Merge remote-tracking branch 'refs/remotes/origin/main'
This commit is contained in:
10
attic/cert-dubyatp-xyz.yaml
Normal file
10
attic/cert-dubyatp-xyz.yaml
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
metadata:
|
||||||
|
name: cert-dubyatp-xyz
|
||||||
|
annotations:
|
||||||
|
replicator.v1.mittwald.de/replicate-from: "cert-manager/cert-dubyatp-xyz"
|
||||||
|
replicator.v1.mittwald.de/replicated-keys: "tls.crt,tls.key"
|
||||||
|
data:
|
||||||
|
tls.crt: ""
|
||||||
|
tls.key: ""
|
||||||
30
attic/deployment.yaml
Normal file
30
attic/deployment.yaml
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: attic
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: attic
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: attic
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: attic
|
||||||
|
image: ghcr.io/zhaofengli/attic:ff8a897d1f4408ebbf4d45fa9049c06b3e1e3f4e
|
||||||
|
envFrom:
|
||||||
|
- secretRef:
|
||||||
|
name: attic-secret
|
||||||
|
volumeMounts:
|
||||||
|
- name: attic-pvc
|
||||||
|
mountPath: /var/empty
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: "256Mi"
|
||||||
|
cpu: "500m"
|
||||||
|
volumes:
|
||||||
|
- name: attic-pvc
|
||||||
|
persistentVolumeClaim:
|
||||||
|
claimName: attic-pvc
|
||||||
24
attic/ingress.yaml
Normal file
24
attic/ingress.yaml
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
apiVersion: networking.k8s.io/v1
|
||||||
|
kind: Ingress
|
||||||
|
metadata:
|
||||||
|
name: attic
|
||||||
|
labels:
|
||||||
|
name: attic
|
||||||
|
annotations:
|
||||||
|
traefik.ingress.kubernetes.io/router.middlewares: cloudflarewarp@file
|
||||||
|
spec:
|
||||||
|
rules:
|
||||||
|
- host: nix-cache.dubyatp.xyz
|
||||||
|
http:
|
||||||
|
paths:
|
||||||
|
- pathType: Prefix
|
||||||
|
path: "/"
|
||||||
|
backend:
|
||||||
|
service:
|
||||||
|
name: attic-svc
|
||||||
|
port:
|
||||||
|
number: 8080
|
||||||
|
tls:
|
||||||
|
- hosts:
|
||||||
|
- nix-cache.dubyatp.xyz
|
||||||
|
secretName: cert-dubyatp-xyz
|
||||||
12
attic/pvc.yaml
Normal file
12
attic/pvc.yaml
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: PersistentVolumeClaim
|
||||||
|
metadata:
|
||||||
|
name: attic-pvc
|
||||||
|
spec:
|
||||||
|
storageClassName: weyma-shared
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: 20Gi
|
||||||
|
volumeMode: Filesystem
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteMany
|
||||||
17
attic/secret.yaml
Normal file
17
attic/secret.yaml
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
apiVersion: external-secrets.io/v1beta1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: attic-secret
|
||||||
|
spec:
|
||||||
|
refreshInterval: 1h
|
||||||
|
secretStoreRef:
|
||||||
|
name: weyma-vault
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
target:
|
||||||
|
name: attic-secret
|
||||||
|
creationPolicy: Owner
|
||||||
|
data:
|
||||||
|
- secretKey: ATTIC_SERVER_TOKEN_RS256_SECRET_BASE64
|
||||||
|
remoteRef:
|
||||||
|
key: attic
|
||||||
|
property: ATTIC_SERVER_TOKEN_RS256_SECRET_BASE64
|
||||||
11
attic/service.yaml
Normal file
11
attic/service.yaml
