonitor so Prometheus will monitor this service
|
||||||
|
# -- Prometheus needs to be configured to watch on all namespaces for ServiceMonitors
|
||||||
|
# -- See the documentation: https://github.com/prometheus-community/helm-charts/tree/main/charts/kube-prometheus-stack#prometheusioscrape
|
||||||
|
# -- See also: https://github.com/prometheus-community/helm-charts/issues/106#issuecomment-700847774
|
||||||
|
serviceMonitor:
|
||||||
|
enabled: true
|
||||||
|
|
||||||
|
|
||||||
|
# agent will deploy pod on every node as daemonSet to read wanted pods logs
|
||||||
|
agent:
|
||||||
|
acquisition:
|
||||||
|
# The namespace where the pod is located
|
||||||
|
- namespace: traefik-system
|
||||||
|
# The pod name
|
||||||
|
podName: traefik-*
|
||||||
|
# as in crowdsec configuration, we need to specify the program name to find a matching parser
|
||||||
|
program: traefik
|
||||||
|
|
||||||
|
# -- Enable persistent volumes
|
||||||
|
persistentVolume:
|
||||||
|
# -- Persistent volume for config folder. Stores local config (parsers, scenarios etc.)
|
||||||
|
config:
|
||||||
|
enabled: false
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteOnce
|
||||||
|
storageClassName: ""
|
||||||
|
existingClaim: ""
|
||||||
|
size: 100Mi
|
||||||
|
# -- Enable hostPath to /var/log
|
||||||
|
hostVarLog: true
|
||||||
|
# -- environment variables from crowdsecurity/crowdsec docker image
|
||||||
|
env:
|
||||||
|
- name: COLLECTIONS
|
||||||
|
value: "crowdsecurity/traefik"
|
||||||
|
|
||||||
|
# -- Enable service monitoring (exposes "metrics" port "6060" for Prometheus)
|
||||||
|
metrics:
|
||||||
|
enabled: true
|
||||||
|
# -- Creates a ServiceMonitor so Prometheus will monitor this service
|
||||||
|
# -- Prometheus needs to be configured to watch on all namespaces for ServiceMonitors
|
||||||
|
# -- See the documentation: https://github.com/prometheus-community/helm-charts/tree/main/charts/kube-prometheus-stack#prometheusioscrape
|
||||||
|
# -- See also: https://github.com/prometheus-community/helm-charts/issues/106#issuecomment-700847774
|
||||||
|
serviceMonitor:
|
||||||
|
enabled: false
|
||||||
|
additionalLabels: {}
|
||||||
|
|
@@ -11,8 +11,8 @@ resources:
|
|||||||
images:
|
images:
|
||||||
- name: octodns
|
- name: octodns
|
||||||
newName: octodns/octodns # has all plugins
|
newName: octodns/octodns # has all plugins
|
||||||
newTag: "2024.04"
|
newTag: "2024.09"
|
||||||
|
|
||||||
- name: git
|
- name: git
|
||||||
newName: alpine/git
|
newName: alpine/git
|
||||||
newTag: "2.43.0"
|
newTag: "v2.45.2"
|
Submodule infrastructure/external-dns/octodns deleted from ba74e801c1
2
infrastructure/external/kustomization.yaml
vendored
2
infrastructure/external/kustomization.yaml
vendored
@@ -8,4 +8,4 @@ resources:
|
|||||||
- namespace.yaml
|
- namespace.yaml
|
||||||
- omv-s3.ingress.yaml
|
- omv-s3.ingress.yaml
|
||||||
- openmediavault.ingress.yaml
|
- openmediavault.ingress.yaml
|
||||||
- proxmox.ingress.yaml
|
- proxmox.ingress.yaml
|
||||||
|
31
infrastructure/gitea/README.md
Normal file
31
infrastructure/gitea/README.md
Normal file
@@ -0,0 +1,31 @@
|
|||||||
|
# Using gitea actions
|
||||||
|
The actions deployment allows to use gitea actions from repositories within this instance.
|
||||||
|
|
||||||
|
### Building docker images
|
||||||
|
Docker builds use the kubernetes runner to build the images. For this to work, the pipeline needs to be able to access the kube-api. A service-account is created for this purpose.
|
||||||
|
|
||||||
|
To use the correct docker builder use the following action
|
||||||
|
```yaml
|
||||||
|
...
