Compare commits
95 Commits
feature/un
...
acf9d34b10
| Author | SHA1 | Date | |
|---|---|---|---|
| acf9d34b10 | |||
| 3ffead0a14 | |||
| b6bdc09efc | |||
| 49b21cde52 | |||
| deed24aa01 | |||
| 9cfb98248d | |||
| 7bc4beefce | |||
| ce9ff68c26 | |||
| 8249e7ef01 | |||
| 14e65df483 | |||
| f6fef4278b | |||
| ef50df8386 | |||
| b6df7604ed | |||
| a03d869d0c | |||
| 1063349fbe | |||
| b88c212b57 | |||
| 38a522a8d6 | |||
| 046936f8f6 | |||
| 309cbc08f5 | |||
| 08b4c7eb5e | |||
| 58e632e0b8 | |||
| 30d02edebc | |||
| e30bfe64ae | |||
| 764a3eafb7 | |||
| eff07665de | |||
| 571aebe78d | |||
| 91a2ae5fe8 | |||
| f12c21ef18 | |||
| 2a96b288bf | |||
| 6f3a5aeab2 | |||
| b001bd3efc | |||
| b54794df35 | |||
| 51c8f7c092 | |||
| cfb1a87a5b | |||
| 10483431c6 | |||
| 3a9450da9d | |||
| 374e23ba1e | |||
| 66f703f5e1 | |||
| 4b05b53d72 | |||
| cfbc7fcd0d | |||
| ffed2aea50 | |||
| e674bf5b94 | |||
| 133af74ae0 | |||
| f648064304 | |||
| c7180f793a | |||
| 4fcdaad297 | |||
| f4b99ca037 | |||
| 588bf774f9 | |||
| e18c661dbd | |||
| 7d65ffea6a | |||
| e460b5324a | |||
| 6fe166e60c | |||
| 6ceb3816fb | |||
| 19b63263e6 | |||
| 20d46d89d2 | |||
| 7aee6c7cf0 | |||
| 443da20ff9 | |||
| 84a47b15b6 | |||
| 40259ee57e | |||
| 619368a2fd | |||
| 3288966b95 | |||
| d12d50b906 | |||
| c7f0221062 | |||
| 7819867091 | |||
| dd4c3d7a36 | |||
| e66905402e | |||
| 1bdb4522c3 | |||
| b5845479c2 | |||
| f2f31c4f4e | |||
| ded829500c | |||
| f762f5451b | |||
| 709f21998e | |||
| 47f091be83 | |||
| da8be916bf | |||
| ad67acb9e7 | |||
| 5a7b5a82d7 | |||
| 2c32db61ec | |||
| 141b80d15c | |||
| bf1d4badbe | |||
| be48049e22 | |||
| 3a629284f3 | |||
| 28c92e727f | |||
| 9a65c531f1 | |||
| 52a086df73 | |||
| b728e21a15 | |||
| da32c9c2ce | |||
| 846390600e | |||
| 18d7a6b4cb | |||
| 31c8e91502 | |||
| f0adf6b5db | |||
| b24ae9c698 | |||
| f3c108e362 | |||
| d2a8d92864 | |||
| 10816c4bd9 | |||
| aca0d4ba21 |
6
.gitignore
vendored
6
.gitignore
vendored
@@ -1,2 +1,6 @@
|
|||||||
|
# Kubernetes secrets
|
||||||
*.secret.yaml
|
*.secret.yaml
|
||||||
charts/
|
main.key
|
||||||
|
|
||||||
|
# Helm Chart files
|
||||||
|
charts/
|
||||||
3
.gitmodules
vendored
3
.gitmodules
vendored
@@ -1,3 +1,6 @@
|
|||||||
[submodule "infrastructure/external-dns/octodns"]
|
[submodule "infrastructure/external-dns/octodns"]
|
||||||
path = infrastructure/external-dns/octodns
|
path = infrastructure/external-dns/octodns
|
||||||
url = ssh://git@git.kluster.moll.re:2222/remoll/dns.git
|
url = ssh://git@git.kluster.moll.re:2222/remoll/dns.git
|
||||||
|
[submodule "apps/monitoring/dashboards"]
|
||||||
|
path = apps/monitoring/dashboards
|
||||||
|
url = ssh://git@git.kluster.moll.re:2222/remoll/grafana-dashboards.git
|
||||||
|
|||||||
17
README.md
17
README.md
@@ -1,7 +1,6 @@
|
|||||||
# Kluster setup and IaaC using argoCD
|
# Kluster setup and IaaC using argoCD
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Initial setup
|
### Initial setup
|
||||||
#### Requirements:
|
#### Requirements:
|
||||||
- A running k3s instance
|
- A running k3s instance
|
||||||
@@ -28,5 +27,21 @@ The app-of-apps will bootstrap a fully featured cluster with the following compo
|
|||||||
- immich
|
- immich
|
||||||
- ...
|
- ...
|
||||||
|
|
||||||
|
#### Recap
|
||||||
|
- install sealedsecrets see [README](./infrastructure/sealedsecrets/README.md)
|
||||||
|
```bash
|
||||||
|
kubectl apply -k infrastructure/sealedsecrets
|
||||||
|
kubectl apply -f infrastructure/sealedsecrets/main.key
|
||||||
|
kubectl delete pod -n kube-system -l name=sealed-secrets-controller
|
||||||
|
```
|
||||||
|
- install argocd
|
||||||
|
```bash
|
||||||
|
kubectl apply -k infrastructure/argocd
|
||||||
|
```
|
||||||
|
- wait...
|
||||||
|
|
||||||
|
|
||||||
### Adding an application
|
### Adding an application
|
||||||
|
todo
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRouteTCP
|
kind: IngressRouteTCP
|
||||||
metadata:
|
metadata:
|
||||||
name: adguard-tls-ingress
|
name: adguard-tls-ingress
|
||||||
|
|||||||
@@ -10,7 +10,7 @@ resources:
|
|||||||
images:
|
images:
|
||||||
- name: adguard/adguardhome
|
- name: adguard/adguardhome
|
||||||
newName: adguard/adguardhome
|
newName: adguard/adguardhome
|
||||||
newTag: v0.107.44
|
newTag: v0.107.46
|
||||||
|
|
||||||
namespace: adguard
|
namespace: adguard
|
||||||
|
|
||||||
|
|||||||
48
apps/files/deployment.yaml
Normal file
48
apps/files/deployment.yaml
Normal file
@@ -0,0 +1,48 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: StatefulSet
|
||||||
|
metadata:
|
||||||
|
name: ocis-statefulset
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: ocis
|
||||||
|
serviceName: ocis-web
|
||||||
|
replicas: 1
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: ocis
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: ocis
|
||||||
|
image: ocis
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: "1Gi"
|
||||||
|
cpu: "1000m"
|
||||||
|
env:
|
||||||
|
- name: OCIS_INSECURE
|
||||||
|
value: "true"
|
||||||
|
- name: OCIS_URL
|
||||||
|
value: "https://ocis.kluster.moll.re"
|
||||||
|
- name: OCIS_LOG_LEVEL
|
||||||
|
value: "debug"
|
||||||
|
ports:
|
||||||
|
- containerPort: 9200
|
||||||
|
volumeMounts:
|
||||||
|
- name: config
|
||||||
|
mountPath: /etc/ocis
|
||||||
|
# - name: ocis-config-file
|
||||||
|
# mountPath: /etc/ocis/config.yaml
|
||||||
|
- name: data
|
||||||
|
mountPath: /var/lib/ocis
|
||||||
|
volumes:
|
||||||
|
# - name: ocis-config
|
||||||
|
# persistentVolumeClaim:
|
||||||
|
# claimName: ocis-config
|
||||||
|
- name: config
|
||||||
|
secret:
|
||||||
|
secretName: ocis-config
|
||||||
|
- name: data
|
||||||
|
persistentVolumeClaim:
|
||||||
|
claimName: ocis
|
||||||
18
apps/files/ingress.yaml
Normal file
18
apps/files/ingress.yaml
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
apiVersion: traefik.io/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: ocis-ingressroute
|
||||||
|
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host(`ocis.kluster.moll.re`)
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: ocis-web
|
||||||
|
port: 9200
|
||||||
|
scheme: https
|
||||||
|
|
||||||
|
tls:
|
||||||
|
certResolver: default-tls
|
||||||
16
apps/files/kustomization.yaml
Normal file
16
apps/files/kustomization.yaml
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
resources:
|
||||||
|
- namespace.yaml
|
||||||
|
- ingress.yaml
|
||||||
|
- service.yaml
|
||||||
|
- pvc.yaml
|
||||||
|
- deployment.yaml
|
||||||
|
- ocis-config.sealedsecret.yaml
|
||||||
|
|
||||||
|
namespace: files
|
||||||
|
|
||||||
|
images:
|
||||||
|
- name: ocis
|
||||||
|
newName: owncloud/ocis
|
||||||
|
newTag: "5.0"
|
||||||
4
apps/files/namespace.yaml
Normal file
4
apps/files/namespace.yaml
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Namespace
|
||||||
|
metadata:
|
||||||
|
name: placeholder
|
||||||
17
apps/files/ocis-config.sealedsecret.yaml
Normal file
17
apps/files/ocis-config.sealedsecret.yaml
Normal file
File diff suppressed because one or more lines are too long
@@ -1,13 +1,11 @@
|
|||||||
```
|
|
||||||
kind: PersistentVolumeClaim
|
kind: PersistentVolumeClaim
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
metadata:
|
metadata:
|
||||||
name: test-claim
|
name: ocis
|
||||||
spec:
|
spec:
|
||||||
storageClassName: nfs-client
|
storageClassName: "nfs-client"
|
||||||
accessModes:
|
accessModes:
|
||||||
- ReadWriteMany
