Compare commits
26 commits
60aa0b134f
...
7a9a5e4dfb
Author | SHA1 | Date | |
---|---|---|---|
7a9a5e4dfb | |||
18c4acef70 | |||
1b362f4cc4 | |||
35263bda94 | |||
4b47b130aa | |||
d0d5350a92 | |||
aa9c28db43 | |||
2f434cf580 | |||
651a30b75c | |||
5aa0355b58 | |||
d439ff9175 | |||
7e04c17bf5 | |||
7196c84c51 | |||
87971913b2 | |||
8121351e9c | |||
907b0b7746 | |||
b2bac535a7 | |||
37857f6937 | |||
6fc5d078a2 | |||
b2aeef55f8 | |||
927ab1adf5 | |||
64f257f1d4 | |||
4352717e22 | |||
65022cdf10 | |||
66dbac10d5 | |||
dc81c04418 |
18 changed files with 440 additions and 4 deletions
kubernetes/apps
ai/open-webui/app
anime/sonarr/app
database
crunchy-postgres-operator/cluster
dragonfly/cluster
mariadb
default
|
@ -33,7 +33,7 @@ spec:
|
|||
app:
|
||||
image:
|
||||
repository: ghcr.io/open-webui/open-webui
|
||||
tag: 0.4.6
|
||||
tag: v0.4.7
|
||||
env:
|
||||
- name: OLLAMA_BASE_URL
|
||||
value: http://10.1.1.61:11434
|
||||
|
|
|
@ -31,7 +31,7 @@ spec:
|
|||
app:
|
||||
image:
|
||||
repository: ghcr.io/onedr0p/sonarr-develop
|
||||
tag: 4.0.11.2688
|
||||
tag: 4.0.11.2697
|
||||
env:
|
||||
SONARR__APP__INSTANCENAME: Sonarr-Anime
|
||||
SONARR__APP__THEME: dark
|
||||
|
|
|
@ -144,6 +144,11 @@ spec:
|
|||
- jellyseerr
|
||||
password:
|
||||
type: AlphaNumeric
|
||||
- name: ptero
|
||||
databases:
|
||||
- ptero
|
||||
password:
|
||||
type: AlphaNumeric
|
||||
|
||||
|
||||
backups:
|
||||
|
|
|
@ -5,7 +5,7 @@ kind: Dragonfly
|
|||
metadata:
|
||||
name: dragonfly
|
||||
spec:
|
||||
image: ghcr.io/dragonflydb/dragonfly:v1.25.3
|
||||
image: ghcr.io/dragonflydb/dragonfly:v1.25.4
|
||||
replicas: 3
|
||||
env:
|
||||
- name: MAX_MEMORY
|
||||
|
|
78
kubernetes/apps/database/mariadb/cluster/backup.yaml
Normal file
78
kubernetes/apps/database/mariadb/cluster/backup.yaml
Normal file
|
@ -0,0 +1,78 @@
|
|||
---
|
||||
# yaml-language-server: $schema=https://ks.hsn.dev/k8s.mariadb.com/backup_v1alpha1.json
|
||||
apiVersion: k8s.mariadb.com/v1alpha1
|
||||
kind: Backup
|
||||
metadata:
|
||||
name: &name mariadb-backup
|
||||
spec:
|
||||
mariaDbRef:
|
||||
name: mariadb
|
||||
timeZone: "America/Chicago"
|
||||
schedule:
|
||||
cron: "0 * * * *"
|
||||
suspend: false
|
||||
stagingStorage:
|
||||
persistentVolumeClaim:
|
||||
storageClassName: openebs-hostpath
|
||||
resources:
|
||||
requests:
|
||||
storage: 6Gi
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
podSecurityContext:
|
||||
runAsUser: 568
|
||||
runAsGroup: 568
|
||||
fsGroup: 568
|
||||
fsGroupChangePolicy: OnRootMismatch
|
||||
storage:
|
||||
s3:
|
||||
endpoint: s3.hsn.dev
|
||||
bucket: mariadb
|
||||
prefix: full/
|
||||
accessKeyIdSecretKeyRef:
|
||||
name: mariadb-secret
|
||||
key: AWS_ACCESS_KEY_ID
|
||||
secretAccessKeySecretKeyRef:
|
||||
name: mariadb-secret
|
||||
key: AWS_SECRET_ACCESS_KEY
|
||||
---
|
||||
# yaml-language-server: $schema=https://ks.hsn.dev/k8s.mariadb.com/backup_v1alpha1.json
|
||||
apiVersion: k8s.mariadb.com/v1alpha1
|
||||
kind: Backup
|
||||
metadata:
|
||||
name: &name mariadb-pterodactyl-backup
|
||||
namespace: database
|
||||
spec:
|
||||
mariaDbRef:
|
||||