|
||||||
|
|
||||||
|
- name: Create Kubeconfig
|
||||||
|
run: |
|
||||||
|
mkdir $HOME/.kube
|
||||||
|
echo "${{ secrets.BUILDX_KUBECONFIG }}" > $HOME/.kube/config
|
||||||
|
|
||||||
|
- name: Set up Docker Buildx
|
||||||
|
uses: docker/setup-buildx-action@v3
|
||||||
|
with:
|
||||||
|
driver: kubernetes
|
||||||
|
driver-opts: |
|
||||||
|
namespace=act-runner
|
||||||
|
qemu.install=true
|
||||||
|
|
||||||
|
...
|
||||||
|
|
||||||
|
- name: Build and push
|
||||||
|
uses: docker/build-push-action@v5
|
||||||
|
with:
|
||||||
|
context: .
|
||||||
|
<other config>
|
||||||
|
```
|
@@ -1,24 +1,23 @@
|
|||||||
apiVersion: apps/v1
|
apiVersion: apps/v1
|
||||||
kind: Deployment
|
kind: Deployment
|
||||||
metadata:
|
metadata:
|
||||||
name: actions-runner
|
labels:
|
||||||
|
app: act-runner
|
||||||
|
name: act-runner
|
||||||
spec:
|
spec:
|
||||||
|
replicas: 1
|
||||||
selector:
|
selector:
|
||||||
matchLabels:
|
matchLabels:
|
||||||
app: actions-runner
|
app: act-runner
|
||||||
template:
|
template:
|
||||||
metadata:
|
metadata:
|
||||||
labels:
|
labels:
|
||||||
app: actions-runner
|
app: act-runner
|
||||||
spec:
|
spec:
|
||||||
hostname: kube-runner
|
restartPolicy: Always
|
||||||
containers:
|
containers:
|
||||||
- name: actions-runner
|
- name: runner
|
||||||
image: actions-runner
|
image: vegardit/gitea-act-runner:dind-latest
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
memory: "128Mi"
|
|
||||||
cpu: "500m"
|
|
||||||
env:
|
env:
|
||||||
- name: GITEA_INSTANCE_URL
|
- name: GITEA_INSTANCE_URL
|
||||||
value: "https://git.kluster.moll.re"
|
value: "https://git.kluster.moll.re"
|
||||||
@@ -27,5 +26,35 @@ spec:
|
|||||||
secretKeyRef:
|
secretKeyRef:
|
||||||
name: actions-runner-secret
|
name: actions-runner-secret
|
||||||
key: runner-token
|
key: runner-token
|
||||||
- name: GITEA_RUNNER_LABELS
|
- name: ACTIONS_RUNNER_POD_NAME
|
||||||
value: k8s
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
fieldPath: metadata.name
|
||||||
|
- name: GITEA_RUNNER_UID
|
||||||
|
value: '1000'
|
||||||
|
- name: GITEA_RUNNER_GID
|
||||||
|
value: '1000'
|
||||||
|
- name: GITEA_RUNNER_JOB_CONTAINER_PRIVILEGED
|
||||||
|
value: 'true'
|
||||||
|
securityContext:
|
||||||
|
privileged: true
|
||||||
|
volumeMounts:
|
||||||
|
- name: runner-data
|
||||||
|
mountPath: /data
|
||||||
|
volumes:
|
||||||
|
- name: runner-data
|
||||||
|
persistentVolumeClaim:
|
||||||
|
claimName: runner-data
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: PersistentVolumeClaim
|
||||||
|
metadata:
|
||||||
|
name: runner-data
|
||||||
|
spec:
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: 5Gi
|
||||||
|
storageClassName: "nfs-client"
|
||||||
|
volumeMode: Filesystem
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteMany
|
||||||
|
@@ -7,7 +7,7 @@ metadata:
|
|||||||
namespace: gitea
|
namespace: gitea
|
||||||
spec:
|
spec:
|
||||||
encryptedData:
|
encryptedData:
|
||||||