|
- ReadWriteOnce
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
storage: 1Mi
|
storage: 150Gi
|
||||||
```
|
|
||||||
10
apps/files/service.yaml
Normal file
10
apps/files/service.yaml
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: ocis-web
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
app: ocis
|
||||||
|
ports:
|
||||||
|
- port: 9200
|
||||||
|
targetPort: 9200
|
||||||
@@ -22,13 +22,13 @@ spec:
|
|||||||
- name: TZ
|
- name: TZ
|
||||||
value: Europe/Berlin
|
value: Europe/Berlin
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- name: actualbudget-data-nfs
|
- name: data
|
||||||
mountPath: /data
|
mountPath: /data
|
||||||
ports:
|
ports:
|
||||||
- containerPort: 5006
|
- containerPort: 5006
|
||||||
name: http
|
name: http
|
||||||
protocol: TCP
|
protocol: TCP
|
||||||
volumes:
|
volumes:
|
||||||
- name: actualbudget-data-nfs
|
- name: data
|
||||||
persistentVolumeClaim:
|
persistentVolumeClaim:
|
||||||
claimName: actualbudget-data-nfs
|
claimName: data
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: actualbudget
|
name: actualbudget
|
||||||
|
|||||||
@@ -1,27 +1,11 @@
|
|||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: PersistentVolume
|
|
||||||
metadata:
|
|
||||||
name: "actualbudget-data-nfs"
|
|
||||||
spec:
|
|
||||||
capacity:
|
|
||||||
storage: "5Gi"
|
|
||||||
accessModes:
|
|
||||||
- ReadWriteOnce
|
|
||||||
nfs:
|
|
||||||
path: /export/kluster/actualbudget
|
|
||||||
server: 192.168.1.157
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: v1
|
|
||||||
kind: PersistentVolumeClaim
|
kind: PersistentVolumeClaim
|
||||||
metadata:
|
metadata:
|
||||||
name: "actualbudget-data-nfs"
|
name: "data"
|
||||||
spec:
|
spec:
|
||||||
storageClassName: ""
|
storageClassName: "nfs-client"
|
||||||
accessModes:
|
accessModes:
|
||||||
- ReadWriteOnce
|
- ReadWriteOnce
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
storage: "5Gi"
|
storage: "5Gi"
|
||||||
|
|
||||||
volumeName: actualbudget-data-nfs
|
|
||||||
|
|||||||
@@ -13,4 +13,4 @@ resources:
|
|||||||
images:
|
images:
|
||||||
- name: actualbudget
|
- name: actualbudget
|
||||||
newName: actualbudget/actual-server
|
newName: actualbudget/actual-server
|
||||||
newTag: 24.2.0
|
newTag: 24.3.0
|
||||||
|
|||||||
16
apps/homeassistant/config.sealedsecret.yaml
Normal file
16
apps/homeassistant/config.sealedsecret.yaml
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
---
|
||||||
|
apiVersion: bitnami.com/v1alpha1
|
||||||
|
kind: SealedSecret
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: config
|
||||||
|
namespace: homeassistant
|
||||||
|
spec:
|
||||||
|
encryptedData:
|
||||||
|
configuration.yaml: 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
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: config
|
||||||
|
namespace: homeassistant
|
||||||
|
type: Opaque
|
||||||
@@ -1,4 +1,3 @@
|
|||||||
|
|
||||||
apiVersion: apps/v1
|
apiVersion: apps/v1
|
||||||
kind: Deployment
|
kind: Deployment
|
||||||
metadata:
|
metadata:
|
||||||
@@ -22,8 +21,11 @@ spec:
|
|||||||
- name: TZ
|
- name: TZ
|
||||||
value: Europe/Berlin
|
value: Europe/Berlin
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- name: config
|
- name: config-dir
|
||||||
mountPath: /config
|
mountPath: /config
|
||||||
|
- name: configuration
|
||||||
|
mountPath: /config/configuration.yaml
|
||||||
|
readOnly: true
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
cpu: "100m"
|
cpu: "100m"
|
||||||
@@ -32,6 +34,10 @@ spec:
|
|||||||
cpu: "2"
|
cpu: "2"
|
||||||
memory: "1Gi"
|
memory: "1Gi"
|
||||||
volumes:
|
volumes:
|
||||||
- name: config
|
- name: config-dir
|
||||||
persistentVolumeClaim:
|
persistentVolumeClaim:
|
||||||
claimName: homeassistant-nfs
|
claimName: config
|
||||||
|
- name: configuration
|
||||||
|
secret:
|
||||||
|
secretName: config
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: homeassistant-ingress
|
name: homeassistant-ingress
|
||||||
@@ -17,7 +17,7 @@ spec:
|
|||||||
certResolver: default-tls
|
certResolver: default-tls
|
||||||
|
|
||||||
---
|
---
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: Middleware
|
kind: Middleware
|
||||||
metadata:
|
metadata:
|
||||||
name: homeassistant-websocket
|
name: homeassistant-websocket
|
||||||
|
|||||||
@@ -9,8 +9,10 @@ resources:
|
|||||||
- pvc.yaml
|
- pvc.yaml
|
||||||
- service.yaml
|
- service.yaml
|
||||||
- deployment.yaml
|
- deployment.yaml
|
||||||
|
- servicemonitor.yaml
|
||||||
|
- config.sealedsecret.yaml
|
||||||
|
|
||||||
images:
|
images:
|
||||||
- name: homeassistant/home-assistant
|
- name: homeassistant/home-assistant
|
||||||
newName: homeassistant/home-assistant
|
newName: homeassistant/home-assistant
|
||||||
newTag: "2024.2"
|
newTag: "2024.1"
|
||||||
|
|||||||
@@ -1,28 +1,11 @@
|
|||||||
---
|
|
||||||
apiVersion: v1
|
|
||||||
kind: PersistentVolume
|
|
||||||
metadata:
|
|
||||||
name: homeassistant-nfs
|
|
||||||
spec:
|
|
||||||
# storageClassName: slow
|
|
||||||
capacity:
|
|
||||||
storage: "1Gi"
|
|
||||||
# volumeMode: Filesystem
|
|
||||||
accessModes:
|
|
||||||
- ReadWriteOnce
|
|
||||||
nfs:
|
|
||||||
path: /kluster/homeassistant
|
|
||||||
server: 192.168.1.157
|
|
||||||
---
|
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: PersistentVolumeClaim
|
kind: PersistentVolumeClaim
|
||||||
metadata:
|
metadata:
|
||||||
name: homeassistant-nfs
|
name: config
|
||||||
spec:
|
spec:
|
||||||
storageClassName: ""
|
storageClassName: "nfs-client"
|
||||||
accessModes:
|
accessModes:
|
||||||
- ReadWriteOnce
|
- ReadWriteOnce
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
storage: "1Gi"
|
storage: "1Gi"
|
||||||
volumeName: homeassistant-nfs
|
|
||||||
|
|||||||
13
apps/homeassistant/servicemonitor.yaml
Normal file
13
apps/homeassistant/servicemonitor.yaml
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
apiVersion: monitoring.coreos.com/v1
|
||||||
|
kind: ServiceMonitor
|
||||||
|
metadata:
|
||||||
|
name: homeassistant-servicemonitor
|
||||||
|
labels:
|
||||||
|
app: homeassistant
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: homeassistant
|
||||||
|
endpoints:
|
||||||
|
- port: homeassistant-web
|
||||||
|
path: /api/prometheus
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: Middleware
|
kind: Middleware
|
||||||
metadata:
|
metadata:
|
||||||
name: stripprefix
|
name: stripprefix
|
||||||
@@ -7,7 +7,7 @@ spec:
|
|||||||
prefixes:
|
prefixes:
|
||||||
- /api
|
- /api
|
||||||
---
|
---
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: Middleware
|
kind: Middleware
|
||||||
metadata:
|
metadata:
|
||||||
name: websocket
|
name: websocket
|
||||||
@@ -18,7 +18,7 @@ spec:
|
|||||||
# enable websockets
|
# enable websockets
|
||||||
Upgrade: "websocket"
|
Upgrade: "websocket"
|
||||||
---
|
---
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: immich-ingressroute
|
name: immich-ingressroute
|
||||||
|
|||||||
@@ -12,14 +12,14 @@ namespace: immich
|
|||||||
helmCharts:
|
helmCharts:
|
||||||
- name: immich
|
- name: immich
|
||||||
releaseName: immich
|
releaseName: immich
|
||||||
version: 0.3.1
|
version: 0.4.0
|
||||||
valuesFile: values.yaml
|
valuesFile: values.yaml
|
||||||
repo: https://immich-app.github.io/immich-charts
|
repo: https://immich-app.github.io/immich-charts
|
||||||
|
|
||||||
|
|
||||||
images:
|
images:
|
||||||
- name: ghcr.io/immich-app/immich-machine-learning