name: mariadb
|
||||
namespace: database
|
||||
timeZone: "America/Chicago"
|
||||
schedule:
|
||||
cron: "0 * * * *"
|
||||
suspend: false
|
||||
stagingStorage:
|
||||
persistentVolumeClaim:
|
||||
storageClassName: openebs-hostpath
|
||||
resources:
|
||||
requests:
|
||||
storage: 6Gi
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
podSecurityContext:
|
||||
runAsUser: 568
|
||||
runAsGroup: 568
|
||||
fsGroup: 568
|
||||
fsGroupChangePolicy: OnRootMismatch
|
||||
databases:
|
||||
- pterodactyl
|
||||
storage:
|
||||
s3:
|
||||
endpoint: s3.hsn.dev
|
||||
bucket: mariadb
|
||||
prefix: pterodactyl/
|
||||
accessKeyIdSecretKeyRef:
|
||||
name: mariadb-secret
|
||||
key: AWS_ACCESS_KEY_ID
|
||||
secretAccessKeySecretKeyRef:
|
||||
name: mariadb-secret
|
||||
key: AWS_SECRET_ACCESS_KEY
|
27
kubernetes/apps/database/mariadb/cluster/externalsecret.yaml
Normal file
27
kubernetes/apps/database/mariadb/cluster/externalsecret.yaml
Normal file
|
@ -0,0 +1,27 @@
|
|||
---
|
||||
# yaml-language-server: $schema=https://ks.hsn.dev/external-secrets.io/externalsecret_v1beta1.json
|
||||
apiVersion: external-secrets.io/v1beta1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: &name mariadb
|
||||
spec:
|
||||
secretStoreRef:
|
||||
kind: ClusterSecretStore
|
||||
name: onepassword-connect
|
||||
target:
|
||||
name: mariadb-secret
|
||||
template:
|
||||
engineVersion: v2
|
||||
data:
|
||||
AWS_ACCESS_KEY_ID: "{{ .minio_mariadb_access_key }}"
|
||||
AWS_SECRET_ACCESS_KEY: "{{ .minio_mariadb_secret_key }}"
|
||||
dataFrom:
|
||||
- extract:
|
||||
key: minio
|
||||
rewrite:
|
||||
- regexp:
|
||||
source: "[-]"
|
||||
target: "_"
|
||||
- regexp:
|
||||
source: "(.*)"
|
||||
target: "minio_$1"
|
21
kubernetes/apps/database/mariadb/cluster/gatus.yaml
Normal file
21
kubernetes/apps/database/mariadb/cluster/gatus.yaml
Normal file
|
@ -0,0 +1,21 @@
|
|||
---
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: mariadb-gatus-ep
|
||||
labels:
|
||||
gatus.io/enabled: "true"
|
||||
data:
|
||||
config.yaml: |
|
||||
endpoints:
|
||||
- name: mariadb
|
||||
group: infrastructure
|
||||
url: tcp://mariadb.database.svc.cluster.local:3306
|
||||
interval: 1m
|
||||
ui:
|
||||
hide-url: true
|
||||
hide-hostname: true
|
||||
conditions:
|
||||
- "[CONNECTED] == true"
|
||||
alerts:
|
||||
- type: pushover
|
|
@ -0,0 +1,9 @@
|
|||
---
|
||||
# yaml-language-server: $schema=https://json.schemastore.org/kustomization
|
||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
resources:
|
||||
- ./backup.yaml
|
||||
- ./externalsecret.yaml
|
||||
- ./gatus.yaml
|
||||
- ./mariadb.yaml
|
38
kubernetes/apps/database/mariadb/cluster/mariadb.yaml
Normal file
38
kubernetes/apps/database/mariadb/cluster/mariadb.yaml
Normal file
|
@ -0,0 +1,38 @@
|
|||
---
|
||||
# yaml-language-server: $schema=https://ks.hsn.dev/k8s.mariadb.com/mariadb_v1alpha1.json
|
||||
apiVersion: k8s.mariadb.com/v1alpha1
|
||||
kind: MariaDB
|
||||
metadata:
|
||||
name: &name mariadb
|
||||
spec:
|
||||
# renovate: datasource=docker depName=docker.io/library/mariadb
|
||||
image: docker.io/library/mariadb:11.6.2