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: attic-svc
|
||||||
|
spec:
|
||||||
|
type: ClusterIP
|
||||||
|
selector:
|
||||||
|
app: attic
|
||||||
|
ports:
|
||||||
|
- port: 8080
|
||||||
|
targetPort: 8080
|
||||||
@@ -114,9 +114,9 @@ authentik:
|
|||||||
annotations:
|
annotations:
|
||||||
replicator.v1.mittwald.de/replicate-from: "cert-manager/cert-dubyatp-xyz"
|
replicator.v1.mittwald.de/replicate-from: "cert-manager/cert-dubyatp-xyz"
|
||||||
replicator.v1.mittwald.de/replicated-keys: "tls.crt,tls.key"
|
replicator.v1.mittwald.de/replicated-keys: "tls.crt,tls.key"
|
||||||
data:
|
data:
|
||||||
tls.crt: ""
|
tls.crt: ""
|
||||||
tls.key: ""
|
tls.key: ""
|
||||||
- apiVersion: external-secrets.io/v1beta1
|
- apiVersion: external-secrets.io/v1beta1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
|
|||||||
10
emby/cert-dubyatp-xyz.yaml
Normal file
10
emby/cert-dubyatp-xyz.yaml
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
metadata:
|
||||||
|
name: cert-dubyatp-xyz
|
||||||
|
annotations:
|
||||||
|
replicator.v1.mittwald.de/replicate-from: "cert-manager/cert-dubyatp-xyz"
|
||||||
|
replicator.v1.mittwald.de/replicated-keys: "tls.crt,tls.key"
|
||||||
|
data:
|
||||||
|
tls.crt: ""
|
||||||
|
tls.key: ""
|
||||||
68
emby/deployment.yaml
Normal file
68
emby/deployment.yaml
Normal file
@@ -0,0 +1,68 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: emby
|
||||||
|
spec:
|
||||||
|
strategy:
|
||||||
|
type: Recreate
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: emby
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
backup.velero.io/backup-volumes: emby-config
|
||||||
|
labels:
|
||||||
|
app: emby
|
||||||
|
spec:
|
||||||
|
volumes:
|
||||||
|
- name: tv-shows
|
||||||
|
nfs:
|
||||||
|
server: 10.105.15.20
|
||||||
|
path: /mnt/hdd-pool/tv-shows
|
||||||
|
- name: movies
|
||||||
|
nfs:
|
||||||
|
server: 10.105.15.20
|
||||||
|
path: /mnt/hdd-pool/movies
|
||||||
|
- name: emby-config
|
||||||
|
persistentVolumeClaim:
|
||||||
|
claimName: emby-config
|
||||||
|
- name: dev-dri
|
||||||
|
hostPath:
|
||||||
|
path: /dev/dri
|
||||||
|
containers:
|
||||||
|
- name: emby
|
||||||
|
image: emby/embyserver:4.9.0.41
|
||||||
|
volumeMounts:
|
||||||
|
- name: tv-shows
|
||||||
|
mountPath: /mnt/tv-shows
|
||||||
|
- name: movies
|
||||||
|
mountPath: /mnt/movies
|
||||||
|
- name: emby-config
|
||||||
|
mountPath: /config
|
||||||
|
- name: dev-dri
|
||||||
|
mountPath: /dev/dri
|
||||||
|
env:
|
||||||
|
- name: UID
|
||||||
|
value: "1000"
|
||||||
|
- name: GID
|
||||||
|
value: "1000"
|
||||||
|
- name: GIDLIST
|
||||||
|
value: "100"
|
||||||
|
livenessProbe:
|
||||||
|
httpGet:
|
||||||
|
path: /
|
||||||
|
port: http
|
||||||
|
securityContext:
|
||||||
|
privileged: true
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: "4096Mi"
|
||||||
|
cpu: "1000m"
|
||||||
|
affinity:
|
||||||
|
nodeAffinity:
|
||||||
|
requiredDuringSchedulingIgnoredDuringExecution:
|
||||||
|
nodeSelectorTerms:
|
||||||
|
- matchExpressions:
|
||||||
|
- key: extensions.talos.dev/i915
|
||||||
|
operator: Exists
|
||||||
22