|
- name: ghcr.io/immich-app/immich-machine-learning
|
||||||
newTag: v1.95.1
|
newTag: v1.99.0
|
||||||
- name: ghcr.io/immich-app/immich-server
|
- name: ghcr.io/immich-app/immich-server
|
||||||
newTag: v1.95.1
|
newTag: v1.99.0
|
||||||
|
|
||||||
|
|||||||
@@ -10,7 +10,7 @@ spec:
|
|||||||
initdb:
|
initdb:
|
||||||
owner: immich
|
owner: immich
|
||||||
database: immich
|
database: immich
|
||||||
secret:
|
secret:
|
||||||
name: postgres-password
|
name: postgres-password
|
||||||
|
|
||||||
postgresql:
|
postgresql:
|
||||||
@@ -19,7 +19,12 @@ spec:
|
|||||||
|
|
||||||
storage:
|
storage:
|
||||||
size: 1Gi
|
size: 1Gi
|
||||||
storageClass: nfs-client
|
pvcTemplate:
|
||||||
|
storageClassName: ""
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: "1Gi"
|
||||||
|
volumeName: immich-postgres
|
||||||
|
|
||||||
monitoring:
|
monitoring:
|
||||||
enablePodMonitor: true
|
enablePodMonitor: true
|
||||||
|
|||||||
@@ -24,3 +24,17 @@ spec:
|
|||||||
requests:
|
requests:
|
||||||
storage: "50Gi"
|
storage: "50Gi"
|
||||||
volumeName: immich-nfs
|
volumeName: immich-nfs
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: PersistentVolume
|
||||||
|
metadata:
|
||||||
|
name: immich-postgres
|
||||||
|
spec:
|
||||||
|
capacity:
|
||||||
|
storage: "1Gi"
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteOnce
|
||||||
|
nfs:
|
||||||
|
path: /kluster/immich-postgres
|
||||||
|
server: 192.168.1.157
|
||||||
|
# later used by cnpg
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: jellyfin-vue-ingress
|
name: jellyfin-vue-ingress
|
||||||
@@ -17,7 +17,7 @@ spec:
|
|||||||
tls:
|
tls:
|
||||||
certResolver: default-tls
|
certResolver: default-tls
|
||||||
---
|
---
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: jellyfin-backend-ingress
|
name: jellyfin-backend-ingress
|
||||||
@@ -37,7 +37,7 @@ spec:
|
|||||||
tls:
|
tls:
|
||||||
certResolver: default-tls
|
certResolver: default-tls
|
||||||
---
|
---
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: Middleware
|
kind: Middleware
|
||||||
metadata:
|
metadata:
|
||||||
name: jellyfin-websocket
|
name: jellyfin-websocket
|
||||||
@@ -48,7 +48,7 @@ spec:
|
|||||||
Connection: keep-alive, Upgrade
|
Connection: keep-alive, Upgrade
|
||||||
Upgrade: WebSocket
|
Upgrade: WebSocket
|
||||||
---
|
---
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: Middleware
|
kind: Middleware
|
||||||
metadata:
|
metadata:
|
||||||
name: jellyfin-server-headers
|
name: jellyfin-server-headers
|
||||||
|
|||||||
@@ -1,39 +1,21 @@
|
|||||||
|
|
||||||
apiVersion: v1
|
|
||||||
kind: PersistentVolume
|
|
||||||
metadata:
|
|
||||||
namespace: media
|
|
||||||
name: jellyfin-config-nfs
|
|
||||||
spec:
|
|
||||||
capacity:
|
|
||||||
storage: "1Gi"
|
|
||||||
accessModes:
|
|
||||||
- ReadWriteOnce
|
|
||||||
nfs:
|
|
||||||
path: /export/kluster/jellyfin-config
|
|
||||||
server: 192.168.1.157
|
|
||||||
---
|
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: PersistentVolumeClaim
|
kind: PersistentVolumeClaim
|
||||||
metadata:
|
metadata:
|
||||||
namespace: media
|
name: config
|
||||||
name: jellyfin-config-nfs
|
|
||||||
spec:
|
spec:
|
||||||
storageClassName: ""
|
storageClassName: "nfs-client"
|
||||||
accessModes:
|
accessModes:
|
||||||
- ReadWriteOnce
|
- ReadWriteOnce
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
storage: "1Gi"
|
storage: "1Gi"
|
||||||
volumeName: jellyfin-config-nfs
|
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: PersistentVolume
|
kind: PersistentVolume
|
||||||
metadata:
|
metadata:
|
||||||
namespace: media
|
name: media
|
||||||
name: jellyfin-data-nfs
|
|
||||||
spec:
|
spec:
|
||||||
capacity:
|
capacity:
|
||||||
storage: "1Ti"
|
storage: "1Ti"
|
||||||
@@ -46,8 +28,7 @@ spec:
|
|||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: PersistentVolumeClaim
|
kind: PersistentVolumeClaim
|
||||||
metadata:
|
metadata:
|
||||||
namespace: media
|
name: media
|
||||||
name: jellyfin-data-nfs
|
|
||||||
spec:
|
spec:
|
||||||
storageClassName: ""
|
storageClassName: ""
|
||||||
accessModes:
|
accessModes:
|
||||||
@@ -55,4 +36,4 @@ spec:
|
|||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
storage: "1Ti"
|
storage: "1Ti"
|
||||||
volumeName: jellyfin-data-nfs
|
volumeName: media
|
||||||
|
|||||||
@@ -25,9 +25,9 @@ spec:
|
|||||||
- name: TZ
|
- name: TZ
|
||||||
value: Europe/Berlin
|
value: Europe/Berlin
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- name: jellyfin-config
|
- name: config
|
||||||
mountPath: /config
|
mountPath: /config
|
||||||
- name: jellyfin-data
|
- name: media
|
||||||
mountPath: /media
|
mountPath: /media
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
@@ -36,10 +36,10 @@ spec:
|
|||||||
initialDelaySeconds: 100
|
initialDelaySeconds: 100
|
||||||
periodSeconds: 15
|
periodSeconds: 15
|
||||||
volumes:
|
volumes:
|
||||||
- name: jellyfin-config
|
- name: config
|
||||||
persistentVolumeClaim:
|
persistentVolumeClaim:
|
||||||
claimName: jellyfin-config-nfs
|
claimName: config
|
||||||
- name: jellyfin-data
|
- name: media
|
||||||
persistentVolumeClaim:
|
persistentVolumeClaim:
|
||||||
claimName: jellyfin-data-nfs
|
claimName: media
|
||||||
|
|
||||||
|
|||||||
1
apps/monitoring/dashboards
Submodule
1
apps/monitoring/dashboards
Submodule
Submodule apps/monitoring/dashboards added at 8f99d67c0c
17
apps/monitoring/grafana-admin.sealedsecret.yaml
Normal file
17
apps/monitoring/grafana-admin.sealedsecret.yaml
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
---
|
||||||
|
apiVersion: bitnami.com/v1alpha1
|
||||||
|
kind: SealedSecret
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: grafana-admin-secret
|
||||||
|
namespace: monitoring
|
||||||
|
spec:
|
||||||
|
encryptedData:
|
||||||
|
password: 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
|
||||||
|
user: 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
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: grafana-admin-secret
|
||||||
|
namespace: monitoring
|
||||||
|
type: Opaque
|
||||||
@@ -1,5 +1,5 @@
|
|||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
metadata:
|
metadata:
|
||||||
name: grafana-ingress
|
name: grafana-ingress
|
||||||
spec:
|
spec:
|
||||||
|
|||||||
@@ -1,4 +1,3 @@
|
|||||||
|
|
||||||
replicas: 1
|
replicas: 1
|
||||||
|
|
||||||
## Create a headless service for the deployment
|
## Create a headless service for the deployment
|
||||||
@@ -10,13 +9,6 @@ headlessService: false
|
|||||||
##
|
##
|
||||||
service:
|
service:
|
||||||
enabled: true
|
enabled: true
|
||||||
type: ClusterIP
|
|
||||||
port: 80
|
|
||||||
targetPort: 3000
|
|
||||||
# targetPort: 4181 To be used with a proxy extraContainer
|
|
||||||
annotations: {}
|
|
||||||
labels: {}
|
|
||||||
portName: service
|
|
||||||
|
|
||||||
serviceMonitor:
|
serviceMonitor:
|
||||||
## If true, a ServiceMonitor CRD is created for a prometheus operator
|
## If true, a ServiceMonitor CRD is created for a prometheus operator
|
||||||
@@ -24,42 +16,42 @@ serviceMonitor:
|
|||||||
##
|
##
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
enabled: false
|
enabled: false
|
||||||
persistence:
|
|
||||||
type: pvc
|
|
||||||
enabled: true
|
|
||||||
# storageClassName: default
|
|
||||||
accessModes:
|
|
||||||
- ReadWriteOnce
|
|
||||||
size: 10Gi
|
|
||||||
# annotations: {}
|
|
||||||
finalizers:
|
|
||||||
- kubernetes.io/pvc-protection
|
|
||||||
# selectorLabels: {}
|
|
||||||
## Sub-directory of the PV to mount. Can be templated.
|
|
||||||
# subPath: ""
|
|
||||||
## Name of an existing PVC. Can be templated.
|
|
||||||
existingClaim: grafana-nfs
|
|
||||||
|
|
||||||
## If persistence is not enabled, this allows to mount the
|
# credentials
|
||||||
## local storage in-memory to improve performance
|
admin:
|
||||||
##
|
existingSecret: grafana-admin-secret
|
||||||
inMemory:
|
userKey: user
|
||||||
|
passwordKey: password
|
||||||
|
|
||||||
|
datasources:
|
||||||
|
datasources.yaml:
|
||||||
|
apiVersion: 1
|
||||||
|
datasources:
|
||||||
|
- name: Thanos
|
||||||
|
type: prometheus
|
||||||
|
url: http://thanos-querier.prometheus.svc:9090
|
||||||
|
isDefault: true
|
||||||
|
|
||||||
|
dashboardProviders:
|
||||||
|
dashboardproviders.yaml:
|
||||||
|
|
||||||
|
## Reference to external ConfigMap per provider. Use provider name as key and ConfigMap name as value.
|
||||||
|
## A provider dashboards must be defined either by external ConfigMaps or in values.yaml, not in both.
|
||||||
|
## ConfigMap data example:
|
||||||
|
##
|
||||||
|
## data:
|
||||||
|
## example-dashboard.json: |
|
||||||
|
## RAW_JSON
|
||||||
|
##
|
||||||
|
dashboardsConfigMaps:
|
||||||
|
home-metrics: dashboard-home-metrics
|
||||||
|
proxmox: dashboard-proxmox
|
||||||
|
gitea: dashboard-gitea
|
||||||
|
|
||||||
|
grafana.ini:
|
||||||
|
wal: true
|
||||||
|
default_theme: dark
|
||||||
|
unified_alerting:
|
||||||
enabled: false
|
enabled: false
|
||||||
## The maximum usage on memory medium EmptyDir would be
|
|
||||||
## the minimum value between the SizeLimit specified
|
|
||||||
## here and the sum of memory limits of all containers in a pod
|
|
||||||
##
|
|
||||||
# sizeLimit: 300Mi
|
|
||||||
|
|
||||||
initChownData:
|
|
||||||
## If false, data ownership will not be reset at startup
|
|
||||||
## This allows the prometheus-server to be run with an arbitrary user
|
|
||||||
##
|
|
||||||
enabled: true
|
|
||||||
|
|
||||||
# Administrator credentials when not using an existing secret (see below)
|
|
||||||
adminUser: admin
|
|
||||||
# adminPassword: strongpassword
|
|
||||||
|
|||||||
@@ -6,29 +6,27 @@ namespace: monitoring
|
|||||||
resources:
|
resources:
|
||||||
- namespace.yaml
|
- namespace.yaml
|
||||||
- grafana.pvc.yaml
|
- grafana.pvc.yaml
|
||||||
- influxdb.pvc.yaml
|
# - influxdb.pvc.yaml
|
||||||
- grafana.ingress.yaml
|
- grafana.ingress.yaml
|
||||||
# prometheus-operator crds
|
- grafana-admin.sealedsecret.yaml
|
||||||
- https://github.com/prometheus-operator/prometheus-operator/releases/download/v0.70.0/bundle.yaml
|
- dashboards/
|
||||||
- prometheus.yaml
|
|
||||||
- thanos-objstore-config.sealedsecret.yaml
|
|
||||||
|
|
||||||
|
|
||||||
helmCharts:
|
helmCharts:
|
||||||
- releaseName: grafana
|
- releaseName: grafana
|
||||||
name: grafana
|
name: grafana
|
||||||
repo: https://grafana.github.io/helm-charts
|
repo: https://grafana.github.io/helm-charts
|
||||||
version: 7.3.0
|
version: 7.3.7
|
||||||
valuesFile: grafana.values.yaml
|
valuesFile: grafana.values.yaml
|
||||||
|
|
||||||
- releaseName: influxdb
|
# - releaseName: influxdb
|
||||||
name: influxdb2
|
# name: influxdb2
|
||||||
repo: https://helm.influxdata.com/
|
# repo: https://helm.influxdata.com/
|
||||||
version: 2.1.2
|
# version: 2.1.2
|
||||||
valuesFile: influxdb.values.yaml
|
# valuesFile: influxdb.values.yaml
|
||||||
|
|
||||||
- releaseName: telegraf-speedtest
|
# - releaseName: telegraf-speedtest
|
||||||
name: telegraf
|
# name: telegraf
|
||||||
repo: https://helm.influxdata.com/
|
# repo: https://helm.influxdata.com/
|
||||||
version: 1.8.39
|
# version: 1.8.39
|
||||||
valuesFile: telegraf-speedtest.values.yaml
|
# valuesFile: telegraf-speedtest.values.yaml
|
||||||
|
|||||||
@@ -1,16 +0,0 @@
|
|||||||
---
|
|
||||||
apiVersion: bitnami.com/v1alpha1
|
|
||||||
kind: SealedSecret
|
|
||||||
metadata:
|
|
||||||
creationTimestamp: null
|
|
||||||
name: thanos-objstore-config
|
|
||||||
namespace: monitoring
|
|
||||||
spec:
|
|
||||||
encryptedData:
|
|
||||||
thanos.yaml: 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
|
|
||||||
template:
|
|
||||||
metadata:
|
|
||||||
creationTimestamp: null
|
|
||||||
name: thanos-objstore-config
|
|
||||||
namespace: monitoring
|
|
||||||
type: Opaque
|
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: nextcloud-ingressroute
|
name: nextcloud-ingressroute
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: Middleware
|
kind: Middleware
|
||||||
metadata:
|
metadata:
|
||||||
name: websocket
|
name: websocket
|
||||||
@@ -9,7 +9,7 @@ spec:
|
|||||||
# enable websockets
|
# enable websockets
|
||||||
Upgrade: "websocket"
|
Upgrade: "websocket"
|
||||||
---
|
---
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: ntfy-ingressroute
|
name: ntfy-ingressroute
|
||||||
|
|||||||
@@ -13,4 +13,4 @@ resources:
|
|||||||
images:
|
images:
|
||||||
- name: binwiederhier/ntfy
|
- name: binwiederhier/ntfy
|
||||||
newName: binwiederhier/ntfy
|
newName: binwiederhier/ntfy
|
||||||
newTag: v2.8.0
|
newTag: v2.10.0
|
||||||
|
|||||||
@@ -34,4 +34,4 @@ spec:
|
|||||||
volumes:
|
volumes:
|
||||||
- name: mealie-data
|
- name: mealie-data
|
||||||
persistentVolumeClaim:
|
persistentVolumeClaim:
|
||||||
claimName: mealie-data
|
claimName: mealie
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: mealie-ingressroute
|
name: mealie-ingressroute
|
||||||
|
|||||||
@@ -12,5 +12,5 @@ resources:
|
|||||||
|
|
||||||
images:
|
images:
|
||||||