|
||||
replicas: 3
|
||||
storage:
|
||||
size: 5Gi
|
||||
storageClassName: openebs-hostpath
|
||||
# bootstrapFrom:
|
||||
# backupRef:
|
||||
# name: mariadb-backup
|
||||
maxScale:
|
||||
enabled: true
|
||||
kubernetesService:
|
||||
type: LoadBalancer
|
||||
metadata:
|
||||
annotations:
|
||||
io.cilium/lb-ipam-ips: 10.1.1.39
|
||||
connection:
|
||||
secretName: mxs-connection
|
||||
port: 3306
|
||||
galera:
|
||||
enabled: true
|
||||
podSecurityContext:
|
||||
runAsUser: 568
|
||||
runAsGroup: 568
|
||||
fsGroup: 568
|
||||
fsGroupChangePolicy: OnRootMismatch
|
||||
service:
|
||||
type: LoadBalancer
|
||||
metadata:
|
||||
annotations:
|
||||
io.cilium/lb-ipam-ips: 10.1.1.33
|
17
kubernetes/apps/database/mariadb/cluster/restore.yaml
Normal file
17
kubernetes/apps/database/mariadb/cluster/restore.yaml
Normal file
|
@ -0,0 +1,17 @@
|
|||
---
|
||||
# yaml-language-server: $schema=https://ks.hsn.dev/k8s.mariadb.com/restore_v1alpha1.json
|
||||
apiVersion: k8s.mariadb.com/v1alpha1
|
||||
kind: Restore
|
||||
metadata:
|
||||
name: restore
|
||||
spec:
|
||||
mariaDbRef:
|
||||
name: mariadb
|
||||
namespace: database
|
||||
backupRef:
|
||||
name: mariadb-backup
|
||||
podSecurityContext:
|
||||
runAsUser: 568
|
||||
runAsGroup: 568
|
||||
fsGroup: 568
|
||||
fsGroupChangePolicy: OnRootMismatch
|
|
@ -40,3 +40,25 @@ spec:
|
|||
wait: true
|
||||
interval: 30m
|
||||
timeout: 5m
|
||||
---
|
||||
# yaml-language-server: $schema=https://ks.hsn.dev/kustomize.toolkit.fluxcd.io/kustomization_v1.json
|
||||
apiVersion: kustomize.toolkit.fluxcd.io/v1
|
||||
kind: Kustomization
|
||||
metadata:
|
||||
name: &app mariadb-cluster
|
||||
namespace: flux-system
|
||||
spec:
|
||||
targetNamespace: database
|
||||
commonMetadata:
|
||||
labels:
|
||||
app.kubernetes.io/name: *app
|
||||
dependsOn:
|
||||
- name: external-secrets-stores
|
||||
path: ./kubernetes/apps/database/mariadb/cluster
|
||||
prune: true
|
||||
sourceRef:
|
||||
kind: GitRepository
|
||||
name: theshire
|
||||
wait: true
|
||||
interval: 30m
|
||||
timeout: 5m
|
||||
|
|
|
@ -18,6 +18,7 @@ resources:
|
|||
- ./overseerr/ks.yaml
|
||||
- ./plex/ks.yaml
|
||||
- ./prowlarr/ks.yaml
|
||||
- ./pterodactyl/ks.yaml
|
||||
- ./radarr/ks.yaml
|
||||
- ./recyclarr/ks.yaml
|
||||
- ./redlib/ks.yaml
|
||||
|
|
30
kubernetes/apps/default/pterodactyl/app/externalsecret.yaml
Normal file
30
kubernetes/apps/default/pterodactyl/app/externalsecret.yaml
Normal file
|
@ -0,0 +1,30 @@
|
|||
---
|
||||
# yaml-language-server: $schema=https://ks.hsn.dev/external-secrets.io/externalsecret_v1beta1.json
|
||||
apiVersion: external-secrets.io/v1beta1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: pterodactyl
|
||||
spec:
|
||||
secretStoreRef:
|
||||
kind: ClusterSecretStore
|
||||
name: onepassword-connect
|
||||
target:
|
||||
name: pterodactyl-secret
|
||||
template:
|
||||
engineVersion: v2
|
||||
data:
|
||||
APP_SERVICE_AUTHOR: "{{ .PTERODACTYL_APP_EMAIL }}"
|
||||
APP_URL: "https://pt.hsn.dev"
|
||||
DB_DATABASE: "pterodactyl"
|
||||
DB_HOST: "mariadb.database.svc.cluster.local"
|
||||