runner-token: AgBHwek/Aj/0oOnI/bnZ4FgtRoeJw4tIKvcDzBhaPdQ7bMVHyHUKYUNP7lkPgZrIN+7rhMY7C/j13iGWx4iTdhTgipLiJvyZ70pXKLSix4IpcypJTElggWkW0JW79x1HyJfBtn9iJiHnEZXPi7sEnyKhA0asAOR0ae8NS6mxxei0TIImaPaC2RHL6MOi40xsXpHz2ZaVhDQaTSRWjv0U6+WkCGcueqM2HLYfF1gqqkzGCjjhdOTK1CKvIvApZ5n8x6x94IiywCXJraDCwLz+acF2c2vA/Jb/3p7TwyyRZ5uIF5LZufhTJ6+5sFJSReHYxO4CpPA8KvM880vtiEjN7LxVo/Jruj2459OvjviKZS03ZwLHHrjanom1+HA9Sx2ffRLiR5ayGkfj/6kvpIRt5x1F7BbPp+a0LXuxJX+1nGDyEa1D1WzVKvZASav6/v7cXcom/nKGO91Zb8qHlOv7ZTs5guGQ9G9VCOHOG8szwpW3ZmQwWfFoWsShzqbDqszBYOGeIjIiDllLzTZ8A9dv9J2ELngZ1IPGIkfpQNEW8hsbNXTYhdVIrkh7BIFkRWfYDNWxqZd4iE6XllQcT1rqndusgiNEJX2r+P4nT8dPewATXQ79wzvZU3kB+VHzM8cLymlVGADi7v/qTY9RcrhuE0oMLzHRShr6JU05VfLGbMsttrYKmW7smvBp3lRJitO5A8+r8cRniS1+Xr8mIx87vCvnoWSH6BKkl9pCdDeCGylAWfkJN9UpkaKg
|
runner-token: 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
|
||||||
template:
|
template:
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
|
@@ -1,84 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: ServiceAccount
|
|
||||||
metadata:
|
|
||||||
name: drone-runner
|
|
||||||
---
|
|
||||||
kind: Role
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
metadata:
|
|
||||||
name: drone-runner
|
|
||||||
rules:
|
|
||||||
- apiGroups:
|
|
||||||
- ""
|
|
||||||
resources:
|
|
||||||
- secrets
|
|
||||||
verbs:
|
|
||||||
- create
|
|
||||||
- delete
|
|
||||||
- apiGroups:
|
|
||||||
- ""
|
|
||||||
resources:
|
|
||||||
- pods
|
|
||||||
- pods/log
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
- create
|
|
||||||
- delete
|
|
||||||
- list
|
|
||||||
- watch
|
|
||||||
- update
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
kind: RoleBinding
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
metadata:
|
|
||||||
name: drone-runner
|
|
||||||
subjects:
|
|
||||||
- kind: ServiceAccount
|
|
||||||
name: drone-runner
|
|
||||||
roleRef:
|
|
||||||
kind: Role
|
|
||||||
name: drone-runner
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
apiVersion: apps/v1
|
|
||||||
kind: Deployment
|
|
||||||
metadata:
|
|
||||||
name: drone-runner
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: drone-runner
|
|
||||||
spec:
|
|
||||||
replicas: 1
|
|
||||||
selector:
|
|
||||||
matchLabels:
|
|
||||||
app.kubernetes.io/name: drone-runner
|
|
||||||
template:
|
|
||||||
metadata:
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: drone-runner
|
|
||||||
spec:
|
|
||||||
serviceAccountName: drone-runner
|
|
||||||
containers:
|
|
||||||
- name: runner
|
|
||||||
image: drone/drone-runner-kube:latest
|
|
||||||
ports:
|
|
||||||
- containerPort: 3000
|
|
||||||
env:
|
|
||||||
- name: DRONE_RPC_HOST
|
|
||||||
value: drone-server:80
|
|
||||||
- name: DRONE_RPC_PROTO
|
|
||||||
value: http
|
|
||||||
- name: DRONE_RPC_SECRET
|
|
||||||
valueFrom:
|
|
||||||
secretKeyRef:
|
|
||||||
name: drone-server-secret
|
|
||||||
key: rpc_secret
|
|
||||||
- name: DRONE_NAMESPACE_DEFAULT
|
|
||||||
value: gitea
|
|
||||||
# - name: DRONE_NAMESPACE_RULES
|
|
||||||
# value: "drone-runner:*"
|
|
||||||
- name: DRONE_SERVICE_ACCOUNT_DEFAULT
|
|
||||||
value: drone-runner
|
|
@@ -1,117 +0,0 @@
|
|||||||
apiVersion: apps/v1
|
|
||||||
kind: Deployment
|
|
||||||
metadata:
|
|
||||||
name: drone-server
|
|
||||||
labels:
|
|
||||||
app: drone-server
|
|
||||||
spec:
|
|
||||||
replicas: 1
|
|
||||||
selector:
|
|
||||||
matchLabels:
|
|
||||||
app: drone-server
|
|
||||||
template:
|
|
||||||
metadata:
|
|
||||||
labels:
|
|
||||||
app: drone-server
|
|
||||||
spec:
|
|
||||||
containers:
|
|
||||||
- name: drone
|
|
||||||
image: drone/drone:latest
|
|
||||||
env:
|
|
||||||
- name: DRONE_SERVER_PORT # because the deployment is called drone-server, override this var again!