- name: mealie
|
- name: mealie
|
||||||
newTag: v1.2.0
|
newTag: v1.3.2
|
||||||
newName: ghcr.io/mealie-recipes/mealie
|
newName: ghcr.io/mealie-recipes/mealie
|
||||||
@@ -1,12 +1,12 @@
|
|||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: PersistentVolumeClaim
|
kind: PersistentVolumeClaim
|
||||||
metadata:
|
metadata:
|
||||||
name: mealie-data
|
name: mealie
|
||||||
spec:
|
spec:
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
storage: 1Gi
|
storage: 5Gi
|
||||||
volumeMode: Filesystem
|
volumeMode: Filesystem
|
||||||
storageClassName: nfs-client
|
storageClassName: "nfs-client"
|
||||||
accessModes:
|
accessModes:
|
||||||
- ReadWriteOnce
|
- ReadWriteOnce
|
||||||
|
|||||||
@@ -18,9 +18,9 @@ spec:
|
|||||||
ports:
|
ports:
|
||||||
- containerPort: 7070
|
- containerPort: 7070
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- name: rss-data
|
- name: data
|
||||||
mountPath: /data
|
mountPath: /data
|
||||||
volumes:
|
volumes:
|
||||||
- name: rss-data
|
- name: data
|
||||||
persistentVolumeClaim:
|
persistentVolumeClaim:
|
||||||
claimName: rss-claim
|
claimName: data
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: rss-ingressroute
|
name: rss-ingressroute
|
||||||
|
|||||||
@@ -1,9 +1,9 @@
|
|||||||
kind: PersistentVolumeClaim
|
kind: PersistentVolumeClaim
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
metadata:
|
metadata:
|
||||||
name: rss-claim
|
name: data
|
||||||
spec:
|
spec:
|
||||||
storageClassName: nfs-client
|
storageClassName: "nfs-client"
|
||||||
accessModes:
|
accessModes:
|
||||||
- ReadWriteOnce
|
- ReadWriteOnce
|
||||||
resources:
|
resources:
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: rss-ingressroute
|
name: rss-ingressroute
|
||||||
|
|||||||
@@ -1,11 +1,25 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: PersistentVolume
|
||||||
|
metadata:
|
||||||
|
name: syncthing-data
|
||||||
|
spec:
|
||||||
|
capacity:
|
||||||
|
storage: "50Gi"
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteOnce
|
||||||
|
nfs:
|
||||||
|
path: /kluster/syncthing
|
||||||
|
server: 192.168.1.157
|
||||||
|
---
|
||||||
kind: PersistentVolumeClaim
|
kind: PersistentVolumeClaim
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
metadata:
|
metadata:
|
||||||
name: syncthing-claim
|
name: syncthing-claim
|
||||||
spec:
|
spec:
|
||||||
storageClassName: nfs-client
|
storageClassName: ""
|
||||||
accessModes:
|
accessModes:
|
||||||
- ReadWriteOnce
|
- ReadWriteOnce
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
storage: 10Gi
|
storage: 10Gi
|
||||||
|
volumeName: syncthing
|
||||||
6
apps/todos/README.md
Normal file
6
apps/todos/README.md
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
### Adding a user
|
||||||
|
```bash
|
||||||
|
kubectl exec -it -n todos deployments/todos-vikunja -- /app/vikunja/vikunja user create -u <username> -e "<user-email>"
|
||||||
|
```
|
||||||
|
|
||||||
|
Password will be prompted.
|
||||||
21
apps/todos/ingress.yaml
Normal file
21
apps/todos/ingress.yaml
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
apiVersion: traefik.io/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: todos-ingressroute
|
||||||
|
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host(`todos.kluster.moll.re`) && PathPrefix(`/api/v1`)
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: todos-api
|
||||||
|
port: 3456
|
||||||
|
- match: Host(`todos.kluster.moll.re`) && PathPrefix(`/`)
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: todos-frontend
|
||||||
|
port: 80
|
||||||
|
tls:
|
||||||
|
certResolver: default-tls
|
||||||
18
apps/todos/kustomization.yaml
Normal file
18
apps/todos/kustomization.yaml
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
|
||||||
|
namespace: todos
|
||||||
|
|
||||||
|
resources:
|
||||||
|
- namespace.yaml
|
||||||
|
- pvc.yaml
|
||||||
|
- ingress.yaml
|
||||||
|
|
||||||
|
|
||||||
|
# helmCharts:
|
||||||
|
# - name: vikunja
|
||||||
|
# version: 0.1.5
|
||||||
|
# repo: https://charts.oecis.io
|
||||||
|
# valuesFile: values.yaml
|
||||||
|
# releaseName: todos
|
||||||
|
# managed by argocd directly
|
||||||
4
apps/todos/namespace.yaml
Normal file
4
apps/todos/namespace.yaml
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Namespace
|
||||||
|
metadata:
|
||||||
|
name: placeholder
|
||||||
12
apps/todos/pvc.yaml
Normal file
12
apps/todos/pvc.yaml
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: PersistentVolumeClaim
|
||||||
|
metadata:
|
||||||
|
name: data
|
||||||
|
spec:
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: 5Gi
|
||||||
|
volumeMode: Filesystem
|
||||||
|
storageClassName: "nfs-client"
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteOnce
|
||||||
51
apps/todos/values.yaml
Normal file
51
apps/todos/values.yaml
Normal file
@@ -0,0 +1,51 @@
|
|||||||
|
######################
|
||||||
|
# VIKUNJA COMPONENTS #
|
||||||
|
######################
|
||||||
|
# You can find the default values that this `values.yaml` overrides, in the comment at the top of this file.
|
||||||
|
api:
|
||||||
|
enabled: true
|
||||||
|
image:
|
||||||
|
tag: 0.22.1
|
||||||
|
persistence:
|
||||||
|
# This is your Vikunja data will live, you can either let
|
||||||
|
# the chart create a new PVC for you or provide an existing one.
|
||||||
|
data:
|
||||||
|
enabled: true
|
||||||
|
existingClaim: data
|
||||||
|
accessMode: ReadWriteOnce
|
||||||
|
size: 10Gi
|
||||||
|
mountPath: /app/vikunja/files
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
main:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
configMaps:
|
||||||
|
# The configuration for Vikunja's api.
|
||||||
|
# https://vikunja.io/docs/config-options/
|
||||||
|
config:
|
||||||
|
enabled: true
|
||||||
|
data:
|
||||||
|
config.yml: |
|
||||||
|
service:
|
||||||
|
frontendUrl: https://todos.kluster.moll.re
|
||||||
|
database:
|
||||||
|
type: sqlite
|
||||||
|
path: /app/vikunja/files/vikunja.db
|
||||||
|
registration: false
|
||||||
|
env:
|
||||||
|
|
||||||
|
frontend:
|
||||||
|
enabled: true
|
||||||
|
image:
|
||||||
|
tag: 0.22.1
|
||||||
|
ingress:
|
||||||
|
main:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
postgresql:
|
||||||
|
enabled: false
|
||||||
|
redis:
|
||||||
|
enabled: false
|
||||||
|
typesense:
|
||||||
|
enabled: false
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
namespace: whoami
|
namespace: whoami
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: argocd-ingressroute
|
name: argocd-ingressroute
|
||||||
|
|||||||
@@ -4,7 +4,7 @@ kind: Kustomization
|
|||||||
namespace: backup
|
namespace: backup
|
||||||
# nameSuffix: -backup
|
# nameSuffix: -backup
|
||||||
resources:
|
resources:
|
||||||
- ../../base
|
- ../../cronjobs-base
|
||||||
# - ./restic-commands.yaml
|
# - ./restic-commands.yaml
|
||||||
|
|
||||||
|
|
||||||
@@ -3,7 +3,7 @@ kind: Kustomization
|
|||||||
|
|
||||||
namespace: backup
|
namespace: backup
|
||||||
resources:
|
resources:
|
||||||
- ../../base
|
- ../../cronjobs-base
|
||||||
|
|
||||||
|
|
||||||
# patch the cronjob args field:
|
# patch the cronjob args field:
|
||||||
@@ -1,6 +1,14 @@
|
|||||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
|
||||||
kind: Kustomization
|
kind: Kustomization
|
||||||
|
|
||||||
|
namespace: backup
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
- rclone-config.sealedsecret.yaml
|
- namespace.yaml
|
||||||
|
- pvc.yaml
|
||||||
- restic-password.sealedsecret.yaml
|
- restic-password.sealedsecret.yaml
|
||||||
- pvc.yaml
|
- rclone-config.sealedsecret.yaml
|
||||||
|
- rclone-gcloud.deployment.yaml
|
||||||
|
- cronjobs-overlays/prune/
|
||||||
|
- cronjobs-overlays/backup/
|
||||||
4
infrastructure/backup/namespace.yaml
Normal file
4
infrastructure/backup/namespace.yaml
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Namespace
|
||||||
|
metadata:
|
||||||
|
name: placeholder
|
||||||
@@ -1,3 +1,16 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: PersistentVolume
|
||||||
|
metadata:
|
||||||
|
name: pg-backup-data
|
||||||
|
spec:
|
||||||
|
capacity:
|
||||||
|
storage: "50Gi"
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteOnce
|
||||||
|
nfs:
|
||||||
|
path: /kluster/pg-backup
|
||||||
|
server: 192.168.1.157
|
||||||
|
---
|
||||||
kind: PersistentVolumeClaim
|
kind: PersistentVolumeClaim
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
|
|
||||||
@@ -5,9 +18,10 @@ metadata:
|
|||||||
name: postgres-backup-claim
|
name: postgres-backup-claim
|
||||||
|
|
||||||
spec:
|
spec:
|
||||||
storageClassName: nfs-client
|
storageClassName: ""
|
||||||
accessModes:
|
accessModes:
|
||||||
- ReadWriteOnce
|
- ReadWriteOnce
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
storage: 10Gi
|
storage: 10Gi
|
||||||
|
volumeName: pg-backup-data
|
||||||
|
|||||||
@@ -11,7 +11,7 @@ resources:
|
|||||||
images:
|
images:
|
||||||
- name: octodns
|
- name: octodns
|
||||||
newName: octodns/octodns # has all plugins
|
newName: octodns/octodns # has all plugins
|
||||||
newTag: "2024.02"
|
newTag: "2024.03"
|
||||||
|
|
||||||
- name: git
|
- name: git
|
||||||
newName: alpine/git
|
newName: alpine/git
|
||||||
|
|||||||
11
infrastructure/external/kustomization.yaml
vendored
Normal file
11
infrastructure/external/kustomization.yaml
vendored
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
|
||||||
|
namespace: external
|
||||||
|
|
||||||
|
|
||||||
|
resources:
|
||||||
|
- namespace.yaml
|
||||||
|
- omv-s3.ingress.yaml
|
||||||
|
- openmediavault.ingress.yaml
|
||||||
|
- proxmox.ingress.yaml
|
||||||
4
infrastructure/external/namespace.yaml
vendored
Normal file
4
infrastructure/external/namespace.yaml
vendored
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Namespace
|
||||||
|
metadata:
|
||||||
|
name: placeholder
|
||||||
5
infrastructure/external/omv-s3.ingress.yaml
vendored
5
infrastructure/external/omv-s3.ingress.yaml
vendored
@@ -1,8 +1,7 @@
|
|||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: omv-s3-ingressroute
|
name: omv-s3-ingressroute
|
||||||
namespace: external
|
|
||||||
spec:
|
spec:
|
||||||
entryPoints:
|
entryPoints:
|
||||||
- websecure
|
- websecure
|
||||||
@@ -20,7 +19,6 @@ apiVersion: v1
|
|||||||
kind: Endpoints
|
kind: Endpoints
|
||||||
metadata:
|
metadata:
|
||||||
name: omv-s3
|
name: omv-s3
|
||||||
namespace: external
|
|
||||||
subsets:
|
subsets:
|
||||||
- addresses:
|
- addresses:
|
||||||
- ip: 192.168.1.157
|
- ip: 192.168.1.157
|
||||||
@@ -31,7 +29,6 @@ apiVersion: v1
|
|||||||
kind: Service
|
kind: Service
|
||||||
metadata:
|
metadata:
|
||||||
name: omv-s3
|
name: omv-s3
|
||||||
namespace: external
|
|
||||||
spec:
|
spec:
|
||||||
ports:
|
ports:
|
||||||
- port: 9000
|
- port: 9000
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: omv-ingressroute
|
name: omv-ingressroute
|
||||||
|
|||||||
4
infrastructure/external/proxmox.ingress.yaml
vendored
4
infrastructure/external/proxmox.ingress.yaml
vendored
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: proxmox-ingressroute
|
name: proxmox-ingressroute
|
||||||
@@ -19,7 +19,7 @@ spec:
|
|||||||
tls:
|
tls:
|
||||||
certResolver: default-tls
|
certResolver: default-tls
|
||||||
---
|
---
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: Middleware
|
kind: Middleware
|
||||||
metadata:
|
metadata:
|
||||||
name: proxmox-websocket
|
name: proxmox-websocket
|
||||||
|
|||||||
@@ -71,7 +71,7 @@ spec:
|
|||||||
selector:
|
selector:
|
||||||
app: drone-server
|
app: drone-server
|
||||||
---
|
---
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: drone-server-ingress
|
name: drone-server-ingress
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: gitea-ingress
|
name: gitea-ingress
|
||||||
|
|||||||
@@ -10,6 +10,6 @@ namespace: metallb-system
|
|||||||
helmCharts:
|
helmCharts:
|
||||||
- name: metallb
|
- name: metallb
|
||||||
repo: https://metallb.github.io/metallb
|
repo: https://metallb.github.io/metallb
|
||||||
version: 0.14.3
|
version: 0.14.4
|
||||||
releaseName: metallb
|
releaseName: metallb
|
||||||
valuesFile: values.yaml
|
valuesFile: values.yaml
|
||||||
|
|||||||
20
infrastructure/nfs-provisioner/README.md
Normal file
20
infrastructure/nfs-provisioner/README.md
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
## How to use
|
||||||
|
This deployment exposes a `StorageClass` named `nfs-client` that can be used to create `PersistentVolumeClaim` resources:
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
kind: PersistentVolumeClaim
|
||||||
|
apiVersion: v1
|
||||||
|
metadata:
|
||||||
|
name: test-claim
|
||||||
|
namespace: test-namespace
|
||||||
|
spec:
|
||||||
|
storageClassName: nfs-client
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteMany
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: 1Mi
|
||||||
|
```
|
||||||
|
|
||||||
|
This will create a new folder in the NFS server under `<base-path>/test-namespace/test-claim` and mount it.