DB_PASSWORD: "{{ .PTERODACTYL_MARIADB_PANEL_PASSWORD }}"
|
||||
DB_USERNAME: "pterodactyl"
|
||||
REDIS_HOST: "dragonfly.database.svc.cluster.local"
|
||||
|
||||
dataFrom:
|
||||
- extract:
|
||||
key: pterodactyl
|
||||
rewrite:
|
||||
- regexp:
|
||||
source: "(.*)"
|
||||
target: "PTERODACTYL_$1"
|
101
kubernetes/apps/default/pterodactyl/app/helmrelease.yaml
Normal file
101
kubernetes/apps/default/pterodactyl/app/helmrelease.yaml
Normal file
|
@ -0,0 +1,101 @@
|
|||
---
|
||||
# yaml-language-server: $schema=https://raw.githubusercontent.com/bjw-s/helm-charts/main/charts/other/app-template/schemas/helmrelease-helm-v2.schema.json
|
||||
apiVersion: helm.toolkit.fluxcd.io/v2
|
||||
kind: HelmRelease
|
||||
metadata:
|
||||
name: &app pterodactyl
|
||||
spec:
|
||||
interval: 30m
|
||||
chart:
|
||||
spec:
|
||||
chart: app-template
|
||||
version: 3.5.1
|
||||
sourceRef:
|
||||
kind: HelmRepository
|
||||
name: bjw-s
|
||||
namespace: flux-system
|
||||
install:
|
||||
remediation:
|
||||
retries: 3
|
||||
upgrade:
|
||||
cleanupOnFail: true
|
||||
remediation:
|
||||
retries: 3
|
||||
strategy: rollback
|
||||
values:
|
||||
controllers:
|
||||
pterodactyl:
|
||||
annotations:
|
||||
reloader.stakater.com/auto: "true"
|
||||
containers:
|
||||
app:
|
||||
image:
|
||||
repository: ghcr.io/pterodactyl/panel
|
||||
tag: v1.11.10@sha256:6c9d060396c0a2c273aa5573460ed51f9176016dac59608b414a3cb02b0cc30c
|
||||
env:
|
||||
CACHE_DRIVER: "redis"
|
||||
SESSION_DRIVER: "redis"
|
||||
QUEUE_DRIVER: "redis"
|
||||
APP_ENV: "production"
|
||||
APP_ENVIRONMENT_ONLY: "false"
|
||||
APP_TIMEZONE: America/Chicago
|
||||
TRUSTED_PROXIES: "*"
|
||||
TZ: America/Chicago
|
||||
envFrom:
|
||||
- secretRef:
|
||||
name: pterodactyl-secret
|
||||
securityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
readOnlyRootFilesystem: true
|
||||
capabilities: { drop: ["ALL"] }
|
||||
resources:
|
||||
requests:
|
||||
cpu: 10m
|
||||
limits:
|
||||
memory: 1Gi
|
||||
pod:
|
||||
securityContext:
|
||||
runAsUser: 568
|
||||
runAsGroup: 568
|
||||
runAsNonRoot: true
|
||||
fsGroup: 568
|
||||
fsGroupChangePolicy: OnRootMismatch
|
||||
service:
|
||||
app:
|
||||
controller: pterodactyl
|
||||
ports:
|
||||
http:
|
||||
port: 80
|
||||
ingress:
|
||||
app:
|
||||
enabled: true
|
||||
className: external-nginx
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/target: external.hsn.dev
|
||||
external-dns.alpha.kubernetes.io/cloudflare-proxied: "true"
|
||||
hosts:
|
||||
- host: &host "pt.hsn.dev"
|
||||
paths:
|
||||
- path: /
|
||||
service:
|
||||
identifier: app
|
||||
port: http
|
||||
tls:
|
||||
- hosts:
|
||||
- *host
|
||||
persistence:
|
||||
config:
|
||||
existingClaim: *app
|
||||
advancedMounts:
|
||||
pterodactyl:
|
||||
app:
|
||||
- subPath: "config"
|
||||
path: "/app/var"
|
||||
- subPath: "nginx"
|
||||
path: "/etc/nginx/http.d"
|
||||
- subPath: "applogs"
|
||||
path: "/app/storage/logs"
|
||||
- subPath: "syslogs"
|
||||
path: "/var/log"
|
||||
- subPath: "letsencrypt"
|
||||
path: "/etc/letsencrypt"
|
10
kubernetes/apps/default/pterodactyl/app/kustomization.yaml
Normal file
10