|
|
||||||
value: ":80"
|
|
||||||
- name: DRONE_GITEA_SERVER
|
|
||||||
value: https://git.kluster.moll.re
|
|
||||||
- name: DRONE_USER_CREATE
|
|
||||||
value: username:remoll,admin:true
|
|
||||||
- name: DRONE_GITEA_CLIENT_ID
|
|
||||||
valueFrom:
|
|
||||||
secretKeyRef:
|
|
||||||
name: drone-server-secret
|
|
||||||
key: client_id
|
|
||||||
- name: DRONE_GITEA_CLIENT_SECRET
|
|
||||||
valueFrom:
|
|
||||||
secretKeyRef:
|
|
||||||
name: drone-server-secret
|
|
||||||
key: client_secret
|
|
||||||
- name: DRONE_RPC_SECRET
|
|
||||||
valueFrom:
|
|
||||||
secretKeyRef:
|
|
||||||
name: drone-server-secret
|
|
||||||
key: rpc_secret
|
|
||||||
- name: DRONE_SERVER_HOST
|
|
||||||
value: drone.kluster.moll.re
|
|
||||||
- name: DRONE_SERVER_PROTO
|
|
||||||
value: https
|
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
memory: "1Gi"
|
|
||||||
cpu: 1.5
|
|
||||||
volumeMounts:
|
|
||||||
- mountPath: /data
|
|
||||||
name: drone-data-nfs
|
|
||||||
volumes:
|
|
||||||
- name: drone-data-nfs
|
|
||||||
persistentVolumeClaim:
|
|
||||||
claimName: drone-data-nfs
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: v1
|
|
||||||
kind: Service
|
|
||||||
metadata:
|
|
||||||
name: drone-server
|
|
||||||
labels:
|
|
||||||
app: drone-server
|
|
||||||
|
|
||||||
spec:
|
|
||||||
type: ClusterIP
|
|
||||||
ports:
|
|
||||||
- port: 80
|
|
||||||
name: http
|
|
||||||
selector:
|
|
||||||
app: drone-server
|
|
||||||
---
|
|
||||||
apiVersion: traefik.io/v1alpha1
|
|
||||||
kind: IngressRoute
|
|
||||||
metadata:
|
|
||||||
name: drone-server-ingress
|
|
||||||
|
|
||||||
spec:
|
|
||||||
entryPoints:
|
|
||||||
- websecure
|
|
||||||
routes:
|
|
||||||
- match: Host(`drone.kluster.moll.re`)
|
|
||||||
kind: Rule
|
|
||||||
services:
|
|
||||||
- name: drone-server
|
|
||||||
port: 80
|
|
||||||
tls:
|
|
||||||
certResolver: default-tls
|
|
||||||
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: v1
|
|
||||||
kind: PersistentVolume
|
|
||||||
metadata:
|
|
||||||
name: drone-data-nfs
|
|
||||||
spec:
|
|
||||||
capacity:
|
|
||||||
storage: "1Gi"
|
|
||||||
accessModes:
|
|
||||||
- ReadWriteOnce
|
|
||||||
nfs:
|
|
||||||
path: /export/kluster/drone
|
|
||||||
server: 192.168.1.157
|
|
||||||
---
|
|
||||||
apiVersion: v1
|
|
||||||
kind: PersistentVolumeClaim
|
|
||||||
metadata:
|
|
||||||
name: drone-data-nfs
|
|
||||||
spec:
|
|
||||||
storageClassName: ""
|
|
||||||
accessModes:
|
|
||||||
- ReadWriteOnce
|
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
storage: "1Gi"
|
|
||||||
volumeName: drone-data-nfs
|
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user