|
||||||
@@ -3,8 +3,6 @@ kind: Kustomization
|
|||||||
|
|
||||||
namespace: nfs-provisioner
|
namespace: nfs-provisioner
|
||||||
|
|
||||||
bases:
|
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
- github.com/kubernetes-sigs/nfs-subdir-external-provisioner//deploy
|
- github.com/kubernetes-sigs/nfs-subdir-external-provisioner//deploy
|
||||||
- namespace.yaml
|
- namespace.yaml
|
||||||
@@ -18,4 +18,4 @@ spec:
|
|||||||
- name: nfs-client-root
|
- name: nfs-client-root
|
||||||
nfs:
|
nfs:
|
||||||
server: 192.168.1.157
|
server: 192.168.1.157
|
||||||
path: /export/kluster/
|
path: /export/kluster/
|
||||||
@@ -3,4 +3,5 @@ kind: StorageClass
|
|||||||
metadata:
|
metadata:
|
||||||
name: nfs-client
|
name: nfs-client
|
||||||
parameters:
|
parameters:
|
||||||
onDelete: "retain"
|
archiveOnDelete: "true"
|
||||||
|
pathPattern: "${.PVC.namespace}/${.PVC.name}"
|
||||||
@@ -9,6 +9,6 @@ namespace: pg-ha
|
|||||||
helmCharts:
|
helmCharts:
|
||||||
- name: cloudnative-pg
|
- name: cloudnative-pg
|
||||||
releaseName: pg-controller
|
releaseName: pg-controller
|
||||||
version: 0.19.1
|
version: 0.20.2
|
||||||
valuesFile: values.yaml
|
valuesFile: values.yaml
|
||||||
repo: https://cloudnative-pg.io/charts/
|
repo: https://cloudnative-pg.io/charts/
|
||||||
|
|||||||
20
infrastructure/prometheus/kustomization.yaml
Normal file
20
infrastructure/prometheus/kustomization.yaml
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
|
||||||
|
namespace: prometheus
|
||||||
|
|
||||||
|
resources:
|
||||||
|
- namespace.yaml
|
||||||
|
# prometheus-operator crds
|
||||||
|
- https://github.com/prometheus-operator/prometheus-operator/releases/download/v0.70.0/bundle.yaml
|
||||||
|
- prometheus.yaml
|
||||||
|
- thanos-objstore-config.sealedsecret.yaml
|
||||||
|
# thanos deployment from kube-thanos project
|
||||||
|
- thanos-store.statefulset.yaml
|
||||||
|
- thanos-query.deployment.yaml
|
||||||
|
|
||||||
|
|
||||||
|
images:
|
||||||
|
- name: thanos
|
||||||
|
newName: quay.io/thanos/thanos
|
||||||
|
newTag: v0.34.1
|
||||||
4
infrastructure/prometheus/namespace.yaml
Normal file
4
infrastructure/prometheus/namespace.yaml
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Namespace
|
||||||
|
metadata:
|
||||||
|
name: placeholder
|
||||||
@@ -46,6 +46,8 @@ kind: Prometheus
|
|||||||
metadata:
|
metadata:
|
||||||
name: prometheus
|
name: prometheus
|
||||||
spec:
|
spec:
|
||||||
|
securityContext:
|
||||||
|
runAsUser: 65534 # same as the thanos sidecar
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
memory: 400Mi
|
memory: 400Mi
|
||||||
@@ -0,0 +1,16 @@
|
|||||||
|
---
|
||||||
|
apiVersion: bitnami.com/v1alpha1
|
||||||
|
kind: SealedSecret
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: thanos-objstore-config
|
||||||
|
namespace: prometheus
|
||||||
|
spec:
|
||||||
|
encryptedData:
|
||||||
|
thanos.yaml: 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
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: thanos-objstore-config
|
||||||
|
namespace: prometheus
|
||||||
|
type: Opaque
|
||||||
52
infrastructure/prometheus/thanos-query.deployment.yaml
Normal file
52
infrastructure/prometheus/thanos-query.deployment.yaml
Normal file
@@ -0,0 +1,52 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: thanos-querier
|
||||||
|
labels:
|
||||||
|
app: thanos-querier
|
||||||
|
spec:
|
||||||
|
replicas: 1
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: thanos-querier
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: thanos-querier
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: thanos
|
||||||
|
image: thanos
|
||||||
|
args:
|
||||||
|
- query
|
||||||
|
- --log.level=debug
|
||||||
|
- --query.replica-label=replica
|
||||||
|
- --endpoint=dnssrv+_grpc._tcp.thanos-store:10901
|
||||||
|
ports:
|
||||||
|
- name: http
|
||||||
|
containerPort: 10902
|
||||||
|
- name: grpc
|
||||||
|
containerPort: 10901
|
||||||
|
livenessProbe:
|
||||||
|
httpGet:
|
||||||
|
port: http
|
||||||
|
path: /-/healthy
|
||||||
|
readinessProbe:
|
||||||
|
httpGet:
|
||||||
|
port: http
|
||||||
|
path: /-/ready
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: thanos-querier
|
||||||
|
name: thanos-querier
|
||||||
|
spec:
|
||||||
|
ports:
|
||||||
|
- port: 9090
|
||||||
|
protocol: TCP
|
||||||
|
targetPort: http
|
||||||
|
name: http
|
||||||
|
selector:
|
||||||
|
app: thanos-querier
|
||||||
73
infrastructure/prometheus/thanos-store.statefulset.yaml
Normal file
73
infrastructure/prometheus/thanos-store.statefulset.yaml
Normal file
@@ -0,0 +1,73 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: StatefulSet
|
||||||
|
metadata:
|
||||||
|
name: thanos-store-gateway
|
||||||
|
labels:
|
||||||
|
app: thanos-store-gateway
|
||||||
|
spec:
|
||||||
|
replicas: 1
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: thanos-store-gateway
|
||||||
|
serviceName: thanos-store-gateway
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: thanos-store-gateway
|
||||||
|
thanos-store-api: "true"
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: thanos
|
||||||
|
image: thanos
|
||||||
|
args:
|
||||||
|
- "store"
|
||||||
|
- "--log.level=debug"
|
||||||
|
- "--data-dir=/data"
|
||||||
|
- "--grpc-address=0.0.0.0:10901"
|
||||||
|
- "--http-address=0.0.0.0:10902"
|
||||||
|
- "--objstore.config-file=/etc/secret/thanos.yaml"
|
||||||
|
- "--index-cache-size=500MB"
|
||||||
|
- "--chunk-pool-size=500MB"
|
||||||
|
ports:
|
||||||
|
- name: http
|
||||||
|
containerPort: 10902
|
||||||
|
- name: grpc
|
||||||
|
containerPort: 10901
|
||||||
|
livenessProbe:
|
||||||
|
httpGet:
|
||||||
|
port: 10902
|
||||||
|
path: /-/healthy
|
||||||
|
readinessProbe:
|
||||||
|
httpGet:
|
||||||
|
port: 10902
|
||||||
|
path: /-/ready
|
||||||
|
volumeMounts:
|
||||||
|
- name: thanos-objstore-config
|
||||||
|
mountPath: /etc/secret
|
||||||
|
readOnly: true
|
||||||
|
- name: thanos-data
|
||||||
|
mountPath: /data
|
||||||
|
volumes:
|
||||||
|
- name: thanos-objstore-config
|
||||||
|
secret:
|
||||||
|
secretName: thanos-objstore-config
|
||||||
|
- name: thanos-data
|
||||||
|
emptyDir: {}
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app.kubernetes.io/name: thanos-store
|
||||||
|
name: thanos-store
|
||||||
|
spec:
|
||||||
|
clusterIP: None
|
||||||
|
ports:
|
||||||
|
- name: grpc
|
||||||
|
port: 10901
|
||||||
|
targetPort: 10901
|
||||||
|
- name: http
|
||||||
|
port: 10902
|
||||||
|
targetPort: 10902
|
||||||
|
selector:
|
||||||
|
app: thanos-store-gateway
|
||||||
@@ -3,7 +3,7 @@ kind: CronJob
|
|||||||
metadata:
|
metadata:
|
||||||
name: renovate
|
name: renovate
|
||||||
spec:
|
spec:
|
||||||
schedule: '@hourly'
|
schedule: '0,30 * * * *'
|
||||||
concurrencyPolicy: Forbid
|
concurrencyPolicy: Forbid
|
||||||
jobTemplate:
|
jobTemplate:
|
||||||
spec:
|
spec:
|
||||||
|
|||||||
9
infrastructure/sealedsecrets/README.md
Normal file
9
infrastructure/sealedsecrets/README.md
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
### Restoring sealed secrets
|
||||||
|
```bash
|
||||||
|
# install the sealed secrets controller
|
||||||
|
kubectl kustomize . | kubectl apply -f -
|
||||||
|
# restore the sealed secrets
|
||||||
|
kubectl apply -f main.key
|
||||||
|
# restart pod
|
||||||
|
kubectl delete pod -n kube-system -l name=sealed-secrets-controller
|
||||||
|
```
|
||||||
@@ -6,7 +6,6 @@ metadata:
|
|||||||
labels:
|
labels:
|
||||||
name: sealed-secrets-service-proxier
|
name: sealed-secrets-service-proxier
|
||||||
name: sealed-secrets-service-proxier
|
name: sealed-secrets-service-proxier
|
||||||
namespace: kube-system
|
|
||||||
rules:
|
rules:
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- ""
|
- ""
|
||||||
@@ -35,7 +34,6 @@ metadata:
|
|||||||
labels:
|
labels:
|
||||||
name: sealed-secrets-controller
|
name: sealed-secrets-controller
|
||||||
name: sealed-secrets-controller
|
name: sealed-secrets-controller
|
||||||
namespace: kube-system
|
|
||||||
roleRef:
|
roleRef:
|
||||||
apiGroup: rbac.authorization.k8s.io