kubernetes/apps/default/pterodactyl/app/kustomization.yaml
Normal file
|
@ -0,0 +1,10 @@
|
|||
---
|
||||
# yaml-language-server: $schema=https://json.schemastore.org/kustomization.json
|
||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
resources:
|
||||
- ../../../../templates/volsync
|
||||
- ../../../../templates/gatus/external
|
||||
- ./externalsecret.yaml
|
||||
# - ./helmrelease.yaml
|
||||
- ./mariadb.yaml
|
46
kubernetes/apps/default/pterodactyl/app/mariadb.yaml
Normal file
46
kubernetes/apps/default/pterodactyl/app/mariadb.yaml
Normal file
|
@ -0,0 +1,46 @@
|
|||
---
|
||||
# yaml-language-server: $schema=https://ks.hsn.dev/k8s.mariadb.com/database_v1alpha1.json
|
||||
apiVersion: k8s.mariadb.com/v1alpha1
|
||||
kind: Database
|
||||
metadata:
|
||||
name: pterodactyl
|
||||
spec:
|
||||
mariaDbRef:
|
||||
name: mariadb
|
||||
namespace: database
|
||||
characterSet: utf8
|
||||
collate: utf8_general_ci
|
||||
---
|
||||
# yaml-language-server: $schema=https://ks.hsn.dev/k8s.mariadb.com/user_v1alpha1.json
|
||||
apiVersion: k8s.mariadb.com/v1alpha1
|
||||
kind: User
|
||||
metadata:
|
||||
name: pterodactyl
|
||||
spec:
|
||||
mariaDbRef:
|
||||
name: mariadb
|
||||
namespace: database
|
||||
passwordSecretKeyRef:
|
||||
name: pterodactyl-secret
|
||||
key: DB_PASSWORD
|
||||
maxUserConnections: 20
|
||||
host: "%"
|
||||
cleanupPolicy: Delete
|
||||
|
||||
---
|
||||
# yaml-language-server: $schema=https://ks.hsn.dev/k8s.mariadb.com/grant_v1alpha1.json
|
||||
apiVersion: k8s.mariadb.com/v1alpha1
|
||||
kind: Grant
|
||||
metadata:
|
||||
name: grant-pterodactyl
|
||||
spec:
|
||||
mariaDbRef:
|
||||
name: mariadb
|
||||
namespace: database
|
||||
privileges:
|
||||
- ALL PRIVILEGES
|
||||
database: "pterodactyl"
|
||||
table: "*"
|
||||
username: pterodactyl
|
||||
grantOption: true
|
||||
host: "%"
|
31
kubernetes/apps/default/pterodactyl/ks.yaml
Normal file
31
kubernetes/apps/default/pterodactyl/ks.yaml
Normal file
|
@ -0,0 +1,31 @@
|
|||
---
|
||||
# yaml-language-server: $schema=https://ks.hsn.dev/kustomize.toolkit.fluxcd.io/kustomization_v1.json
|
||||
apiVersion: kustomize.toolkit.fluxcd.io/v1
|
||||
kind: Kustomization
|
||||
metadata:
|
||||
name: &app pterodactyl
|
||||
namespace: flux-system
|
||||
spec:
|
||||
targetNamespace: default
|
||||
commonMetadata:
|
||||
labels:
|
||||
app.kubernetes.io/name: *app
|
||||
dependsOn:
|
||||
- name: external-secrets
|
||||
- name: dragonfly-cluster
|
||||
- name: mariadb-cluster
|
||||
- name: rook-ceph-cluster
|
||||
- name: volsync
|
||||
path: ./kubernetes/apps/default/pterodactyl/app
|
||||
prune: true
|
||||
sourceRef:
|
||||
kind: GitRepository
|
||||
name: theshire
|
||||
wait: false
|
||||
interval: 30m
|
||||
timeout: 5m
|
||||
postBuild:
|
||||
substitute:
|
||||
APP: *app
|
||||
GATUS_SUBDOMAIN: "pt"
|
||||
VOLSYNC_CAPACITY: 10Gi
|
|
@ -31,7 +31,7 @@ spec:
|
|||
app:
|
||||
image:
|
||||
repository: ghcr.io/onedr0p/sonarr-develop
|
||||
tag: 4.0.11.2688
|
||||
tag: 4.0.11.2697
|
||||
env:
|
||||
SONARR__APP__INSTANCENAME: Sonarr
|
||||
SONARR__APP__THEME: dark
|
||||
|
|
Reference in a new issue