emby/ingress.yaml
Normal file
22
emby/ingress.yaml
Normal file
@@ -0,0 +1,22 @@
|
|||||||
|
apiVersion: networking.k8s.io/v1
|
||||||
|
kind: Ingress
|
||||||
|
metadata:
|
||||||
|
name: emby-ingress
|
||||||
|
annotations:
|
||||||
|
traefik.ingress.kubernetes.io/router.middlewares: cloudflarewarp@file
|
||||||
|
spec:
|
||||||
|
rules:
|
||||||
|
- host: emby.dubyatp.xyz
|
||||||
|
http:
|
||||||
|
paths:
|
||||||
|
- pathType: Prefix
|
||||||
|
path: "/"
|
||||||
|
backend:
|
||||||
|
service:
|
||||||
|
name: emby-http-svc
|
||||||
|
port:
|
||||||
|
number: 8096
|
||||||
|
tls:
|
||||||
|
- hosts:
|
||||||
|
- emby.dubyatp.xyz
|
||||||
|
secretName: cert-dubyatp-xyz
|
||||||
12
emby/pvc.yaml
Normal file
12
emby/pvc.yaml
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: PersistentVolumeClaim
|
||||||
|
metadata:
|
||||||
|
name: emby-config
|
||||||
|
spec:
|
||||||
|
storageClassName: weyma-shared
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: 10Gi
|
||||||
|
volumeMode: Filesystem
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteOnce
|
||||||
12
emby/resilio-pvc.yaml
Normal file
12
emby/resilio-pvc.yaml
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: PersistentVolumeClaim
|
||||||
|
metadata:
|
||||||
|
name: resilio-pvc
|
||||||
|
spec:
|
||||||
|
storageClassName: weyma-shared
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: 10Gi
|
||||||
|
volumeMode: Filesystem
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteOnce
|
||||||
39
emby/resilio-sync.yaml
Normal file
39
emby/resilio-sync.yaml
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: resilio-sync
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: resilio-sync
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: resilio-sync
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: resilio-sync
|
||||||
|
image: lscr.io/linuxserver/resilio-sync:3.0.0
|
||||||
|
volumeMounts:
|
||||||
|
- name: config
|
||||||
|
mountPath: /config
|
||||||
|
- name: tv-shows
|
||||||
|
mountPath: /sync/tv-shows
|
||||||
|
- name: movies
|
||||||
|
mountPath: /sync/movies
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: "700Mi"
|
||||||
|
cpu: "500m"
|
||||||
|
volumes:
|
||||||
|
- name: config
|
||||||
|
persistentVolumeClaim:
|
||||||
|
claimName: resilio-pvc
|
||||||
|
- name: tv-shows
|
||||||
|
nfs:
|
||||||
|
server: 10.105.15.20
|
||||||
|
path: /mnt/hdd-pool/tv-shows
|
||||||
|
- name: movies
|
||||||
|
nfs:
|
||||||
|
server: 10.105.15.20
|
||||||
|
path: /mnt/hdd-pool/movies
|
||||||
23
emby/svc.yaml
Normal file
23
emby/svc.yaml
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: emby-http-svc
|
||||||
|
spec:
|
||||||
|
type: ClusterIP
|
||||||
|
selector:
|
||||||
|
app: emby
|
||||||
|
ports:
|
||||||
|
- port: 8096
|
||||||
|
targetPort: 8096
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: emby-https-svc
|
||||||
|
spec:
|
||||||
|
type: ClusterIP
|
||||||
|
selector:
|
||||||
|
app: emby
|
||||||
|
ports:
|
||||||
|
- port: 8920
|
||||||
|
targetPort: 8920
|
||||||
@@ -5,6 +5,6 @@ metadata:
|
|||||||
annotations:
|
annotations:
|
||||||