|
apiGroup: rbac.authorization.k8s.io
|
||||||
kind: Role
|
kind: Role
|
||||||
@@ -43,7 +41,6 @@ roleRef:
|
|||||||
subjects:
|
subjects:
|
||||||
- kind: ServiceAccount
|
- kind: ServiceAccount
|
||||||
name: sealed-secrets-controller
|
name: sealed-secrets-controller
|
||||||
namespace: kube-system
|
|
||||||
---
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: Role
|
kind: Role
|
||||||
@@ -52,7 +49,6 @@ metadata:
|
|||||||
labels:
|
labels:
|
||||||
name: sealed-secrets-key-admin
|
name: sealed-secrets-key-admin
|
||||||
name: sealed-secrets-key-admin
|
name: sealed-secrets-key-admin
|
||||||
namespace: kube-system
|
|
||||||
rules:
|
rules:
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- ""
|
- ""
|
||||||
@@ -116,7 +112,6 @@ metadata:
|
|||||||
labels:
|
labels:
|
||||||
name: sealed-secrets-service-proxier
|
name: sealed-secrets-service-proxier
|
||||||
name: sealed-secrets-service-proxier
|
name: sealed-secrets-service-proxier
|
||||||
namespace: kube-system
|
|
||||||
roleRef:
|
roleRef:
|
||||||
apiGroup: rbac.authorization.k8s.io
|
apiGroup: rbac.authorization.k8s.io
|
||||||
kind: Role
|
kind: Role
|
||||||
@@ -133,7 +128,6 @@ metadata:
|
|||||||
labels:
|
labels:
|
||||||
name: sealed-secrets-controller
|
name: sealed-secrets-controller
|
||||||
name: sealed-secrets-controller
|
name: sealed-secrets-controller
|
||||||
namespace: kube-system
|
|
||||||
spec:
|
spec:
|
||||||
minReadySeconds: 30
|
minReadySeconds: 30
|
||||||
replicas: 1
|
replicas: 1
|
||||||
@@ -157,7 +151,7 @@ spec:
|
|||||||
command:
|
command:
|
||||||
- controller
|
- controller
|
||||||
env: []
|
env: []
|
||||||
image: docker.io/bitnami/sealed-secrets-controller:v0.23.1
|
image: controller
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
@@ -342,7 +336,6 @@ metadata:
|
|||||||
labels:
|
labels:
|
||||||
name: sealed-secrets-controller
|
name: sealed-secrets-controller
|
||||||
name: sealed-secrets-controller
|
name: sealed-secrets-controller
|
||||||
namespace: kube-system
|
|
||||||
spec:
|
spec:
|
||||||
ports:
|
ports:
|
||||||
- port: 8080
|
- port: 8080
|
||||||
@@ -365,7 +358,6 @@ roleRef:
|
|||||||
subjects:
|
subjects:
|
||||||
- kind: ServiceAccount
|
- kind: ServiceAccount
|
||||||
name: sealed-secrets-controller
|
name: sealed-secrets-controller
|
||||||
namespace: kube-system
|
|
||||||
---
|
---
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: ServiceAccount
|
kind: ServiceAccount
|
||||||
@@ -374,4 +366,3 @@ metadata:
|
|||||||
labels:
|
labels:
|
||||||
name: sealed-secrets-controller
|
name: sealed-secrets-controller
|
||||||
name: sealed-secrets-controller
|
name: sealed-secrets-controller
|
||||||
namespace: kube-system
|
|
||||||
|
|||||||
12
infrastructure/sealedsecrets/kustomization.yaml
Normal file
12
infrastructure/sealedsecrets/kustomization.yaml
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
|
||||||
|
namespace: kube-system
|
||||||
|
|
||||||
|
resources:
|
||||||
|
- controller.yaml
|
||||||
|
|
||||||
|
images:
|
||||||
|
- name: controller
|
||||||
|
newName: docker.io/bitnami/sealed-secrets-controller
|
||||||
|
newTag: 0.26.1
|
||||||
@@ -5,6 +5,8 @@ resources:
|
|||||||
- pvc.yaml
|
- pvc.yaml
|
||||||
- configmap.yaml
|
- configmap.yaml
|
||||||
- servicemonitor.yaml
|
- servicemonitor.yaml
|
||||||
|
- https://raw.githubusercontent.com/traefik/traefik/v2.11/docs/content/reference/dynamic-configuration/kubernetes-crd-definition-v1.yml
|
||||||
|
- https://raw.githubusercontent.com/traefik/traefik/v2.11/docs/content/reference/dynamic-configuration/kubernetes-crd-rbac.yml
|
||||||
|
|
||||||
namespace: traefik-system
|
namespace: traefik-system
|
||||||
|
|
||||||
@@ -13,4 +15,4 @@ helmCharts:
|
|||||||
releaseName: traefik
|
releaseName: traefik
|
||||||
version: 26.1.0
|
version: 26.1.0
|
||||||
valuesFile: values.yaml
|
valuesFile: values.yaml
|
||||||
repo: https://helm.traefik.io/traefik
|
repo: https://traefik.github.io/charts
|
||||||
|
|||||||
@@ -1,14 +1,14 @@
|
|||||||
apiVersion: argoproj.io/v1alpha1
|
apiVersion: argoproj.io/v1alpha1
|
||||||
kind: Application
|
kind: Application
|
||||||
metadata:
|
metadata:
|
||||||
name: restic-commons-application
|
name: backup-application
|
||||||
namespace: argocd
|
namespace: argocd
|
||||||
spec:
|
spec:
|
||||||
project: infrastructure
|
project: infrastructure
|
||||||
source:
|
source:
|
||||||
repoURL: ssh://git@git.kluster.moll.re:2222/remoll/k3s-infra.git
|
repoURL: ssh://git@git.kluster.moll.re:2222/remoll/k3s-infra.git
|
||||||
targetRevision: main
|
targetRevision: main
|
||||||
path: infrastructure/backup/common
|
path: infrastructure/backup/
|
||||||
destination:
|
destination:
|
||||||
server: https://kubernetes.default.svc
|
server: https://kubernetes.default.svc
|
||||||
namespace: backup
|
namespace: backup
|
||||||
@@ -1,18 +0,0 @@
|
|||||||
apiVersion: argoproj.io/v1alpha1
|
|
||||||
kind: Application
|
|
||||||
metadata:
|
|
||||||
name: restic-backup-application
|
|
||||||
namespace: argocd
|
|
||||||
spec:
|
|
||||||
project: infrastructure
|
|
||||||
source:
|
|
||||||
repoURL: ssh://git@git.kluster.moll.re:2222/remoll/k3s-infra.git
|
|
||||||
targetRevision: main
|
|
||||||
path: infrastructure/backup/overlays/backup
|
|
||||||
destination:
|
|
||||||
server: https://kubernetes.default.svc
|
|
||||||
namespace: backup
|
|
||||||
syncPolicy:
|
|
||||||
automated:
|
|
||||||
prune: true
|
|
||||||
selfHeal: true
|
|
||||||
@@ -1,7 +1,4 @@
|
|||||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
kind: Kustomization
|
kind: Kustomization
|
||||||
resources:
|
resources:
|
||||||
- common.application.yaml
|
- application.yaml
|
||||||
- backup.application.yaml
|
|
||||||
- prune.application.yaml
|
|
||||||
- postgres.backup.application.yaml
|
|
||||||
|
|||||||
@@ -1,18 +1,19 @@
|
|||||||
apiVersion: argoproj.io/v1alpha1
|
apiVersion: argoproj.io/v1alpha1
|
||||||
kind: Application
|
kind: Application
|
||||||
metadata:
|
metadata:
|
||||||
name: postgres-backup-application
|
name: external-application
|
||||||
namespace: argocd
|
namespace: argocd
|
||||||
|
|
||||||
spec:
|
spec:
|
||||||
project: infrastructure
|
project: infrastructure
|
||||||
source:
|
source:
|
||||||
repoURL: ssh://git@git.kluster.moll.re:2222/remoll/k3s-infra.git
|
repoURL: ssh://git@git.kluster.moll.re:2222/remoll/k3s-infra.git
|
||||||
targetRevision: main
|
targetRevision: main
|
||||||
path: infrastructure/backup/postgres
|
path: infrastructure/external
|
||||||
destination:
|
destination:
|
||||||
server: https://kubernetes.default.svc
|
server: https://kubernetes.default.svc
|
||||||
namespace: backup
|
namespace: external
|
||||||
syncPolicy:
|
syncPolicy:
|
||||||
automated:
|
automated:
|
||||||
prune: true
|
prune: true
|
||||||
selfHeal: true
|
selfHeal: true
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
kind: Kustomization
|
kind: Kustomization
|
||||||
resources:
|
resources:
|
||||||
- application.yaml
|
- application.yaml
|
||||||
@@ -1,18 +1,19 @@
|
|||||||
apiVersion: argoproj.io/v1alpha1
|
apiVersion: argoproj.io/v1alpha1
|
||||||
kind: Application
|
kind: Application
|
||||||
metadata:
|
metadata:
|
||||||
name: restic-prune-application
|
name: files-application
|
||||||
namespace: argocd
|
namespace: argocd
|
||||||
|
|
||||||
spec:
|
spec:
|
||||||
project: infrastructure
|
project: apps
|
||||||
source:
|
source:
|
||||||
repoURL: ssh://git@git.kluster.moll.re:2222/remoll/k3s-infra.git
|
repoURL: ssh://git@git.kluster.moll.re:2222/remoll/k3s-infra.git
|
||||||
targetRevision: main
|
targetRevision: main
|
||||||
path: infrastructure/backup/overlays/prune
|
path: apps/files
|
||||||
destination:
|
destination:
|
||||||
server: https://kubernetes.default.svc
|
server: https://kubernetes.default.svc
|
||||||
namespace: backup
|
namespace: files
|
||||||
syncPolicy:
|
syncPolicy:
|
||||||
automated:
|
automated:
|
||||||
prune: true
|
prune: true
|
||||||
selfHeal: true
|
selfHeal: true
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user