replicator.v1.mittwald.de/replicate-from: "cert-manager/cert-dubyatp-xyz"
|
replicator.v1.mittwald.de/replicate-from: "cert-manager/cert-dubyatp-xyz"
|
||||||
replicator.v1.mittwald.de/replicated-keys: "tls.crt,tls.key"
|
replicator.v1.mittwald.de/replicated-keys: "tls.crt,tls.key"
|
||||||
data:
|
data:
|
||||||
tls.crt: ""
|
tls.crt: ""
|
||||||
tls.key: ""
|
tls.key: ""
|
||||||
@@ -3,6 +3,8 @@ kind: Deployment
|
|||||||
metadata:
|
metadata:
|
||||||
name: vaultwarden
|
name: vaultwarden
|
||||||
spec:
|
spec:
|
||||||
|
strategy:
|
||||||
|
type: Recreate
|
||||||
selector:
|
selector:
|
||||||
matchLabels:
|
matchLabels:
|
||||||
app: vaultwarden
|
app: vaultwarden
|
||||||
@@ -16,6 +18,12 @@ spec:
|
|||||||
containers:
|
containers:
|
||||||
- name: vaultwarden
|
- name: vaultwarden
|
||||||
image: vaultwarden/server:1.33.2-alpine
|
image: vaultwarden/server:1.33.2-alpine
|
||||||
|
livenessProbe:
|
||||||
|
exec:
|
||||||
|
command:
|
||||||
|
- /healthcheck.sh
|
||||||
|
initialDelaySeconds: 10
|
||||||
|
periodSeconds: 60
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
memory: "128Mi"
|
memory: "128Mi"
|
||||||
|
|||||||
10
whatismyip/cert-dubyatp-xyz.yaml
Normal file
10
whatismyip/cert-dubyatp-xyz.yaml
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
metadata:
|
||||||
|
name: cert-dubyatp-xyz
|
||||||
|
annotations:
|
||||||
|
replicator.v1.mittwald.de/replicate-from: "cert-manager/cert-dubyatp-xyz"
|
||||||
|
replicator.v1.mittwald.de/replicated-keys: "tls.crt,tls.key"
|
||||||
|
data:
|
||||||
|
tls.crt: ""
|
||||||
|
tls.key: ""
|
||||||
20
whatismyip/deployment.yaml
Normal file
20
whatismyip/deployment.yaml
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: whatismyip
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: whatismyip
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: whatismyip
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: whatismyip
|
||||||
|
image: ghcr.io/eugenmayer/whatsmyip:0.0.1
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: "128Mi"
|
||||||
|
cpu: "500m"
|
||||||
22
whatismyip/ingress.yaml
Normal file
22
whatismyip/ingress.yaml
Normal file
@@ -0,0 +1,22 @@
|
|||||||
|
apiVersion: networking.k8s.io/v1
|
||||||
|
kind: Ingress
|
||||||
|
metadata:
|
||||||
|
name: whatismyip-ingress
|
||||||
|
annotations:
|
||||||
|
traefik.ingress.kubernetes.io/router.middlewares: cloudflarewarp@file
|
||||||
|
spec:
|
||||||
|
rules:
|
||||||
|
- host: whatismyip.dubyatp.xyz
|
||||||
|
http:
|
||||||
|
paths:
|
||||||
|
- pathType: Prefix
|
||||||
|
path: "/"
|
||||||
|
backend:
|
||||||
|
service:
|
||||||
|
name: whatismyip-svc
|
||||||
|
port:
|
||||||
|
number: 8080
|
||||||
|
tls:
|
||||||
|
- hosts:
|
||||||
|
- whatismyip.dubyatp.xyz
|
||||||
|
secretName: cert-dubyatp-xyz
|
||||||
10
whatismyip/svc.yaml
Normal file
10
whatismyip/svc.yaml
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: whatismyip-svc
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
app: whatismyip
|
||||||
|
ports:
|
||||||
|
- port: 8080
|
||||||
|
targetPort: 8080
|
||||||
Reference in New Issue
Block a user